Dedication |
|
iii | |
About the Authors |
|
iii | |
Preface |
|
xvii | |
|
1 The Evolution of Criminal Investigation and Forensic Science |
|
|
1 | (16) |
|
|
2 | (1) |
|
|
2 | (1) |
|
Criminal Investigation and Forensic Science |
|
|
2 | (1) |
|
The Evolution of Criminal Investigation |
|
|
3 | (6) |
|
The Impact of the Agricultural and Industrial Revolutions |
|
|
3 | (1) |
|
The Fieldings: Crime Information and the Bow Street Runners |
|
|
3 | (1) |
|
The Metropolitan Police Act of 1829 |
|
|
3 | (1) |
|
|
3 | (1) |
|
Pinkerton's National Detective Agency |
|
|
4 | (2) |
|
The Emergence of Municipal Detectives |
|
|
6 | (1) |
|
Federal and State Developments |
|
|
6 | (2) |
|
The Police and the U.S. Supreme Court |
|
|
8 | (1) |
|
Historical Milestones of Forensic Science |
|
|
9 | (6) |
|
Biometric Based Personal Identification |
|
|
9 | (3) |
|
|
12 | (2) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
2 Legal Aspects of Investigation |
|
|
17 | (19) |
|
|
18 | (1) |
|
The Bill of Rights and the States |
|
|
19 | (2) |
|
Evolution of the Fourteenth Amendment |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (4) |
|
|
21 | (1) |
|
Arrest Distinguished from Detention |
|
|
21 | (1) |
|
Arrest Distinguished from Charging |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (2) |
|
|
24 | (1) |
|
|
25 | (10) |
|
Legal Searches and Seizures |
|
|
26 | (1) |
|
|
26 | (2) |
|
|
28 | (1) |
|
Search Incident to Arrest |
|
|
28 | (2) |
|
Search of a Motor Vehicle |
|
|
30 | (1) |
|
Emergency (Exigent Circumstances) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
Fruits of the Poisonous Tree |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
3 Investigators, the Investigative Process, and the Crime Scene |
|
|
36 | (44) |
|
|
37 | (1) |
|
|
37 | (1) |
|
The Investigator and the Importance of Investigation |
|
|
37 | (11) |
|
Essential Qualities of the Investigator |
|
|
38 | (1) |
|
Organization of the Investigative Process |
|
|
39 | (1) |
|
The Preliminary Investigation |
|
|
40 | (1) |
|
1 Receipt of Information, Initial Response, and Officer Safety Procedures |
|
|
40 | (2) |
|
|
42 | (1) |
|
3 Secure Scene and Control Persons and Evidence |
|
|
42 | (1) |
|
4 Issue a Be-on-the-Lookout |
|
|
43 | (1) |
|
5 Conduct Neighborhood and Vehicle Canvass |
|
|
44 | (2) |
|
6 Administrative Procedures for Processing Crime Scenes |
|
|
46 | (1) |
|
7 The Incident/Offense Report |
|
|
46 | (2) |
|
|
48 | (1) |
|
Organization of the Crime Scene Investigation |
|
|
49 | (8) |
|
|
49 | (2) |
|
|
51 | (5) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
Typical Crime Scene Problems |
|
|
57 | (1) |
|
Rules for the Crime Scene Investigator |
|
|
57 | (7) |
|
|
58 | (1) |
|
|
59 | (2) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
62 | (2) |
|
Infectious Disease Risks and Precautions for Investigators |
|
|
64 | (2) |
|
|
66 | (3) |
|
|
67 | (1) |
|
2 Choice of Search Pattern |
|
|
67 | (1) |
|
3 Instruction of Personnel |
|
|
68 | (1) |
|
|
68 | (1) |
|
Suspended Searches, Debriefing, and Release of the Scene |
|
|
69 | (1) |
|
Collection and Care of Evidence |
|
|
69 | (1) |
|
Visual Documentation of the Crime Scene |
|
|
69 | (8) |
|
|
69 | (1) |
|
Digital Still Photography |
|
|
70 | (1) |
|
Digital Image Management Systems |
|
|
71 | (1) |
|
Crime Scene Sketching and Forensic Mapping |
|
|
71 | (6) |
|
Submission of Evidence to the Crime Laboratory |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
80 | (41) |
|
|
81 | (1) |
|
Class versus Individual Characteristics |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
Locating and Handling Soil Evidence |
|
|
84 | (1) |
|
Footwear, Foot, and Tires: Prints and Impressions |
|
|
84 | (3) |
|
Preserving Residue Prints |
|
|
85 | (1) |
|
|
86 | (1) |
|
Preserving Shoe Impressions in Snow |
|
|
87 | (1) |
|
|
87 | (2) |
|
|
89 | (3) |
|
|
91 | (1) |
|
Fibers, Cloth Fragments, and Impressions |
|
|
92 | (1) |
|
String, Cord, Rope, and Tape |
|
|
93 | (1) |
|
|
93 | (7) |
|
Basis for Fingerprint Identification |
|
|
94 | (1) |
|
|
94 | (1) |
|
Conditions Affecting the Quality of Latent Fingerprints |
|
|
95 | (1) |
|
Locating Latent Fingerprints |
|
|
96 | (1) |
|
Methods of Developing Latent Fingerprints |
|
|
96 | (1) |
|
|
97 | (2) |
|
Developing Latent Fingerprints on Bodies |
|
|
99 | (1) |
|
Collecting and Preserving Latent Prints |
|
|
99 | (1) |
|
Marking and Identifying Print Lifts |
|
|
100 | (1) |
|
|
100 | (4) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
102 | (2) |
|
|
104 | (1) |
|
|
105 | (5) |
|
The Appearance of Bloodstains |
|
|
105 | (1) |
|
Using Bloodstains to Reconstruct the Crime |
|
|
106 | (1) |
|
|
107 | (3) |
|
Laboratory Determinations |
|
|
110 | (1) |
|
Lip Cosmetics, DNA, and Lip Prints |
|
|
110 | (1) |
|
|
110 | (5) |
|
Laboratory Determinations |
|
|
111 | (3) |
|
Collecting Firearm Evidence |
|
|
114 | (1) |
|
Marking and Packaging Firearm Evidence |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
116 | (3) |
|
Handwriting Samples and Examinations |
|
|
117 | (2) |
|
Laboratory Determinations |
|
|
119 | (1) |
|
Collecting and Packaging Evidence |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
5 Interviewing and Interrogation |
|
|
121 | (32) |
|
|
122 | (1) |
|
Interviews and Interrogations: Similarities and Differences |
|
|
122 | (1) |
|
Objectives of Interviewing |
|
|
123 | (1) |
|
Objectives of Interrogation |
|
|
124 | (1) |
|
Qualifications of Interviews and Interrogators |
|
|
124 | (1) |
|
Time, Place, and Setting of Interviewing and Interrogation |
|
|
125 | (1) |
|
|
126 | (1) |
|
Preparation for the Interview or Interrogation |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
127 | (1) |
|
Witnesses: Motivations, Perceptions, and Barriers |
|
|
128 | (1) |
|
Persons with Physical Infirmities |
|
|
129 | (1) |
|
Reliability of Eyewitness Identification |
|
|
129 | (2) |
|
|
131 | (1) |
|
Forms of Witness Intimidation |
|
|
131 | (1) |
|
Response Strategies for Addressing Witness Intimidation |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
Documenting Interrogations |
|
|
133 | (3) |
|
The Use of Electronic Recordings for Interrogations |
|
|
133 | (1) |
|
Benefits of Recording for Police Officers and Prosecutors |
|
|
134 | (1) |
|
|
134 | (2) |
|
|
136 | (1) |
|
|
136 | (2) |
|
Voluntary False Confessions |
|
|
136 | (1) |
|
Coerced--Compliant False Confessions |
|
|
137 | (1) |
|
Coerced--Internalized False Confessions |
|
|
137 | (1) |
|
Recommendations to Reduce the Possibility of False Confessions |
|
|
137 | (1) |
|
Admissibility of Confessions and Admissions |
|
|
138 | (1) |
|
The Free-and-Voluntary Rule |
|
|
138 | (1) |
|
The Delay-in-Arraignment Rule |
|
|
138 | (1) |
|
Interviewing and Interrogation: Legal Requirements |
|
|
139 | (4) |
|
Preinterrogation Legal Requirements |
|
|
139 | (1) |
|
|
139 | (1) |
|
Suspect's Response: Waiver and Alternatives |
|
|
140 | (2) |
|
|
142 | (1) |
|
|
142 | (1) |
|
Interrogation as Defined by the U.S. Supreme Court |
|
|
142 | (1) |
|
Most Recent U.S. Supreme Court Decision on the Right to Remain Silent |
|
|
143 | (1) |
|
|
143 | (1) |
|
Right to Remain Silent--Invocation |
|
|
143 | (1) |
|
Right to Remain Silent--Waiver |
|
|
144 | (1) |
|
|
144 | (5) |
|
The Critical Role of the Comfort/Discomfort Equation in Detecting Deception |
|
|
144 | (1) |
|
Establishing a Comfort Zone for Detecting Deception |
|
|
144 | (1) |
|
Defining Signs of Comfort |
|
|
145 | (1) |
|
Signs of Discomfort in an Interaction |
|
|
145 | (2) |
|
|
147 | (1) |
|
Specific Behaviors to Consider in Detecting Deception |
|
|
148 | (1) |
|
Use of Technological Instruments to Detect Deception |
|
|
149 | (2) |
|
|
149 | (2) |
|
Computer Voice Stress Analysis |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
6 Field Notes and Reporting |
|
|
153 | (17) |
|
|
154 | (1) |
|
|
154 | (2) |
|
Guidelines for Note-Taking |
|
|
155 | (1) |
|
|
155 | (1) |
|
Six Interrogatory and Basic Investigative Questions |
|
|
156 | (1) |
|
|
157 | (7) |
|
Formats for Incident Reports |
|
|
157 | (2) |
|
NIBRS-Compliant Incident Reports |
|
|
159 | (1) |
|
Computer-Generated Reports |
|
|
159 | (1) |
|
|
159 | (1) |
|
Common Elements of Incident Reports |
|
|
159 | (5) |
|
Writing Effective Reports: The Narrative |
|
|
164 | (3) |
|
|
164 | (3) |
|
Supervisory Review and Disposition of Incident Reports |
|
|
167 | (1) |
|
Follow-Up Investigation and Supplemental Reports |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
7 The Follow-Up Investigation and Investigative Resources |
|
|
170 | (34) |
|
|
171 | (1) |
|
The Decision to Initiate a Follow-Up Investigation |
|
|
171 | (1) |
|
The Follow-Up Investigation Process |
|
|
172 | (2) |
|
Reviewing the Incident and Supplemental Reports |
|
|
174 | (1) |
|
|
175 | (1) |
|
Vehicle Impoundment Report |
|
|
175 | (1) |
|
Field Interview/Information Reports |
|
|
175 | (1) |
|
|
175 | (1) |
|
Examining Physical Evidence |
|
|
175 | (1) |
|
Reinterviewing Victims and Witnesses |
|
|
175 | (2) |
|
|
177 | (1) |
|
|
177 | (5) |
|
|
178 | (1) |
|
|
178 | (2) |
|
Regional Information Sharing Systems (RISS) |
|
|
180 | (1) |
|
|
180 | (1) |
|
Nonprofit and Private Sources |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
182 | (2) |
|
|
182 | (1) |
|
Planning and Preparing for Surveillance Operations |
|
|
182 | (1) |
|
Termination of Surveillance Operations |
|
|
183 | (1) |
|
Guidelines for Conducting Photo Lineups, Live Lineups, and Field Show-Ups |
|
|
184 | (2) |
|
|
184 | (2) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
186 | (4) |
|
|
190 | (1) |
|
Investigative Support and Analytical Tools |
|
|
191 | (12) |
|
|
191 | (1) |
|
|
191 | (1) |
|
The Intelligence/Analytical Cycle |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
4 Analysis and Production |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
Surveillance Cameras and Facial Recognition Software |
|
|
193 | (1) |
|
|
194 | (1) |
|
Crime Scene Reconstruction |
|
|
195 | (3) |
|
|
198 | (2) |
|
|
200 | (1) |
|
|
200 | (1) |
|
Time-Event Charting and Link Analysis |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (29) |
|
|
205 | (1) |
|
|
206 | (3) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
Measures of Crime Laboratory Effectiveness |
|
|
209 | (4) |
|
|
209 | (1) |
|
|
209 | (2) |
|
|
211 | (1) |
|
Responding to the National Academies of Science (NAS) Report |
|
|
212 | (1) |
|
Admissibility of Examination Results |
|
|
212 | (1) |
|
|
213 | (9) |
|
|
214 | (3) |
|
|
217 | (3) |
|
Next Generation Identification (NGI) Program |
|
|
220 | (1) |
|
National Integrated Ballistic Information Network Program |
|
|
221 | (1) |
|
Handling Evidence in the Laboratory |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
222 | (1) |
|
ATF Forensic Science Laboratories |
|
|
222 | (1) |
|
|
223 | (3) |
|
|
225 | (1) |
|
Problems in Crime Laboratories |
|
|
226 | (6) |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
Sentencing Mistakes and Poor Training |
|
|
228 | (1) |
|
|
229 | (1) |
|
Scandals and Mistakes within the FBI Crime Lab: The Madrid Bombing Case |
|
|
229 | (2) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
|
9 Injury and Death Investigations |
|
|
233 | (35) |
|
|
234 | (1) |
|
|
234 | (1) |
|
The Medico-Legal Examination |
|
|
235 | (1) |
|
|
235 | (1) |
|
Dead Body Evidence Checklist |
|
|
235 | (1) |
|
Postmortem Changes and Time of Death |
|
|
236 | (4) |
|
|
236 | (1) |
|
Algor Mortis (Body Cooling) |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
237 | (1) |
|
|
237 | (1) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
238 | (2) |
|
|
240 | (2) |
|
|
242 | (8) |
|
|
242 | (5) |
|
|
247 | (1) |
|
|
247 | (1) |
|
|
247 | (2) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
250 | (8) |
|
Methods and Evidence of Suicide |
|
|
251 | (7) |
|
Gender Differences in Suicidal Behavior |
|
|
258 | (1) |
|
|
258 | (3) |
|
Coordination and Cooperation |
|
|
258 | (1) |
|
|
259 | (1) |
|
Identification of Remains |
|
|
259 | (1) |
|
|
259 | (1) |
|
Examination of the External Body |
|
|
259 | (1) |
|
|
259 | (1) |
|
Examination of the Internal Body |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
261 | (5) |
|
|
262 | (1) |
|
Myths and Misconceptions about Serial Killers |
|
|
263 | (1) |
|
Causality and the Serial Murderer |
|
|
264 | (1) |
|
Serial Murder and the NCAVC |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
268 | (30) |
|
|
269 | (1) |
|
|
269 | (1) |
|
Sex-Related Investigations |
|
|
269 | (4) |
|
Interview of the Rape Victim |
|
|
270 | (1) |
|
Type and Sequence of Sexual Acts during an Assault |
|
|
271 | (2) |
|
Deaf Victims of Sexual Assault |
|
|
273 | (1) |
|
|
273 | (1) |
|
Improving Police Response |
|
|
274 | (1) |
|
|
274 | (2) |
|
Signs and Symptoms of Sexual Abuse |
|
|
274 | (1) |
|
Assisted-Living Facilities |
|
|
274 | (1) |
|
|
274 | (1) |
|
Early Recognition and Detection |
|
|
275 | (1) |
|
Interviewing Elder Victims of Sexual Abuse |
|
|
275 | (1) |
|
|
275 | (1) |
|
Why Women Do Not Report Rape to the Police |
|
|
276 | (1) |
|
|
276 | (2) |
|
The Victim and Physical Evidence |
|
|
278 | (4) |
|
Instructions to the Victim |
|
|
278 | (1) |
|
Semen and Hair as Evidence |
|
|
279 | (1) |
|
Information for the Examining Physician/Sexual-Assault Nurse Examiner |
|
|
279 | (1) |
|
Collection of the Victim's Clothing |
|
|
279 | (1) |
|
The Role of the Investigator in Securing the Rape Scene |
|
|
280 | (1) |
|
Incidence of Errors in the Collection of Evidence |
|
|
281 | (1) |
|
Collecting Samples for DNA Analysis from Suspects |
|
|
281 | (1) |
|
Sexual-Battery Examination |
|
|
282 | (1) |
|
|
282 | (3) |
|
|
283 | (1) |
|
The Value of Condom Trace Evidence |
|
|
284 | (1) |
|
Guidelines for Evidence Collection |
|
|
285 | (1) |
|
|
285 | (1) |
|
Drug-Facilitated Sexual Assault |
|
|
285 | (4) |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
288 | (1) |
|
Evidence Collection and Processing |
|
|
288 | (1) |
|
|
288 | (1) |
|
|
288 | (1) |
|
Homosexual Lifestyles and Homicide Investigation |
|
|
289 | (5) |
|
Interpersonal Violence-Oriented Disputes and Assaults |
|
|
289 | (1) |
|
Murders Involving Forced Anal Sex and/or Sodomy |
|
|
290 | (1) |
|
Extreme Sexual Self-Mutilation |
|
|
290 | (2) |
|
Lust, Murders, and Other Acts of Sexual Perversion |
|
|
292 | (1) |
|
Homosexual/Heterosexual Murder/Suicide |
|
|
292 | (1) |
|
|
293 | (1) |
|
Autoerotic Deaths/Sexual Asphyxia |
|
|
294 | (3) |
|
The Psychological Autopsy |
|
|
296 | (1) |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
297 | (1) |
|
11 Crimes against Children |
|
|
298 | (43) |
|
|
299 | (1) |
|
Assaults against Children |
|
|
300 | (1) |
|
Burn Injuries and Child Abuse |
|
|
300 | (5) |
|
|
301 | (1) |
|
Medical Classification of Burn Severity |
|
|
302 | (1) |
|
|
302 | (3) |
|
Unexplained Child Fatalities |
|
|
305 | (2) |
|
Sudden Infant Death Syndrome |
|
|
305 | (1) |
|
The Police Officer's Role |
|
|
306 | (1) |
|
Criminal Homicide as a Possibility |
|
|
307 | (1) |
|
Traumatic Brain Injuries and Death |
|
|
307 | (4) |
|
"Coup-Contrecoup" Injuries |
|
|
308 | (1) |
|
|
308 | (3) |
|
Munchausen Syndrome by Proxy |
|
|
311 | (2) |
|
|
312 | (1) |
|
The Role of the Physician in Child-Abuse Cases |
|
|
312 | (1) |
|
Child Sexual Exploitation |
|
|
313 | (13) |
|
|
313 | (8) |
|
|
321 | (3) |
|
|
324 | (1) |
|
Use of the Computer and the Internet in Child Pornography |
|
|
325 | (1) |
|
Internet Crimes against Children |
|
|
326 | (2) |
|
Bullying and Cyberbullying |
|
|
328 | (1) |
|
|
328 | (4) |
|
|
329 | (1) |
|
Victimology of the Missing Child |
|
|
329 | (1) |
|
|
330 | (1) |
|
Checklist for Law Enforcement |
|
|
330 | (1) |
|
|
331 | (1) |
|
Sex Offender Registration and Notification |
|
|
332 | (1) |
|
|
333 | (7) |
|
|
333 | (3) |
|
Classification of Threats |
|
|
336 | (1) |
|
The Role of Law Enforcement |
|
|
337 | (1) |
|
Investigating School Violence |
|
|
337 | (3) |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
341 | (15) |
|
|
342 | (1) |
|
|
342 | (1) |
|
|
343 | (1) |
|
Antitrafficking Task Force |
|
|
343 | (1) |
|
Training of Law-Enforcement Officers |
|
|
343 | (1) |
|
Trafficking versus Smuggling |
|
|
344 | (1) |
|
When Smuggling Becomes Trafficking |
|
|
344 | (1) |
|
Forced Labor, Involuntary Servitude, Peonage, and Debt Bondage |
|
|
345 | (2) |
|
Estimated Numbers of Victims |
|
|
345 | (1) |
|
|
345 | (1) |
|
Typical Characteristics of Traffickers |
|
|
345 | (1) |
|
Industries Involved in Forced Labor |
|
|
346 | (1) |
|
|
347 | (2) |
|
Recruitment of Foreign Women for the Sex Trade |
|
|
347 | (1) |
|
Delivery and Marketing of Trafficked Women |
|
|
348 | (1) |
|
Locating Sex-Trafficking Victims |
|
|
349 | (1) |
|
Investigative Considerations in Sex-Trafficking Cases |
|
|
349 | (5) |
|
|
349 | (1) |
|
Victim Interview Considerations |
|
|
350 | (1) |
|
|
350 | (1) |
|
|
350 | (1) |
|
|
351 | (1) |
|
|
351 | (1) |
|
|
352 | (1) |
|
Victim Living/Working Conditions |
|
|
352 | (1) |
|
Confirming the Type of Employment |
|
|
352 | (1) |
|
Things Victims May Be Lacking |
|
|
352 | (1) |
|
Physical Indicators of Sex Trafficking |
|
|
352 | (1) |
|
Psychological Effects of Sex Trafficking |
|
|
352 | (1) |
|
|
352 | (1) |
|
Social Networks and Personal Safety |
|
|
353 | (1) |
|
Information That Helps Identify Trafficking Offenders |
|
|
353 | (1) |
|
|
353 | (1) |
|
A Single Lawyer for Multiple Trafficking Victims |
|
|
353 | (1) |
|
The Role of Nongovernmental Organizations in Sex-Trafficking Cases |
|
|
354 | (1) |
|
|
354 | (1) |
|
|
354 | (1) |
|
|
355 | (1) |
|
|
356 | (20) |
|
|
357 | (1) |
|
|
357 | (2) |
|
|
357 | (1) |
|
|
358 | (1) |
|
|
358 | (1) |
|
|
358 | (1) |
|
Intent to Deprive Permanently |
|
|
358 | (1) |
|
Use of Force, Fear, or Threat of Force |
|
|
358 | (1) |
|
Overview: The Offense, the Victim, and the Offender |
|
|
359 | (1) |
|
|
360 | (10) |
|
|
360 | (1) |
|
Use of Surveillance Cameras to Prevent Street Robberies |
|
|
360 | (1) |
|
|
360 | (1) |
|
|
361 | (1) |
|
Automatic-Teller-Machine Robberies |
|
|
362 | (1) |
|
|
362 | (2) |
|
Convenience-Store Robberies |
|
|
364 | (1) |
|
Truck-Hijacking Robberies |
|
|
365 | (1) |
|
|
365 | (2) |
|
|
367 | (3) |
|
|
370 | (2) |
|
|
371 | (1) |
|
|
371 | (1) |
|
|
371 | (1) |
|
Follow-Up Robbery Investigative Procedures |
|
|
372 | (2) |
|
|
372 | (1) |
|
Generating a Likeness of a Suspect |
|
|
373 | (1) |
|
|
374 | (1) |
|
|
375 | (1) |
|
|
375 | (1) |
|
|
376 | (23) |
|
|
377 | (2) |
|
The Offense and Offenders |
|
|
379 | (3) |
|
|
382 | (1) |
|
Approaching the Scene and Initial Actions |
|
|
382 | (1) |
|
Investigative Considerations at the Scene |
|
|
383 | (4) |
|
Recognition of Burglary Tools |
|
|
384 | (2) |
|
|
386 | (1) |
|
Importance of the Time Factor |
|
|
386 | (1) |
|
|
387 | (2) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
389 | (2) |
|
Car, RV, and Trailer Burglaries |
|
|
391 | (1) |
|
Investigating Criminal Fences and Other Outlets for Stolen Property |
|
|
392 | (3) |
|
The Investigator's Crime Prevention Role |
|
|
395 | (2) |
|
Reducing the Risk of Commercial Burglary |
|
|
396 | (1) |
|
Reducing the Risk of Residential Burglary |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
398 | (1) |
|
15 Larceny/Theft and White-Collar Crime |
|
|
399 | (36) |
|
|
400 | (2) |
|
The Offense and the Offender |
|
|
402 | (1) |
|
|
402 | (1) |
|
Shoplifting and Organized Retail Crime (ORC) |
|
|
403 | (3) |
|
|
403 | (1) |
|
Organized Retail Crime (ORC) |
|
|
403 | (2) |
|
Copper and Other Precious Metal Theft |
|
|
405 | (1) |
|
|
405 | (1) |
|
Identity Theft and Follow-On Crimes |
|
|
406 | (5) |
|
How Identity Theft Occurs |
|
|
406 | (3) |
|
|
409 | (2) |
|
Investigation of Identity Theft and Follow-On Cases |
|
|
411 | (1) |
|
|
411 | (3) |
|
|
414 | (1) |
|
|
415 | (1) |
|
|
416 | (8) |
|
|
416 | (1) |
|
Charity and Disaster Frauds |
|
|
416 | (1) |
|
|
416 | (1) |
|
Health-Care and Medicare Fraud |
|
|
417 | (2) |
|
Workers Compensation Fraud |
|
|
419 | (1) |
|
|
419 | (1) |
|
Home Improvement and Repair Frauds |
|
|
419 | (1) |
|
Internet Frauds and Scams |
|
|
419 | (3) |
|
Other Frauds: Pigeon-Drop and Bank-Examiners Cons |
|
|
422 | (1) |
|
Victims of Fraud: Senior Citizens |
|
|
423 | (1) |
|
|
424 | (2) |
|
|
424 | (2) |
|
|
426 | (1) |
|
|
426 | (1) |
|
Security and Investment Frauds |
|
|
426 | (5) |
|
|
427 | (1) |
|
|
428 | (1) |
|
|
428 | (2) |
|
Pay Phones/ATM Machine Investments |
|
|
430 | (1) |
|
One-Year Callable Certificates of Deposit |
|
|
430 | (1) |
|
|
430 | (1) |
|
|
430 | (1) |
|
|
431 | (1) |
|
|
431 | (1) |
|
1-900 and Foreign Exchange Numbers |
|
|
431 | (1) |
|
Mexican Collect Call Scheme |
|
|
431 | (1) |
|
|
431 | (1) |
|
Telemarketing and Postal Frauds |
|
|
432 | (1) |
|
|
432 | (1) |
|
|
433 | (1) |
|
|
433 | (1) |
|
Fees Charged for Normally Free Services |
|
|
433 | (1) |
|
|
433 | (1) |
|
Phony Inheritance Schemes |
|
|
433 | (1) |
|
|
433 | (1) |
|
|
434 | (1) |
|
|
434 | (1) |
|
16 Vehicle Thefts and Related Offenses |
|
|
435 | (37) |
|
|
436 | (1) |
|
|
437 | (6) |
|
Miscellaneous Statistics and Notes |
|
|
437 | (1) |
|
|
438 | (1) |
|
Methods of Operation---The Professional |
|
|
439 | (1) |
|
|
440 | (3) |
|
Theft of Heavy Construction Equipment |
|
|
443 | (2) |
|
Commercial-Vehicle and Cargo Theft |
|
|
445 | (1) |
|
Investigative Tools and Techniques |
|
|
445 | (16) |
|
Major Investigative Resources |
|
|
446 | (2) |
|
|
448 | (3) |
|
Locating and Handling Vehicles |
|
|
451 | (1) |
|
|
451 | (8) |
|
Investigation of Vehicle Fires |
|
|
459 | (2) |
|
|
461 | (1) |
|
|
461 | (3) |
|
|
461 | (2) |
|
|
463 | (1) |
|
|
463 | (1) |
|
|
463 | (1) |
|
|
464 | (1) |
|
|
465 | (3) |
|
|
466 | (1) |
|
Title and Registration Issues |
|
|
467 | (1) |
|
|
467 | (1) |
|
|
468 | (1) |
|
|
468 | (1) |
|
Aircraft and Avionics Theft |
|
|
468 | (3) |
|
|
469 | (1) |
|
|
469 | (1) |
|
|
470 | (1) |
|
Theft Prevention Techniques |
|
|
470 | (1) |
|
|
471 | (1) |
|
|
471 | (1) |
|
|
471 | (1) |
|
|
472 | (16) |
|
|
473 | (1) |
|
|
473 | (1) |
|
Cybercrime Tools and Services Related to Theft and Fraud |
|
|
474 | (1) |
|
|
475 | (1) |
|
|
475 | (5) |
|
Investigation of Cybercrimes |
|
|
480 | (5) |
|
|
480 | (2) |
|
|
482 | (1) |
|
|
482 | (1) |
|
|
482 | (3) |
|
|
485 | (2) |
|
Computer and Peripheral Evidence |
|
|
485 | (1) |
|
|
485 | (2) |
|
|
487 | (1) |
|
|
487 | (1) |
|
18 Agricultural, Wildlife, and Environmental Crimes |
|
|
488 | (21) |
|
|
489 | (1) |
|
Dimensions of Agricultural, Wildlife, and Environmental Crimes |
|
|
490 | (2) |
|
|
492 | (1) |
|
|
493 | (1) |
|
|
494 | (4) |
|
|
496 | (1) |
|
|
497 | (1) |
|
|
497 | (1) |
|
|
498 | (1) |
|
|
499 | (1) |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
500 | (4) |
|
Major Threats to Wildlife |
|
|
501 | (2) |
|
|
503 | (1) |
|
|
504 | (4) |
|
The Legal and Enforcement Framework |
|
|
505 | (1) |
|
Provisions of State RCRA Laws |
|
|
505 | (2) |
|
|
507 | (1) |
|
|
508 | (1) |
|
|
508 | (1) |
|
|
508 | (1) |
|
19 Arson and Explosives Investigations |
|
|
509 | (37) |
|
|
510 | (1) |
|
Preliminary Investigation |
|
|
511 | (1) |
|
Where and How Did The Fire Start? |
|
|
511 | (2) |
|
Two Factors Needed to Cause A Fire |
|
|
511 | (1) |
|
|
512 | (1) |
|
Spontaneous Heating and Ignition |
|
|
513 | (1) |
|
|
513 | (3) |
|
|
513 | (1) |
|
|
513 | (1) |
|
|
514 | (1) |
|
Collapsed Furniture Springs |
|
|
514 | (1) |
|
|
515 | (1) |
|
Temperature Determination |
|
|
516 | (1) |
|
Fire Setting and Related Mechanisms |
|
|
516 | (3) |
|
|
516 | (1) |
|
Telltale Signs of Accelerants |
|
|
516 | (3) |
|
|
519 | (1) |
|
|
519 | (1) |
|
|
519 | (1) |
|
|
519 | (5) |
|
Financial Stress as the Primary Cause |
|
|
519 | (3) |
|
Arson Generated by Third Parties |
|
|
522 | (2) |
|
|
524 | (1) |
|
|
524 | (1) |
|
Detection and Recovery of Fire-Accelerant Residues |
|
|
524 | (1) |
|
Alternative Fuels in Fire Debris Analysis |
|
|
525 | (1) |
|
Scientific Methods in Arson Investigation |
|
|
525 | (2) |
|
Detection of Fire Accelerants |
|
|
526 | (1) |
|
|
527 | (3) |
|
|
527 | (1) |
|
Firefighters at the Scene |
|
|
527 | (1) |
|
|
527 | (2) |
|
Other Witnesses Concerning Finances of the Insured |
|
|
529 | (1) |
|
|
529 | (1) |
|
|
529 | (1) |
|
|
529 | (1) |
|
Interviewing the Target and the Owner |
|
|
529 | (1) |
|
Interviewing a Potential Informant Who Is Not a Suspect |
|
|
530 | (1) |
|
|
530 | (1) |
|
Photographing the Arson Scene |
|
|
531 | (1) |
|
|
531 | (1) |
|
|
531 | (1) |
|
|
531 | (2) |
|
|
531 | (1) |
|
|
532 | (1) |
|
|
532 | (1) |
|
|
532 | (1) |
|
Improvised Explosive Devices (IEDs) |
|
|
533 | (8) |
|
Factors Affecting IED Construction |
|
|
533 | (1) |
|
Basic Components of the IED |
|
|
533 | (1) |
|
Primary Effect by Type of IED |
|
|
534 | (2) |
|
The United States as a Target of IEDs |
|
|
536 | (1) |
|
Investigating the Explosion Scene |
|
|
536 | (1) |
|
Locating and Identifying Articles of Evidence |
|
|
537 | (1) |
|
Collecting Evidence at the Explosion Scene |
|
|
538 | (2) |
|
Analyzing the Fuel Source |
|
|
540 | (1) |
|
Suspicious Packages and Letters |
|
|
541 | (1) |
|
Use of Robotic Devices in Moving and Destroying Dangerous Objects |
|
|
541 | (1) |
|
|
542 | (1) |
|
Reading The Bomber's Signature |
|
|
542 | (3) |
|
Similarities between Bombings |
|
|
544 | (1) |
|
Association of Bombings through Forensic Examination |
|
|
544 | (1) |
|
|
545 | (1) |
|
|
545 | (1) |
|
|
545 | (1) |
|
20 Recognition, Control, and Investigation of Drug Abuse |
|
|
546 | (44) |
|
|
547 | (1) |
|
|
548 | (1) |
|
|
548 | (5) |
|
|
548 | (1) |
|
|
548 | (2) |
|
Heroin (Diacetylmorphine) |
|
|
550 | (1) |
|
|
551 | (1) |
|
|
551 | (1) |
|
|
552 | (1) |
|
|
552 | (1) |
|
|
552 | (1) |
|
|
553 | (1) |
|
|
554 | (1) |
|
|
554 | (1) |
|
|
554 | (5) |
|
|
554 | (2) |
|
|
556 | (1) |
|
Phenmetrazine (Preludin), Methylphenidate (Ritalin), and Pemoline (CYLERT) |
|
|
556 | (1) |
|
Crystallized Methamphetamine |
|
|
556 | (2) |
|
|
558 | (1) |
|
|
559 | (1) |
|
|
559 | (1) |
|
|
559 | (1) |
|
|
560 | (1) |
|
|
560 | (1) |
|
|
560 | (3) |
|
|
560 | (1) |
|
Methylenedioxy Methamphetamine |
|
|
561 | (1) |
|
Lysergic Acid Diethylamide (LSD 25) |
|
|
561 | (1) |
|
|
561 | (1) |
|
|
561 | (1) |
|
|
562 | (1) |
|
|
562 | (1) |
|
|
563 | (3) |
|
|
563 | (2) |
|
|
565 | (1) |
|
|
565 | (1) |
|
|
565 | (1) |
|
|
566 | (1) |
|
|
566 | (1) |
|
Major Countries of Origin and Trafficking Patterns |
|
|
566 | (4) |
|
|
567 | (2) |
|
|
569 | (1) |
|
|
569 | (1) |
|
|
569 | (1) |
|
|
569 | (1) |
|
|
570 | (1) |
|
|
570 | (1) |
|
|
570 | (8) |
|
Informants: Motivations and Types |
|
|
570 | (1) |
|
|
571 | (2) |
|
Other Sources for Information |
|
|
573 | (1) |
|
|
574 | (1) |
|
|
575 | (2) |
|
High-Intensity Drug Trafficking Area (HIDTA) Programs |
|
|
577 | (1) |
|
Searches, Seizures, and Warrants |
|
|
578 | (6) |
|
|
578 | (1) |
|
|
578 | (1) |
|
Past Reliability of the Confidential Informant |
|
|
579 | (1) |
|
Information Supplied by the Informant |
|
|
579 | (1) |
|
Corroboration of the Information Supplied |
|
|
579 | (1) |
|
|
579 | (1) |
|
|
579 | (2) |
|
|
581 | (1) |
|
|
581 | (2) |
|
Pharmaceutical Diversions |
|
|
583 | (1) |
|
Clandestine Drug Laboratories |
|
|
584 | (4) |
|
Identifying Laboratory Operations |
|
|
584 | (1) |
|
|
584 | (1) |
|
Catching Cooks: Meth Monitors |
|
|
585 | (1) |
|
Lab Seizure and Forfeiture |
|
|
586 | (1) |
|
Conducting a Laboratory Raid |
|
|
586 | (2) |
|
Conspiracy Investigations |
|
|
588 | (1) |
|
|
588 | (1) |
|
|
588 | (1) |
|
|
589 | (1) |
|
|
589 | (1) |
|
|
589 | (1) |
|
|
590 | (41) |
|
|
591 | (1) |
|
|
592 | (12) |
|
|
592 | (2) |
|
|
594 | (7) |
|
Other Active International Groups |
|
|
601 | (2) |
|
Other International Threats: Mexico |
|
|
603 | (1) |
|
|
604 | (73) |
|
Who Is the "Homegrown Terrorist"? |
|
|
605 | (1) |
|
Attacks from Inside the United States |
|
|
606 | (1) |
|
|
607 | (70) |
|
|
677 | |
|
|
607 | (2) |
|
|
609 | (2) |
|
Financing Terrorist Organizations |
|
|
611 | (6) |
|
|
612 | (1) |
|
|
612 | (2) |
|
|
614 | (1) |
|
Credit Card Fraud and Theft |
|
|
614 | (1) |
|
Charities Fraud and Linkages |
|
|
615 | (2) |
|
National Counterterrorism Intelligence Structures |
|
|
617 | (6) |
|
Other Criminal Activities Linked to Terrorist Groups |
|
|
617 | (1) |
|
Investigation of Terrorist Activities |
|
|
617 | (6) |
|
|
623 | (5) |
|
Limited Biological Attacks: Anthrax |
|
|
624 | (3) |
|
Chemical Attacks: Mass Casualties |
|
|
627 | (1) |
|
|
628 | (1) |
|
|
629 | (1) |
|
|
629 | (1) |
|
|
630 | (1) |
|
22 The Trial Process and the Investigator as a Witness |
|
|
631 | (21) |
|
|
632 | (1) |
|
|
632 | (2) |
|
|
632 | (1) |
|
|
633 | (1) |
|
|
634 | (2) |
|
|
634 | (1) |
|
|
635 | (1) |
|
|
636 | (9) |
|
|
636 | (1) |
|
The First Rule of Evidence |
|
|
636 | (1) |
|
|
637 | (1) |
|
|
637 | (1) |
|
|
637 | (1) |
|
|
637 | (1) |
|
|
637 | (1) |
|
|
637 | (1) |
|
|
638 | (1) |
|
|
638 | (1) |
|
|
638 | (1) |
|
|
638 | (1) |
|
|
638 | (1) |
|
Preponderance of Evidence |
|
|
639 | (1) |
|
|
640 | (1) |
|
|
640 | (1) |
|
|
640 | (2) |
|
|
642 | (1) |
|
Exceptions to the Hearsay Rule |
|
|
643 | (1) |
|
|
644 | (1) |
|
|
645 | (5) |
|
The Investigator as a Witness |
|
|
645 | (5) |
|
|
650 | (1) |
|
|
650 | (1) |
|
|
651 | (1) |
Glossary |
|
652 | (15) |
Notes |
|
667 | (36) |
Index |
|
703 | |