8
1.2 Assess the use of investigative techniques in criminal investigations Techniques • Forensic • Surveillance techniques • Profiling techniques • Use of intelligence databases e.g. National DNA Database • Interview – Eye witnesses – Other witnesses

1.2 Assess the use of investigative techniques in criminal investigations Techniques Forensic Surveillance techniques Profiling techniques Use of intelligence

Embed Size (px)

Citation preview

Page 1: 1.2 Assess the use of investigative techniques in criminal investigations Techniques Forensic Surveillance techniques Profiling techniques Use of intelligence

1.2 Assess the use of investigative techniques in criminal investigations

• Techniques• Forensic• Surveillance techniques• Profiling techniques• Use of intelligence databases e.g. National DNA

Database• Interview– Eye witnesses– Other witnesses

Page 2: 1.2 Assess the use of investigative techniques in criminal investigations Techniques Forensic Surveillance techniques Profiling techniques Use of intelligence

1.2 Assess the use of investigative techniques in criminal investigations

Use of Techniques• Situation– Crime Scene– Laboratory– Police station– ‘Street’

• Type of Crime– Violent crime– E-crime

• Property crime

Page 3: 1.2 Assess the use of investigative techniques in criminal investigations Techniques Forensic Surveillance techniques Profiling techniques Use of intelligence

UK Surveillance

Surveillance Techniques• The UK is reported to be the most intrusive society in

history• What evidence is there of state surveillance? • Survey their local area, research media sources and collect

evidence of different surveillance techniques. Guest speakers from local Police and Neighborhood Watch

• Learners to report on their findings to show what sort of evidence is collected and how it might be used in criminal investigations

• See the Regulation of Investigatory Powers Act 2000

Page 4: 1.2 Assess the use of investigative techniques in criminal investigations Techniques Forensic Surveillance techniques Profiling techniques Use of intelligence

Regulation of Investigatory Powers Act 2000 (RIP / RIPA)

• Act of the Parliament of UK, regulating the powers of public bodies to carry out surveillance and investigation, and covering the interception of communications.

• Introduced to take account of technological change such as the growth of the Internet and strong encryption.

Page 5: 1.2 Assess the use of investigative techniques in criminal investigations Techniques Forensic Surveillance techniques Profiling techniques Use of intelligence

Regulation of Investigatory Powers Act 2000 (RIP / RIPA)

• Bill was introduced in the House of Commons on 9 February 2000 and completed its Parliamentary passage on 26 July.

• Parliament approved new additions in December 2003, April 2005, July 2006 and February 2010

Page 6: 1.2 Assess the use of investigative techniques in criminal investigations Techniques Forensic Surveillance techniques Profiling techniques Use of intelligence

Regulation of Investigatory Powers Act 2000

• interception of communications• acquisition of communications data (eg billing data)• intrusive surveillance (on residential premises/in

private vehicles)• covert surveillance in the course of specific

operations• the use of covert human intelligence sources

(agents, informants, undercover officers)• access to encrypted data

Page 8: 1.2 Assess the use of investigative techniques in criminal investigations Techniques Forensic Surveillance techniques Profiling techniques Use of intelligence

Offender profiling

• using famous cases –• Jack the Ripper, The Zodiac Killer• Research these cases - British approach to

profiling