Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: April 29, 2024 Mon

Time: 10:46 pm

Results for criminal investigation

60 results found

Author: Bhati, Avinash

Title: Quantifying the Specific Deterrent Effects of DNA Databases

Summary: "Forensic science has come to play an increasingly important role in aiding criminal investigations. The field has experienced numerous advances over the last two decade. This has lead courts, practitioners, prosecutors and legislators to embrace the tools it offers, in general, and DNA profiling, in particular. The National Institute of Justice consequently sought applications to study a broad array of social science research issues that these advances have raised. This report describes findings from a project aimed at quantifying the specific deterrent effects of DNA databases. Re-offending patterns of a large cohort of offenders released from Florida Department of Corrections custody between 1996 and 2004 were analyzed. During this period, several important pieces of legislation were passed in Florida requiring convicted felons — convicted of an increasing number of crime types - to submit biological samples for DNA profile extraction and storage in searchable databases. Models constructed to identify the specific deterrent effects of DNA databases distinct from their probative effects yielded mixed results. Small deterrent effects — 2 to 3 percent reductions in recidivism risk attributable to deterrence — were found for only offense categopries (robbery and burglary). Strong probative effects — 20 to 30 percent increase in recidivism risk attributable to probative effects — were uncovered for most offense categories. Methods, data, results and implications are discussed in this report."

Details: Washington, DC: Justice Policy Center, The Urban Institute, 2010. 98p.

Source: Internet Resource; Accessed August 13, 2010 at: http://www.urban.org/uploadedpdf/412058_dna_databases.pdf

Year: 2010

Country: United States

URL: http://www.urban.org/uploadedpdf/412058_dna_databases.pdf

Shelf Number: 118537

Keywords:
Criminal Investigation
Deterrence
DNA Typing
Forensic Science

Author: Justice Project

Title: Electronic Recording of Custodial Interrogations in Tennessee: A Review of Current Practices

Summary: "The application of readily available technology to police work can lead to major benefits for law enforcement agencies. Many jurisdictions across the country, for example, have benefitted from documenting the interrogations of suspects in custody with audio and/or video recording equipment. By creating a fully reviewable record of an interrogation, prosecutors get the best, most reliable evidence possible. Legislation has been introduced in the Tennessee General Assembly (HB 596 and SB 261) that would require electronic recording of custodial interrogations in homicide cases in Tennessee. Under the proposed law, if an interrogation is not recorded for some reason it would still be admissible in court, as it is today. The legislation would simply extend this valuable evidencegathering policy, already employed in many Tennessee jurisdictions, to law enforcement departments statewide. In order to understand the current use of electronic recording in Tennessee, The Justice Project conducted a statewide survey of law enforcement agencies and requested copies of any written policies on recording interrogations. The results indicate that a majority of Tennessee law enforcement agencies electronically record interrogations at least some of the time, and report that the practice strengthens the credibility and reliability of criminal investigations and prosecutions. This report presents the results of The Justice Project’s survey and details the advantages of statewide implementation of electronic recording of custodial interrogations."

Details: Washington, DC: The Justice Project, 2010. 8p.

Source: Internet Resource: Accessed August 22, 2010 at: http://www.thejusticeproject.org/wp-content/uploads/er-in-tennessee-report.pdf

Year: 2010

Country: United States

URL: http://www.thejusticeproject.org/wp-content/uploads/er-in-tennessee-report.pdf

Shelf Number: 119661

Keywords:
Criminal Investigation
Interrogation
Interviewing in Law Enforcement
Police Questioning

Author: Seattle (Washington). Office of City Auditor

Title: Cal Anderson Park Surveillance Camera Pilot Program Evaluation

Summary: From January through February 2008, the City of Seattle installed three surveillance cameras in Capitol Hill’s Cal Anderson Park. In June 2008, the Seattle City Council adopted an ordinance that created the Surveillance Camera Pilot Program and established controls over the cameras’ use. The ordinance governing the pilot program requires that the City Auditor conduct a program evaluation to address: Departmental compliance with the policies of the ordinance; The effect of the cameras on crime deterrence; The effect of the cameras on crime detection and investigation; and The effect of the cameras on the public perception of safety. This program evaluation is intended to help the Seattle City Council decide whether to grant additional authority to the Department of Parks and Recreation, the Seattle Police Department, and the Department of Information Technology to operate surveillance cameras in Cal Anderson Park, or to install surveillance cameras in other City parks.

Details: Seattle, WA: Office of City Auditor, 2009. 82p.

Source: Internet Resource: Accessed September 16, 2010 at: http://www.cityofseattle.net/audit/docs/2009Oct_PublishedReportSurveillanceCameras.pdf

Year: 2009

Country: United States

URL: http://www.cityofseattle.net/audit/docs/2009Oct_PublishedReportSurveillanceCameras.pdf

Shelf Number: 119819

Keywords:
Criminal Investigation
Deterrence
Parks
Prevention
Situational Crime
Video Surveillance

Author: North Carolina Governor's Crime Commission, Criminal Justice Analysis Center

Title: Computer Crime in North Carolina: Assessing the Needs of Local Law Enforcement

Summary: Crimes with a cyber component once included acts such as hacking, financial fraud, theft of intellectual property and so on. Recently, crimes of this nature have evolved as citizens become more technology-savvy and gain easier access to computers. Many would agree that without proper investigative training and tools, successful prosecution of these crimes can never occur. While the primary purpose of this exploratory study is to assess investigative needs of law enforcement, the study also seeks to examine the prevalence of computer crime in North Carolina along with current procedures and activities surrounding it. An 18-item questionnaire was developed to measure the impact of cyber crime on investigations and to determine both the strengths and weaknesses of law enforcement in dealing with crimes containing a cyber component. Part one focused on the number and types of cyber crimes experienced while part two pertained specifically to computer-mediated crime. Open-ended questions throughout the survey provided respondents with the opportunity to suggest additional training initiatives and share additional comments on what steps can be taken to lessen the extent of crimes with a cyber component. Two distinct survey samples from police departments and sheriffs’ offices were randomly selected to receive a survey by mail. Samples excluded airport, college/university, hospital and state agencies. A total of 80 surveys were distributed to sheriffs’ offices and a total of 183 surveys were sent to police departments. This comprised 80 percent of all sheriffs’ offices and almost 53 percent of the total number of local police departments being surveyed. The combined jurisdictional resident population of surveyed agencies comprised over 71 percent of the state’s total resident population. A total of 127 surveys were completed and returned by law enforcement agencies equating to a 48.3 percent response rate. The combined jurisdictional resident population of responding agencies comprised over 46 percent of the state’s total resident population. Seventy-one counties were represented with at least one responding agency. In 2008, responding agencies indicated that roughly 6 percent of investigations contained a cyber component. Based on a linear projection, there were approximately 26,257 cases statewide containing a cyber component in 2008. This equates to 294.1 cases per 100,000 residents, a rate which is comparable to the rate of aggravated assaults and motor vehicle thefts reported in North Carolina. The three most frequently investigated computer crimes by an average reporting agency were fraud related (79.3%), criminal threatening (8.5%), and online enticement of minors/child pornography (4.9%). Cumulatively, respondents indicated that 198 (26.6%) of 745 investigators have received training, with the average agency reporting that one-third of their investigators had been trained. Fifty-two percent of agencies indicated that investigators had receiving local or inhouse training while 54 percent and 27 percent of agencies indicated training at the state and national levels respectively. Over 85 percent of respondents indicated that their agencies collect computer/electronic evidence during investigation. However, only about two-thirds of these agencies reported having standard protocols established for handling evidence of this nature. The inability to trace and monitor Internet communications and the lack of training were seen as the two largest investigative impediments for crimes with a cyber component. Another substantial concern by law enforcement is the public’s apathy and lack of awareness towards crimes with a cyber component. Respondents were either indifferent or minimally concerned about the lack of standard operating procedures, search warrant issues, jurisdictional issues, lack of information sharing, and lack of technical expertise due to staff turnover. At the time of survey, roughly four out of every 10 agencies actually conducted cyber crime prevention or awareness activities and just over 30 percent were involved in official partnerships with other agencies or private entities to combat cyber crime. Over two-thirds of agencies expressed that they were either totally unprepared or somewhat unprepared in terms of equipment. Similarly, over half of respondents felt unprepared in terms of training and about 60 percent believed they were unprepared in terms of personnel. Law enforcement responded more positively in regards to their coordination with other agencies. Although over one-third of agencies answered neutrally, almost 39 percent of agencies believed they were prepared. Computer-mediated crime was briefly examined as it is one of the newest types of crime involving computers and is likely to expand in coming years. For the purposes of this study, computer-mediated crimes are defined as those traditional types of crime (theft, robbery, rape, assault, etc.) that are furthered either by the use of a computer or electronic device. Many cases were mediated through means of the Internet with crimes ranging from robberies facilitated by Craigslist to statutory rape through meeting over MySpace to burglaries perpetrated after taking virtual tours of rental properties. As a whole, law enforcement slightly agreed that they lack the power to prevent or curtail computer-mediated crime. In fact, half of respondents agreed that they have little power to curtail these types of crime in comparison to only under one-fourth of agencies who disagreed. A much higher level of agreement was measured regarding the expected growth of computer-mediated crime. Overwhelmingly, agencies agreed that their jurisdiction will experience an increase in computer-mediated crime in the next five years. One-half of respondents agreed coupled with an additional one-third who strongly agreed that legislators should enhance penalties for traditional crimes mediated by a computer or electronic device. When surveyed about the adequacy of current North Carolina statutes for prosecuting cyber crime perpetrators, law enforcement responses were most commonly neutral. However, interestingly enough, no respondents strongly agreed and only 19 percent of respondents agreed that current statutes are adequate enough. Lastly, the survey measured opinions on whether introduction of a bill was needed in North Carolina to impede computerrelated victimization. New Jersey State Legislative Bill A2864/S1429 makes it a crime of the third degree if a person attempts, via electronic or any other means, to lure or entice a person into a motor vehicle, structure or isolated area, or to meet or appear at any place, with a purpose to commit a criminal offense with or against the person lured or enticed or against any other person. Over 87 percent of respondents believed introduction of a similar bill is needed in North Carolina. Study findings revealed several areas of concern related to the investigation of computer-related crime. According to remarks, it appears investigators and prosecutors are disconnected when dealing with crimes involving a cyber component. Funding consideration should be given to establish pilot sites for joint training sessions between detectives and prosecutors among neighboring judicial districts across the state. In addition, equipment, training and personnel must all be enhanced in hopes of curtailing cyber crimes including computer-mediated crimes.

Details: Raleigh, NC: Governor's Crime Commission, 2010. 22p.

Source: Internet Resource: Accessed March 8, 2011 at: http://www.ncgccd.org/pdfs/pubs/cybercrime.pdf

Year: 2010

Country: United States

URL: http://www.ncgccd.org/pdfs/pubs/cybercrime.pdf

Shelf Number: 120890

Keywords:
Computer Crimes (North Carolina)
Criminal Investigation
Cybercrime
Internet Crimes

Author: Braga, Anthony A.

Title: Moving the Work of Criminal Investigators Towards Crime Control

Summary: This paper points out the challenges to police executives in moving the work of criminal investigators towards a more active role in crime control. The paper provides research on the effectiveness of criminal investigators, the problem-oriented approach to crime control, and intelligence-led policing. The authors suggest ways to allocate proactive and problem-solving work between criminal investigators and patrol officers. The paper concludes with examples by the authors of moving the work of criminal investigators at the Milwaukee Police Department, the New York Police Department, the Victoria

Details: Washington, DC: U.S. National Institute of Justice; Cambridge, MA: Harvard Kennedy School Program in Criminal Justice Policy and Management, 2011. 38p.

Source: Internet Resource: New Perspectives in Policing: Accessed March 17, 2011 at: http://www.ojp.usdoj.gov/nij/pubs-sum/232994.htm

Year: 2011

Country: International

URL: http://www.ojp.usdoj.gov/nij/pubs-sum/232994.htm

Shelf Number: 121046

Keywords:
Criminal Investigation
Intelligence-Led Policing
Problem-Oriented Policing
Problem-Solving

Author: U.S. Department of Justice. Office of Justice Programs. Bureau of Justice Assistance

Title: An Assessment of the New Orleans Police Department Homicide Section: Recommendations for Best Practices

Summary: This study examined how homicides in New Orleans are investigated and ways to improve those investigations. A team of experts in law enforcement reviewed NOPD crime data, procedures, and homicide case files to arrive at their conclusions. The team also conducted more than 120 hours of interviews with NOPD officers, management personnel , non-sworn personnel, and Assistant District Attorneys during the Third and Fourth Quarter of 2010. One of the problems they encountered with the NOPD Homicide division is that they believe the culture is dated, and reflects past practice rather than current models, methods and technologies. The researchers also believe some processes need reengineering, while others need refining. In all, this report provides 82 recommendations to better the Homicide division. But – to quote the report: “The positive point is that most problems do not appear to be endemic- rather, they are resolvable, albeit some are easier than others.” The report also notes in its conclusion that the NOPD has been moving to implement needed changes.

Details: Washington, DC: U.S. Department of Justice, Bureau of Justice Assistance, 2010. 57p.

Source: Internet Resource: Accessed April 8, 2011 at: http://www.nola.gov/en/PRESS/City-Of-New-Orleans/All-Articles/~/media/C20063D63F4F45BB93788C40B2CA8370.ashx

Year: 2010

Country: United States

URL: http://www.nola.gov/en/PRESS/City-Of-New-Orleans/All-Articles/~/media/C20063D63F4F45BB93788C40B2CA8370.ashx

Shelf Number: 121278

Keywords:
Criminal Investigation
Homicide (New Orleans)

Author: Poot, C.J. de

Title: Jihadi Terrorism in the Netherlands: A Description Based on Closed Criminal Investigations

Summary: What is the nature of jihadist terrorism in the Netherlands at the outset of the 21st century when we base our analysis on information the police gathered about this phenomenon? That is the core question of this research. In order to increase the understanding of jihadist terrorism, the knowledge collected by the police during criminal investigations into jihadist activities has been analysed systematically. When we refer to jihadist activities, we mean activities which are aimed at making a contribution to the armed fight against the West and against other perceived enemies of Islam. For the purpose of this research, we analysed a total of twelve (large-scale) criminal investigations that were conducted in the Netherlands in the period between July 2001 and July 2005. In doing so, we have sketched the portrait of an era. The most recent criminal investigation we analysed was conducted in the spring of 2005. We cannot make any projection about the manner in which the phenomenon of jihadism has changed since then under the influence of national or international developments. We have based this research on police files. This entails considerable restrictions. Firstly, not all jihadist activities come to the knowledge of the police and the police do not initiate criminal investigations into all jihadist activities which come to their knowledge. Secondly, we only selected a part of the cases which have been investigated during the research period. This selection may have influenced our perception. Thirdly, we have based this research on the information gathered by investigation teams which had the aim of reconstructing terrorist crimes and submitting these to the court substantiated by evidence. This focus of the investigation teams, their investigation hypotheses and the related selection and interpretation of information has also influenced our perception. The findings presented below must be seen in this light. For the purpose of obtaining an objective analysis of the available investigation material, but also because different criminal investigations into jihadist activities are often interrelated, we considered the selected investigation material in its entirety, and chose to rely less on the structures of the separate criminal investigations. The raw empirical material was subsequently restructured, so that groups of cooperating persons and joint activities could be examined together. In analysing this material, we focused on three dimensions of this phenomenon: (1) jihadist cooperations; (2) the activities performed in these cooperations and (3) the jihadist actors.

Details: The Hague: Boom Juridische uitgevers, 2011. 176p.

Source: Internet Resource: Onderzoek en beleid, 291: Accessed April 12, 2011 at: http://english.wodc.nl/onderzoeksdatabase/1381a-jihadist-terrorism-in-the-netherlands-a-description-based-on-closed-criminal-investigations.aspx?cp=45&cs=6796

Year: 2011

Country: Netherlands

URL: http://english.wodc.nl/onderzoeksdatabase/1381a-jihadist-terrorism-in-the-netherlands-a-description-based-on-closed-criminal-investigations.aspx?cp=45&cs=6796

Shelf Number: 121318

Keywords:
Criminal Investigation
Extremist Groups
Islam
Terrorism (Netherlands)
Terrorists

Author: Smith, Alison M.

Title: Law Enforcement Use of Global Positioning (GPS) Devices to Monitor Motor Vehicles: Fourth Amendment Considerations

Summary: As technology continues to advance, what was once thought novel, even a luxury, quickly becomes commonplace, even a necessity. Global Positioning System (GPS) technology is one such example. Generally, GPS is a satellite-based technology that discloses the location of a given object. This technology is used in automobiles and cell phones to provide individual drivers with directional assistance. Just as individuals are finding increasing applications for GPS technology, state and federal governments are as well. State and federal law enforcement use various forms of GPS technology to obtain evidence in criminal investigations. For example, federal prosecutors have used information from cellular phone service providers that allows real-time tracking of the locations of customers’ cellular phones. Title III of the Omnibus Crime Control and Safe Streets Act of 1958 (P.L. 90-351) regulates the interception of wire, oral, and electronic communications. As such, it does not regulate the use of GPS technology affixed to vehicles and is beyond the scope of this report. The increased reliance on GPS technology raises important societal and legal considerations. Some contend that law enforcement’s use of such technology to track motor vehicles’ movements provides for a safer society. Conversely, others have voiced concerns that GPS technology could be used to reveal information inherently private. Defendants on both the state and federal levels are raising Fourth Amendment constitutional challenges, asking the courts to require law enforcement to first obtain a warrant before using GPS technology. Subject to a few exceptions, the Fourth Amendment of the U.S. Constitution requires law enforcement to obtain a warrant before conducting a search or making a seizure. Courts continue to grapple with the specific issue of whether law enforcement’s use of GPS technology constitutes a search or seizure, as well as the broader question of how the Constitution should address advancing technology in general. The Supreme Court has not directly addressed the issue of whether law enforcement’s use of GPS technology in connection with motor vehicles falls within the Fourth Amendment’s purview. Lower federal courts have relied on Supreme Court precedent to arrive at arguably varying conclusions. For example, several district and circuit courts of appeals have concluded that law enforcement’s current use of GPS technology does not constitute a search, and is thus permissible, under the Constitution. To date, while the U.S. Supreme Court has not provided a definitive answer regarding law enforcement’s use of GPS technology, state legislatures and courts have approached the issue in various ways. Some states have enacted laws requiring law enforcement to obtain a warrant before using GPS technology. Some state courts have resolved the question under their own constitutions. Although they have reached somewhat differing conclusions, other state courts have relied on Supreme Court precedent, such as United States v. Knotts, 460 U.S. 276 (1983), to derive an answer. This report discusses the basics of GPS technology, society’s reliance on it, and some of the related legal and privacy implications. In addition, the report examines legislative and judicial responses on both federal and state levels.

Details: Washington, DC: Congressional Research Service, 2011. 15p.

Source: Internet Resource: CRS Report R41663: Accessed May 11, 2011 at: http://www.fas.org/sgp/crs/misc/R41663.pdf

Year: 2011

Country: United States

URL: http://www.fas.org/sgp/crs/misc/R41663.pdf

Shelf Number: 121707

Keywords:
Criminal Investigation
Fourth Amendment
Global Positioning Devices
Search and Seizure
Technology

Author: Lanning, Kenneth V.

Title: Child Molesters: A Behavioral Analysis For Professionals Investigating the Sexual Exploitation of Children. 5th ed.

Summary: The sexual victimization of children involves varied and diverse dynamics. It can range from one-on-one intrafamilial abuse to multioffender/multivictim extrafamilial sex rings and from nonfamily abduction of toddlers to prostitution of teenagers. Sexual victimization of children can run the gamut of “normal” sexual acts from fondling to intercourse. The victimization can also include deviant sexual behavior involving more unusual conduct (e.g., urination, defecation, playing dead) that often goes unrecognized, including by statutes, as possibly being sexual in nature. There are, therefore, no step-by-step, rigid investigative standards that are applicable to every case or circumstance. Investigative approaches and procedures have to be adjusted based on the dynamics of the case. Larger law-enforcement agencies tend to have more specialized investigative units that investigate the different types of cases. One unit might investigate intrafamilial, child-abuse cases; another might investigate missing-, abducted-, or murdered-children cases; and another might investigate extrafamilial, sexual-exploitation cases. Offenders, however, sometimes cross these investigative categories. For example a father might produce and distribute child pornography images of his own child or might molest other children in addition to his own. Investigators have to be trained and prepared to address these diverse realities. This discussion will focus primarily on the behavioral aspects of the sexual exploitation of children perpetrated by adult offenders who have an acquaintance relationship (i.e., not strangers or family members) with their child victims. Some of the information, however, could have application to acquaintance juvenile offenders and other types of child-molestation cases. Although some legal and technical aspects involved in these cases will be discussed, those are not my areas of expertise. The law and emerging technology can change rapidly and significantly in a short time. Experts in those areas should be consulted before applying this information, but underlying human behavior tends to remain the same. The concept of the acquaintance molester and other related terms will be defined and insight will be provided into the behavioral patterns of offenders and victims in such cases. For purposes of this publication, investigation is defined as any objective, fact-finding process. This certainly includes the work of law enforcement and prosecutors, but may also sometimes include the work of other professionals such as social workers, forensic mental-health or medical personnel, and youth-serving organizations. One major goal of this publication is to increase objectivity and professionalism in these investigations. This is the fifth edition of this publication.

Details: Alexandria, VA: National Center for Missing & Exploited Children, 2010. 212p.

Source: Internet Resource: accessed July 28, 2011 at: http://www.missingkids.com/en_US/publications/NC70.pdf

Year: 2010

Country: United States

URL: http://www.missingkids.com/en_US/publications/NC70.pdf

Shelf Number: 122223

Keywords:
Child Molestation
Child Pornography
Child Sexual Abuse
Criminal Investigation
Missing Children
Missing Persons (U.S.)
Sex Offenders
Sex Offenses

Author: Lawson, Philippa

Title: Responding to Victims of Identity Crime: A Manual for Law Enforcement Agents, Prosecutors and Policy-Makers

Summary: Identity crime is a serious crime with potentially devastating effects on individual victims. With recent amendments to the Canadian Criminal Code creating new offences for identity theft and identity fraud, it is incumbent on law enforcement to take reports of such crime and to investigate them thoroughly. It is also incumbent on law enforcement to assist victims by providing appropriate advice and referrals. This Manual is designed to support and strengthen the understanding of Canadian law enforcement officers, investigators, prosecutors and policy-makers about victims of identity related crime, so as to better assist victims of these types of crimes and ultimately to reduce the incidence and impact of such crimes. Improving law enforcement response to victims not only serves to help victims recover their reputations and prevent further damage, but it also contributes to the identification and prosecution of identity criminals. The manual includes six modules and several printable appendices for use by police officers and investigators in their daily operations. It is designed to be useful both as a quick reference tool in specific cases and as a more detailed source of information for professional training purposes.

Details: Vancouver: International Centre for Criminal Law Reform and Criminal Justice Policy, 2011. 113p.

Source: Internet Resource: Accessed September 17, 2011 at: http://www.icclr.law.ubc.ca/files/identity_crime/00%20Victims%20of%20Identity%20Crime%20Manual.pdf

Year: 2011

Country: Canada

URL: http://www.icclr.law.ubc.ca/files/identity_crime/00%20Victims%20of%20Identity%20Crime%20Manual.pdf

Shelf Number: 122771

Keywords:
Criminal Investigation
Identity Theft (Canada)
Victims of Crime

Author: Peterson, Joseph

Title: Sexual Assault Kit Backlog Study

Summary: Sexual assault is one of the most serious crimes facing society and, over the past several decades, increasing attention has been paid to the proper collection of physical evidence from victims to document and reconstruct the crime, to identify the assailant, and to aid in the prosecution of the assailant. When victims report such offenses to the police and are examined at hospitals, medical personnel employ sexual assault kits and accompanying protocols to guide the collection of evidence from the victim. Sexual assault kit (SAK) report forms also record important information from the victim about activities prior to, during and after the assault. Given the likely transfer of biological secretions in such crimes, sexual assault kits and DNA evidence have the power to verify the crime and pinpoint the identity of the assailant. The probative value of such scientific evidence, however, depends largely on the circumstances of the particular case, being pivotal in one instance and less important in another. Although law enforcement agencies and hospitals have greatly improved and expanded procedures to gather sexual assault kit evidence, scientific resources and procedures to test such evidence have not kept pace. The National Institute of Justice staff, researchers and investigative journalists have uncovered the fact that backlogged and untested sexual assault kits (SAKs) are a major problem facing forensic crime laboratories and law enforcement agencies throughout the United States. The combined untested SAKs from the Los Angeles Sheriff’s Department (LASD) and Los Angeles Police Department (LAPD) reached 10,895 cases in the fall of 2008. As the result of growing public concern, Human Rights Watch undertook a study in Los Angeles to document reasons behind the accumulation of these untested kits and found a number of organizational and resource deficiencies throughout the city and county. They were not crime laboratory backlogs per se but were untested kits held in police property rooms in cold storage, where investigators and prosecutors had not requested that the SAK be tested. In 2009, however, the chief executives of Los Angles city and county law enforcement agencies announced that all backlogged kits would be tested, using outside private DNA testing laboratories. The untested sexual assault kit problem in Los Angeles, coupled with the fact that agencies had decided to test all such kits for the presence of DNA evidence, presented a unique research opportunity. The Sexual Assault Kit Backlog Project at California State University, Los Angeles (CSULA) was funded by the National Institute of Justice (NIJ) in 2009 to accomplish four primary objectives: 1) evaluate the results of scientific tests performed by private laboratories on backlogged sexual assault kit (SAK) evidence from the LASD and LAPD crime laboratories, 2) review the sexual assault case processing literature and the role played by evidence and other factors in solving and prosecuting such cases; 3) determine the criminal justice dispositions of a sample of backlogged and non-backlogged cases before and after kit testing; and 4) identify principal case and evidence characteristics that could be used by forensic laboratories to evaluate and prioritize sexual assault evidence submitted to crime laboratories. The accomplishment of such goals would aid all law enforcement agencies and associated crime laboratories about the value of testing backlogged sexual assault kits and to set guidelines for processing such evidence in the future.

Details: Los Angeles: California State University - Los Angeles, School of Criminal Justice & Criminalistics, 2012. 133p.

Source: Internet Resource: Accessed june 28, 2012 at: https://www.ncjrs.gov/pdffiles1/nij/grants/238500.pdf

Year: 2012

Country: United States

URL: https://www.ncjrs.gov/pdffiles1/nij/grants/238500.pdf

Shelf Number: 125377

Keywords:
Criminal Evidence
Criminal Forensics
Criminal Investigation
DNA Typing
Rape
Rapists
Sexual Assault (U.S.)

Author: Chorney, Brenda

Title: Organized Crime Integrated Units: Analysis Report

Summary: Public Safety Canada is maintaining a National Research Agenda on Organized Crime in support of the National Coordinating Committee on Organized Crime (NCC). As a step in this process, Public Safety Canada contracted PRA Inc., an independent research company, to compile an inventory of organized crime integrated teams and units1 operating across Canada and to conduct further analysis of a subset of the identified integrated units. An important component of combating organized crime is a collaborative integrated approach. The inventory will provide a greater understanding of the integrated teams operating across Canada, and, as such, will identify existing teams and units, as well as some basic information on each unit. The analysis component examines a subset of the integrated units identified through the inventory phase to gain a greater understanding of the operational aspects, challenges, and keys to success for these units. This report presents the findings for the analysis component. The report also incorporates information obtained while compiling the inventory database.

Details: Ottawa: Research and National Coordination, Organized Crime Division, Law Enforcement and Policing Branch, Public Safety Canada, 2010. 50p.

Source: Internet Resource: Accessed July 7, 2012 at: http://publications.gc.ca/collections/collection_2012/sp-ps/PS4-101-2010-eng.pdf

Year: 2010

Country: Canada

URL: http://publications.gc.ca/collections/collection_2012/sp-ps/PS4-101-2010-eng.pdf

Shelf Number: 125500

Keywords:
Criminal Investigation
Law Enforcement Collaboration
Organized Crime (Canada)
Police Investigations

Author: Great Britain. Parliament. House of Commons. Home Affairs Committee

Title: Private Investigators: HC 100, Fourth Report of Session 2012-13 - Report, Together with Formal Minutes, Oral and Written Evidence

Summary: The report 'Private Investigators (HC 100)' concludes that it is getting easier for anyone to advertise themselves as a private investigator - with modern communications and cheap surveillance devices; and while the industry remains unregulated, a number of serious risks must be explored - concerning the involvement of private investigators in the justice system and law enforcement, and the threat of corruption those links entail. The Committee recommends that the Government set up a robust licensing and registration system as soon as possible. Private investigators and their companies should be governed by a new Code of Conduct for Private Investigators. Under this system a criminal record for breach of section 55 should disqualify an individual from their operations. The report also proposes that dealings between police and investigators should be recorded, and that there should be a one year cooling off period between serving as a police officer and entering the investigation industry. While recognising the honest contribution made by most private investigators, this report highlights the involvement of some private investigators in the illegal market of personal data and calls again on the Government to strengthen the penalties for data offences. The Independent Police Complaints Commission must also take direct control over investigations in cases alleging police corruption in relation to private investigators.

Details: London: The Stationery Office Limited, 2012. 127p.

Source: Internet Resource: Accessed July 23, 2012 at: www.parliament.uk/homeaffairscom

Year: 2012

Country: United Kingdom

URL:

Shelf Number: 125715

Keywords:
Criminal Investigation
Private Investigators (U.K.)

Author: Doleac, Jennifer L.

Title: The Effects of DNA Databases on Crime

Summary: Since 1988, every US state has established a database of criminal offenders’ DNA profiles. These databases have received widespread attention in the media and popular culture, but this paper provides the first rigorous analysis of their impact on crime. DNA databases are distinctive for two reasons: (1) They exhibit enormous returns to scale, and (2) they work mainly by increasing the probability that a criminal is punished rather than the severity of the punishment. I exploit the details and timing of state DNA database expansions in two ways, first to address the effects of DNA profiling on individual’s subsequent criminal behavior and then to address the impacts on crime rates and arrest probabilities. I first show that profiled violent offenders are more likely to return to prison than similar, unprofiled offenders. This suggests that the higher probability of getting caught outweighs the deterrent effect of DNA profiling. I then show that larger DNA databases reduce crime rates, especially in categories where forensic evidence is likely to be collected at the scene—e.g., murder, rape, assault, and vehicle theft. The probability of arresting a suspect in new crimes falls as databases grow, likely due to selection effects. Back-of-the-envelope estimates of the marginal cost of preventing each crime suggest that DNA databases are much more cost-effective than other common law enforcement tools.

Details: Charlottesville, VA: Frank Batten School of Leadership and Public Policy, University of Virginia,, 2012. 65p.

Source: Internet Resource: Working Paper: Accessed March 4, 2013 at: http://www.batten.virginia.edu/sites/default/files/fwpapers/Doleac_DNADatabases_0.pdf

Year: 2012

Country: United States

URL: http://www.batten.virginia.edu/sites/default/files/fwpapers/Doleac_DNADatabases_0.pdf

Shelf Number: 127821

Keywords:
Criminal Deterrence
Criminal Investigation
DNA Fingerprinting
DNA Typing

Author: Bjelopera, Jerome P.

Title: The Federal Bureau of Investigation and Terrorism Investigations

Summary: The Federal Bureau of Investigation (FBI, the Bureau) is the lead federal law enforcement agency charged with counterterrorism investigations. Since the September 11, 2001 (9/11) attacks, the FBI has implemented a series of reforms intended to transform itself from a largely reactive law enforcement agency focused on investigations of criminal activity into a more proactive, agile, flexible, and intelligence-driven agency that can prevent acts of terrorism. This report provides background information on key elements of the FBI terrorism investigative process based on publicly available information. It discusses • several enhanced investigative tools, authorities, and capabilities provided to the FBI through post-9/11 legislation, such as the USA PATRIOT Act of 2001; the 2008 revision to the Attorney General’s Guidelines for Domestic FBI Operations (Mukasey Guidelines); and the expansion of Joint Terrorism Task Forces (JTTF) throughout the country; • intelligence reform within the FBI and concerns about the progress of those reform initiatives; • the FBI’s proactive, intelligence-driven posture in its terrorism investigations using preventative policing techniques such as the “Al Capone” approach and the use of agent provocateurs; and • the implications for privacy and civil liberties inherent in the use of preventative policing techniques to combat terrorism. This report sets forth possible considerations for Congress as it executes its oversight role. These issues include the extent to which intelligence has been integrated into FBI operations to support its counterterrorism mission and the progress the Bureau has made on its intelligence reform initiatives.

Details: Washington, DC: Congressional Research Service, 2013. 30p.

Source: Internet Resource: R41780: Accessed May 3, 2013 at: http://www.fas.org/sgp/crs/terror/R41780.pdf

Year: 2013

Country: United States

URL: http://www.fas.org/sgp/crs/terror/R41780.pdf

Shelf Number: 128611

Keywords:
Criminal Investigation
Terrorism (U.S.)

Author: Paine, Colin

Title: Solvability Factors in Dwelling Burglaries in Thames Valley

Summary: This study replicates previous research aimed at identifying those factors associated with solved residential burglaries. This study analyses all cases of residential burglary in Thames Valley between 1st March 2010 and 31st October 2011. Analysis identified a host of factors correlated to solved cases, but of these just 12 are recognised as effective solvability factors. This study confirms the findings of previous studies in identifying the following variables as effective solvability factors, a) fingerprints recovered; b) offender seen; c) witness recorded; d) offender’s vehicle sighted; e) offender disturbed; f) description of the suspect is recorded. However, this study advances the list of known solvability factors further by identifying six new variables that were traditionally overlooked and some of which result from advances in science, these are a) footwear marks; b) DNA; c) citizens’ reports on the burglary being in progress, d) the stolen property is recovered; e) articles left the scene by the offender and f) whether a vehicle was stolen in the crime. The magnitude of these effects, measured with standardised mean differences, suggest that the presence of these factors is strongly associated with solvability, some with very large effect sizes often exceeding Cohen’s d = 1.0. The analyses suggest that over 50% of all burglaries had one or more solvability factors present, and having one or more of these solvability factors was associated with over 60% accuracy in detection. If used as a screening tool, this solvability analysis approach Thames Valley Police would be required to investigate just over 40% of cases for investigation, as all other cases are unlikely to be solved. The policy implications of using solvability factors analysis is clear; implementing this approach as a screening tool enables police leaders to choose a suitable cut-off point that will allow an optimal balance between resource usage and detection levels. Sensitivity analysis identified that the geographical distribution of burglary solvability factors across Thames Valley is not even. The policy implication being that differential targets may offer a fairer and more effective incentive to police area commanders instead of force wide targets.

Details: Cambridge, UK: University of Cambridge, 2012. 153p.

Source: Internet Resource: Thesis: Accessed May 29, 2013 at: http://library.college.police.uk/docs/Burglary-Solvability-2013.pdf

Year: 2012

Country: United Kingdom

URL: http://library.college.police.uk/docs/Burglary-Solvability-2013.pdf

Shelf Number: 128847

Keywords:
Crime Analysis
Criminal Investigation
Residential Burglary (U.K.)
Stolen Property

Author: Stevenson, Olivia

Title: Geographies of Missing People: Processes, Experiences, Responses

Summary: Missing people have a presence and an impact in our everyday lives. A person in the UK is recorded as missing by the police approximately every two minutes and a wealth of agencies – police, charities, health, social workers – are charged with searching for, and supporting those left behind. However, there is a paucity of UK based qualitative research conducted directly with adults reported as missing about their experiences. The Geographies of Missing People research study has been designed to explore why adults leave, but more particularly, where they go and what happens while they are missing. The overall intention of the research is to create a new space of enquiry around missing experience, with direct reference to the people who experience its profound effects (and see also Parr et al (forthcoming) ‘Searching for missing people: families and missing experience’).

Details: Glasgow: University of Glasgow, 2013. 118p.

Source: Internet Resource: Accessed June 26, 2013 at: http://www.geographiesofmissingpeople.org.uk/downloads/Stevenson-et-al.pdf

Year: 2013

Country: United Kingdom

URL: http://www.geographiesofmissingpeople.org.uk/downloads/Stevenson-et-al.pdf

Shelf Number: 129164

Keywords:
Criminal Investigation
Missing Persons (U.K.)

Author: Annison, Rachel

Title: In the Dock: Examining the UK's Criminal Justice Response to Trafficking

Summary: In the Dock is The Anti-Trafficking Monitoring Group’s (ATMG) third report. The ATMG continues its unique task of monitoring and evaluating the UK’s performance in implementing the Council of Europe Convention on Action against Trafficking in Human Beings and the EU Directive 2011/36/EU on preventing and combating trafficking in human beings and protecting its victims. This report examines the effectiveness of trafficking investigations and prosecutions through the UK Criminal Justice System (CJS) in terms of law, policy and practice. In particular, the report focuses on: • Obstacles that impede an effective criminal justice response to trafficking; • The UK’s ability to ensure its obligations to protect trafficked persons participating in criminal proceedings; • Adherence to the requirement not to criminalise trafficked persons; and • Presenting examples of good practice from within the UK and abroad wherever possible. The ATMG was pleased to find examples of localised good practice and outstanding work by the police, prosecutors and judges that led to trafficking convictions. We found that successful trafficking prosecutions are commonly linked to areas where specialism is developed within the police and other criminal justice actors, or where multi-agency and international partnerships were put into place. The research found that such examples were often the product of individual efforts, dedication and deeper understanding of the problem. Unfortunately, these excellent examples do not represent the situation overall in the UK, as the CJS is yet to develop an efficient response to trafficking that tackles this egregious crime as a priority. The ATMG concludes that the UK is at risk of losing the fight against human trafficking unless it urgently develops a systematic criminal justice response. In particular, the ATMG is concerned that: 1. Human trafficking is not a policing priority despite the Government’s commitment to make the UK a hostile environment for traffickers; 2. There is no unified law against human trafficking in the statute books, often leaving criminal justice actors uncertain about how to identify the crime and prosecute traffickers; 3. Despite the steady increase in the number of potential trafficked persons identified, the number of traffickers punished for trafficking offences has decreased; 4. In comparison, evidence suggests that many trafficked persons are prosecuted for crimes they were compelled to commit while their traffickers enjoy impunity; 5. The impact of trafficking on victims is often misunderstood by criminal justice actors, resulting in inappropriate responses that hamper the trafficked persons’ ability to act as a witness and may potentially cause them further harm.

Details: London: Anti-Trafficking Monitoring Group, 2013. 162p.

Source: Internet Resource: Accessed July 16, 2013 at: http://www.ecpat.org.uk/sites/default/files/in_the_dock_atmg_2013.pdf

Year: 2013

Country: United Kingdom

URL: http://www.ecpat.org.uk/sites/default/files/in_the_dock_atmg_2013.pdf

Shelf Number: 129417

Keywords:
Child Trafficking
Criminal Investigation
Criminal Prosecution
Human Trafficking (U.K.)
Victims Services

Author: U.S. Department of Defense. Inspector General

Title: Evaluation of the Military Criminal Investigative Organizations Sexual Assault Investigations

Summary: We evaluated the Military Criminal Investigative Organizations’ (MCIOs’) sexual assault investigations completed in 2010 to determine whether they completed investigations as required by DoD, Military Service, and MCIO guidance. Our evaluation focused on the following question: Did the MCIOs investigate sexual assaults as required by guiding policies and procedures? Findings • Most MCIO investigations (89 percent) met or exceeded the investigative standards. • We returned cases with significant deficiencies (11 percent) to the MCIOs for corrective action. • Although 83 cases had no deficiencies, most of the remaining investigations had deficiencies that were not deemed significant. • The U.S. Army Criminal Investigation Command (CID) and Air Force Office of Special Investigations (AFOSI) policy guidance does not direct the collection of clothing articles that a victim or suspect might have placed on themselves shortly after the assault, if different from the clothing worn during the assault. • Naval Criminal Investigative Service (NCIS) policy does not require NCIS investigators to notify or coordinate with their servicing judge advocate(s) upon initiating an investigation. • CID guidance regarding records checks does not provide a definitive timeliness requirement. NCIS policy on this topic needs improvement. • NCIS needs policy to require Sexual Assault Response Coordinator (SARC) notifications and documentation. Recommendations • The Director and Commanders of the MCIOs implement measures to improve crime scene processing, evidence collection, supervision, and documentation to reduce investigative deficiencies. • The Commanders of CID and AFOSI evaluate their existing policies regarding the collection of clothing worn by suspects and victims subsequent to a sexual assault. • The Director of NCIS evaluate current policy regarding the timely notification and coordination with servicing judge advocates upon the initiation of sexual assault cases, as well as the continued coordination with the servicing judge advocates until final case disposition. • The Commander of CID and Director of NCIS evaluate existing policy guidance regarding the timely completion of records checks. • The Director of NCIS implement policy requiring SARC notifications and documentation. Comments Overall, the Commander, CID, agreed with our recommendations. The Director, NCIS, and the Commander, AFOSI, agreed in part with our recommendations, but objected to our assessment in a number of areas in the report.

Details: Washington, DC: U.S. Department of Defense, Inspector General, 2013. 104p.

Source: Internet Resource: Accessed August 19, 2013 at: http://www.dodig.mil/pubs/documents/DODIG-2013-091.pdf

Year: 2013

Country: United States

URL: http://www.dodig.mil/pubs/documents/DODIG-2013-091.pdf

Shelf Number: 129649

Keywords:
Criminal Investigation
Military
Sexual Assault (U.S.)

Author: Carter, David C.

Title: Homicide Process Mapping: Best Practices for Increasing Homicide Clearances

Summary: Since 1990, the number of homicides committed in the United States has dropped over 30 percent. While this is a positive trend, it is somewhat counter-balanced by another trend: in the mid-1970s, the average homicide clearance rate in the United States was around 80 percent. Today, that number has dropped to 65 percent - hence, more offenders are literally getting away with murder. The Bureau of Justice Assistance (BJA), a component of the U.S. Department of Justice's Office of Justice Programs (OJP), recognizes that the problem of violence in the United States requires a multifaceted approach. In a coordinated initiative of projects, BJA has examined the manner in which trends in violence are identified by law enforcement for tactical purposes, reviewed how cutting-edge analysis and the integration of resources can disrupt trends in violent crime, and examined two decades of violence-reduction initiatives to determine what works. Based on lessons learned, new initiatives are explored, such as the Law Enforcement Forecasting Group (LEFG), which produced a paper on the importance of the analytic process for crime control (tactically) and resource allocation for crime reduction (strategically). Collectively, the lessons from these initiatives - and other initiatives by BJA and companion OJP components - provide guidance on new avenues to explore. Based on the findings from these projects, one of the focal points in violence suppression initiatives that BJA explored was the most efficacious method to manage homicide investigations. Two paths were used toward this end. The current project on Homicide Process Mapping focused on investigative practices. A companion project by the International Association of Chiefs of Police (IACP), 10 Things Law Enforcement Executives Can Do to Positively Impact Homicide Investigation Outcomes, focused on the administrative environment in support of homicide investigations. Both are essential for successful investigations. The purpose of this project was to identify best practices in homicide investigations that will result in an increase in homicide clearance rates. To accomplish this goal, seven geographically representative law enforcement agencies were identified that had at least 24 homicides in 2011 and had a clearance rate of 80 percent or higher. In addition, because the first 48 hours of a homicide investigation are critical, the project identified critical tasks in the first 48 hours of the investigation that increase the probability of a clearance. The selected agencies, both municipal and county, were the Baltimore County, Maryland, Police Department; the Denver, Colorado, Police Department; the Houston, Texas, Police Department; the Jacksonville, Florida, Sheriff's Office; the Richmond, Virginia, Police Department; the Sacramento County, California, Sheriff's Department; and the San Diego, California, Police Department. Each site was visited by two experienced homicide investigators and a police researcher who conducted interviews and reviewed documents. Interviews were conducted with the homicide commander, homicide supervisors, homicide investigators, and other personnel who each department believed were important in aiding successful homicide investigations. Following the collection of all information, the findings were broken down into strategic and tactical issues. Each of these is discussed in this report from a policy implementation perspective. This is followed by a summary of homicide investigation best practices that at least two agencies reported using. The report concludes with a process map that identifies critical investigative tasks to be performed in the first 48 hours after a homicide is reported. The process map is the product of a detailed analysis and integration of the processes used by the agencies in this project. While many factors contributed to successful homicide investigations, including some creative practices, there was one overarching factor: all of the agencies visited had laid a strong foundation of trust with the community and a strong foundation of cooperation and information sharing with other law enforcement agencies. Without this foundation, success will be limited.

Details: Washington, DC: U.S. Department of Justice, Bureau of Justice Assi3tance, 2013. 67p.

Source: Internet Resource: Accessed November 11, 2013 at: http://www.iir.com/Documents/Homicide_Process_Mapping_September_email.pdf

Year: 2013

Country: United States

URL: http://www.iir.com/Documents/Homicide_Process_Mapping_September_email.pdf

Shelf Number: 131618

Keywords:
Crime Analysis
Crime Mapping
Criminal Investigation
Homicides (U.S.)
Violent Crimes

Author: Messick, Richard E.

Title: Corruption risks in the criminal justice chain and tools for assessment

Summary: This U4 issue paper provides policymakers in developing nations, their citizens, and U4's partners in the donor community with an overview of where corruption is most likely to arise in the investigation, prosecution, trial, and incarceration stages of the criminal justice process. Each chapter focuses on a specific stage, providing a summary of the principal decision makers involved, the tasks they perform, the most common types of corruption risk, the tools available to assess the risks, and, where sufficient experience exists, an evaluation of the usefulness of these assessment tools. While some basic risk management approaches are noted, the emphasis is on analysis and assessment of problems. Much of what is known about corruption at the different stages of the criminal justice system comes from developed country experiences. In many cases, however, the drivers of corruption are the same across all countries. In using the available set of tools to assess corruption risks in criminal trials and appeals, the greatest challenge for practitioners is finding the relevant parts of general assessment tools that assess the particular corruption risks. The paper concludes with an appeal for integrated corruption risk assessment tools and accessible reporting. Only a sector-wide lens will allow identification of the linkages and dependencies within the criminal justice chain, providing a basis for targeted reform efforts and a comprehensive anti-corruption strategy.

Details: Bergen, Norway: CHR. Michelsen Institute, Anti-corruption Resource Centre, 2014. 51p.

Source: Internet Resource: Accessed April 29, 2015 at: http://www.u4.no/publications/corruption-risks-in-the-criminal-justice-chain-and-tools-for-assessment/

Year: 2015

Country: International

URL: http://www.u4.no/publications/corruption-risks-in-the-criminal-justice-chain-and-tools-for-assessment/

Shelf Number: 135402

Keywords:
Corruption
Criminal Investigation
Risk Assessment

Author: Dongen, Teun van

Title: Detecting Elusive Criminals

Summary: Organized crime for the European market is a multi-billion dollar business that feeds on, as well as sustains, poverty and poor governmental control. As factors like the economic crisis and the emergence and growth of urban slums will sustain organized crime, this threat is likely to stay with us in the foreseeable future. Against this background, this report answers the following question: what research strands need to be explored further in order to find solutions for the threat posed to Europe by transnational organized crime? The flexibility of criminal networks is remarkable, as they seem to think nothing of moving operations to other countries, entering into new partnerships and using other modes of transportation. Also, they are often quick to pick up on new technologies that help them run their businesses. The consequent lack of signature and standard operating procedures on the part of criminal networks means that they are increasingly difficult to detect. The fact that a criminal cell has at one point been in touch with another cell, says little to nothing about the likelihood that they will be in touch again. In general, it is questionable to what extent past behaviors can be used as clues to predict future conduct and eventually find and catch criminal cells. Current research strands that have to do with the detection of criminal networks fail to take into account the state of flux that is characteristic of organized crime. Technological detection tools like scanners and air sampling devices are deployed statically, and fail to uncover more than a small part of all organized criminal activity. Knowledge discovery approaches, in which criminal networks can be detected through the analysis of digital data, are mostly based on police records. This means that approaches along these lines are largely reactive in nature. A similar objection can be raised against crime mapping exercises that are carried out by scholars and government research departments. They register trends and developments in organized crime after they have taken place. This means that organized crime mapping, while useful, is always a step behind- a shortcoming which could be a problem against a threat that changes rapidly and constantly. Therefore, we suggest a series of research strands that are more preventive in nature. First, the detection of criminal networks should be applied to the preventive and early warning phase. We should development frameworks and vulnerability assessment tools to predict or estimate whether a certain area - a neighborhood, a city, a region - will in the near future have to deal with criminal networks. This will help governments act quickly and at an early stage, which is crucial when dealing with a fluid and adaptive threat like the one posed by organized crime. For the development of such vulnerability and early warning frameworks, we need more research into what contextual factors make areas vulnerable to organized crime, and into the motives of criminal networks to choose certain areas of operation over others. We need, in other words, to learn more about the causes behind the trends and developments in organized crime. Second, research is needed to identify and address legal obstacles to the sharing of information between and within governments needed to detect criminal networks or make vulnerability assessments. What should be addressed is not only the legal obstacles between governments, but also within governments and between the government and the private sector. Finally, we should look into technological tools for criminal network detection (e.g., data mining) as well as into possibilities to generate human criminal intelligence, as such an approach will be non-intrusive and will help law enforcement agencies win the trust of the local population.

Details: The Hague: The Hague Centre for Strategic Studies and TNO, 2012. 65p,

Source: Internet Resource: Accessed July 22, 2015 at: http://www.hcss.nl/reports/detecting-elusive-criminals/122/

Year: 2012

Country: Europe

URL: http://www.hcss.nl/reports/detecting-elusive-criminals/122/

Shelf Number: 136127

Keywords:
Criminal Investigation
Criminal Networks
Organized Crime

Author: Jago, Sue

Title: Gathering evidence of the sexual exploitation of children and young people: a scoping exercise

Summary: The original aim of the scoping exercise was to focus on the investigation process. However, almost half the areas included in the exercise were 'just starting out' to establish a multi-agency response to child sexual exploitation which includes challenging offenders. Local partnerships that are developing expertise in building successful prosecution cases initially face significant organisational issues. As a result the key messages from the scoping exercise address these issues as well as those directly related to the gathering of evidence, disruption plans and building cases for prosecution. The key findings are set out below and grouped under headings that reflect the way the report has been organised: A multi-agency approach Existing guidance1 on tackling child sexual exploitation makes clear the importance of a proactive and coordinated approach to tackling perpetrators. This section relates to the delivery of these objectives through a multi-agency partnership: - in many areas there was evidence of a lack of focus on the proactive investigation of the perpetrators of child sexual exploitation. Child protection units have been traditionally reactive but the move to inclusion in the work of PPUs is helping to develop a more proactive approach - recognising the link between missing children and vulnerability to sexual exploitation enhances the criminal justice response - raising the priority of investigating child sexual exploitation is likely to require resources as well as reorganisation - an appropriate allocation of resources to child sexual exploitation is likely to require the introduction of relevant performance indicators - the involvement of voluntary sector specialist projects in multi-agency partnerships is invaluable for the delivery of intervention packages but requires the support of the LSCB - the most robust organisational response is a dedicated unit with co-located staff - in other models the development of a virtual team and the appointment/identification of a child sexual exploitation coordinator supports effective partnership working. The foundation for effective evidence gathering Difficulties with translating information into viable evidence has been a barrier to securing prosecutions. This section relates to ways to improve the gathering, sharing and recording of information as a basis for building a case against a perpetrator: - information sharing protocols based on child protection are likely to require adaptation to meet the needs of early intervention and investigation in cases of child sexual exploitation - identifying risk factors and addressing them through early intervention demonstrates care for the young victim and builds trust to enable exploitation to be challenged - specialist agencies, particularly if seen to be non-statutory, are well placed to build trusting relationships with young victims and their parents and carers - providing support from first referral to post conviction, and beyond age 18 where required, can prevent re-victimisation and is more likely to be provided by a non-statutory specialist agency - a child sexual exploitation coordinator, working with points of contact in each agency, provides a focal point for collating information and has been a turning point for building successful cases against perpetrators - a wide range of agencies needs to be involved, including those who have not traditionally seen evidence gathering against perpetrators of child sexual exploitation as part of their role - support from the CPS to raise awareness about collecting and preserving information in an evidentially viable way can be crucial to building a sound prosecution case data collection systems for missing persons can be useful for collating information on child sexual exploitation - intelligence systems not only support individual investigations but also enable areas to map local activity to identify 'hotspots' and other common factors, and can contribute to a national picture of trends. Developing a disruption plan Disruption is not necessarily a fall-back position. Developing a disruption plan can prevent children and young people at risk from becoming involved in exploitative relationships, and can help both victims and perpetrators to recognise the criminal nature of such relationships: - coercive relationships are difficult to dislodge without a disruption plan abduction warnings can be an effective way to sever contact between victims and perpetrators - there is scope for greater use of police powers and court orders including SOPOs and RSHOs - there is scope for increasing cooperation with other enforcement agencies to disrupt the process of exploitation. Preparing a prosecution case This was at the heart of the scoping exercise. The main issue to be addressed was the general reluctance of young people to recognise or report exploitation, and the consequent difficulties of relying on their evidence: - sexual exploitation is a form of child abuse but it raises unique issues as it involves particularly challenging young people who often do not recognise the coercive nature of their relationships - creative investigative techniques help to corroborate the evidence of chaotic and/or reluctant young victims and witnesses - a key worker approach provides the best support for young people during the investigation and prosecution process - more effective outcomes are achieved where there is an early meeting between the police and the CPS - child sexual exploitation strategies can be strengthened by discussing with the CPS how to integrate their policy on prosecuting criminal cases involving children and young people.

Details: Luton, UK: University of Bedfordshire, 2008. 49p.

Source: Internet Resource: Accessed August 5, 2015 at: http://www.beds.ac.uk/__data/assets/pdf_file/0018/40824/Gathering_evidence_final_report_June_08.pdf

Year: 2008

Country: United Kingdom

URL: http://www.beds.ac.uk/__data/assets/pdf_file/0018/40824/Gathering_evidence_final_report_June_08.pdf

Shelf Number: 113966

Keywords:
Child Sexual Abuse
Child Sexual Exploitation
Criminal Investigation
Organized Crime

Author: European Commission. Directorate General Justice, Freedom and Security

Title: Study on "Best Practices in Vertical Relations between the Financial Intelligence Unit and (1) Law Enforcement Services and (2) Money Laundering and Terrorist Financing Reporting Entities with a View to Indicating Effective Models for Feedback on Fol"

Summary: The objective of the study was to make an inventory on the provision of feedback between the Reporting Entities (REs), the Financial Intelligence Units (FIUs) and Law enforcement Authorities (LEAs). 25 Member States were visited and a large number of interviews were held. Feedback should be provided and received in the following ways: (1) Feedback should be received by the REs in reaction to the financial reports (STRs) the REs are legally obligated to send to the FIUs of the different Member States. (2) Feedback should be provided by LEAs to the FIUs in reaction on the dissemination by the FIU of financial information on the basis of the STRs received from the REs. The interviews of personnel from the REs, FIUs and LEAs indicated a level of feedback (FIU->RE) as generally recommended in the Best practice Guidelines on Providing Feedback, published in 1998 by the FATF. There are some new developments like indications on quality of STRs being fed back to the REs. The main forms of feedback between those entities (FIU->RE) are however still based on the recommendations of the FATF. Feedback in the 25 Member States consists mainly of general feedback (the organisation of AML-meetings, workshops, statistics, typologies, trends, sanitised cases etc.) and specific feedback (individual or case to case) on the outcome of specific STRs reported by the REs. This last form of feedback seems to be provided in an informal way in most Member States. Some forms of formal obligations to provide specific feedback between FIUs and LEAs and from the FIUs to REs were found in some Member States. It was also found that even if there was a formal obligation for LEAs and the FIU to provide feedback to each other and the REs, this not always meant that feedback was supplied to the REs. The general impression of the AML activities in relation to feedback within the Member States visited by the Team is that most Member States still rely on the "old" recommendations of the FATF (1998) on feedback. New ways to provide feedback are hardly developed. Good communication and information exchange with the REs is not sufficiently implemented in a lot of Member States. Contacts between reporting Entities and the FIU as well as Law enforcement authorities seem to have decreased in some Member States. "The number of meeting, conferences and training sessions have become less and less, AML information is not sent as frequently as in the past, the relation between FIUs, Reporting Entities and Law enforcement, in relation to the money laundering approach has cooled down". General Remarks like this by a number of REs seem to suggest a declining interest in AML activities. A possible explanation for this may be the lack of communication and cooperation within the AML chain (REs, FIUs and LEAs), continuous organisational changes that some institutions are facing, complicated AML legislation and lack of sufficient results in the form of ML convictions. Audits performed in some Member States on the effectiveness of AML Institutions showed few achievements in the fight against ML, and as a consequence, usually a reorganisation of the AML institutions was undertaken in some countries. Some examples of these changes are The Netherlands (2006 MOT to the FIU the Netherlands), The United Kingdom (2006 NCIS to SOCA) and presently Italy (2008). Other Member States have relocated their FIU organisation or created new functions like a police liaisons within their units, e.g. Bulgaria, Lithuania, Hungary and Estonia. In addition, FIUs and REs expressed their concern about the increasing number of tasks that have been assigned to them in relation to the traditional AML activities and or new specific tasks regarding the financing of terrorism. This report certainly does not pretend to be of a scientific nature but merely an introduction to the problem of feedback. One thing is certain, there is a lot of improvement to be made in the communication and cooperation between the different AML institutions.

Details: Brussels: European Commission, 2008. 101p.

Source: Internet Resource: Accessed August 8, 2015 at: http://ec.europa.eu/dgs/home-affairs/doc_centre/crime/docs/study_fiu_and_terrorism_financing_en.pdf

Year: 2008

Country: Europe

URL: http://ec.europa.eu/dgs/home-affairs/doc_centre/crime/docs/study_fiu_and_terrorism_financing_en.pdf

Shelf Number: 136357

Keywords:
Criminal Investigation
Financial Crimes
Information Sharing
Law Enforcement
Money Launderings
Organized Crime
Terrorist Financing

Author: U.S. Department of Justice

Title: Department of Justice Report Regarding the Criminal Investigation into the Shooting Death of Michael Brown by Ferguson, Missouri Police Officer Darren Wilson

Summary: At approximately noon on Saturday, August 9, 2014, Officer Darren Wilson of the Ferguson Police Department (FPD) shot and killed Michael Brown, an unarmed 18-year-old. The Criminal Section of the Department of Justice Civil Rights Division, the United States Attorney's Office for the Eastern District of Missouri, and the Federal Bureau of Investigation (FBI) (collectively, The Department) subsequently opened a criminal investigation into whether the shooting violated federal law. The Department has determined that the evidence does not support charging a violation of federal law. This memorandum details the Department's investigation, findings, and conclusions. Part I provides an introduction and overview. Part II summarizes the federal investigation and the evidence uncovered during the course of the investigation, and discusses the applicable federal criminal civil rights law and standards of federal prosecution. Part III provides a more in-depth summary of the evidence. Finally, Part IV provides a detailed legal analysis of the evidence and explains why the evidence does not support an indictment of Darren Wilson. The Department conducted an extensive investigation into the shooting of Michael Brown. Federal authorities reviewed physical, ballistic, forensic, and crime scene evidence; medical reports and autopsy reports, including an independent autopsy performed by the United States Department of Defense Armed Forces Medical Examiner Service (AFMES); Wilson's personnel records; audio and video recordings; and internet postings. FBI agents, St. Louis County Police Department (SLCPD) detectives, and federal prosecutors and prosecutors from the St. Louis County Prosecutor's Office (county prosecutors) worked cooperatively to both independently and jointly interview more than 100 purported eyewitnesses and other individuals claiming to have relevant information. SLCPD detectives conducted an initial canvass of the area on the day of the shooting. FBI agents then independently canvassed more than 300 residences to locate and interview additional witnesses. Federal and local authorities collected cellular phone data, searched social media sites, and tracked down dozens of leads from community members and dedicated law enforcement email addresses and tip lines in an effort to investigate every possible source of information. The principles of federal prosecution, set forth in the United States Attorneys' Manual (USAM), require federal prosecutors to meet two standards in order to seek an indictment. First, we must be convinced that the potential defendant committed a federal crime. See USAM 9-27.220 (a federal prosecution should be commenced only when an attorney for the government believes that the person's conduct constitutes a federal offense). Second, we must also conclude that we would be likely to prevail at trial, where we must prove the charges beyond a reasonable doubt. See USAM 9-27.220 (a federal prosecution should be commenced only when the admissible evidence will probably be sufficient to sustain a conviction); Fed R. Crim P. 29(a)(prosecution must present evidence sufficient to sustain a conviction). Taken together, these standards require the Department to be convinced both that a federal crime occurred and that it can be proven beyond a reasonable doubt at trial. In order to make the proper assessment under these standards, federal prosecutors evaluated physical, forensic, and potential testimonial evidence in the form of witness accounts. As detailed below, the physical and forensic evidence provided federal prosecutors with a benchmark against which to measure the credibility of each witness account, including that of Darren Wilson. We compared individual witness accounts to the physical and forensic evidence, to other credible witness accounts, and to each witness's own prior statements made throughout the investigations, including the proceedings before the St. Louis County grand jury (county grand jury). We worked with federal and local law enforcement officers to interview witnesses, to include re-interviewing certain witnesses in an effort to evaluate inconsistencies in their accounts and to obtain more detailed information. In so doing, we assessed the witnesses' demeanor, tone, bias, and ability to accurately perceive or recall the events of August 9, 2014. We credited and determined that a jury would appropriately credit those witnesses whose accounts were consistent with the physical evidence and consistent with other credible witness accounts. In the case of witnesses who made multiple statements, we compared those statements to determine whether they were materially consistent with each other and considered the timing and circumstances under which the witnesses gave the statements. We did not credit and determined that a jury appropriately would not credit those witness accounts that were contrary to the physical and forensic evidence, significantly inconsistent with other credible witness accounts, or significantly inconsistent with that witness's own prior statements. Based on this investigation, the Department has concluded that Darren Wilson's actions do not constitute prosecutable violations under the applicable federal criminal civil rights statute, 18 U.S.C. 242, which prohibits uses of deadly force that are 'objectively unreasonable,' as defined by the United States Supreme Court. The evidence, when viewed as a whole, does not support the conclusion that Wilson's uses of deadly force were 'objectively unreasonable' under the Supreme Court's definition. Accordingly, under the governing federal law and relevant standards set forth in the USAM, it is not appropriate to present this matter to a federal grand jury for indictment, and it should therefore be closed without prosecution.

Details: Washington, DC: U.S. Department of Justice, 2015. 86p.

Source: Internet Resource: Memorandum: Accessed August 17, 2015 at: http://www.justice.gov/sites/default/files/opa/press-releases/attachments/2015/03/04/doj_report_on_shooting_of_michael_brown_1.pdf

Year: 2015

Country: United States

URL: http://www.justice.gov/sites/default/files/opa/press-releases/attachments/2015/03/04/doj_report_on_shooting_of_michael_brown_1.pdf

Shelf Number: 136435

Keywords:
Criminal Investigation
Deadly Force
Police Behavior
Police Use of Force

Author: Ropero-Miller, Jeri D.

Title: 2009 Evaluation of Forensic DNA Unit Efficiency Improvement (EIP) Program

Summary: RTI International conducted a comprehensive evaluation of five laboratories funded under the National Institute of Justice's (NIJ's) 2009 DNA Unit Efficiency Improvement Program (EIP). The evaluation team documented the implementation of each laboratorys grant activities and conducted five process and outcome evaluations to determine the impact of the EIP. Data used in the evaluation were collected through site visits, routinely scheduled meetings via the telephone and Web, performance metrics and data collection tools, and surveys of key laboratory personnel. This evaluation occurred in conjunction with the laboratories' DNA Unit EIPs for the first 28 months (October 2009 to January 2012); during this time, one laboratory completed its EIP, one laboratory implemented its EIP in April 2011, and three laboratories were still actively progressing to an EIP implementation. At the end of the project, the evaluation team documented the evaluation results based on the various stages of the laboratory EIPs; complete outcome evaluations were not possible for all laboratories. Staff identified strategies to assist other DNA laboratories in future EIPs. The five DNA EIP laboratories evaluated under this 2009 DNA Unit EIP are the Denver Police Department Crime Laboratory Bureau (DPD), Denver, CO; University of North Texas Health Science Center Department of Forensic and Investigative Genetics (UNTHSC), Ft. Worth, TX; Orange County Crime Laboratory (OCCL), Orange/Santa Clara, CA; Oklahoma State Bureau of Investigation Forensic Science Services (OSBI), Edmond, OK; and Palm Beach County Sheriff's Office Crime Laboratory (PBSO), West Palm Beach, FL.

Details: Research Triangle Park, NC: RTI International, 2012. 200p.

Source: Internet Resource: Accessed August 20, 2015 at: https://www.ncjrs.gov/pdffiles1/nij/grants/248830.pdf

Year: 2012

Country: United States

URL: https://www.ncjrs.gov/pdffiles1/nij/grants/248830.pdf

Shelf Number: 136506

Keywords:
Criminal Investigation
DNA Typing
Forensic Science

Author: Northumberland Fire and Rescue Service

Title: European Exchange of Best Practice in Arson Prevention and Investigation (E-API)

Summary: This is the final report of an innovative two-year project that was delivered by Northumberland Fire and Rescue Service (UK) in partnership with Northumbria Police (UK) and Laboratoire Central de la Prefecture de Police (Paris, France). The project was delivered between January 2007 and December 2008 and was titled: "European Exchange of Best Practice in Arson Prevention and Investigation" 1. The project activities were co-funded by the European Commission Directorate-General for Environment under the 2006 Call for Proposals in Civil Protection. The overarching premise of the project was that by sharing best practice in arson prevention and investigation, arson practitioners across Europe could be better equipped to prevent and investigate fire crime within their communities. In order to stimulate and facilitate greater levels of cross-border communication, the project involved the delivery of a number of key activities, including the: - creation of a European network of contacts; - creation and development of a European Register of Experts/Specialists; - creation and development of a European Database of Best Practice; - design, development and pilot of basic-level training modules for fire investigation (suitable for delivery in all European countries); - delivery of the first "Fire Crime in Europe Conference". The partners conclude that the project was extremely successful because it exceeded the scope of the initial plans. The project successfully created a European Network of Arson Practitioners and facilitated a significant level of cross-border communication and information exchange. This level of cross-border communication was unprecedented among arson practitioners prior to the project. The project was also deemed to be successful because it delivered all seven of its key objectives, which subsequently contributed towards the successful completion of all project aims. In addition, the project delivered all of its expected outputs, as well as an additional four outputs. Importantly, the project delivered significant European added-value through the dissemination of activities and outputs to a wide European audience. This level of dissemination was made possible by a comprehensive communication strategy which included the publication of journal/magazine articles across Europe, the placement of advertisements on websites and the circulation of emails via the project distribution list. It is the opinion of the project team that greater levels of European cross-border communication, cooperation and interaction are still required within the fields of arson prevention and investigation. This report makes a number of specific recommendations which will help to achieve this objective. The project team envisage, as they have done since the project outset, that the outputs described in this report represent a foundation rather than a conclusion. The implementation of the recommendations presented within this report will provide foundations upon which to achieve future success. Northumberland Fire and Rescue Service, Northumbria Police and Laboratoire Central remain committed to supporting the newly formed European Network of Arson Practitioners; however, they now require assistance and collaboration from other organisations and individuals in order to guarantee its success and longevity.

Details: Northumberland, UK: Northumberland Fire and Rescue Service, 2009. 84p.

Source: Internet Resource: Accessed August 24, 2015 at: http://www.stoparsonuk.org/documents/resources/European%20Exchange%20of%20Best%20Practice%20in%20Arson%20Prevention%20and%20Investigation.pdf

Year: 2009

Country: Europe

URL: http://www.stoparsonuk.org/documents/resources/European%20Exchange%20of%20Best%20Practice%20in%20Arson%20Prevention%20and%20Investigation.pdf

Shelf Number: 136570

Keywords:
Arson
Criminal Investigation
Firesetting

Author: Interdisciplinary Group of Independent Experts (GIEI)

Title: Ayotzinapa Report: Research and intial conclusions of the disappearances and homicides of the normalistas from Ayotzinapa

Summary: The report issued on September 6 by the Interdisciplinary Group of Independent Experts (GIEI) concludes that the Mexican government's version of the fate of the 43 forcibly disappeared students from Ayotzinapa is wrong and not substantiated by scientific evidence. The Washington Office on Latin America (WOLA) is deeply troubled by the government's grave mishandling of the case and supports the experts' call for the government to pursue further lines of investigation to clarify what happened to the students and provide truth and justice to their families. Mexico's Attorney General, Arely Gomez, who replaced former Attorney General Jesus Murillo Karam shortly after he presented the Mexican government's grossly flawed version of the students' disappearance, affirmed that her office will analyze all aspects of the report to determine whether to incorporate them into the investigation but refrained from making any statements about the government's grave errors in the case. "Rather than doing new tests to prove a theory that has already been discarded, the Mexican government should work to restructure the investigation and pursue all of the proposed lines of investigation," affirmed Maureen Meyer, WOLA Senior Associate for Mexico. "Given the multiple failures of the government's investigators, a new team should be created within the Attorney General's Office to be in charge of this next stage of the investigation," she stated. The group of five renowned experts on criminal prosecutions and human rights was formed by the Inter-American Commission on Human Rights (IACHR) based on an agreement with the students' families, their representatives, and the Mexican government. They began their work on March 2, 2015 and have been providing vital technical assistance for the case. Their report reflects six months of extensive work to search for the students, investigate those responsible, provide attention to the surviving victims of the attacks and victims' families, and to develop proposals regarding enforced disappearances in Mexico. The report negates the Mexican government's narrative that after the students had been forcibly disappeared by municipal police they were handed over to a criminal group and subsequently incinerated in a trash dump. "'The experts' report makes clear that the government attempted to sell to the families, Mexican society, and the international community a version of the events that, far from being the truth, is not backed up by scientific evidence," affirmed Meyer. "The government preferred expediency over veracity and went to great lengths, including likely torture, to back up their version of the events," she said. The report also shows that several areas of investigation remain unexplored. In particular, the experts suggest that the extreme violence that was used against the students may have been related to the fact that buses were being used by organized criminal groups in Iguala to transport heroin. Lastly, the report also makes clear that state and federal security forces knew that the students were being pursued and attacked by the municipal police yet they did nothing to come to the students' aid.

Details: Grupo Interdisciplinario de Expertos Independientes. Ayotzinapa (GIEI),2015. 35p. (English summary)

Source: Internet Resource: Accessed September 11, 2015 at: http://media.wix.com/ugd/3a9f6f_e1df5a84680a4a8a969bd45453da1e31.pdf

Year: 2015

Country: Mexico

URL: http://media.wix.com/ugd/3a9f6f_e1df5a84680a4a8a969bd45453da1e31.pdf

Shelf Number: 136721

Keywords:
Criminal Investigation
Disappearances
Homicides
Organized Crime

Author: U.S. Government Accountability Office

Title: Confidential Informants: Updates to Policy and Additional Guidance Would Improve Oversight by DOJ and DHS Agencies

Summary: Federal law enforcement components used more than 16,000 confidential informants in fiscal year 2013 as part of criminal investigations. Informants can be critical to an investigation, but without appropriate oversight, problems can occur that undermine the credibility of the informant's role in an investigation. The Attorney General's Guidelines sets forth procedures on the management of informants, including vetting potential informants and overseeing informants' illegal activities that components authorize to support an investigation. GAO was asked to review the use of confidential informants. GAO reviewed the extent to which (1) DOJ and DHS components' policies address the Guidelines for vetting informants and overseeing their illegal activities and (2) selected components have monitoring processes to ensure compliance with the Guidelines. GAO reviewed components' documented policies and monitoring processes and interviewed agency officials about their practices. GAO visited components' field offices in three locations chosen based on the numbers of informants overseen, among other factors. What GAO Recommends GAO recommends that DOJ and DHS and their components take actions to update components' policies and monitoring processes to improve handling and oversight of confidential informants. DOJ and DHS concurred with our recommendations.

Details: Washington, DC: GAO, 2015. 59p.

Source: Internet Resource: GAO-15-807: Accessed September 16, 2015 at: http://www.gao.gov/assets/680/672514.pdf

Year: 2015

Country: United States

URL: http://www.gao.gov/assets/680/672514.pdf

Shelf Number: 136790

Keywords:
Criminal Investigation
Homeland Security
Informants

Author: Bayliss, Anda

Title: Risk, bureaucracy and missing persons: An evaluation of a new approach to the initial police response

Summary: Key findings Three forces piloted a new approach to missing persons for a three month period. While officers were previously required to attend all incidents as the default initial response, the pilot introduced a new risk assessment process and 'absence' category. During the pilot, this category of incidents (involving a person who was not where they were expected to be but not thought to be at risk of harm) were to be monitored by police call handlers without officers being deployed immediately. The evaluation found promising qualitative evidence of the pilot having achieved its primary aim - to make the initial police response to missing persons reports more proportionate to risk. It was thought - as a side benefit - that a more proportionate approach might also help free up police capacity. The evaluation found consistent evidence of the pilot having achieved this secondary aim. Did the pilot result in a more proportionate and risk-based response? - The qualitative research found a widespread perception among officers that the pilot had helped to better identify those at risk, and ensured that higher risk incidents received the attention they required. - This result was not reflected in some of the survey findings. Based on officer descriptions, a high proportion of incidents in the pilot sites were assessed to be low risk. Did a more proportionate response help free up police capacity? - Despite an increase in the number of recorded incidents in the pilot sites, around a third were classified as absences and, thus, did not require officers to attend. - By being more proportionate, the pilot forces were able to target resources better and free up capacity. A saving of 200 shifts over the three month period was estimated as a result of officers not attending absences. The amount of time spent on the initial response to missing persons was also reduced in the pilot sites (-23%) relative to the comparison sites (-3%). In theory, these resources could be redirected towards higher risk incidents. Did the pilot improve officer attitudes and job satisfaction? - Most response officers and supervisors who were interviewed welcomed the pilot, and said their attitudes about attending missing persons incidents had improved. - A survey of officers, however, did not reveal a consistent pattern of attitude change. How did partners view the pilot? - There was widespread view among partners that the police should move away from a 'one size fits all' approach to missing persons. - About two-thirds of respondents were positive or neutral about the pilot. A third were more critical, mainly raising concerns about the application of the new category. - The quality of the engagement partners reportedly received from the police before implementation seemed to affect their level of support for the pilot. - The reduction in missing person coordinators in the pilot forces - an organisational change that was unconnected to the pilot - was potentially regarded as a greater problem. How was the pilot perceived to have affected police safeguarding work? - There was no evidence to suggest the pilot had undermined forces' ability to carry out proactive safeguarding work (though it was a perceived concern for some partners). - The reduction in missing person coordinators in the pilot forces reportedly would have placed pressure on monitoring and partnership work after the pilot (though it continued).

Details: London: College of Policing, 2013. 55p.

Source: Internet Resource: Accessed December 2, 2015 at: http://whatworks.college.police.uk/Research/Documents/Missing_persons_PUBLICATION_PQ.pdf

Year: 2013

Country: United Kingdom

URL: http://whatworks.college.police.uk/Research/Documents/Missing_persons_PUBLICATION_PQ.pdf

Shelf Number: 128750

Keywords:
Criminal Investigation
Missing Persons
Police Effectiveness
Risk Assessment

Author: Police Foundation

Title: Police Under Attack: Southern California Law Enforcement Response to the Attacks by Christopher Dorner

Summary: For nine days in early February 2013, like millions of Americans, was glued to news reports of a former police and naval officer who was targeting police officers and their families. It was one of the most bizarre and violent acts of vengeance against law enforcement officers this country has experienced. By the time he was finally stopped, Christopher Dorner had murdered four people and wounded several others. His threats and actions put Southern California policing agencies in an unprecedented collective state of alert - one in which both excellent and heroic police work was done and some regrettable decisions were made. This incident represents a sentinel event in American policing - one that serves as a warning of needed changes in parts of our public safety system. For the first time, a trained former police officer was hunting cops and their families, exploiting jurisdictional boundaries and using legally-acquired sophisticated, high-powered weaponry. And he did this in a highly public way that provided a template for others who may seek to terrorize this great country and target the people charged with protecting its citizens. The challenges confronting the principal law enforcement agencies in this incident were immense. It took place over a wide expanse of Southern California where more than 20 million people live, work and play. It encompassed urban, suburban and mountainous geography. It was worked in balmy weather and a freezing blizzard. It required the coordination of thousands of hard-charging police officers, sheriff's deputies, highway patrol officers and state and federal special agents. And they engaged the incident with different policies and practices, from differing organizational cultures and utilizing frequently incompatible communications systems. Bringing new advances to policing is the core of the Police Foundation's mission. Central to our research and work with police agencies is the idea that new learning - and therefore advancements - can be acquired through examining policing-involved critical incidents. This is certainly true of this incident. Reviews of incidents like this are intended to transform "lessons learned" to "lessons applied" in the hopes of enhancing the safety of officers and the public. In emphasizing this, we affix no blame to those who tried desperately to apprehend Dorner and save lives. To do so dishonors their sacrifices and diverts attention from increasing our understanding about protecting society and keeping cops safe. Covering every aspect of this very complicated incident would result in a book-length document. To keep the project manageable, we focused on the most important "lessons learned" that can be generalized to a wide range of circumstances and jurisdictions. Accordingly, we have tried to accomplish three broad goals: 1) Present the facts and our recommendations in an objective manner that respects the professionalism, dedication and heroism of the law enforcement officers involved in this incident, and honors the sacrifice of those whose lives were lost by helping prevent the injury and death of other officers or civilians in the future; 2) Highlight this as a sentinel event in which we identify underlying weaknesses in the regional public safety system, preventable errors and recommendations for avoiding similar tragic outcomes; 3) Use multi-media to provide an immersive experience to a wide breadth of readers that gives them a better understanding of the complicated nature of such events and how dangerous they are to the peace officers trying to stop highly motivated criminals. Our examination of this incident begins with the murders of Monica Quan and Keith Lawrence in Irvine, CA and concludes with the murder of Deputy Jeremiah MacKay, the wounding of Deputy Alex Collins and Dorner's suicide in the mountains of San Bernardino County. In our quest to tease out lessons which we can generalize across the nation, we did not examine every aspect of the incident. Our observations and recommendations are based on our understanding of both the many successes and the relatively few errors that occurred throughout the course of it. They are not intended for the sole use of the involved agencies, as they have each conducted their own internal reviews. Rather, they are aimed at improving American policing's response to similar critical incidents through changes in policy, practice, organizational culture and an increased understanding of the nature of preventable error.

Details: Washington, DC: Police Foundation, 2015. 102p.

Source: Internet Resource: Accessed January 15, 2016 at: http://www.policefoundation.org/wp-content/uploads/2015/07/Police-Under-Attack.pdf

Year: 2015

Country: United States

URL: http://www.policefoundation.org/wp-content/uploads/2015/07/Police-Under-Attack.pdf

Shelf Number: 137579

Keywords:
Criminal Investigation
Homicides
Law Enforcement Response
Police Officers
Police Response
Violent Crime

Author: Great Britain. Home Office

Title: Forensic Science Strategy: A national approach to forensic science delivery in the criminal justice system

Summary: Vision 1. Forensic science is the application of science to a criminal investigation and court proceedings. This includes crime scene investigation and the collection, identification, analysis and interpretation of potential evidence such as DNA, fingerprints, digital evidence, drug analysis and footwear marks. 2. The Government's vision for forensic science is for a clearer system of governance to ensure quality standards and proper ethical oversight, and a cost effective service that delivers to law enforcement and the criminal justice system (CJS) robust and relevant forensic evidence, and in so doing strengthens public and judicial trust in forensic science. Context 3. Crime is falling, but it is also changing. Latest figures from the Crime Survey for England and Wales (CSEW) show that there were an estimated 6.5 million crimes in the year to June 2015. This is an 8% decrease compared with last year and the lowest estimate since the CSEW began in 1981. Police Recorded Crime shows a long-term shift away from 'traditional' volume crime, such as burglary and theft from a vehicle, and an increase in offences with a digital element, such as child sexual abuse and indecent imagery offences. The shift to digital not only enables new types of crime, but also means that traditional volume crimes can be committed in ways that leave a digital as well as a physical trail. 4. Demand for digital forensics has grown in parallel with the increased use of digital devices over the past 20 years. At the same time, there has been a decline in the demand for traditional forensic science such as DNA and fingerprints. Forensic science can make a significant contribution to improving policing outcomes and efficiency, but will only be able to meet this challenge through a whole system approach, from the crime scene to the court. Landscape 5. There are currently a variety of forensic delivery models in existence ranging from forensic teams in forces, collaborative/regional structures and some operating models linked to wider partnership approaches. All models have a combination of services delivered by forces and external Forensic Service Providers (FSP). 6. In early 2016, the police service will consider options on how best to develop a digital approach which could encompass biometrics (e.g. fingerprint bureau) or broader areas of forensics, including scene of crime officers, digital forensics and other in house forensic facilities. Scoping work setting out business case options is expected to be completed in Spring 2016. A national approach to forensic science delivery, proposed and delivered by police forces, would aim to ensure greater consistency of service quality; resilient, reliable capability and with economies of scale.

Details: London: Home Office, 2016. 27p.

Source: Internet Resource: Cm 9217: Accessed March 16, 2016 at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/506652/54493_Cm_9217_Forensic_Science_Strategy_Accessible.pdf

Year: 2016

Country: United Kingdom

URL: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/506652/54493_Cm_9217_Forensic_Science_Strategy_Accessible.pdf

Shelf Number: 138256

Keywords:
Criminal Investigation
DNA
Evidence Gathering
Fingerprint Analysis
Forensic Science

Author: Wells, William

Title: Unsubmitted Sexual Assault Kits in Houston, TX: Case Characteristics, Forensic Testing Results, and the Investigation of CODIS Hits, Final Report

Summary: In 2011, the National Institute of Justice funded the Houston Police Department to form a multidisciplinary team to study the problem of sexual assault kits (SAK) that were collected but never submitted to a crime lab for screening and testing. The Houston Action-Research Project sought to understand the factors that produced the volume of unsubmitted SAKs, the way forensic evidence is used during criminal investigations and prosecutions of sexual assaults, and what stakeholders should expect when large numbers of previously unsubmitted SAKs get tested. The project adopted a holistic approach and considered the broader issue of responses, beyond testing the kits, to sexual assaults in the community. Houston's Action-Research Project Working Group includes representatives from the following organizations: - Houston Forensic Science Center - Harris County District Attorney's Office - Harris Health System - Houston Area Women's Center - Houston Police Department Sex Crimes Investigative Units - Memorial Hermann Health System - Sam Houston State University - Department of Criminal Justice and Criminology - University of Texas at Austin - Institute on Domestic Violence and Sexual Assault The group has been working collaboratively and collecting data that has allowed for an understanding of multiple aspects of the local response system. The organizations that have been working on this project have also been implementing and evaluating reforms that are meant to improve the response to sexual assaults. Action research entails an iterative process in which research evidence informs responses and for this reason the project has generated multiple research reports. This is one of a number of reports and presentations that will be released to help other jurisdictions learn from our experiences as they seek to better understand and improve their own practices.

Details: Final report submitted to the U.S. National Institute of Justice, 2016. 66p.

Source: Internet Resource: Accessed June 13, 2016 at: https://www.ncjrs.gov/pdffiles1/nij/grants/249812.pdf

Year: 2016

Country: United States

URL: https://www.ncjrs.gov/pdffiles1/nij/grants/249812.pdf

Shelf Number: 139402

Keywords:
Criminal Evidence
Criminal Investigation
DNA Sampling
Police Policies and Procedures
Rape
Sexual Assault

Author: Lehmann, Robert J.B.

Title: Using Crime Scene Behavior for Risk Assessment in Sexual Offenders

Summary: Sexual offending represents an important judicial, clinical, and policy issue and tends to invoke considerable public concern. Recent meta-analytic research indicates that about 8% of men and 20% of women had suffered some form of sexual abuse prior to the age of 18 (Pereda, Guilera, Forns, & Gomez-Benito, 2009). Tjaden and Thoennes (2006) report a lifetime prevalence of rape in men of about 3% and in women of about 18%. Accordingly, courts, police, and forensic practitioners invest considerable resources in predicting and preventing sexual offending by known sexual offenders. In general, those involved in assessing an offender's risk for future sexual offending seek to collect diverse information about the offender and the offenses committed to inform their decisions. Furthermore, the importance of including crime scene information into forensic risk assessment (referred to as "risk assessment" from hereon) is emphasized throughout the literature (e.g., Beech, Fisher, & Thornton, 2003; West, 2000). In Germany, the analysis of crime scene behavior is an essential part of clinical-idiographic risk assessment (Rasch, 1999). Expert witnesses are implicitly required by law to explain an offender's risk by providing evidence from their crime scene behavior. Indeed, the courts have placed increasing demand on the analysis of an offender's crime scene behavior to date. Moreover, the analysis of an offender's criminal behavior following a clinical-idiographic approach (Dahle, 2005) is part of the minimum standards of risk assessment in Germany (Boetticher et al., 2007). In spite of the theoretical relevance of crime scene analysis (CSA) for risk assessment, there is little empirical evidence to support what crime scene behavior is most relevant for risk assessment. Therefore, the empirical analysis of the predictive accuracy of crime scene behaviors for the assessment of future sexual offending is needed. For example, whereas frequently used actuarial risk assessment methods rely heavily on the criminal history of an offender with only limited and a-theoretical inclusion of crime scene related variables, CSA could also be applied in cases where offenders have no such criminal history (i.e., first-time offenders) or where the criminal history is simply unknown (e.g., foreign offender). Furthermore, according to German regulations, risk assessment can only be completed using a clinical-idiographic risk assessment approach, which pays particular attention to the individual circumstances and characteristics (e.g., crime scene information) of a particular case. To provide for a scientific and controllable framework as well as for transparency, it is essential to structure the clinical-idiographic assessment content-wise and to follow specific methodological guidelines. In terms of the theoretical and empirical basis for the process of analyzing the crime scene behavior evaluators have to draw on, for example, general theories of criminality and social psychology or dated (non-validated) offender typologies. So far, there are no explicit guidelines or risk assessment instruments assisting the evaluator to structure the CSA or indicating what is the relevant information to include. Therefore, the possibilities for quality control (e.g., comprehensiveness, completeness) of the CSA are limited. To diagnose deviant sexual preferences diagnosticians often rely on the self-report assessment of the patients themselves. However, given the elevated risk associated with a diagnosis of a sexual paraphilia, patients may have a tendency for dissimulation. To overcome this problem researchers have recently suggested the use of behavioral indicators derived from a person's criminal history as a complementary method for diagnosing sexual paraphilia (Nitschke, Mokros, Osterheider, & Marshall, 2012). In addition to being a useful complement for the clinical diagnosis of sexual paraphilia, crime scene behavior could generally provide potentially rich information about other enduring offender propensities as well. These propensities (e.g., whether a sexual offense was motivated by general antisocial behavior or sexualized aggression) could have important implications for risk assessment, offender treatment, and police investigations. They could help therapists to identify the important clinical phenomena evident in the offense behavior or could inform risk assessment for police investigations in cases where the offender has yet to be identified (e.g., behavioral investigative advice). Altogether, crime scene information is an important and understudied factor that might be a valid contribution to risk assessment as well as for other applied contexts (e.g., the delivery of treatment services). Crime scene information is valuable as it is a more objective measure of what the offender actually did, and is not dependent on self-report. Also, it should commonly be available and easily assessable by the analysis of victim statements, police reports, and court decisions. However, to date no systematic and theory-based empirical evaluation is available that tries to identify the relevant crime scene information to be included into a comprehensive risk assessment.

Details: Berlin: Freie Universitat Berlin, 2014. 83p.

Source: Internet Resource: Dissertation: Accessed September 28, 2016 at: http://www.diss.fu-berlin.de/diss/servlets/MCRFileNodeServlet/FUDISS_derivate_000000015568/Lehmann.Robert.diss.pdf

Year: 2014

Country: Germany

URL: http://www.diss.fu-berlin.de/diss/servlets/MCRFileNodeServlet/FUDISS_derivate_000000015568/Lehmann.Robert.diss.pdf

Shelf Number: 146119

Keywords:
Crime Analysis
Crime Scenes
Criminal Investigation
Risk Assessment
Sex Offenders

Author: Ritter, Nancy

Title: Down the Road: Testing Evidence in Sexual Assaults

Summary: A few years ago, NIJ published The Road Ahead: Unanalyzed Evidence in Sexual Assault Cases, a special report that explored the issue of untested sexual assault kits that were stored in law enforcement evidence facilities around the nation. Since then, we have learned a lot about the role of testing biological evidence in solving sexual assaults. This report, Down the Road: Testing Evidence in Sexual Assaults, discusses the results of recent studies supported by NIJ. Through scientific research, we have gained greater understanding that: Although a sexual assault kit (SAK) may contain biological evidence - more than two-thirds of the cases in two recent studies did - there can be other important physical evidence that is not stored with the SAK, such as bedding, toxicology reports, or weapons. - One kit does not equal one biological sample: In an ongoing SAK-testing partnership between NIJ and the FBI, for example, 597 kits (tested as of October 2015) contained 8,694 discreet biological samples; therefore, when speaking about the "number" of SAKs, it is important to keep in mind that each kit likely contains many separate pieces of evidence that could be tested to determine the identity of a suspect. - Although testing SAK evidence may lead to the identification of a suspect, evidence of serial rapes, or the exoneration of a wrongly convicted person, it is only one part of the investigative process. Testing may not result in a new lead if, for example, the identity of the suspect is already known or there is not enough biological evidence in the kit to yield a DNA profile. Some of the most recent scientific findings about the role of evidence testing in sexual assaults come from two major NIJ-supported projects. After a competitive solicitation process, NIJ awarded research grants in 2011 to the Houston Police Department (HPD) and the Wayne County (Detroit), Michigan, Prosecutor's Office to form multidisciplinary teams to examine the issue of unsubmitted SAKs in their jurisdictions.

Details: Washington, DC: U.S. Department of Justice, National Institute of Justice, 2016. 40p.

Source: Internet Resource: Accessed September 29, 2016 at: https://www.ncjrs.gov/pdffiles1/nij/249805.pdf

Year: 2016

Country: United States

URL: https://www.ncjrs.gov/pdffiles1/nij/249805.pdf

Shelf Number: 140505

Keywords:
Criminal Investigation
Forensic Evidence
Rape
Sexual Assaults

Author: Great Britain. Home Office

Title: The Stephen Lawrence Independent Review: Possible Corruption and the Role of Undercover Policing in the Stephen Lawrence Case

Summary: The questions posed by our terms of reference must be considered in the context of the following key findings of the Stephen Lawrence Inquiry: a) The initial investigation of the murder of Stephen Lawrence was seriously flawed and deserving of severe criticism. The underlying causes of the failure were more troublesome and potentially more sinister. The impact of incompetence, racism and corruption on the investigation had been the subject of much evidence and debate. b) The Inquiry was faced with a complex task in order to determine whether corruption and collusion, racism or institutional lethargy had (alone or in combination) been causative of the seriously flawed initial investigation of the murder. Each contended force could have resulted in or contributed to the same failings. To assess the extent of the impact of any one of the forces on the investigation, it was necessary to consider that force in isolation. c) Applying the civil standard of proof to its findings, namely on the balance of probability, the Inquiry concluded that institutional racism affected the murder investigation, the Metropolitan Police Service (MPS) and police services elsewhere, as well as other institutions and organisations. d) As regards the serious allegation of corruption or collusion, the Inquiry decided that it would be wholly unfair to reach any adverse conclusion without being sure of it, applying the criminal standard of proof. Applying that standard, the Inquiry found that the evidence fell short of making it sure that corruption or collusion had infected the initial murder investigation. e) The flawed MPS Barker Review of the murder investigation in late 1993 had failed to expose the faults in the murder investigation as it should have. Equally, in the face of the Lawrence family's justified criticism, for years afterwards the MPS had wrongly insisted that the investigation had been professionally and competently carried out. This had piled more grief upon that caused by the murder itself and had misled both the family and the public.

Details: London: Home Office, 2014. 2 vol., summary

Source: Internet Resource: Accessed October 12, 2016 at: https://www.gov.uk/government/publications/stephen-lawrence-independent-review

Year: 2014

Country: United Kingdom

URL: https://www.gov.uk/government/publications/stephen-lawrence-independent-review

Shelf Number: 140536

Keywords:
Criminal Investigation
Police Accountability
Police Corruption
Police Integrity
Police Misconduct
Stephen Lawrence

Author: Georgetown University. Law School. Center on Privacy Technology

Title: The Perpetual Line-up: Unregulated Police Face Recognition in America,

Summary: There is a knock on your door. It's the police. There was a robbery in your neighborhood. They have a suspect in custody and an eyewitness. But they need your help: Will you come down to the station to stand in the line-up? Most people would probably answer "no." This summer, the Government Accountability Office revealed that close to 64 million Americans do not have a say in the matter: 16 states let the FBI use face recognition technology to compare the faces of suspected criminals to their driver's license and ID photos, creating a virtual line-up of their state residents. In this line-up, it's not a human that points to the suspect - it's an algorithm. But the FBI is only part of the story. Across the country, state and local police departments are building their own face recognition systems, many of them more advanced than the FBI's. We know very little about these systems. We don't know how they impact privacy and civil liberties. We don't know how they address accuracy problems. And we don't know how any of these systems - local, state, or federal - affect racial and ethnic minorities. This report closes these gaps. The result of a year-long investigation and over 100 records requests to police departments around the country, it is the most comprehensive survey to date of law enforcement face recognition and the risks that it poses to privacy, civil liberties, and civil rights. Combining FBI data with new information we obtained about state and local systems, we find that law enforcement face recognition affects over 117 million American adults. It is also unregulated. A few agencies have instituted meaningful protections to prevent the misuse of the technology. In many more cases, it is out of control.

Details: Washington, DC: Georgetown University, School of Law, 2016. 150p.

Source: Internet Resource: Accessed October 26, 2016 at: https://www.perpetuallineup.org/sites/default/files/2016-10/The%20Perpetual%20Line-Up%20-%20Center%20on%20Privacy%20and%20Technology%20at%20Georgetown%20Law.pdf

Year: 2016

Country: United States

URL: https://www.perpetuallineup.org/sites/default/files/2016-10/The%20Perpetual%20Line-Up%20-%20Center%20on%20Privacy%20and%20Technology%20at%20Georgetown%20Law.pdf

Shelf Number: 146031

Keywords:
Criminal Investigation
Facial Recognition
Police Line-ups

Author: Kruisbergen, Edwin W.

Title: Combating organized crime: A study on undercover policing and the follow-the-money strategy

Summary: This thesis presents empirical evidence on two counterstrategies to organized crime in the Netherlands: the criminal justice approach and the financial approach. For the criminal justice approach, it focuses on a specific method of criminal investigation: undercover policing. For the financial approach, it looks into what organized crime offenders actually do with their money as well as the efforts of law enforcement agencies to confiscate criminal earnings. Index General introduction Undercover policing: assumptions and empirical evidence Infiltrating organized crime groups: theory, regulation and results of a last resort method of investigation Profitability, power, or proximity? Organized crime offenders investing their money in legal economy Explaining attrition: investigating and confiscating the profits of organized crime Conclusion and discussion

Details: The Hague: WODC, Vrije Universiteit Amsterdam, 2017. 204p.

Source: Internet Resource: Dissertation: Accessed January 25, 2017 at: https://www.wodc.nl/binaries/Kruisbergen_dissertation_full%20text_tcm28-237785.pdf

Year: 2017

Country: Netherlands

URL: https://www.wodc.nl/binaries/Kruisbergen_dissertation_full%20text_tcm28-237785.pdf

Shelf Number: 147799

Keywords:
Criminal Investigation
Organized Crime
Proceeds of Crime
Undercover Policing

Author: Ohm, Meit

Title: Geographic Profiling: A scientific tool or merely a guessing game?

Summary: Geographic profiling is considered as one of the most controversial and innovative technologies used in criminal investigations today. The accuracy of the methodology has become a popular topic amongst scholars and has caused a heated debate regarding the success of geographic profiling. This study seeks to evaluate if geographic profiling is a useful tool for the police. Thus the aims of this study are to examine if the methodology is a viable tool during investigations and further to establish to what extent geographic profiling has been successfully applied within the area of property crime, in particular burglary investigations. By conducting a systematic literature review and key informant interviews this study found that geographic profiling can be a very useful tool for analysts. Further the results showed that geographic profiling systems are not always more accurate than simpler methods, however simpler strategies are not necessarily as consistent as a computerised system. Moreover the results indicate that geographic profiling can be applied during burglary investigations, if done correctly and by a trained investigator. The study concludes that geographic profiling is more than just a guessing game and if applied appropriately it will most likely identify the offender. Lastly the results and shortcomings of this study, including the need for future research is discussed.

Details: Malmo: Malmö högskola/Hälsa och samhälle, 2016. 35p.

Source: Internet Resource: Thesis: Accessed February 4, 2017 at: https://dspace.mah.se/bitstream/handle/2043/20828/Bachelorthesis.MeitOhrn.pdf?sequence=2&isAllowed=y

Year: 2016

Country: Sweden

URL: https://dspace.mah.se/bitstream/handle/2043/20828/Bachelorthesis.MeitOhrn.pdf?sequence=2&isAllowed=y

Shelf Number: 145873

Keywords:
Burglary
Crime Analysis
Criminal Investigation
Geographic Profiling
Geographical Information Systems (GIS)

Author: Doleac, Jennifer L.

Title: The effects of DNA databases on the deterrence and detection of offenders

Summary: Countries around the world use databases of criminal offenders' DNA profiles to match known offenders with crime scene evidence. The purpose is to ease police detection work and to increase the probability that offenders get caught if they reoffend, thereby deterring future criminal activity. However, relatively little is known about the behavioral effects of this law enforcement tool. We exploit a large expansion of Denmark's DNA database in 2005 to measure the effect of DNA profiling on criminal behavior. Individuals charged after the expansion were much more likely to be added to the DNA database than similar offenders charged just before that date. Using a regression discontinuity strategy, we find that the average effect of the DNA database is a reduction in recidivism. By using the rich Danish register data, we further show that effects are heterogeneous across observable offender characteristics; it is mainly offenders initially charged with violent crime that are deterred from committing new crimes. We also find that DNA profiling has a positive detection effect, increasing the probability that repeat offenders get caught. Finally, we find evidence that DNA profiling changes non-criminal behavior: offenders added to the DNA database are more likely to get or remain married. This is consistent with the hypothesis that, by deterring future criminal behavior, DNA profiling changes an offender's life course for the better.

Details: Unpublished paper, 2016. 70p.

Source: Internet Resource: Accessed February 11, 2017 at: http://jenniferdoleac.com/wp-content/uploads/2015/03/DNA_Denmark.pdf

Year: 2016

Country: Denmark

URL: http://jenniferdoleac.com/wp-content/uploads/2015/03/DNA_Denmark.pdf

Shelf Number: 147325

Keywords:
Criminal Deterrence
Criminal Investigation
DNA Fingerprinting
DNA Typing
Recidivism
Reoffending

Author: Hicks, Tristram

Title: Model Approach for Investigating the Financing of Organised Crime

Summary: The financing of organised crime is a horizontal issue for all criminal markets, although it rarely falls in the focus of law enforcement agencies. The intelligence gathering of law enforcement agencies has traditionally been focused on uncovering the members of crime groups and tracing the illicit goods or services. Financial transactions are traced mainly for the purposes of money laundering investigations, where the focus is on the proceeds and not on the investments related to the criminal activities. The reason for this is that currently criminal prosecution procedures in all Member States are entirely focused on collecting evidence in regards to possession, transporting, manufacturing or sale of illicit products or services. Financing of organised crime is also often passed over in threat assessments and strategic analyses of organised crime.

Details: Sofia, Bulgaria: Center for the Study of Democracy, 2015? 16p.

Source: Internet Resource: Accessed February 13, 2017 at: http://www.csd.bg/artShow.php?id=17318

Year: 2015

Country: Europe

URL: http://www.csd.bg/artShow.php?id=17318

Shelf Number: 145770

Keywords:
Criminal Investigation
Illicit Products
Money Laundering
Organized Crime

Author: Sharp, Stephanie

Title: Pickpocketing on the Railway: Targeting Solvable Cases

Summary: This study aims to identify and exploit the circumstantial factors associated with the solvability of pickpocketing on the railway. Through the development of a statistical case screening model derived from these factors, comparisons are made between this method and the current intuition-based approach to case screening at BTP. Finally, the study aims to understand the impact of secondary investigations upon pickpocketing solvability, following case screening and allocation. Using a five-year dataset of 36,260 cases split into two equivalent samples, statistical tests were performed on one sample to understand the strength and significance of factor relationships with solvability, before developing the screening formula through logistic regression. A suitable cut-off point is established to balance what would be missed opportunities or wasted efforts. Following the inclusion of automatic screen-in factors, the final model was tested for predictive accuracy using the second sample and compared to that of current practices. Finally, the relationship between the volume of investigative actions and case solvability was assessed, for the full population and controlling for cases screened in by the statistical model. A range of factors reported significant correlations with pickpocketing solvability, including suspect information; witness accounts; CCTV availability and committed time range, amongst others. The statistical screening model developed presents a predictive accuracy rate of 74.7% compared to BTP’s current processes at 14.4%. There was no significant relationship reported between the volume of investigative actions and case solvability. These findings led to the conclusion that significant efficiencies would be associated with implementing the statistical model due to it screening in fewer crimes for investigation (29.8% reduced from 90.6%). The absence of association between detectives’ activity and solvability informs the conclusion that the surplus resources should be removed from pickpocketing investigations. The estimated savings would be £2.5M over five years. Finally, due to data limitations, a Randomised Control Trial (RCT) is proposed to test the effectiveness of the screening model and subsequent pickpocketing investigations, in a real operational context.

Details: Cambridge, UK: Fitzwilliam College, 2016. 88p.

Source: Internet Resource: Thesis: Accessed April 5, 2017 at: http://www.crim.cam.ac.uk/alumni/theses/Stephanie%20Sharp.pdf

Year: 2016

Country: United Kingdom

URL: http://www.crim.cam.ac.uk/alumni/theses/Stephanie%20Sharp.pdf

Shelf Number: 144712

Keywords:
Criminal Investigation
Pickpocketing
Pickpockets
Railroads
Transit Crime

Author: Queensland. Audit Office

Title: Criminal Justice System -- Reliability and Integration of Data

Summary: Queensland's criminal justice system prevents, detects, and investigates crimes. It delivers judicial processes, manages prisoners and offenders, and provides rehabilitation services. The Queensland Police Service and the Department of Justice and Attorney-General (through its Queensland Courts Service, Queensland Corrective Services, and Office of the Director of Public Prosecutions) are the prime agencies for delivering these services. Throughout this report, we refer to these entities collectively as criminal justice entities. These entities collect valuable data on occurrences (crimes, traffic matters, missing persons, domestic violence, and other incidents), people, and property, and on their activities. They use the data when making decisions about their activities and when allocating resources. The government relies on the statistics and reports generated from this data to set its policy direction. The public rely on it for an appreciation of levels of community safety. Between 2010-11 and 2015-16, the Queensland Police Service recorded 2 174 144 occurrences with 2 809 283 reportable offences into the Queensland Police Records Information Management Exchange (QPRIME) system. The Queensland Police Service define a reportable offence as any act reported to, or becoming known by, the police that they consider, prima facie (at first view, before investigation), to be in breach of the criminal law. The Queensland Police Service has an unacceptable amount of crime data across the state that is incomplete, inaccurate, and wrongly classified. Contributing to this are officers' poor understanding or use of data classification rules, poor guidance, inappropriate data classification practices and inadequate quality assurance controls. As a result, reported crime statistics are questionable at best and unreliable at worst, and should be treated with caution. Underlying the crime statistics, we undertook a statewide assessment of Queensland Police QPRIME system data. Between 2010-11 and 2015-16, we found 22 per cent of all occurrence reports with reportable offences recorded in the Queensland Police Records Information Management Exchange (QPRIME) system, were incomplete, inaccurate or both. We also identified trends in withdrawn and unfounded offences that warranted investigation

Details: Brisbane: Audit Office, 2017. 81p.

Source: Internet Resource: Report 14: 2016-17: Accessed May 5, 2017 at: http://apo.org.au/files/Resource/qao_criminal_justice_system_data_report_14_april_2017.pdf

Year: 2017

Country: Australia

URL: http://apo.org.au/files/Resource/qao_criminal_justice_system_data_report_14_april_2017.pdf

Shelf Number: 145319

Keywords:
Administration of Justice
Crime Statistics
Criminal Investigation
Criminal Justice Statistics
Criminal Justice Systems

Author: Magalingam, Pritheega

Title: Complex network tools to enable identification of a criminal community

Summary: Retrieving criminal ties and mining evidence from an organised crime incident, for example money laundering, has been a difficult task for crime investigators due to the involvement of different groups of people and their complex relationships. Extracting the criminal association from enormous amount of raw data and representing them explicitly is tedious and time consuming. A study of the complex networks literature reveals that graph-based detection methods have not, as yet, been used for money laundering detection. In this research, I explore the use of complex network analysis to identify the money laundering criminals' communication associations, that is, the important people who communicate between known criminals and the reliance of the known criminals on the other individuals in a communication path. For this purpose, I use the publicly available Enron email database that happens to contain the communications of 10 criminals who were convicted of a money laundering crime. I show that my new shortest paths network search algorithm (SPNSA) combining shortest paths and network centrality measures is better able to isolate and identify criminals' connections when compared with existing community detection algorithms and k-neighbourhood detection. The SPNSA is validated using three different investigative scenarios and in each scenario, the criminal network graphs formed are small and sparse hence suitable for further investigation. My research starts with isolating emails with 'BCC' recipients with a minimum of two recipients bcc-ed. 'BCC' recipients are inherently secretive and the email connections imply a trust relationship between sender and 'BCC' recipients. There are no studies on the usage of only those emails that have 'BCC' recipients to form a trust network, which leads me to analyse the 'BCC' email group separately. SPNSA is able to identify the group of criminals and their active intermediaries in this 'BCC' trust network. Corroborating this information with published information about the crimes that led to the collapse of Enron yields the discovery of persons of interest that were hidden between criminals, and could have contributed to the money laundering activity. For validation, larger email datasets that comprise of all 'BCC' and 'TO/CC' email transactions are used. On comparison with existing community detection algorithms, SPNSA is found to perform much better with regards to isolating the sub-networks that contain criminals. I have adapted the betweenness centrality measure to develop a reliance measure. This measure calculates the reliance of a criminal on an intermediate node and ranks the importance level of each intermediate node based on this reliability value. Both SPNSA and the reliance measure could be used as primary investigation tools to investigate connections between criminals in a complex network.

Details: Melbourne: School of Mathematical and Geospatial Sciences, College of Science, Engineering and Health, RMIT University, 2015. 129p.

Source: Internet Resource: Dissertation: Accessed May 13, 2017 at: https://researchbank.rmit.edu.au/eserv/rmit:161407/Magalingam.pdf

Year: 2015

Country: Australia

URL: https://researchbank.rmit.edu.au/eserv/rmit:161407/Magalingam.pdf

Shelf Number: 145462

Keywords:
Criminal Investigation
Criminal Networks
Geospatial Analysis
Money Laundering
Network Analysis
Organized Crime

Author: Herbert, James

Title: Multiagency Investigation & Support Team (MIST) Pilot: Evaluation Report

Summary: This report summarises the findings of the evaluation of the Multiagency Investigation and Support Team (MIST), a pilot response developed by WA Police (Child Abuse Squad); Department for Child Protection & Family Support (Child First, Armadale & Cannington Districts); WA Department of Health (Princess Margaret Hospital); Department of the Attorney General (Child Witness Service); and Parkerville Children and Youth Care Inc. This report comprises the following: - A review of key literature; - What is the Multiagency Investigation & Support Team? - Comparison of Western Australia to practices in other states/territories; - A Theory of Change for the MIST - Methodology; - Research Findings of the following sub-studies; - Qualitative Study of the Perceptions of the MIST pilot; - Descriptive Study of the Fidelity of the MIST Pilot to the Standard Operating Procedures; i. Was MIST implemented as intended (e.g. allocation and interview location); - Quasi-experimental Comparison; i. Do the MIST and Practice as Usual conditions differ in the criminal justice and child protection response? ii. Do the MIST and Practice as Usual conditions differ in the timeliness of the criminal justice and child protection response? iii. Do the MIST and Practice as Usual conditions differ in the referral and uptake of therapeutic and other supportive services? Conclusion. This report draws on a number of publications resulting from a project looking at effective cross-agency responses to severe abuse. This includes two published systematic searches of the literature (Herbert & Bromfield, 2016b, 2017a), a national survey of directors of Child Advocacy Centres in the United States (Ghan, 2017; Herbert, Walsh, & Bromfield, Under Review), a report comparing cross-agency practices in responding to severe child abuse nationally (Herbert & Bromfield, Under reviewa), a draft theory of change for multi-disciplinary teams (Herbert & Bromfield, Under review-b). These articles have also been translated into two reports for the New South Wales Ombudsman's Office and the Joint Investigation Response Team (JIRT) agencies (NSW Police, NSW Health, NSW Family and Community Services) for their review of the JIRT arrangement (Herbert & Bromfield, 2017b, 2017c). This report also references the interim report of the MIST evaluation (Herbert & Bromfield, 2016a).

Details: Adelaide: Australian Centre for Child Protection, University of South Australia, 2017. 125p.

Source: Internet Resource: Accessed August 5, 2017 at: http://apo.org.au/system/files/99916/apo-nid99916-404976.pdf

Year: 2017

Country: Australia

URL: http://apo.org.au/system/files/99916/apo-nid99916-404976.pdf

Shelf Number: 146731

Keywords:
Child Abuse and Neglect
Child Protection
Cooperation
Criminal Investigation

Author: Strom, Kevin J.

Title: Efficiency in Processing Sexual Assault Kits in Crime Laboratories and Law Enforcement Agencies

Summary: Unsubmitted sexual assault kits (SAKs) that accrue in U.S. law enforcement agencies (LEAs) have been the subject of increasing attention for the past decade, as have untested SAKs pending analysis in crime laboratories. The field needs a research-informed approach to identify the most efficient practices for addressing the submission of SAKs in LEAs and the testing of SAKs in laboratories. This approach would also determine whether specific policies or characteristics of a jurisdiction result in more efficient processing outcomes. This mixedmethods study examines intra- and interagency dynamics associated with SAK processing efficiency in a linked sample of crime laboratories (N = 145) and LEAs (N = 321). Relying on responses to a national survey of laboratories and a matched sample of LEAs, researchers at RTI International used regression analysis and stochastic frontier modeling to assess how labor and capital inputs, evidence policies, evidence management systems, and models of cross-agency coordination affect SAK processing efficiency. Semistructured interviews with personnel from forensic laboratories, LEAs, and prosecutor's offices in six jurisdictions were used to elaborate on critical themes relating to SAK processing efficiency. Research Questions Research questions are organized into four sections: Submission and Testing Rates addresses whether laboratory or LEA characteristics are associated with efficiency at laboratory, LEA, and jurisdiction levels and includes one research question: - What laboratory or LEA characteristics (e.g., size of agency, use of technology) are associated with SAK testing or submission rates? Production Functions estimates the productivity of laboratory and LEA processing inputs and provides each unit with a technical efficiency score. Research questions include these: - How productive are laboratory DNA processing inputs and LEA labor inputs? - Do resource utilization inefficiencies contribute to the accumulation of SAKs in LEAs or laboratories? If so, what would be the impact if all inefficiencies were eliminated? Case Closure Rates investigates relationships between LEA submission rates and case closures and between laboratory testing rates and case closures. This section has the following research question: - Do testing or submission rates affect the number of cases that can be closed? Perceptions of Efficient Practices examines qualities or practices of agencies that are perceived to enhance efficiency. This section includes the following research question: - From the perspective of LEAs, laboratories, and prosecuting attorneys, what qualities or practices are most important for efficiency in SAK processing? Study Design and Methods To address the aforementioned research questions, RTI project staff conducted a 2-year mixed-methods study in three phases: - In Phase I, a national survey was administered to state, county, and municipal laboratories that conduct biological forensic analysis, and an additional survey was given to a sample of LEAs that submit SAK evidence to these laboratories. Questions were designed to assess SAK outputs (e.g., submission/testing rates) and inputs (e.g., labor, capital, policies, interagency communication). - In Phase II, production functions were estimated to examine effects of labor and capital inputs, in addition to policies, management systems, and cross-agency coordination on efficiency. - In Phase III, six jurisdictions were recruited for site visits, and qualitative methods were used to understand how LEAs, laboratories, and prosecutors implement practices that affect efficiency.

Details: Research Triangle Park, NC: RTI International, 2017. 55p.

Source: Internet Resource: Accessed September 18, 2017 at: https://www.ncjrs.gov/pdffiles1/nij/grants/250682.pdf

Year: 2017

Country: United States

URL: https://www.ncjrs.gov/pdffiles1/nij/grants/250682.pdf

Shelf Number: 147387

Keywords:
Crime Laboratories
Criminal Investigation
Evidence
Rape
Sexual Assault

Author: Cross, Theodore

Title: Injury Evidence, Biological Evidence, and Prosecution of Sexual Assault

Summary: Injury evidence and biological evidence gained from forensic medical examinations of victims can provide evidence about the crime as well as the means of linking a suspect to the crime. Evidence from a forensic medical examination can include genital and non-genital injuries, biological evidence (including sperm or semen, blood, and amylase, an enzyme of saliva), and a DNA profile that can often be derived from the biological evidence. This DNA can be matched to a potential suspect, matched to another investigation in the FBI's Combined DNA Index System (CODIS), or matched to a convicted offender in CODIS. Injury evidence can be used to establish a victim's lack of consent and could lead to physical assault charges. This project explored the use and impact of injury evidence and biological evidence through a study of the role of these forms of evidence in prosecuting sexual assault in an urban district attorney's office in a metropolitan area in the eastern United States. The research questions addressed in this summary overview are as follows: - How frequent were different forms of injury evidence and biological evidence in the sample? - Is the presence of injury evidence and biological evidence correlated with the presence of other forms of evidence? - Which types of cases and case circumstances are more likely to yield injury evidence and biological evidence? - Do the presence of injury evidence and biological evidence predict criminal justice outcomes, taking into account the effects of other predictors? - In what ways do prosecutors use injury evidence and biological evidence and what is their appraisal of their impact on case outcomes?

Details: Urbana-Champaign: University of Illinois at Urbana-Champaign, 2017. 22p.

Source: Internet Resource: Accessed September 19, 2017 at: https://www.ncjrs.gov/pdffiles1/nij/grants/251036.pdf

Year: 2017

Country: United States

URL: https://www.ncjrs.gov/pdffiles1/nij/grants/251036.pdf

Shelf Number: 147400

Keywords:
Criminal Investigation
Evidence
Forensic Evidence
Rape
Sex Offenders
Sexual Assault

Author: Doleac, Jennifer L.

Title: The Interaction and Impact of State DNA Database Laws, Final Summary Overview

Summary: Despite the widespread use of criminal offender DNA databases by the law enforcement community, relatively little is known about their real-world effects on criminal behavior. The purpose of DNA databases is to quickly and accurately match crime scene evidence with known offenders. They aim to reduce crime by increasing the probability of punishment, conditional on offending. They also exhibit large returns to scale. For these reasons, DNA databases are likely to be far more cost-effective than traditional law enforcement tools. Indeed, previous research has shown that DNA databases have large crime-reducing effects at the state level (Doleac, 2015). However, because DNA database expansions are - like most crime policies - legislated at the state level, the resulting policies may not be efficient from a national perspective. Each state will weigh its own costs and benefits when making policy decisions, without regard for their effects on other states. But state DNA databases do not exist in a vacuum: they could have effects on criminal behavior elsewhere. The federal government can improve the national efficiency of state-level policies by inducing states to consider the costs and benefits to their neighbors - i.e., to internalize the externalities. The federal government has invested a large amount of money in helping states expand their databases and clear sample backlogs, presumably because it perceives positive externalities to state database expansions. Positive externalities would exist if offenders are highly mobile, and are deterred or incapacitated upon being added to a state database. If they stop committing crime, this would reduce crime in other states. Positive externalities could also exist if profiles from one state help other states catch and incapacitate offenders. One important aspect of DNA database policy in the United States is that states can search for profile matches across state lines, using CODIS. This should increase the positive externalities of state-level expansions. For instance, if Georgia expands its database, neighboring states such as Florida could benefit from being able to search those additional profiles. Depending on how often crimes in Florida are committed by out-of-state offenders, the expansion of Georgia's database could help Florida identify and convict more offenders, reducing its own crime rate. When Georgia is weighing the costs and benefits of expanding its database, it will probably not consider these external benefits, and so its database will be inefficiently small; hence the justification for federal funding to encourage more expansions. However, there could be negative externalities, particularly if a state's database expansion induces probable offenders to move to another state. For instance, suppose Georgia adds felony arrestees to its database, but Florida does not include that group. Offenders in Georgia who think they could be arrested for a felony will have an incentive to move to Florida, to avoid DNA profiling and therefore detection for past or future crimes. (Such a behavioral effect is not unreasonable to expect: we typically assume that human capital is mobile, and that workers move to places with better jobs.) In this case, Georgia's database expansion would displace some of its own crime to Florida. As before, Georgia would not include this external cost in its cost-benefit analysis, but in this case a state database that seems optimal from the state's perspective will be inefficiently large from the national perspective. Which of these externalities dominates in the DNA database context is an empirical question. The goal of this project is to answer that question. This report summarizes the main findings.

Details: Final report to the U.S. National Institute of Justice, 2017. 19p.

Source: Internet Resource: Accessed September 20, 2017 at: https://www.ncjrs.gov/pdffiles1/nij/grants/251035.pdf

Year: 2017

Country: United States

URL: https://www.ncjrs.gov/pdffiles1/nij/grants/251035.pdf

Shelf Number: 147416

Keywords:
Cost-Benefit Analysis
Criminal Deterrence
Criminal Investigation
DNA Fingerprinting
DNA Typing
Recidivism
Reoffending

Author: Herbert, James

Title: Components of Effective Cross-Agency Responses to Abuse - A Report for the NSW Ombudsman's Office (Report 2 of 2)

Summary: This report aims to provide a synthesis of research information to suggest the most important components of Multi-Disciplinary Team responses in order to inform the ongoing review of the Joint Investigation Response Team (JIRT) model by the NSW Ombudsman’s Office. Drawing on recently completed studies of multi-disciplinary teams and new research, this report presents findings on: (a) What is the evidence for the effectiveness of Multi-Disciplinary Teams, and what characteristics are consistent across effective Multi-Disciplinary Teams; (b) What Multi-Disciplinary Team responses to abuse are in use in Australia and comparable international jurisdictions; and (c) The rationale for Multi-Disciplinary Team models. The report ends with a summary of the implications of this information for the current review of the JIRT model.

Details: Adelaide: Australian Centre for Child Protection, University of South Australia, 2017. 133p.

Source: Internet Resource: Accessed November 7, 2017 at: http://www.unisa.edu.au/Global/EASS/Research/ACCP/Components%20of%20Effective%20Cross-Agency%20Responses%20to%20Abuse.pdf

Year: 2017

Country: Australia

URL: http://www.unisa.edu.au/Global/EASS/Research/ACCP/Components%20of%20Effective%20Cross-Agency%20Responses%20to%20Abuse.pdf

Shelf Number: 148056

Keywords:
Child Abuse and Neglect
Child Protection
Cooperation
Criminal Investigation

Author: Independent Advisory Group on the Use of Biometric Data in Scotland

Title: Report of the Independent Advisory Group on the Use of Biometric Data in Scotland

Summary: The report of the Independent Advisory Group on the Use of Biometric Data which provides recommendations on a policy and legislative framework for police use of biometric data and associated technologies, and rules around retention. The advisory group, chaired by John Scott QC, was established by the Cabinet Secretary for Justice to consider the recommendations contained in HM Inspectorate of Constabulary in Scotland's Audit and Assurance Review of the Use of the Facial Search functionality within the UK Police National Database (PND) by Police Scotland report, and provide recommendations on a policy and legislative framework. The report makes 9 recommendations which include the creation of an independent Scottish Biometrics Commissioner, the establishment of a statutory code of practice covering biometric data and technologies and a review of the existing retention rules (with distinct policies applied to children aged 12 to 17). A Scottish Government response is published alongside the report

Details: Edinburgh: Scottish Government, 2018. 91p.

Source: Internet Resource: Accessed April 10, 2018 at: http://www.gov.scot/Publications/2018/03/9437/downloads#res533063

Year: 2018

Country: United Kingdom

URL: http://www.gov.scot/Publications/2018/03/9437/downloads#res533063

Shelf Number: 149748

Keywords:
Criminal Investigation
Facial Recognition
Police Investigation
Police Technology

Author: Walach, Vaclav

Title: Lifecycle of a Hate Crime. Country Report for the Czech Republic

Summary: The objective of this research was to determine how hate crimes are investigated and punished in the Czech Republic (CR). This was achieved by analysing the experiences of individual actors in the criminal proceedings for this type of crime. Our corpus of data included the following categories of informants: offenders, victims, defense attorneys, public prosecutors, and judges. Additional sources of data consisted primarily of secondary literature (legislation, by-laws, concept documents, legal analyses, etc.). The project focus suggested a specific approach to the data construction. It is relatively difficult to gain access to the population for each of the categories in the hate crime research corpus. Informants within the justice system (public prosecutors and judges) are small in number and, additionally, are restricted by regulations imposed by superior bodies. In practice, this meant that potential informants could not be contacted directly, but only by submitting a formal request to individual courts and public prosecutors' offices. Access to these people was further complicated by the fact that, in the CR, hate crimes constitute a relatively narrow slice of criminal activity, and particular informants who deal with this activity are difficult to identify in advance (see below). To target these individuals, then, we relied upon help from the institutions representing individual categories of informants. Attorneys who had represented hate crime offenders or their victims in the past were also difficult to gain access to. Because no records are kept of these individuals, we were forced to identify potential informants in advance using our prior experience, or by analyzing court judgments or media content. This already reduced sample size shrank further with the frequent refusal of those contacted to take part in the research for a number of reasons. It was similarly difficult to gain access to offenders and victims of hate crime. Data protection laws, which mandate that personal data concerning offenders and victims be anonymized in judicial records provided to the public, have rendered the population in these two categories invisible. It was therefore necessary to approach these individuals via the prisons and probation institutions responsible for monitoring the offenders, along with organizations focused on helping hate crime victims. Identifying and Contacting Informants Informants were identified and contacted in two phases During the first phase, we contacted the lead organizations for the justice system, legal representation, and the prisons-the Czech Judicial Union (CJU), the Supreme Public Prosecutor's Office (SPPO), the Judicial Academy (JA), the Czech Bar Association (CBA) and the General Directorate of the Prison Service (GDPS). We anticipated that they would provide access to experts in the justice system, legal profession, and to offenders. But with the exception of the GDPS, none of these institutions mediated contact with any of the informants officially. Also unsuccessful was an attempt to make mass contact with all lawyers via the CBA. There was no response to requests posted on the CBA's website or in their official magazine, Bulletin Advokacie. For this reason, we embarked upon the second phase of contact and identification, this time primarily employing personal contacts, along with an analysis of court decisions in hate crime cases and a media analysis of cases in which hate crime was mentioned. The task of identifying appropriate informants, however, clearly differed based upon the type of actor being contacted.

Details: Prague: in IUSTITIA, o.p.s., 2017. 124p.

Source: Internet Resource: Accessed may 2, 2018 at: https://www.iccl.ie/wp-content/uploads/2018/04/Life-Cycle-of-a-Hate-Crime-Country-Report-for-Czech-Republic-English.pdf

Year: 2017

Country: Czech Republic

URL: https://www.iccl.ie/wp-content/uploads/2018/04/Life-Cycle-of-a-Hate-Crime-Country-Report-for-Czech-Republic-English.pdf

Shelf Number: 149974

Keywords:
Bias-Motivated Crime
Criminal Investigation
Discrimination
Hate Crimes
Police Investigations
Prejudice

Author: U.S. Federal Bureau of Investigation

Title: Serial Murder: Multi-Disciplinary Perspectives for Investigators

Summary: The topic of serial murder occupies a unique niche within the criminal justice community. In addition to the significant investigative challenges they bring to law enforcement, serial murder cases attract an over-abundance of attention from the media, mental health experts, academia, and the general public. While there has been signifi cant, independent work conducted by a variety of experts to identify and analyze the many issues related to serial murder, there have been few efforts to reach a consensus between law enforcement and other experts, regarding these matters. In an effort to bridge the gap between the many views of issues related to serial murder, the Federal Bureau of Investigation (FBI) hosted a multi-disciplinary Symposium in San Antonio, Texas, on August 29, 2005 through September 2, 2005. The goal of the Symposium was to bring together a group of respected experts on serial murder from a variety of fields and specialties, to identify the commonalities of knowledge regarding serial murder. A total of 135 subject matter experts attended the five-day event. These individuals included law enforcement officials who have successfully investigated and apprehended serial killers; mental health, academic, and other experts who have studied serial killers and shared their expertise through education and publication; officers of the court, who have judged, prosecuted, and defended serial killers; and members of the media, who inform and educate the public when serial killers strike. The attendees also reflected the international nature of the serial murder problem, as there were attendees from ten different countries on five continents. The agenda encompassed a variety of topics related to serial murder including common myths, definitions, typologies, pathology and causality, forensics, the role of the media, prosecution issues, investigative task force organization, and major case management issues. Each day included panel discussions, case presentations, and discussion groups addressing a range of topics related to serial murder. This monograph is a culmination of the input and discussion of the attendees on the major issues related to serial murder. The contents are based upon the notes taken during the presentations, panel discussions, and break-out group sessions. The goal in publishing this monograph is to outline the consensus views from a variety of disciplines on the causality, motivations, and characteristics of serial murderers, which will enable the criminal justice community to generate a more effective response in the identification, investigation, and adjudication of these cases.

Details: Washington, DC; FBI, 2008. 71p.

Source: Internet Resource: Accessed May 7, 2018 at: https://www.fbi.gov/file-repository/stats-services-publications-serial-murder-serial-murder-july-2008-pdf/view

Year: 2008

Country: United States

URL: https://www.fbi.gov/file-repository/stats-services-publications-serial-murder-serial-murder-july-2008-pdf/view

Shelf Number: 150067

Keywords:
Criminal Investigation
Homicides
Serial Murder

Author: Romanosky, Sasha

Title: Law Enforcement Cyber Center: Final Technical Report

Summary: Cybercrime and cyber threats place many demands on law enforcement agencies, ranging from investigating cyber incidents to securing their own information systems. In addition, law enforcement agencies are required to collect and handle the constantly increasing volume of digital evidence. The Bureau of Justice Assistance established the Law Enforcement Cyber Center (LECC) in October 2014 to help state and local law enforcement better combat cybercrime. The LECC, which completed in September 2017, was tasked to serve as an online portal and a clearinghouse of information, directing users to existing resources developed and managed by subject-matter experts, professional organizations, and government agencies. The LECC was managed by a consortium of organizations led by the RAND Corporation as the main grantee. Partner organizations in the LECC team were the International Association of Chiefs of Police and the Police Executive Research Forum. Although doing so was not formally part of the LECC grant, the project team also collaborated with the National White Collar Crime Center, a nonprofit organization. This technical report provides an account of LECC activities since its inception in October 2014 to its completion in September 2017. Key Findings The LECC Met Its Objectives and Completed All Its Planned Tasks The LECC project team set up the LECC website, identified training and training needs for various stakeholders, contributed to better links among crime units, enhanced prevention education, and developed technical assistance materials for relevant audiences. The project team also organized the LECC Justice Executive Cyber Roundtable, which provided a unique forum to bring together police chiefs, prosecutors, and judges to address the fight against cybercrime. The Metrics Employed by the Project Team Demonstrated the Usefulness of the Type of Services Provided by the LECC As the LECC web traffic data demonstrate, the content provided on the LECC website was successful in attracting traffic to the website. The volume of traffic visiting the website grew over time, suggesting that it is possible to attract new users as well as retain existing visitors by providing a continuously updated set of relevant information. The presentation of the LECC and its website at various meetings, fora, and conferences received interest and enthusiasm, indicating a perceived need for such a resource among various stakeholders. The LECC's resources were also designed to foster greater links among crime units; for example, the LECC team compiled a list of regional capabilities relevant for combatting cybercrime, such as forensics labs or training facilities. The LECC team developed a report on the implementation of the Utah Model of cybercrime prevention, summarizing lessons and best practices from the implementation of a new cybercrime unit in Utah. Recommendation Future endeavors to assist state and local law enforcement and prosecutors with cybercrime prevention, investigation, and prosecution should continue to broker the exchange of knowledge within and across law enforcement stakeholder groups.

Details: Santa Monica, CA: RAND, 2017. 48p.

Source: Internet Resource: Accessed May 25, 2018 at: https://www.rand.org/content/dam/rand/pubs/research_reports/RR2300/RR2320/RAND_RR2320.pdf

Year: 2017

Country: United States

URL: https://www.rand.org/content/dam/rand/pubs/research_reports/RR2300/RR2320/RAND_RR2320.pdf

Shelf Number: 150370

Keywords:
Computer Crime
Costs of Crime
Crime Prevention
Criminal Investigation
Cybercrime
Internet Crime

Author: Cross, Theodore

Title: Forensic Evidence and Criminal Justice Outcomes in a Statewide Sample of Sexual Assault Cases

Summary: Sexual assault is a heinous crime that as much as a quarter of women nationally experience in their lifetime. Not only do victims suffer the terror and degradation of the assault, but they are further at risk of injury and a range of difficulties with mental health and functioning. Survivors are also at risk of re-victimization from informal and professional responses that question their credibility and in effect blame them for the assault. Only a small proportion of sexual assaults are prosecuted; only a subset of assaults are reported to police, only a portion of those cases reported to police result in arrest, and only small percentage of those arrested are ultimately prosecuted. When prosecution does ensue, enormous demands are placed on victims; they must testify in court about the traumatic events of the crime and face assaults on their credibility both in and outside the courtroom. In this difficult context, investigative methods that increase evidence against assailants while decreasing the burden on victims are especially important, and advances in the technology and expertise of collecting and analyzing injury and forensic evidence offer promise. Victims undergo difficult forensic medical examinations with the hope of contributing evidence that can help bring assailants to justice. The research community has a responsibility to develop a better understanding of how this information is used and actually relates to criminal justice actions. This study explores the role of injury evidence and forensic evidence in sexual assault cases using data from medical providers, crime laboratories and police. The study: - Examines the frequency of injury and biological evidence in sexual assault cases; - Identifies case factors associated with the presence of injury and biological evidence; - Analyzes how often biological evidence is processed prior to versus after arrest; - Explores how injury and biological evidence as well as other factors are related to arrest; and - Examines results for key comparisons thought to be salient for forensic evidence: Sexual Assault Nurse Examiners vs. other medical examiners; strangers vs. known suspects; child victims vs. adults and adolescents.

Details: Urbana-Champaign, IL: University of Illinois Urbana Champaign, 2014. 220p.

Source: Internet Resource: Accessed May 31, 2018 at: https://www.ncjrs.gov/pdffiles1/nij/grants/248254.pdf

Year: 2015

Country: United States

URL: https://www.ncjrs.gov/pdffiles1/nij/grants/248254.pdf

Shelf Number: 150411

Keywords:
Criminal Investigation
Evidence
Forensic Evidence
Rape
Sex Offenders
Sexual Assault

Author: U.S. Department of Justice, Office of the Inspector General, Evaluation and Inspections Division

Title: Review of the United States Marshals Service's Apprehension of Violent Fugitives

Summary: The Presidential Threat Protection Act of 2000 directed the creation of fugitive apprehension task forces and encouraged the Department of Justice (Department) to focus on apprehending violent federal and state fugitives. In fiscal year (FY) 2001, the Department changed its strategic plan and shifted the focus of its fugitive apprehension efforts from all federal fugitives to violent federal and violent state fugitives. The United States Marshals Service (USMS), the federal government's primary agency for apprehending fugitives, is principally responsible for carrying out the Department's strategy. To apprehend fugitives of all types, Deputy Marshals in the 94 federal judicial districts (district) work individually or as members of warrant squads, district fugitive task forces, or Regional Fugitive Task Forces (RTF). The Office of the Inspector General (OIG) initiated this review to evaluate the performance of the USMS in apprehending violent fugitives. To evaluate the USMS's performance, we analyzed trends in fugitive apprehensions using data from the USMS's Warrant Information Network (WIN) from FY 2001 to 2004. We also compared the number of violent fugitives apprehended to the amount of time (measured in staff years) that USMS personnel spent on fugitive investigations. In addition, to examine the effectiveness of the RTFs, we compared the number of violent fugitive apprehensions in the 15 districts included in the 5 existing RTFs to the number of violent apprehensions in the other 79 districts. We also surveyed all of the USMS district offices about their violent fugitive apprehension efforts. The performance of the USMS in apprehending violent fugitives improved from FY 2001 to FY 2004. During that period, the USMS increased the number of violent fugitives it apprehended by 51 percent. We also found that the USMS became more efficient in apprehending violent fugitives. The number of violent fugitives apprehended per staff year increased from 18 violent fugitives in FY 2002 to 21 violent fugitives in FY 2004. We concluded that the USMS's performance improved primarily because the USMS increased the staff time dedicated to violent fugitive investigations by 21 percent and because the five RTFs created by the USMS were more efficient and effective at apprehending fugitives. Despite its improved performance, the USMS was unable to reduce the number of violent federal fugitives at large. From FY 2001 through FY 2004, the number of violent federal fugitives who remained at large increased by 3 percent to 14,419 fugitives. The Deputy Marshals we interviewed said that the number of violent federal fugitives sought by the USMS increased because the increased number of federal task forces throughout the country generated more federal fugitives. We found that the USMS also investigated more federal fugitives referred from other federal agencies, and that state and local law enforcement agencies requested more assistance from the USMS in apprehending fugitives. Although the increase in the number of violent federal fugitives is not fully within the USMS's control, we identified three factors within the USMS's control that, if addressed, would improve its effectiveness at apprehending violent federal fugitives. The factors are that (1) not all districts assigned violent federal fugitive investigations to the RTFs and other task forces; (2) the USMS did not fully change its focus from apprehending all federal fugitives to apprehending violent federal and state fugitives; and (3) most USMS districts did not enter data regarding their state fugitives in WIN when the investigations were opened so that the USMS could more effectively focus its resources on apprehending violent fugitives.

Details: Washington, DC: Office of the Inspector General, 2005. 59p.

Source: Internet Resource: Accessed June 8, 2018 at: https://oig.justice.gov/reports/USMS/e0508/final.pdf

Year: 2005

Country: United States

URL: https://oig.justice.gov/reports/USMS/e0508/final.pdf

Shelf Number: 150509

Keywords:
Arrests and Apprehensions
Criminal Investigation
Criminals
Fugitives from Justice
Marshals
United States Marshals Service

Author: Salet, Renze

Title: VVC onder de aandacht: Een onderzoek naar ZSM en de gevolgen voor het politiewerk

Summary: At the end of 2009, the police and Public Prosecution Service took the initiative for the often long lead times of the settlement of cases of common crime to deal with. This resulted in the measure 'ZSM', with which a direct and faster criminal response to common crime was envisaged. In 2011, the introduction of this measure was started. Although the introduction of ZSM has broad reactions to positive reactions led, there is also the necessary criticism and concern expressed about among others possible negative consequences for fundamental criminal law values. Striking however, there was hardly any research at the start of this study something known about the actual functioning of ZSM. Also about the consequences of ZSM lacked empirical research for police and police work. With this a part of this gap is filled up. In this research the central question is how the ZSM method works, which consequences this has for police work and which factors and circumstances play a role in this. To answer this question are in total four ZSM tables the working method, the role and contributions of the various partners cooperate, investigated. In addition, there are thirteen different basic teams of the National Police investigated how from the basic teams to the police the work on the VVC cases goes on, how the police work fits in with the work at the ZSM table and what influence the ZSM method has on police and police work. In doing so, attention was paid to the question of which factors and circumstances affect the practices used. In the frame both have large numbers at both the ZSM tables and the basic teams interviews and are police officers and employees at the ZSM tables were observed, with a number of concrete issues being followed. The observed cases at the ZSM tables formed the basis for a legal one analysis of those ZSM decisions. In addition, there are a number of lawyers per location interviewed. Finally, an analysis of the speed with which matters at ZSM are settled on the basis of existing registration data. The fieldwork in this study took place in the period of October 2014 to August 2015. (Google Translation)

Details: Amsterdam : Reed Business, 2017. 220p.

Source: Internet Resource: Accessed july 9, 2018 at: https://www.politieacademie.nl/kennisenonderzoek/kennis/mediatheek/PDF/93210.PDF

Year: 2017

Country: Netherlands

URL: https://www.politieacademie.nl/kennisenonderzoek/kennis/mediatheek/PDF/93210.PDF

Shelf Number: 150789

Keywords:
Criminal investigation
Criminal Law
Police Intelligence
Police Investigations
Prosecution

Author: U.S. Department of Justice. Office of Justice Programs. Office of Juvenile Justice and Delinquency Prevention

Title: A Law Enforcement Guide on International Parental Kidnapping

Summary: International parental kidnapping, whether as a result of a parent or other person taking or wrongfully retaining a child with the intent to obstruct the lawful exercise of parental rights, merits the full and timely attention of law enforcement. The child (or children) should be considered to be in danger, especially when the person taking or retaining the child has previously threatened to abduct or harm the child or themselves, or is otherwise unstable. In these cases, the law enforcement responsibility is much broader than the simple act of retrieving the child. Officers, and the agencies they represent, who respond promptly, professionally, and efficiently to reports regarding what many term "family kidnappings" become, in effect, a means of protection for the child (Findlay and Lowery, 2011). This guide is for local, state, and federal law enforcement authorities who respond to international parental child kidnapping cases. It suggests methods for preventing international child kidnappings by family members; describes the role of law enforcement as the initial responder and investigator; discusses applicable laws, treaties, and legal remedies for child recovery and reunification; and outlines considerations for criminal prosecution and extradition of offenders. The guide covers: - Risks and effects of the problem, as well as scope and remedies. - Law enforcement interventions for preventing kidnapping. - Initial law enforcement response. - Interdiction: How to stop a kidnapping in progress. - The continuing investigation in the United States and abroad. - Federal resources that can aid in the investigation.

Details: Washington, DC: OJJDP, 2018. 100p.

Source: Internet Resource: Accessed July 25, 2018 at: https://www.ojjdp.gov/pubs/250606.pdf

Year: 2018

Country: International

URL: https://www.ojjdp.gov/pubs/250606.pdf

Shelf Number: 150916

Keywords:
Child Abduction
Child Custody
Child Kidnapping
Criminal Investigation
Kidnapping
Parental Kidnapping

Author: Herbert, James

Title: National comparison of cross-agency practice in investigating and responding to severe child abuse

Summary: The response to severe child abuse (namely abuse requiring police investigation) requires many different workers across agencies and disciplinary backgrounds to work together effectively. This paper reports on the arrangements in place in each state/territory to support a cross-agency response based on characteristics associated with effective cross-agency responses identified in the research literature. This paper was prepared to provide practitioners and policy makers with a national view on cross-agency policies to encourage cross-jurisdictional learning and sharing of approaches. The authors also hope that this paper will lead to a national discussion around effective policies and practices in cross-agency responses. Each state/territory was compared on the characteristics of their response to severe child abuse, arrangements for joint planning, interviewing and investigation, the degree of integration of therapeutic and supportive services, and governance arrangements.

Details: Melbourne: Australian Institute of Family Studies, 2017. 36p.

Source: Internet Resource: CFCA PAPER NO. 47: Accessed August 30, 2018 at: https://aifs.gov.au/cfca/sites/default/files/publication-documents/47_national_comparison_of_cross-agency_practice_in_investigating_and_responding_to_severe_child_abuse.pdf

Year: 2017

Country: Australia

URL: https://aifs.gov.au/cfca/sites/default/files/publication-documents/47_national_comparison_of_cross-agency_practice_in_investigating_and_responding_to_severe_child_abuse.pdf

Shelf Number: 151314

Keywords:
Child Abuse and Neglect
Child Maltreatment
Child Protection
Criminal Investigation
Police Investigation

Author: Creedon, Mick

Title: Operation Herne: Special Demonstration Squad Reporting: Mentions of Sensitive Campaigns

Summary: Introduction Operation Herne is the title given to the independent investigation led by Derbyshire's Chief Constable Mick Creedon QPM into the Special Demonstration Squad (SDS). The SDS was a covert unit of the Metropolitan Police Special Branch (MPSB). Operation Herne's terms of reference are to review the former SDS from its origin in 1968 to its closure in 2008, examining how it operated throughout its existence. This report examines "collateral reporting" and "mentions" of Justice Campaigns recorded within SDS intelligence submissions. Following the Peter Francis allegations that the SDS targeted the family of murdered teenager Stephen Lawrence, Operation Herne has investigated the extent of similar information held within SDS documentation. This report will refer to SDS reporting on a number of Justice Campaigns. A "Justice Campaign" would usually form as a result of family or public concerns surrounding the: - Investigation, detention or treatment of a subject who died in police custody, - Investigation, detention or treatment of a subject who died following police contact - Victim of a murder - High profile prosecution or investigation - Miscarriages of Justice The majority of these cases involved black males, hence the commonly used term "Black Justice Campaign." Operation Herne has identified emerging evidence that in addition to the Stephen Lawrence Campaign, a number of other Justice Campaigns have been mentioned within SDS records. Seventeen such Justice Campaigns have been identified so far. These range between 1970 and 2005 and are as a result of deaths in police custody, following police contact and the victims of murders. It is the intention of Chief Constable Creedon and Operation Herne to inform all of the families involved and share, where possible the knowledge and information held. This process will inevitably take time to research and complete given the historical profile of many of the events and the natural difficulties in tracing some families. The work to identify such families or campaigns continues and those identified will be personally appraised of the detail by investigators from Operation Herne.

Details: Ashbourne, UK: Derbyshire Constabulary, 2014. 32p.

Source: Internet Resource: Accessed January 16, 2019 at: http://www.statewatch.org/news/2014/jul/uk-2014-07-op-herne-report-3-sds.pdf

Year: 2014

Country: United Kingdom

URL: http://www.statewatch.org/news/2014/jul/uk-2014-07-op-herne-report-3-sds.pdf

Shelf Number: 154219

Keywords:
Criminal Investigation
Deaths in Custody
Justice Campaign
Metropolitan Police Special Branch
Operation Herne
Police Custody
Police Misconduct
Special Demonstration Squad

Author: Hinoposa, Gina

Title: Turning the Tide on Impunity: Protection and Access to Justice for Journalists and Human Rights Defenders in Mexico

Summary: KEY FINDINGS - Protection measures provided through Mexico's Mechanism to Protect Human Rights Defenders and Journalists are often insufficient. The Mechanism has been unable to develop risk analysis protocols that effectively identify the different needs of female, rural, indigenous, and other particularly vulnerable journalists and defenders when it comes to receiving protections. Protection measures are often unreliable, are not adequately implemented, and do not take into account realities on the ground in different parts of the country. In some cases, they have been unable to provide sufficient protection: six Mechanism beneficiaries have been murdered since August 2017. - The Mechanism suffers from a serious lack of adequate staffing and budget levels. There are only 35 Mechanism personnel overseeing the protection of 831 journalists and human rights defenders. Despite this context, Mexico's 2019 budget cut funds to the Ministry of the Interior"s Human Rights Unit-which finances the Mechanism's staff salaries-by over USD$610,500, meaning additional staff will likely not be hired in 2019. Moreover, while the Mechanism spent approximately $13.6 million on the implementation of protection measures in 2018, Mexico's Congress only allocated up to $10.9 million for protection measures in the 2019 budget. - The Mechanism has made progress in developing strategies that go beyond providing immediate protection to journalists and human rights defenders. Experiences in the state of Chihuahua could serve as a model for developing comprehensive prevention strategies that are more comprehensive and more attuned to local contexts. Since 2016, Mechanism officials have been working alongside Chihuahua's state government, national and international human rights bodies, and local civil society groups to develop a Contingency Plan focused on addressing the root causes of violence against journalists and human rights defenders in that state. - Mexican authorities are frequently identified as the perpetrators behind crimes against journalists and human rights defenders. Public officials were determined to be the likely aggressors in 39 percent of cases the Mechanism has overseen. Similarly, "abuse of authority" was the second-most common crime reported by prosecutor's offices that provided us with statistics on these crimes, pointing to how frequently public officials and security forces are involved in attacks. This helps to explain why many investigations into crimes against journalists and human rights defenders lack credibility and impartiality, particularly at the state level. - The Mexican government's failure to properly investigate and sanction crimes against journalists and human rights defenders has left these groups open to attack. Between 2012 and June 2018, only three percent of investigations opened by the state prosecutor's offices analyzed by WOLA and PBI made it to the courts. Of the 1,077 cases investigated by the federal-level Special Prosecutor's Office for Crimes against Freedom of Expression (FEADLE) during that period, less than 12 percent were taken to court. Only five FEADLE cases-less than one percent-resulted in convictions. Aside from its overall poor track record in prosecuting cases, FEADLE rarely takes advantage of its power to take investigations out of the hands of state prosecutor's offices when state authorities are not handling the cases with due diligence. - FEADLE's capacity to fulfill its mandate has been severely limited by a lack of human and financial resources. The agency's budget has been reduced by 54 percent since 2014, from over USD$2 million to around $942,000. The office only has 22 prosecutors and 15 investigative police officers on staff. - Many prosecutor's offices in Mexico do not maintain quality criminal statistics that could aid in criminal analysis and strengthen prosecutorial oversight. Without systematized databases with reliable statistics on crimes against journalists and human rights defenders, prosecutors are unable to draw patterns and connections between cases, or identify any common modus operandi used to target victims. Some offices do not track the status and results of their investigations, such as the outcome of cases that are tried in court. This makes it difficult for authorities to identify and rectify gaps in their investigative practices and processes, and makes clear that prosecutors in these offices are not being evaluated based on their performance. - Some law enforcement institutions often devote valuable time and resources toward discrediting and criminalizing the work of journalists and human rights defenders, rather than guaranteeing their protection. There is a clear pattern of Mexican authorities misusing criminal legislation to criminalize activists and media workers. In Chihuahua state, for example, we found that over the period reviewed for this report, the number of cases in which authorities deemed journalists to be the alleged aggressors was more than double the number of cases opened into crimes committed against them. - The U.S. government continues to provide significant funds to support the Protection Mechanism and to strengthen investigations into crimes against journalists and human rights defenders. In September 2017, the U.S. Agency for International Development (USAID) initiated a USD$7.1 million project called ProVoces. ProVoces consultants have provided trainings, mentorship, and technical assistance to the Mexican agencies charged with addressing violence against journalists and defenders and aims to strengthen coordination between prosecutor's offices, federal and state-level protection mechanisms, and civil society organizations.

Details: Washington, DC: Washington Office on Latin America, 2019. 40p.

Source: Internet Resource: Accessed May 10, 2019 at: https://www.wola.org/wp-content/uploads/2019/03/ENGLISH-WOLA-PBI-2019.pdf

Year: 2019

Country: Mexico

URL: https://www.wola.org/wp-content/uploads/2019/03/ENGLISH-WOLA-PBI-2019.pdf

Shelf Number: 155747

Keywords:
Criminal Investigation
Freedom of Expression
Homicides
Human Rights Defenders
Journalists
Prosecution
Protection Measures