Introduction To Criminal Investigation Processes Practices and Thinking
Introduction To Criminal Investigation Processes Practices and Thinking
Birzer
Introduction to CRIMINAL INVESTIGATION
•
Introduction to
CRIMINAL
INVESTIGATION
Edited by
Michael L. Birzer and Cliff Roberson
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been
made to publish reliable data and information, but the author and publisher cannot assume responsibility for the valid-
ity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright
holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this
form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may
rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or uti-
lized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopy-
ing, microfilming, and recording, or in any information storage or retrieval system, without written permission from the
publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://
www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923,
978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For
organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for
identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
C ontents
Preface, vii
Editors, xi
Contributors, xiii
Section 1 FOUNDATIONS
Chapter 6 ■ Evidence 81
Cory Rodivich
v
vi ◾ Contents
Index, 373
P reface
The diligent investigation of crime is both necessary and critical. Many years ago, police
reformers O.W. Wilson and R.C. McLaren wrote in their classic textbook on police admin-
istration, “The purpose of the detective or criminal investigation function is to investigate
certain serious crimes in order to arrest and convict the perpetrators and to recover stolen
property” (Wilson and McLaren, 1977, p. 364). It is undeniable that the basic purpose of
the criminal investigation function in the 21st century has for the most part remained
unchanged. The investigation of crime is an important mandate of the police. All police
agencies, large and small, rural and urban, perform criminal investigations; consequently,
the manner in which investigators are trained is neither uniform nor consistent. Some
neophyte investigators receive sophisticated training in order to learn the craft, while oth-
ers simply learn on the job while assigned to a senior criminal investigator. Often, the first
exposure that an investigator may have to crime scene investigation techniques goes back
to their college days, as a student, taking an introduction course to criminal investigation.
We reminded ourselves often of this as we crafted this introductory textbook on criminal
investigation.
ix
x ◾ Preface
belief that combining the expertise of law enforcement authorities with academicians who
study crime and law enforcement practices is the gold standard of an effective textbook on
criminal investigation.
The five chapters in Part 3 focus on property crimes, auto theft, arson, and financial
crimes. In Chapter 8, Matthew O’Deane examines vandalism. The chapter provides a thor-
ough discussion of the most common types of vandalism in the United States: tagging
and gang graffiti. The chapter offers prevention tips and basic investigative protocols that
should be followed in order to effectively prosecute the perpetrators. Chapter 9 focuses on
larceny and burglary. In this chapter, Walt Wywadis does an excellent job of discussing
larceny and burglary from the preliminary investigation through the follow-up investiga-
tion. The chapter discusses offender characteristics and presents prevention techniques. In
Chapter 10, Don Munday examines the investigation of auto theft in a step-by-step manner
and discusses common methods and tools that perpetrators use to steal autos. Moreover,
the chapter clearly outlines the steps to be followed in both the preliminary and follow-up
investigation. In Chapter 11, Cliff Roberson provides an overview of arson investigations.
Arson investigations can be both challenging and complex and should be approached with
diligence. The chapter begins with a detailed description of the duties of the first responder
and then proceeds to describe the steps that should be taken to preserve an arson scene.
The chapter concludes with a comprehensive discussion of specific investigative steps that
should be taken. Michael Palmiotto tackles financial crimes in Chapter 12. The chapter
presents an overview of financial crimes while at the same time providing practical tech-
niques that should be followed during the investigation.
Part 4 consists of three chapters. In Chapter 13, Gregg Etter and Roger Pennel discuss
homicide and assault investigations. The chapter provides a thorough discussion of mode,
method, and opportunity; the role of the medical examiner; manners of death; and types
of evidence that may be encountered by investigators. Chapter 14 is written by John Padget
and centers on the investigation of sex crimes. The chapter describes the nature of sex crime
investigations and the critical role of the first responder. The chapter culminates with an
overview of specific steps that should be followed during the investigation of a sex crime.
In Chapter 15, Harrison Watts examines robbery investigation by discussing the categories
of robbery, parties to the crime, and specific investigative steps. The chapter concludes with
a discussion what is required for the successful prosecution of robbery.
The three chapters in Part 5 center on specialized investigations. The use of illegal drugs
is considered to be a serious crime problem in the United States; in Chapter 16, Don Vespa
provides a thoughtful overview of the investigation of illicit drug trafficking, including ini-
tiating the investigation, establishing and managing confidential informants, steps in the
investigation, and a variety of surveillance techniques used in undercover operations. With
the barrage of technological advancements, millions of children find themselves regularly
in front of the computer on the Internet, and it is not uncommon to hear news reports of a
child being solicited online by a sexual predator. Cybercrimes represent a significant grow-
ing threat in our society. In Chapter 17, Mark McCoy discusses the various types of cyber-
crimes and offers a timely protocol on how these cases should be investigated. In Chapter
18, Gregg Etter provides a complete overview of the investigation of gang-related crimes. He
discusses the cultural characteristics of gangs and provides information centering on the
primary and secondary crimes committed by gangs. Motivations for gang-related crimes
xii ◾ Preface
are also covered in the chapter. The chapter offers a comprehensive discussion of effective
gang investigative techniques and concludes with an overview of anti-gang programs that
have been shown to be effective.
Part 6 concludes the book with two chapters. In Chapter 19, Frank DiMarino discusses
the legal issues centering on criminal investigation. Among the topics discussed are crimi-
nal law, felonies, misdemeanors, and factors that should be taken into account during the
crime scene investigation and upon the initial arrest of the suspect. Rounding out the text
is Chapter 20, in which Cliff Roberson and Gwynne Birzer provide an overview of how
to prepare a case for court. Topics in the chapter include testimony in court, accuracy of
police reports, chain of custody of evidence, personal credibility, and insightful tips for
testifying in court.
REFERENCE
Wilson, O.W. and McLaren, R.C. (1977). Police Administration, 4th ed. New York: McGraw-Hill.
E ditors
Michael L. Birzer, EdD, is professor of criminal justice and director of the School of
Community Affairs at Wichita State University. His research interests include police
behavior, advancing the adult learning theory of andragogy into criminal justice education
and training, the intersection of race and police contacts, and qualitative research meth-
ods (phenomenology, ethnomethodology, and ethnography). His non-academic experi-
ence includes over 18 years of service with the Sedgwick County Sheriff’s Department in
Wichita, KS, where he obtained the rank of lieutenant. Books he has co-authored with Cliff
Roberson include Introduction to Private Security: Theory Meets Practice (Prentice Hall,
2010); Police Field Operations: Theory Meets Practice (Allyn & Bacon, 2008); and Policing
Today and Tomorrow (Prentice Hall, 2007).
Cliff Roberson, LLM, PhD, is a professor emeritus at Washburn University and academic
chair, Graduate School of Criminal Justice, Kaplan University. He is also managing editor of
Police Practices and Research: An International Journal and Professional Issues in Criminal
Justice Journal. He has written numerous texts and articles on criminal justice and has
over 30 years’ experience in academia as a professor, dean, and associate vice president.
His non-academic experience includes service as Director of Programs, National College
of District Attorneys; chief defense counsel for offenders, Texas Board of Criminal Justice;
head, Military Law Branch, U.S. Marine Corps Headquarters; and Marine judge advocate.
xiii
C ontributors
Gwynne Birzer, JD, a practicing attorney in the state of Kansas, earned her undergradu-
ate degree in criminal justice from Washburn University, Topeka, KS, in 1989. She earned
her law degree from Washburn University School of Law in 1992. In 1993, she became
an assistant district attorney and prosecuted sexual offenses and child abuse cases for 5
years. She also served as a special assistant attorney general, prosecuting sexually violent
offenders across the state of Kansas. In 1998, she entered private practice and taught trial
techniques as an adjunct instructor at Washburn University. She is currently an associate
attorney at the law firm of Hite, Fanning & Honeyman, LLP, where she focuses her practice
on civil defense and litigation with emphasis on medical malpractice. She also serves as an
adjunct professor teaching about the American courts and judicial system at Wichita State
University.
Bryan Courtney is executive director of the Missouri–Regional Community Policing
Institute at Missouri Western State University, St. Joseph. MO–RCPI is a member of U.S.
Department of Justice, COPS Office, national RCPI training network. Courtney is cur-
rently coordinating a Bureau of Justice Assistance (BJA) project, RCPI National Network
Delivery of BJA Training, which provides a wide range of BJA training throughout the
nation to federal, state, and local law enforcement. Courtney has been with the MO–RCPI
since 1997. He received his undergraduate degree in criminal justice at Missouri Western
State University and his master’s degree in criminal justice at Washburn University in
Topeka, KS. He was a police officer in Maryville, MO, for 6 years.
Frank DiMarino, JD, LLM, is dean of the School of Criminal Justice, Kaplan University,
and executive editor of the journal Professional Issues in Criminal Justice. From 1991 to
2007, he served as a Financial Institution Fraud Coordinator and Environmental Crimes
Coordinator while prosecuting white collar criminals as an assistant U.S. Attorney in
Savannah, GA. Frank’s other legal experience includes serving as chief of the Criminal
Law Division, Fort Stewart, GA, and as assistant U.S. Attorney, Miami, FL. In Washington,
D.C., he worked as a senior trial attorney with the General Crimes Section, Multi-District
Fraud Unit, Division of Enforcement, Commodity Futures Trading Commission. He also
served as appellate counsel and branch chief of the U.S. Army Legal Services Agency, Falls
Church, VA, and as prosecutor and officer-in-charge of the military post legal office in
Nuremberg, Germany.
xv
xvi ◾ Contributors
Gregg W. Etter, Sr., EdD, is an assistant professor of criminal justice at the University of
Central Missouri, Warrensburg. He served 29 years with the Sedgwick County Sheriff’s
Office in Wichita, KS, retiring as a lieutenant. Dr. Etter earned his bachelor’s and master’s
degrees from Wichita State University and his doctorate from Oklahoma State University.
He is a member of the American Society of Criminology, Academy of Criminal Justice
Sciences, and the National Sheriff’s Association. He is rated as a gang expert by the National
Gang Crime Research Center.
John A. Eterno, PhD, is associate dean of graduate studies in criminal justice at Molloy
College, Rockville Centre, NY, and is a retired captain from the New York Police
Department. He is managing editor of Police Practice and Research. His books include
Policing within the Law: A Case Study of the New York City Police Department (Praeger,
2003); Police Practices in Global Perspective (Rowman & Littlefield, 2009; with Dilip Das),
and Unveiling Compstat: The Global Policing Revolution’s Naked Truths (Taylor & Francis,
forthcoming; with Eli Silverman). He has testified as a policing expert, appeared in vari-
ous media outlets (e.g., ABC, CBS), and consulted widely. His most recent peer-reviewed
articles have appeared in Professional Issues in Criminal Justice, International Journal of
Police Science & Management, Women and Criminal Justice, and Criminal Law Bulletin.
Robert D. Hanser, PhD, is the head of the department of criminal justice at the University
of Louisiana at Monroe. In addition to teaching undergraduate and graduate courses in
criminal justice, Dr. Hanser conducts pre-service and in-service training for police and
correctional officers at the North Delta Regional Training Academy. He is a licensed pro-
fessional counselor in the states of Louisiana and Texas, a licensed addictions counselor
in Louisiana, a certified anger resolution therapist, and a certified gang specialist in gang
counseling. His research and teaching interests focus on human behavior and mental
health issues within the field of criminal justice.
Mark R. McCoy, EdD, is an associate professor at the University of Central Oklahoma
Forensic Science Institute, where he is administrator of the Digital Evidence and Cyber
Security Program. He retired after 20 years of service with the Oklahoma State Bureau of
Investigation (OSBI), where he was the first supervisor of the OSBI Computer Crime Unit.
He is a member of the International Association of Computer Investigative Specialists and
is a certified forensic computer examiner. Dr. McCoy has a master’s degree in forensic sci-
ence and a doctorate in occupational and adult education.
Scott M. Mire, PhD, is currently an assistant professor of criminal justice at the University
of Louisiana at Lafayette. He is a former police officer and U.S. border patrol agent.
Following his service as a border patrol agent, Dr. Mire was employed by the Texas Police
Corps as a training coordinator while he pursued his doctorate in criminal justice at Sam
Houston State University, Huntsville, TX. As a training coordinator, Dr. Mire was respon-
sible for all curriculum development in addition to providing training in all aspects of law
enforcement. More recently, Dr. Mire has authored or co-authored several journal articles
and book chapters. In addition, he has co-authored three textbooks in the areas of correc-
tional counseling, ethics in criminal justice, and understanding the correlates of violence.
Contributors ◾ xvii
Donald Munday, EdD, has over 22 years of experience as a commissioned law enforce-
ment officer. Dr. Munday served with the Wichita Police Department, where his respon-
sibilities included patrol, crime prevention, community policing, critical stress debriefing,
Crime Stoppers, vice and organized crime, bunco, exploited and missing children, and
planning and research. He then became the chief of police for the city of Bel Aire, KS. Dr.
Munday has been teaching criminal justice courses in university settings for many years.
He has also authored two criminal justice undergraduate programs of study. He holds
a bachelor’s degree in human resources management; a master’s in management from
Friends University, Wichita, KS; and a doctorate in occupational and adult education from
Oklahoma State University. Dr. Munday is an elected faculty member of the Alpha Phi
Sigma National Criminal Justice Honor Society and has been a presenter at the Academy
of Criminal Justice Sciences and other state and national conferences. Currently, he is a
director at Pratt Community College–Wichita.
Matthew O’Deane, PhD, has been a police officer in California since 1992. He is currently
an investigator for the San Diego County District Attorney’s Office and is a former police
officer, detective, and sergeant of the National City, CA, Police Department. He holds a
doctorate in public policy from Walden University and is an adjunct professor for Kaplan
University. Dr. O’Deane has also written two books on the subject of gangs, the Gang
Investigator’s Handbook: A Law-Enforcement Guide to Identifying and Combating Violent
Street Gangs (Paladin Press, 2008) and Gangs: Theory, Practice, and Research (LawTech
Custom Publishing, 2010).
John Padgett, PhD, is a native of Augusta, GA, and is curårently serving as a core faculty
member in Capella University’s Public Safety program. He obtained his associate’s degree
in criminal justice from Georgia Military College, Milledgeville; his bachelor’s degree in
business administration from Brenau University, Gainesville, GA; his master’s degree in
education from Troy University, Troy, AL; and his doctorate in professional psychology,
specializing in terrorism and violence, at Walden University. He is 26-year law enforce-
ment veteran, an administrative law hearing officer, director of law enforcement training,
professor, and core faculty member. His most notable law enforcement convictions include
the investigation and apprehension of two serial child molesters, two serial rapists, and the
first serial murderer in Augusta, GA.
degree from Jasper County Community College, his bachelor’s degree from Missouri
Southern University, and his master’s and doctorate degrees from Sam Houston State
University, Huntsville, TX.
Cory Rodivich is a crime scene supervisor with the Wichita, KS, Police Department.
He is responsible for the daily operation and supervision of the crime scene investiga-
tion section, including the direction and supervision of investigative work at major crime
scenes. Supervisor Rodivich holds a master’s degree in criminal justice from Wichita State
University, where he currently serves as an adjunct professor in the criminal justice and
forensic science programs. He holds the honor of being the first law enforcement professional
from Kansas to attend the renowned National Forensic Academy, where he was elected
class president by his colleagues. Supervisor Rodivich has instructed police officers and
scene investigators throughout the Midwest as a consultant for the Regional Community
Policing Institute at Wichita State University. His professional affiliations include the
International Association for Identification, the International Association of Bloodstain
Pattern Analysts, and the Association for Crime Scene Reconstruction. He is certified as a
Crime Scene Investigator through the International Association for Identification.
Gene L. Scaramella, EdD, currently serves as the Dean of Graduate Studies for Ellis
University. He received his doctorate in leadership and educational policy studies from
Northern Illinois University, DeKalb, and his master’s degree in law enforcement admin-
istration and bachelor’s degree in law enforcement administration from Western Illinois
University, Macomb. Dr. Scaramella served as a police officer for 16 years with both the
Arlington Heights, IL, Police Department and the Chicago Police Department.
Donald F. Vespa, resident agent in charge (retired) for the Drug Enforcement
Administration, St. Louis Division, has extensive operational experience in investigative
surveillance techniques, informant utilization, undercover operations, and narcotic case
development, and he has over 22 years experience in drug law enforcement. Vespa has
served as a DEA High Intensity Drug Trafficking Areas (HIDTA) task force commander,
DEA state and local task force group supervisor, and DEA resident agent in charge.
J. Harrison Watts, PhD, is an assistant professor in the criminal justice and legal studies
department at Washburn University. Dr. Watts is a former police practitioner with 15 years
of progressive law enforcement experience in Texas. He has 10 years of administrative-
level management experience with assignments including sergeant in the criminal inves-
tigations division, deputy chief constable, inspector general, and city commissioner. His
research interests are focused on police policy and management.
Walter J. Wywadis is Deputy Chief of Police, Topeka, KS, Police Department. He attended
Kansas State University on a football scholarship and later became a Topeka police offi-
cer. He has served in the field of investigations as an investigator, supervisor, and division
commander. Wywadis holds a bachelor’s degree in criminal justice and a master’s degree
in management from Friends University, Wichita, KS. He is a graduate of the FBI National
Academy and the Police Executive Research Forum sponsored Senior Management
Institute for Police (SMIP) at Boston University.
1
Foundations
1
Chapter 1
A Brief History of
Criminal Investigation
John A. Eterno
Malloy College
CHAPTER OBJECTIVES
After reading this chapter, you should be able to do the following:
Chapter Outline
• Overview of Criminal Investigation
• Origins of Western Society’s Criminal Investigation
• English Influence
• Development of Criminal Investigation in the United States
• Contemporary Employment in Criminal Investigation
3
4 ◾ John A. Eterno
He was trusted by people due to his kind demeanor and his grandfatherly appearance. His
behavior seems to have steadily gotten worse when his wife left him when he was 49. He
was a vicious man and a cannibal (Anon., 2007, paragraph 4):
In 1928, Fish indulged his taste for human flesh on a 12-year-old girl named Grace
Budd. She was the daughter of parents who knew and trusted Fish. When Fish
offered to take her to a party for children, they let him do so without any misgivings.
Instead of a party, Fish took Grace to his cottage in Westchester County, New York.
Stripping himself naked, Fish strangled the child, and then beheaded and dismem-
bered her with a meat cleaver. He then cooked her body parts into a stew seasoned
with onions and carrots. Albert Fish then consumed this grisly repast down to the
last awful morsel, and then he vanished.
This is only one example of the absolutely horrifying nature of this killer. After another
incident in July 1924, where a police officer’s son went missing in Staten Island, a borough
on the south side of New York City, investigators were feverishly called in: “In a short period
of time, Manhattan fingerprint experts and police photographers were enlisted in the case
as well as some two hundred and fifty plainclothesmen” (Bardsley, 2010). Fish was not
caught until a break in the case occurred in July 1934. At that point, most thought the case
would never be solved, and only one investigator was still involved in the case, Detective
William King. Fish sent a letter to Delia Budd, Grace’s mother, in which he provided the
gruesome details of her murder. Following a lead from the envelope, the investigators were
able to find Fish (Bardsley, 2010):
But, Detective King realized that the details of his meeting with the Budds and Grace
were accurate. Also, the handwriting on this horrible letter was identical to the letter
the elderly kidnapper had written … six years earlier. The envelope had an impor-
tant clue: a small hexagonal emblem had the letters N.Y.P.C.B.A. which stood for
the New York Private Chauffeur’s Benevolent Association. … A young janitor [at
the N.Y.P.C.B.A.] came forward, admitting that he had taken a couple of sheets of
paper and a few envelopes. He had left the stationery in his old rooming house at 200
East 52nd Street. The landlady was shocked when she was given “Frank Howard’s”
description. He sounded just like the old man who had lived there for two months,
the old man who had checked out of her rooming house just a couple of days earlier.
The former tenant had called himself Albert H. Fish. … Finally, the post office told
Detective King that it had intercepted a letter for Albert Fish. … On December 13,
1934, the landlady called Detective King. Albert Fish was at the rooming house look-
ing for his letter. The old man was sitting with a teacup when King opened the door.
Fish stood up and nodded when King asked him if he was Albert Fish. Suddenly, Fish
reached into his pocket and produced a razor blade which he held in front of him.
Infuriated, King grabbed the old man’s hand and twisted it sharply, “I’ve got you
now,” he said triumphantly.
6 ◾ John A. Eterno
Criminal investigators seek to uproot and bring to justice such horrid lawbreakers.
Influenced by what they have seen and heard in the media, students may think that detec-
tive skills are innate to everyone, but they are not.
ENGLISH INFLUENCE
THIEF TAKERS
Ancient civilizations and early European practices developed the roots of modern-day inves-
tigations, but it was the lure of money and the advancement of science that served as the cata-
lysts for advances in detective work. In 18th-century England, changes in approaches to crime
fighting were instrumental in the development of modern-day investigations. Constables
and watchmen were the common law enforcement practice of the time. Mostly, these men
A Brief History of Criminal Investigation ◾ 7
assisted victims in taking an offender to a magistrate, but it was also hoped that their pres-
ence would deter would-be criminals, as private citizens were expected to bear the brunt of
enforcing the law and doing any investigatory work. As cities became more populated, urban
problems such as poverty and crime began to escalate. The difficulties of relying on private
citizens for law enforcement became obvious, but the solution to this problem was not so
clear. As early as the 1600s, men known as “thief takers” could be found (Beattie, 2006). For a
reward or fee, these men used their knowledge of criminals and criminal behaviors to nego-
tiate between perpetrators and victims for the return of some or all of the stolen property, or
they helped bring the perpetrator to justice. Thief takers became far more numerous in the
mid-1700s because the monetary rewards for capturing criminals grew larger. These rewards
came from both the government and newspapers (Emsley et al., 2011).
Beattie (2006, p. 16) wrote that, “Over the quarter century between 1720 and 1745, and
again briefly between 1750 and 1752, the reward for the conviction of a robber in London
was 140 pounds, a sum that approached three or four years’ income for even a skilled work-
man.” Notwithstanding the inevitable corruption that such a system led to, many believed
that these methods were to some extent successful, at least compared to the constable and
watchmen, who felt little or no responsibility to investigate incidents.
For in the winter of 1749–50, with reports increasing of violence, … Fielding had
taken what was to turn out to be an important initiative by persuading a group of
men, including constables and ex-constables, to devote themselves to seeking out
and apprehending serious offenders and bringing them to Bow Street for examina-
tion and commitment to trial.
This, in itself, was a critical innovation, but Fielding took it a step further. Without a source
of funding, the experiment devised by Fielding could easily have failed, and, in fact, it was
on the brink of failing (Beattie, 2006). Although rewards were still coming in, they were
expensive for the government to maintain, led to corruption, and were inefficient. Further,
they were hardly adequate for this unique operation. Fielding provided the government
with a clear alternative to rewards: Give him money to pay for his group and advertise the
reporting of crimes and descriptions. Bow Street then began to pay its men directly for
their services. Clearly, Fielding took a major step forward in the development of modern-
day policing and detective work. Indeed, he has been credited with establishing the first
detective unit (Germann et al., 1978, as cited in Roberg et al., 2009, p. 34).
8 ◾ John A. Eterno
By 1765, after Fielding had died and his half-brother John had taken over, Bow Street
had clerical staff and regular people to help. This arrangement eventually caught on: “More
rotation offices were set up in Middlesex and Westminster. In 1792, the Middlesex Justices
Act created seven police offices in the metropolis, each with three stipendiary magistrates
and six constables charged with detecting and arresting criminals” (Emsley et al., 2011).
SCOTLAND YARD
By the early 1800s, it was clear that changes were needed in the way laws were enforced,
and the British Parliament set up committees to study the issues of crime and policing in
1812, 1818, and 1822 (MPS, 2011a). It was not until 1829, though, that the British Home
Secretary, Sir Robert Peel, created the first modern police force in London through the
Metropolitan Police Act (i.e., the Act for Improving the Police in and near the Metropolis).
Although the police had developed a military structure, the intent of Peel was that the
force not be military but civilian, and he deliberately chose uniforms for his officers that
had no resemblance to those of the military (McKenzie, 1996). Today, both styles of polic-
ing, military and civilian, have become commonplace, depending on the country and the
particular police force. Peel chose Scotland Yard for his first headquarters, and the name
has become synonymous with the Metropolitan Police.
Prevention was the key to Peel’s reforms; however, there was no immediate acceptance
of the police. Gaining public trust was critical: “Peel’s reforms, particularly in regards to
discipline, were not only intended to promote and preserve the public peace, but to pro-
mote and preserve the public trust. Prior to these reforms, the public’s faith in the existing
police watch systems was faint” (Anderson, 2001, p. 78). Initially, the police primarily had
an influence on the everyday quality of life, as they enforced laws against public drunken-
ness, fights, and similar minor violations.
DETECTIVES
It was not until 1842 that the Detective Branch was established, but “it soon became appar-
ent that a detective force was needed to work in conjunction with the uniformed, beat
patrol officers. Authority was given for the creation of a distinct detective force within the
Metropolitan Police in 1842” (Emsley et al., 2011). Today, detectives are fewer in number
compared to the uniformed patrol officers, and they tend to think of themselves, in gen-
eral, as vastly more skilled than the typical officer. As Emsley and Shpayer-Makov (2006, p.
12) stated, “In their memoirs and in the way that they use the media, detectives commonly
have liked to stress their knowledge of offenders, their shrewdness, their cunning, and,
in more recent times, their ability to deploy science and technology.” Unfortunately, such
skills and information can lead to corrupt activities. Indeed, scandal among plainclothes
officers is not uncommon: “Metropolitan Police detectives in the late twentieth century
have demonstrated the problems in setting police officers on relatively modest incomes to
investigate high-earning entrepreneurs dealing in, for example, drugs and pornography.
Detective officers in such situations are exposed to dangerous levels of temptation and
A Brief History of Criminal Investigation ◾ 9
the potential for serious corruption … especially when the detectives regard themselves
as elite” (Emsley and Shpayer-Makov, 2006, p. 13). Nevertheless, it is clear that the special
skills of detectives are clearly necessary for proper investigations.
The difficulties of being a detective, including corruption and politics, among many
other possible troubles, should not be underestimated. A very early case can be found in the
then newly formed Detective Branch of the London Metropolitan Police (MPS, 2011b):
Jonathan Whicher was one of the original members of the Detective Branch. … In
1860, he was called in to assist the investigation into the horrific murder of 4-year-
old (Francis) Savile Kent. … When the nursemaid, Elizabeth Gough, reported
the child missing at 7:15 am to Mrs. Kent, a search commenced for the child, who
was found dead in an outside privy with his throat cut and a stab wound to the
chest. … The local magistrates soon became impatient for results …. They asked
the Home Office for assistance from Scotland Yard without the agreement of the
local Chief Constable, and it was after a second request from them that Detective
Inspector Jonathan Whicher, then the most senior and well known of the detectives
at Scotland Yard, was sent. Whicher concentrated on a missing night dress, possibly
blood stained, belonging to Constance, and there was also circumstantial evidence
against her. The magistrates directed Constance’s arrest and gave Whicher seven
days to prepare a case. Mr. Kent provided a barrister for his daughter who domi-
nated proceedings. Constance was released on bail and the case was later dropped.
The reaction in the newspapers was sympathetic to Constance, Whicher was heavily
criticised, notwithstanding the difficulties he had faced, and his reputation never
recovered. … Five years later, in April 1865, after a period abroad and in a reli-
gious institution in Brighton, Constance attended Bow Street magistrates court and
confessed to the murder. Her motive had apparently been to exact revenge against
the second Mrs. Kent for her treatment of Constance’s mother. … The confession
from Constance came too late to save the career of Jonathan Whicher who had been
pensioned before Constance’s appearance at Bow Street confirmed his original sus-
picion. It is a classic illustration of how early investigations were directed heavily by
magistrates, of the influence which well-to-do people could exert over local police
officers, and of the importance of immediately searching and questioning the whole
household at the scene of a crime, regardless of social status.
of the London police” (Roberg et al., 2009, p. 37). One of the greatest differences between
the two, uniquely American, was the large number of local departments with only tangen-
tial centralized federal government control. Further, the nature of the American system
was such that local law enforcement developed more quickly compared to federal enforce-
ment. Indeed, law enforcement at the federal level was put together in piecemeal fashion.
As Johnson (1981, pp. 74–75) stated:
Each department which exercised some control over domestic affairs (Treasury,
Post Office, etc.) had particular law enforcement problems … they evolved as each
department evolved. Federal law enforcement, therefore, developed haphazardly,
with no central supervision in response to specific needs. … Federal officers had
neither a separate identity nor a general assignment to uphold the law. Rather, they
worked within a particular government bureaucracy where they investigated spe-
cific crimes.
Recall that Peel established his force due to an act of Parliament; not so for the American
police, as each locale set up its own department, and federal agencies concentrated on their
own areas of responsibilities. This was at least partially the result of the American federal-
ism style of government. Johnson (1981) compared the American and British experiences
with police from 1829 to 1860: “London’s police therefore had a highly centralized com-
mand. … By contrast, an American chief of police had many masters. So did his patrol-
men. Mayors and aldermen interfered often and without thought about the consequences
… there was no single standard of behavior” (p. 32). Also, it was not until the American
Civil War in the 1860s that it was ultimately decided that the federal government was
supreme. Prior to that, the neophyte democracy still had many lingering questions regard-
ing the power of the states.
Today, investigations in the United States are accomplished by an array of local, state,
and federal agencies, reflecting the power structure of our complex government. According
to the U.S. Department of Justice (BJS, 2007), 17,876 state and local law enforcement agen-
cies employed 1,076,897 employees in 2004. Many of these are small agencies that do not
have detectives. For these smaller agencies, when an incident requiring further inves-
tigation occurs, detectives from state, county, or other local departments are called in.
Adding to the state and local numbers, at the federal level 30 agencies have 100 or more
law enforcement officers who are full time and authorized to carry firearms and make
arrests (BJS, 2007).
enforcement, though. As the nation grew, Americans used the mail system to transport
cash or other valuables, making the Postal Service ripe for criminal activity. In the early
19th century, it became obvious that some substantial enforcement was needed. Special
agents were hired who not only investigated crime but also performed a variety of inspec-
tion duties (Johnson, 1981); these special agents did investigations but were not full-time
detectives. Furthermore, before 1830, very few of these special agents existed: “Postmasters
general probably employed no more than a dozen special agents at any one time” (Johnson,
1981, p. 78)
In 1836, Congress passed a law that allowed the hiring of full-time special agents with
arrest powers; these special agents became the first formal police force within the executive
branch of the federal government. These new special agents were finally full-time investi-
gators (Johnson, 1981, pp. 79–80):
The Postal Service is one of the earliest examples in American history of the use of detec-
tives who were exclusively government agents; however, a fairly common practice, even for
the government, was to hire private detectives.
ALLAN PINKERTON
One of the most well known private detectives was Allan Pinkerton. In the 19th century,
he created one of the most famous detective agencies known throughout the world and
which still exists today—the Pinkerton National Detective Agency. The Pinkerton Agency
is credited with saving President-Elect Abraham Lincoln’s life in 1861 in Baltimore, among
their many other accomplishments (Anon., 2011). Pinkerton was born in Scotland in 1819.
His father was a police sergeant who died when Pinkerton was young, and his family was
very poor. As a young man, he got involved in a movement that called for political and
social reform. When the government issued a warrant for his arrest, Pinkerton fled to
the United States in 1842. His career as a law enforcement officer began after he caught
counterfeiters while cutting wood near Chicago. His reputation growing, he was given an
appointment as a deputy sheriff. Although the actual dates are in doubt, sometime around
12 ◾ John A. Eterno
1849 he was appointed as the city police’s first and, for a while, only detective. He soon
quit that job. Pinkerton himself said that he left that job because of “political interference”
(Mackay, 1996, p. 68).
Interestingly, and a fact not often cited in biographies of Pinkerton, at this point in his life
he was “eagerly snapped up by the United States Post Office which appointed him Special
United States Mail Agent” (Mackay, 1996, p. 69). As we know from our earlier discussion,
the Postal Service was one of the most professional investigative bodies of its time. Pinkerton
went undercover and brilliantly solved a case, determining that “one of the sorters, Theodore
Dennison, had a brother named Perry who had once been arrested for pilfering mail in
another town. Allan, in his guise as a recently arrived Scottish immigrant, befriended the
Dennisons and learned that they were, in fact, nephews of the Chicago postmaster” (Mackay,
1996, p. 69). Shortly after this excellent piece of undercover work, Pinkerton left the post
office and created the North-Western Detective Agency (later Pinkerton and Co.); however,
it should be noted that Pinkerton did not invent the private detective nor the private detec-
tive agency. Although he was certainly very good at it, a French detective, Eugene Francois
Vidocq, is generally considered to be the first modern detective. Vidocq created an agency
in 1832 or 1833, well before Pinkerton (Brown, 2006; Emsley et al., 2006; Mackay, 1996).
Pinkerton’s name, however, has become synonymous with investigations. He certainly pop-
ularized such work and enjoyed many successes. He was even hired by the Union during the
Civil War to obtain military information about the Confederate states (Anon., 2011).
Pinkerton also helped popularize a romanticized notion of criminals. Unlike the numer-
ous theories of crime that exist today, all essentially sociologically or psychologically based,
the image of a criminal as an equal adversary for detectives began to emerge. Walker (1977,
p. 22) observed that, “Between 1874 and 1885 Pinkerton published more than eighteen
books on crime and criminals. … Pinkerton wrote that ‘romance and tradition have for a
long period of time accredited the cracksman with being the most expert in their profes-
sion.’ The police officer was expected to match wits with these expert criminals.”
THE FBI
The Postal Service and the Treasury Department (Secret Service) were early federal govern-
ment investigative bodies. Today, the preeminent federal agency for law enforcement inquiries
is the Federal Bureau of Investigation (FBI). Although many other federal agencies conduct
investigations, those agencies tend to concentrate on very specific crimes; for example, the
Drug Enforcement Agency (DEA), Bureau of Alcohol, Tobacco, Firearms, and Explosives
(ATF), and Internal Revenue Service (IRS) all do investigations, but their work is specifically
tailored to the mission of the particular agency. The FBI, however, is unique in that its mis-
sion is far more general in nature. Indeed, its mission statement reads (FBI, 2011a):
To protect and defend the United States against terrorist and foreign intelligence
threats, to uphold and enforce the criminal laws of the United States, and to provide
leadership and criminal justice services to federal, state, municipal, and interna-
tional agencies and partners.
A Brief History of Criminal Investigation ◾ 13
Investigations by the FBI can overlap with those of other federal agencies, and the FBI
may even take over. The well-known raid that took place in February 1993 on the Branch
Davidians in Waco, Texas, was initially an ATF operation. The FBI was called in to assist
after a raid by the ATF was unsuccessful, leaving four of its agents dead. A 51-day standoff
followed after the FBI took charge; it ended badly, and many of the Davidians died after the
FBI stormed the compound. The raid is still controversial today.
After 9/11, the FBI took on added significance in the war on terror. President George W.
Bush created the Department of Homeland Security (DHS) to ensure that all of the fed-
eral agencies involved in law enforcement were properly sharing information and working
together. The FBI, however, clearly has absorbed the lion’s share of federal investigations,
in addition to acquiring an enormous amount of expertise.
The FBI was created relatively recently compared to some of its counterparts (e.g., U.S.
Postal Service, Secret Service). Indeed, the oversight body of the FBI, the Department of
Justice (DOJ), was not created until 1870. The DOJ often utilized the Secret Service and
private detectives for their investigations (FBI, 2011b). What was to become the FBI was
not created until 1908. In that year, Attorney General Charles Bonaparte under President
Theodore Roosevelt assigned ten former Secret Service employees and some others to be
special agents; however, the specific reason for formation of the agency was political. There
was a fight between the President and Congress over corruption, and the Secret Service
agents on loan to the DOJ were subject to severe criticism for an investigation they did on
a U.S. Senator. Jeffreys-Jones (2007, p. 39) summarized the situation:
In 1904, Secret Service detectives on loan to Justice had obtained evidence that led
to the conviction of a number of land fraudsters, including U.S. Senator John H.
Mitchell (R-Ore.). … Unhappy about the investigation to which he had been sub-
jected, Congress directed a barrage of criticism at the Secret Service. This culmi-
nated, in the spring of 1908, in a legislative ban on the Treasury Department’s loan
of Secret Service detectives to any other department. Faced with this ban, the execu-
tive created the Justice Department’s own detective force.
When the terms of the Attorney General and President were completed in 1909, they
recommended that the 34 agents then assigned become a permanent force. The next
Attorney General, George Wickersham, named this group of agents the Department of
Investigation (FBI, 2011b), and the Bureau was given its current name in 1935. In 1924,
J. Edgar Hoover became the director of the FBI. He made many changes and oversaw a
rapid expansion of the Bureau. In 1932, the FBI began releasing its Most Wanted lists.
During World War II, the FBI collected intelligence and tracked down deserters. Today,
terrorism, cybercrime, white collar crime, and organized crime are among the many fed-
eral crimes investigated by the Bureau. The FBI is the main domestic investigative agency
for the U.S. government, and it reports to the Attorney General. The FBI, however, does
not have the disciplinary powers of state and local police forces. Those police forces, who
do the vast majority of police work in the United States, run their own departments under
local authority.
14 ◾ John A. Eterno
CONTEMPORARY EMPLOYMENT
IN CRIMINAL INVESTIGATION
In today’s world, there is no shortage of criminal behavior. In fact, the United States has
the dubious distinction of having the highest prison population rate in the world and is
the largest consumer of the world’s illegal drugs (Eterno and Das, 2010). On a global level,
transnational crime and terrorism are ever increasing as modern technology and trans-
portation systems expand to more and more countries. Opportunities for careers in inves-
tigation should be widely available for the foreseeable future; however, this field offers so
many potential career paths that it is beyond the scope of this chapter to explain them all.
Instead, readers interested in careers as investigators are given a broad outline on how to
proceed.
Preparing for a career as an investigator requires one to be aware of the possible tracks
one can take. In very general terms, one can work in a laboratory setting or in a field set-
ting. For those thinking of working in a laboratory (say, examining DNA), the requisite
educational path would be one in the hard sciences, with a major in biology, chemistry,
forensic science, or other related subject. This would allow entrance to graduate-level pro-
grams to prepare for work in a laboratory setting. In addition to DNA analysis, forensic
investigations can involve, for example, fingerprints, firearms, poisons, polygraph testing,
human remains, autopsies, accounting, computers, applied psychology, and much more.
Working in the field as an investigator requires a different set of skills. Although knowl-
edge of forensics is helpful, generally a detective working in the field would not be required
to develop a sophisticated, higher education in the sciences. Those interested in field
investigations would more likely major in criminal justice or a related discipline. These
careers generally involve becoming a sworn officer. The skills required are very different
and include an understanding of criminal and procedural laws, methods of interrogation,
understanding a crime scene, developing a case for prosecution, understanding modus
operandi, spotting patterns in criminal behavior, understanding the causes of criminality,
and much more.
Choosing which track to take will depend on one’s interests and abilities; for example,
those interested in accounting might seek to become experts in white collar crime. This
very wide range of potential careers makes it important for future investigators to think
about what they would like to do in the future as soon as possible so their education can
be tailored to achieving that goal. Those interested in becoming an FBI special agent, for
example, should know that the FBI has five entry-level programs: accounting, computer
science/information technology, language, law, and diversified (combination of full-time
experience and education).
As you read through this book, certain topics may be more appealing to you, and you
may even consider embarking on a career in one; however, you need to do your homework
to find out what it takes to become that particular type of investigator and to determine
job opportunities in that field. Some careers are more likely to have openings than others.
Importantly, students should talk to an advisor and a practitioner as early in their college
career as possible.
A Brief History of Criminal Investigation ◾ 15
BIBLIOGRAPHY
Anderson, J. (2001). Iron Discipline, Then and Now. Law & Order, 49(8):77–78.
Anon. (2007). Albert Fish, the Grandfatherly Ghoul, http://twistedminds.creativescapism.com/most-
notorious/albert-fish/af-murders/.
Anon. (2011). Allan Pinkerton. In Encyclopaedia Britannica Online, http://www.britannica.com/
EBchecked/topic/461110/Allan-Pinkerton.
Bardsley, M. (2010). Albert Fish: The Manhunt, http://www.trutv.com/library/crime/serial_killers/
notorious/fish/8.html; Albert Fish: A Clue, http://www.trutv.com/library/crime/serial_killers/
notorious/fish/10.html.
Beattie, J.M. (2006). Early Detection: The Bow Street Runners in Late Eighteenth Century London.
In Emsley, C. and Shpayer-Makov, H., Eds., Police Detectives in History, 1750–1950 (pp. 15–32).
Burlington, VT: Ashgate Publishing.
BJS. (2007). Census of State and Local Law Enforcement Agencies, 2004. Washington, D.C.: U.S.
Department of Justice, Bureau of Justice Statistics (bjs.ojp.usdoj.gov/content/pub/pdf/csllea04.
pdf).
Brown, H.G. (2006). Tips, Traps and Tropes: Catching Thieves in Post-Revolutionary Paris. In
Emsley, C. and Shpayer-Makov, H., Eds., Police Detectives in History, 1750–1950 (pp. 33–60).
Burlington, VT: Ashgate Publishing.
Dershowitz, A. (2002). Shouting Fire: Civil Liberties in a Turbulent Age. Boston: Little, Brown and
Company.
Emsley, C. and Shpayer-Makov, H., Eds. (2006). Police Detectives in History, 1750–1950. Burlington,
VT: Ashgate Publishing.
Emsley, C., Hitchcock, T., and Shoemaker, R. (2011). Crime and Justice—Policing in London, Old
Bailey Proceedings Online (http://www.oldbaileyonline.org/static/Policing.jsp).
Eterno, J.A. and Das, D.K., Eds. (2010). Police Practices in Global Perspective. Lanham, MD: Rowman
& Littlefield.
FBI. (2011a). Quick Facts. Washington, D.C.: Federal Bureau of Investigation (http://www.fbi.gov/
quickfacts.htm).
FBI. (2011b). Origins (1908–1910). Washington, D.C.: Federal Bureau of Investigation (http://www.
fbi.gov/about-us/history/brief-history).
Germann, A.C., Day, F.D., and Gallati, R.R. (1978). Introduction to Law Enforcement and Criminal
Justice. Springfield, IL: Charles C Thomas; cited by Roberg, R., Novak, K., and Cordner, G.
(2009). Police and Society. New York: Oxford University Press.
Jeffreys-Jones, R. (2007). The FBI: A History. New Haven, CT: Yale University Press.
Johnson, D.R. (1981). American Law Enforcement: A History. St. Louis, MO: Forum Press.
16 ◾ John A. Eterno
Mackay, J. (1996). Allan Pinkerton: The First Private Eye. New York: John Wiley & Sons.
McKenzie, I. (1996). The History of Criminal Investigation. Austin, TX: Raintree Steck-Vaughn.
MPS. (2011a). History of the Metropolitan Police: Time Line 1829–1849. London: Metropolitan Police
Service (http://www.met.police.uk/history/timeline1829-1849.htm).
MPS. (2011b). History of the Metropolitan Police: Constance Kent and the Road Hill House Murder.
London: Metropolitan Police Service (http://www.met.police.uk/history/constance.htm).
Ramsland, K. (2007). Beating the Devil’s Game: A History of Forensic Science and Criminal Investigation.
New York: Berkley Books.
Roberg, R., Novak, K., and Cordner, G. (2009). Police and Society. New York: Oxford University
Press.
Walker, S. (1977). A Critical History of Police Reform. Lexington, MA: D.C. Heath and Company.
Chapter 2
Introducing Criminal
Investigation
Bryan Courtney
Missouri Western College
CHAPTER OBJECTIVES
After reading this chapter, you should be able to do the following:
Chapter Outline
• Introducing Criminal Investigation
• Qualifications for Becoming a Criminal Investigator
• Selection Process
• Specialized Training for Criminal Investigators
• Role of the Patrol Officer in the Preliminary Investigation
• Role and Function of the Criminal Investigator
17
18 ◾ Bryan Courtney
that this or any agency would favor those candidates from patrol who enter the criminal
investigator selection process having developed skills and acumen in any of these special-
ized areas.
General qualifications may also include demonstrated interpersonal skills illustrating
that the detective candidate is able to successfully build relationships outside of the organi-
zation across gender, ethnic, generational, and political groups (Bennett and Hess, 2007).
Also key is that law enforcement agencies will evaluate the candidate’s demonstrated
ability to develop solvability factors during preliminary investigations while in patrol.
Additionally, the organization will evaluate if the detective candidate has been able to suc-
cessfully build professional relationships and has effectively communicated with the crim-
inal investigations unit from his or her patrol position. Criminal investigation is a process
of discovering, preparing, identifying, and presenting evidence. Organizations will look
for candidates who have demonstrated these skills, as well as the ability to perform deduc-
tive reasoning, a logical process in which a conclusion follows from specific facts (Bennett
and Hess, 2007). It has long been said that the greatest predictor of future performance is
past performance; law enforcement agencies will look to promote candidates for detective
positions that have a demonstrated history of assisting the criminal investigations unit in
successful clearance of criminal investigations.
SELECTION PROCESS
Generally, the process begins with a job posting, which informs department personnel of
an opening in the criminal investigations unit. Interested officers submit their interest in
the position following department policy, which typically requires sending a résumé to the
patrol officer’s supervisor. The supervisor will evaluate if the interested party has met the
minimum qualifications for the position; if so, the supervisor will enter the interested offi-
cer into the candidate pool. Applicants will be screened for eligibility for the promotional
process through reviews of the candidate’s experiences and expertise as they relate to the
qualifications of the posted position. Upon being entered into the promotional process
for detective the candidate will generally have to successfully navigate a selection process
consisting of an assessment center, written test, panel interview, role play, group exercise,
and in-basket (KCPD, 2011).
Larger agencies may require candidates who meet the minimum requirements for the
rank of detective or investigator to successfully complete the agency’s promotional acad-
emy. The Madison Police Department requires all of the detective and investigator candi-
dates who have successfully passed the department’s screening process for admission to
the promotional academy to complete a week of technical competency skills specific to the
rank and training in general quality improvement methods and leadership skills. Those
candidates who score 70% or higher are allowed to continue on to the assessment center
(MPD, 2011). The assessment center is essentially a job simulation consisting of various
exercises designed to assess the qualifications and developmental potential of each candi-
date. The exercises are based on job-related situations and are designed as interpersonal and
administrative exercises. A typical assessment center will be comprised of five sections for
20 ◾ Bryan Courtney
all ranks: written exam, interview, in-basket assignment, role-play situation, and a group
exercise. Nearly all agencies will require a written test in the promotion process that gener-
ally covers organizational policy, procedure, state law, and in some cases materials from a
reading list assigned to the candidates during the selection process (MPD, 2011).
Interviews are generally included in the selection process for positions in the criminal
investigations unit. Interviews are conducted by a promotion panel and serve to evaluate
the candidate’s skills, knowledge, and abilities to perform the functions required of the
position. Interview topics can include familiarity with department policies and procedures
and applicable statutes, as well as the candidate’s motivation to become a detective, initia-
tive, problem-solving and organizational skills, history of teamwork, report writing abil-
ity, crime scene expertise, tactical response, and view of the role of detective within the
department and in an interagency capacity (MPD, 2011).
Role plays included in the selection process generally focus on crime scene processing for
investigators and interviewing for detectives. Group exercises for detectives and investiga-
tors can include debate, major incident simulation, and demonstration of communication
skills. The in-basket exercise for detectives generally includes a simulated case assignment
for the candidate to work. Evaluation criteria for the assessment center can include scoring
the candidate’s communication skills, both internal and external to the organization, in
addition to problem solving and case feedback (MPD, 2011).
Candidates are scored based on their performance throughout the selection process by the
promotion panel. Generally, departments post a list in rank order of those who completed
the promotion process. Open positions will be filled by the highest ranking candidates on
the promotional list, which is typically posted for 12 months (DPD, 2011). Candidates who
are promoted to the criminal investigations unit generally enter the unit on a probationary
basis and are subject to review at the end of the probationary period. New detectives who
successfully pass the evaluation at the end of their probationary period will remain in that
capacity; those who do not may be removed or retrained. Candidates not promoted dur-
ing the life of the promotional list will need to repeat the selection process to be eligible for
future detective or investigator position openings within the criminal investigations unit
(KCPD, 2011).
Specific skills that are very useful to criminal investigations and that often require spe-
cialized training include (Swanson et al., 2006):
The responding patrol officer must be open to any and all sources of information and
open to new information when approaching a crime scene. The responding officer may have
received some information from dispatch or other sources in reference to any weapons,
natural hazards, manmade hazards, or any other potential threats at the crime scene and
should take all of this information into consideration when arriving at the scene (Gardner,
2000). Many times, the information about what exactly the potential threats are at a crime
scene is incomplete at best and many times completely unknown. Officers should work to
develop a strong tactical acumen and use their training and experience to protect them-
selves and others in the initial approach to crime scenes. In the initial approach to a crime
scene it is very important to determine if there is a crime in progress and if the suspect is
still at the scene. If a suspect is at the scene, the patrol officer must determine if there are
multiple suspects and whether or not the officer has the tactical acumen to arrest the sus-
pects. If the suspect has left the scene prior to arrival of the patrol officer, is an injured victim
present? If so, does the victim present any threat to the officer’s safety? When the respond-
ing officer has determined that no threats to the officer’s safety are present and declares the
scene secure, the officer can begin rendering assistance to any injured victims.
the crime scene for their own personal reasons or curiosity. The initial responding officer
should quickly put up a crime scene tape barrier to keep those not directly involved in the
investigation out of the scene. Some officers, victims, witnesses, and onlookers may resist
when asked to step back from the crime scene. It is important that the officer use a firm but
respectful tone and approach to ensure that all comply and that the integrity of the crime
scene is preserved (Colwell and Huth, 2010).
After the initial responding officer has arrived at the crime scene, cared for the injured,
arrested the suspect, identified victims and witnesses, secured the scene, and set up the
crime scene barrier, eventually the criminal investigations unit detectives will arrive on
the scene and the officer will turn the crime scene over to the investigators. Historically,
the dynamics of the relationship between patrol officers and detectives has been a source of
potential friction. Police scholar and former Wichita Police Chief O.W. Wilson stated that,
“The communication of information between patrol officers and investigators is a vital fac-
tor in the success of criminal investigations. Investigators should make every effort to fos-
ter the cooperation and enthusiasm of patrol officers through frequent personal contacts,
by making certain that beat officers receive acknowledgment in reports and press releases,
and by fostering preliminary investigations by patrolmen. One of the fastest ways to stop
the cooperation between patrol officers and investigators is to have the latter reword the
preliminary investigation as if the patrol officer were not to be trusted” (Greenberg and
Wasserman, 1979).
Introducing Criminal Investigation ◾ 25
Ideally, law enforcement as a whole has embraced the patrol officer as a critical compo-
nent of criminal investigations overall and specifically in preliminary investigation. Every
agency should work toward meaningful communication and partnerships between patrol
personnel and investigations personnel to increase the likelihood of successful closure of
criminal investigations. Turning over a crime scene from patrol to the criminal investiga-
tions unit in a professional manner is an excellent avenue for easing potential friction and
can serve as a catalyst for fostering a closer relationship between patrol officers and detec-
tives, potentially improving the successful closure rate of criminal investigations. The first
step in turning over the crime scene to the criminal investigations unit requires the initial
responding officer to provide a proper debrief of the crime scene to the responding detective.
The debrief should include a detailed summary of the officer’s initial observations approach-
ing the scene; initial observations upon arriving at the scene; any and all of the solvability
factors information the officer was able to collect, including pointing out any witnesses to
the detective, any fragile evidence or evidence that may rapidly deteriorate, and any second-
ary crime scenes; and explaining the crime scene barrier (Gardner, 2000). When the initial
responding officer has clearly communicated all observations, actions, and solvability fac-
tors to the detective and the detective clearly communicates to the officer that the informa-
tion has been received and that investigations now has the scene, the officer can assume a
supporting role, begin the report writing process, or take whatever action the situation or
department policy dictates once the scene is released to the criminal investigations unit.
1. Notes
2. Photography
3. Sketches
4. Report
All four components of crime scene documentation are interdependent in properly recall-
ing the crime scene later in court (Bennett and Hess, 2007).
It is critical that criminal investigators be aware that, to be admissible in court, crime scene
photographs must be material, relevant, accurate, free of distortion, and non-inflamma-
tory. The court will evaluate crime scene photographs to determine if they will be allowed
into evidence in a trial proceeding based on specific criteria: Crime scene photographs
must be material; a material photograph is directly related to the specific case and subject.
Crime scene photographs must be relevant; a relevant photograph assists in supporting and
illustrating witness testimony. Crime scene photographs must be competent; a competent
photograph is an accurate representation of what was photographed. Its chain of custody
has been accurately documented and maintained, and the photograph was secured until
presentation as evidence in court.
Introducing Criminal Investigation ◾ 27
Properly defining the role of the criminal investigator must begin with an examination of
the overall mission of policing to illustrate the roles that criminal investigations and detec-
tives fill in meeting that mission. Policing in the United States has experienced a shift in the
manner in which police services are delivered largely as a result of the evolving philosophy
of community policing. Driven by research, citizen dissatisfaction with police services,
public policy, and federal dollars, many police agencies are adopting community policing
as a strategy. Community policing advocates a department-wide shift in the delivery of
police services that puts an emphasis on problem solving, community partnerships, and
organizational change (PERF, 1996).
The greatest boost to the community-oriented era of policing occurred with the passing
of the Violent Crime Control and Law Enforcement Act of 1994. The act authorized expen-
ditures of over $8 billion over 6 years to add 100,000 police officers to communities across
the country and to promote the implementation of community policing. Furthermore,
the Act also prompted Attorney General Janet Reno to create the Office of Community
Oriented Policing Services (COPS) in the U.S. Department of Justice. The COPS Office has
been tasked with the responsibility for putting the additional officers on the streets and
providing training and technical assistance to the nation’s communities and police depart-
ments in developing strategies for implementing community policing. The COPS Office
defines community policing “as a policing philosophy that promotes and supports orga-
nizational strategies to address the causes and reduce the fear of crime and social disorder
through problem-solving tactics and community-police partnerships” (Cohen, 2001).
In her Report to Congress on the COPS Office, Attorney General Reno (2000, pp. 2–3)
made an eloquent argument of support for community policing:
When President Clinton signed into law the Violent Crime and Control and Law
Enforcement Act of 1994, he fulfilled a promise he made when he first took office—
that his administration would provide local communities the resources to add
100,000 community policing officers to the nation’s streets. Six years later, this his-
toric legislation has made a difference. As of this summer, over 105,000 community
policing officers have been funded. More than 30,000 grants have been awarded
Introducing Criminal Investigation ◾ 29
to over 12,000 law enforcement agencies, covering 87% of the country. Crime has
dropped to its lowest level since 1968, as police officers work hand-in-hand with the
community forging new partnerships and working together to solve problems.
By walking the beat and sharing in the life of neighborhoods, thousands of com-
munity oriented policing officers funded by the COPS program are redefining the
relationship between law enforcement and community. As community members
get to know the person behind the badge, and police officers learn the hopes and
fears of the residents they serve, perceptions change. Trust grows. New and creative
ways of dealing with longstanding problems are developed. Unique partnerships are
developed among groups and organizations where previously there was skepticism
or even hostility. Crime decreases, the fear of crime decreases, and neighborhoods
thrive.
Another of the many benefits of the COPS program, and a critical part of its legacy,
has been its focus on training. COPS’ regional network of training institutes across
the country has trained officers in areas including building partnerships within the
community, supporting victims of domestic violence, and problem solving. COPS
also has made a substantial contribution to numerous integrity initiatives and is
continuing to develop additional resources to strengthen this critical area. I know
that the COPS program has contributed significantly to a safer America. We must
not rest on our success, nor become complacent. We must continue our progress.
My hope is that the important work of the COPS program will go on, as we continue
to change the face of law enforcement for the 21st century.
What cannot be lost in this discussion is the importance of the role of the criminal
investigator in conducting the follow-up investigation. The criminal investigator’s ability
to successfully close criminal investigations will ensure that offenders are arrested and
entered into the criminal justice system, victims will see justice, and personal property
will be returned.
BIBLIOGRAPHY
APD. (2011). How to Become a Police Officer: Selection Process. Alexandria, VA: City of Alexandria
(www.alexandriava.gov/police/info/default.aspx?id=9066).
Bennett, W. and Hess, K. (2007). Criminal Investigation, 8th ed. Belmont, CA: Thomson
Wadsworth.
BLS. (2011). Occupational Outlook Handbook, 2010–11 Edition. Washington, D.C.: U.S. Department
of Labor, Bureau of Labor Statistics (www.bls.gov/oco/ocos160.htm).
Cohen, D. (2001). Problem-Solving Partnerships: Including the Community for a Change. Washington,
D.C.: U.S. Department of Justice, Office of Community Policing Services (http://www.cops.
usdoj.gov/ric/ResourceDetail.aspx?RID=163).
Colwell, J. and Huth, C. (2010). Unleashing the Power of Unconditional Respect: Transforming Law
Enforcement and Police Training. Boca Raton, FL: CRC Press.
DMPD. (2011). Minimum Qualifications for Police Officer. Des Moines, IA: Iowa Department of
Public Safety (http://www.dps.state.ia.us/commis/prtb/qualifications.shtml).
DOJ. (2011). Community Oriented Policing Services: Community Policing Defined. Washington, D.C.:
U.S. Department of Justice (http://www.cops.usdoj.gov/Default.asp?Item=36).
DPD. (2011). Operations Manual for the Police Department of the City and County, Denver, Colorado.
Denver, CO: Denver Police Department (www.denvergov.org/Portals/326/documents/intro.
pdf).
Introducing Criminal Investigation ◾ 31
FBI. (2010). Law Enforcement Officers Killed & Assaulted, 2009. Washington, D.C.: Federal Bureau of
Investigation (http://www2.fbi.gov/ucr/killed/2009/aboutleoka.html).
Gardner, R. (2000). Practical Crime Scene Processing and Investigation. Boca Raton, FL: CRC Press.
Greenberg, I. and Wasserman, R. (1979). Managing Criminal Investigations. Washington, D.C.: U.S.
Department of Justice, National Institute of Law Enforcement and Criminal Justice.
KCPD. (2011). Personnel Policy. Kansas City, MO: Kansas City Police Department (www.kcpd.org/
masterindex/files/ppbm/500/504-6.pdf).
Kelling, G. (1974). Kansas City Preventive Patrol Experiment: A Summary Report. Washington, D.C.:
Police Foundation.
MPD. (2011). Madison Police Department Promotional Process for Investigators, Detectives, and
Sergeants. Madison, WI: Madison Professional Police Officers Association (www.mppoainfo.
com/news/promotional_process.html).
PERF. (1996). Themes and Variations in Community Policing. Washington, D.C.: Police Executive
Research Forum.
Redsicker, D. (2000). The Practical Methodology of Forensic Photography, 2nd ed. Boca Raton, FL:
CRC Press.
Reno, J. (2000). Attorney General’s Report to Congress. Washington, D.C.: U.S. Department of Justice,
Office of Community Oriented Policing Services.
SDPD. (2011). Mission Statement. San Diego, CA: San Diego Police Department (http://www.sandi-
ego.gov/police/about/chief/index.shtml).
Swanson, C., Chamelin, N., Territo, L., and Taylor, R. (2006). Criminal Investigation, 9th ed. New
York: McGraw-Hill.
Trojanowicz, R. and Bucqueroux, B. (1990). Community Policing: How to Get Started. Cincinnati,
OH: Anderson Publishing.
2
Preliminary Considerations
Chapter 6 ■ Evidence
33
Chapter 3
CHAPTER OBJECTIVES
After reading this chapter, you should be able to do the following:
Chapter Outline
• Introduction
• Purpose of Search
• Planning the Search
• Legal Considerations
• Search Methods
• Post-Search Survey
INTRODUCTION
The actions taken during a crime scene investigation can play a critical role in the successful
resolution of a case. Proper treatment and preservation of the crime scene are vital to the
identification and ultimate prosecution of the perpetrators. A crime scene that is handled
in a haphazard manner can be detrimental to successful resolution of the case, not to men-
tion a police department’s reputation. The diligent investigation of the crime scene is both
necessary and critical (Birzer and Roberson, 2008). An important part of any investigation
is the crime scene search. This chapter introduces the crime scene search, and the purpose
35
36 ◾ Michael L. Birzer
and scope of the crime scene search are discussed along with legal considerations that must
be acknowledged. Finally, the chapter provides a detailed discussion of planning the search
as well as specific search techniques. The student will find the information presented in this
chapter an effective building block to learning about the critical nature of the crime scene
search. Police officers reading this chapter will find the information to be a fresh review of
the fundamentals of the crime search. Although the information presented in this chapter is
generic enough to be applied in most jurisdictions, police officers are always advised to check
with their agency’s standard operating procedures for crime scene search techniques.
PURPOSE OF SEARCH
O’Hara and O’Hara (2003, p. 6) informed us that, “An investigation can be considered a
success if all the available information relevant and material to the issues or allegations of
the case is uncovered.” Oftentimes the crime search is the underpinning for discerning
available information that is relevant and material to the issues and allegations of the case.
Throughout this book we emphasize that the primary purpose of crime scene investigation
is to help establish what happened and to identify the responsible person. This is done by
carefully documenting the conditions at a crime scene and identifying all relevant physi-
cal evidence. The ability to identify and properly collect physical evidence is often criti-
cal to prosecuting violent crimes. The crime scene search plays an important role in the
crime scene investigation. Actions taken at the outset of an investigation, such as the initial
crime scene search, can play an important role in the resolution of a case. Careful, thor-
ough investigation is important to ensure that potential physical evidence is not tainted or
destroyed or potential witnesses overlooked.
The purpose of the crime scene search is to discover evidence that will be useful in
determining what happened, with the ultimate goal of identifying the person or persons
responsible for committing the crime, and thus resolving the case. Evidence discovered at
the crime scene will play a crucial role later at the criminal trial in establishing the truth
and convicting the guilty parties. The general scope of the crime scene can cover structures
of any kind, including but not limited to vehicles, open fields, mass transit systems, water
vessels, waterways, aircraft, and the like. In some cases, there may be multiple crime scenes
for one crime. Suppose, for example, that a shooting happens in a residence and the suspect
subsequently places the body in the trunk of his car and drives the body to an open field
located in a rural area where he buries the body in a shallow grave. In this situation, there
are three separate crime scenes: the residence where the shooting took place, the vehicle that
was used to transport the body, and the open field where the body was buried. Investigators
would be responsible for diligent searches for evidence at each of these areas.
witnesses, and others in the area. The investigator should survey the scene for dangerous
persons and control the situation. If necessary, additional assistance should be summoned
to the scene for the purpose of control and ensuring the safety of all personnel.
For the overall protection the crime scene, it is important to control, identify, and
remove persons at the crime scene as well as limit the number of persons who enter the
crime scene. The initial responding officers should identify persons at the crime scene
and control their movement. They should immediately control all individuals at the scene
and prevent individuals from altering or destroying physical evidence by restricting their
movement, location, and activity while maintaining safety at the scene. It is not uncom-
mon for passersby to stop at the crime scene to take a look or for news reporters to quickly
congregate on the scene after hearing the call come in over the police scanner. In a mat-
ter of minutes, the crime scene can become a spectacle. This is why it is important to
ask all unauthorized and nonessential personnel to leave the crime scene promptly. In
essence, all individuals at the crime scene should be identified, including suspects, wit-
nesses, bystanders, and medical and other assisting personnel. Controlling the movement
of persons at the crime scene and limiting the number of persons who enter the crime
scene are essential to maintaining scene integrity, safeguarding evidence, and minimiz-
ing contamination.
INITIAL WALKTHROUGH
According to the Department of Justice (DOJ, 2000), the crime scene walkthrough pro-
vides an overview of the entire scene, identifies any threats to scene integrity, and ensures
protection of physical evidence. Written and photographic documentation provides a per-
manent record. The investigator in charge should conduct a walkthrough of the scene with
individuals responsible for processing the scene. During this walkthrough, the investiga-
tor in charge should avoid contaminating the scene by using the established path of entry.
It is important to prepare preliminary documentation of the scene as observed. Fragile
or perishable evidence should be identified and protected (e.g., consider climatic condi-
tions, crowds, hostile environment). Ensure that all evidence that could be compromised is
immediately documented, photographed, and collected. Conducting a scene walkthrough
prior to the search gives the investigator in charge an overview of the entire scene. It pro-
vides the first opportunity to identify valuable or fragile evidence and to determine initial
investigative procedures, providing for a systematic examination and documentation of
the scene. Written and photographic documentation records the condition of the scene
as first observed and provides a permanent record. During the initial walkthrough it is
important to determine which areas should be searched, paying special attention to poten-
tial problem areas. Transient physical evidence should be identified and protected. A deter-
mination should be made about personnel and equipment needs. Furthermore, specific
assignments should be made of police personnel. The importance of taking extensive notes
to document the scene, physical and environmental conditions, and personnel movements
cannot be overemphasized (Birzer and Roberson, 2008).
Crime Scene Search ◾ 39
diagrams are an ideal supplement to photographs. A rough sketch drawn at the scene is
normally not drawn to scale and is used as a model for the finished sketch. In general, the
following should be included on the rough sketch:
• Specific location
• Date
• Time
• Case identifier
• Preparer
• Weather conditions
• Lighting conditions
• Scale or scale disclaimer
• Compass orientation
• Evidence
• Measurements
• Key or legend
In some cases, number designations on the sketch can be coordinated with the same number
designations on the evidence log. The crime scene sketch should illustrate the basic perim-
eter, the location of fixed objects such as furniture, and the location of any evidence, in addi-
tion to providing the appropriate measurements, a key or legend, and compass orientation.
EVIDENCE CUSTODIAN
One evidence custodian should be assigned to log evidence as it is discovered during the
search. The evidence custodian should ensure that any item of evidence is photographed in
the position where it was found prior to collection and should log where the evidence was
found, the date and time when it was found, and who found it, in addition to maintaining
a chain of custody and control of the evidence. The evidence custodian should also coor-
dinate the packaging of all evidence collected at the crime scene and should thoroughly
document the circumstances behind the collection of a piece of evidence, including who
discovered the evidence, the time and date of discovery, and any special circumstances.
Assigning an evidence custodian limits the number of crime scene personnel who may
handle evidence, which could become an issue when a suspect is identified and the case
subsequently goes to trial.
SPECIAL CONSIDERATIONS
In some special cases prior to the search, crime scene authorities may find it necessary to bring
in specialists. Such specialists may come from a variety of disciplines, as dictated by the spe-
cific crime scene, to assist in the collection of evidence found during the search. Specialists
may include medical examiners, anthropologists, odontologists, entomologists, computer
investigative specialists, bomb technicians, geologists, and blood pattern analysts.
Crime Scene Search ◾ 41
PRE-SEARCH MEETING
Prior to initiating the search, the search team leader should meet with all personnel who
will be involved in the search. The search team leader should fully debrief the search team
as to what is known up to that point in the investigation and about the general scope and
purpose of the search. Search patterns that will be used should be identified and assign-
ment of search personnel made. The evidence custodian should also be named at the pre-
search meeting. The search leader should maintain control during the entire search process,
including ensuring the safety of personnel at all times. All search personnel should be
made aware of the location of the command post. Birzer and Roberson (2008, p. 177) pro-
vided the following pre-search search planning checklist:
LEGAL CONSIDERATIONS
An important first step in the crime scene investigation is to evaluate search and sei-
zure issues to determine the necessity of obtaining consent to search or a search warrant.
Consent to search is given by a person who has legal care, custody, and control of the
property or location. If consent to search is obtained, it should be in writing (Birzer and
Roberson, 2008). Most police agencies have a form for consent to search among their writ-
ten forms. Consent searches are a legitimate means of obtaining evidence, but it is always
best to obtain a search warrant. The gold standard, when in doubt, is to obtain a search
warrant. The controlling principles governing search warrants are generally provided by
42 ◾ Michael L. Birzer
the U.S. Constitution’s Fourth Amendment, which is part of the Bill of Rights and guards
against unreasonable searches and seizures (Birzer and Roberson, 2007). The procedure for
obtaining a search warrant involves the presentation of an affidavit to a judge or magistrate
by a law enforcement officer requesting that the magistrate issue the search warrant based
on the probability of criminal activity (Birzer and Roberson, 2008). For a detailed discus-
sion on the laws pertaining to search procedures, the reader is directed to Chapter 20.
SEARCH METHODS
Recall that the purpose of the crime scene search is to discover any and all evidence that
will be useful in determining what actually happened, with the ultimate goal of devel-
oping suspects. Physical evidence is any object that can establish that a crime has been
committed or any object that can link a suspect to a crime or can provide a link between
the victim and a crime. Physical evidence introduced in a trial is in the form of a physical
object, which is intended to prove a fact. Physical evidence can conceivably include all or
part of any object. Suppose, for example, that the victim is stabbed with a hunting knife,
which is later recovered; the hunting knife is physical evidence. Physical evidence can also
include imprints or compressions; this type of evidence may include footwear patterns,
tire tracks, tool marks and scratches, and bite marks. Physical evidence may also be in the
form of trace materials, which may include paints and other deposits, hair and other fibers,
pollens, glass, and polymers. Several types of crime scene search patterns may be used and
will vary depending on the nature of the crime scene and the type of terrain; for example,
the method used to search a crime scene where the victim was murdered inside of a house
will differ significantly from a case where the victim was taken to a rural area and mur-
dered in a field. It is always best to define the limits of the search in very broad terms. The
crime scene search must be thorough and systematic. If an investigator fails to recognize
an item as a piece of evidence or improperly collects the item, that item will not serve any
purpose in the investigation.
STRIP METHOD
The strip method is ideal to use when investigators are covering a large search area looking
for a sizeable object (see Figure 3.1A). The strip method requires that the area be blocked
out in the form of a rectangle. Search team members then proceed at the same pace along
paths parallel to one side of the rectangle. As with all search methods discussed in this
chapter, when evidence is discovered, that person announces the discovery and the search
is halted until the evidence is collected. Prior to collecting the evidence a photograph may
be taken of the discovery, and an investigator who has been assigned to collect the evidence
may be called to collect the evidence. After the evidence is collected, the search is contin-
ued. When the searchers reach the end of the rectangle, they turn around and begin to
walk back along new lanes or paths.
Crime Scene Search ◾ 43
Zone A Zone B
Zone C Zone D
GRID METHOD
The grid method is a modification of the strip method (see Figure 3.1B). A grid search is
simply two parallel searches, offset by 90°, performed one after the other. The grid search
method requires that the area be searched along horizontal and vertical lines of a grid. The
grid search is very thorough as the search is done in opposite directions.
ZONE METHOD
The zone method entails the crime scene being divided into zones or quadrants for indi-
vidual searching (see Figure 3.1C). Depending on the size of the area, zone quadrants may
be cut into another set of zone quadrants. The zone search method is ideal to use in an
indoor crime scene because these scenes typically represent readily definable zones.
SPIRAL METHOD
For the spiral search method, the collection of evidence is carried out in a circular pattern
working toward a fixed point at the center (see Figure 3.1D). One of two methods may
be used when conducting a spiral search: an outward search or an inward search. In the
44 ◾ Michael L. Birzer
outward spiral search, investigators follow each other in the path of a spiral, beginning at
the outside and spiraling in toward the center. In an inward spiral search, investigators
begin in the center of the search area and proceed to circle around in an outward motion.
The spiral method is generally used for special conditions of the search. There is always
the possibility that, when using the inward spiral method, evidence could be destroyed as
investigators walk toward the center to begin the search.
WHEEL METHOD
The wheel method is similar to the spiral method. In the wheel method, the search area
is considered to be essentially circular. The search team gathers at the center of the circle
and proceeds outward along the radii. This search method may have to be repeated sev-
eral times depending on the size of the circle. The wheel search method does have a few
limitations. One limitation is the increase in relative area to be observed as the investiga-
tor departs from the center (O’Hara and O’Hara, 2003). The wheel method is also difficult
when searching larger areas and is usually reserved for smaller crime scenes.
POST-SEARCH SURVEY
At the conclusion of the search, the search leader or scene commander should conduct a
final survey of the search site. The final search survey should include a critical review of
the search. All aspects of the search should be discussed jointly with the search team in
an effort to identify any part of the scene or evidence that might have been overlooked.
All documentation made during the search should be double checked to ensure its accu-
racy and completeness. Moreover, it is also important to verify that all evidence has been
accounted for prior to leaving the scene. All equipment utilized in the search should be
retrieved. A final glance at the crime scene should be taken to make sure that hiding
places or difficult-to-access areas have not been overlooked. Finally, search team mem-
bers should be reminded not to release any particulars about evidence that was collected
to news outlets or other non-authorized persons unless authorized by the crime scene
commander.
BIBLIOGRAPHY
Birzer, M.L. and Roberson, C. (2007). Policing Today and Tomorrow. Upper Saddle River, NJ: Prentice
Hall.
Birzer, M.L. and Roberson, C. (2008). Police Field Operations: Theory Meets Practice. Boston, MA:
Pearson Allyn & Bacon.
DOJ. (2000). Crime Scene Investigation: A Guide for Law Enforcement. Washington, D.C.: U.S.
Department of Justice, Office of Justice Programs (http://www.ncjrs.gov/pdffiles1/nij/178280.
pdf).
O’Hara, C.E. and O’Hara, G.L. (2003). Fundamentals of Criminal Investigation, 7th ed. Springfield,
IL: Charles C Thomas.
Osterburg, J. and Ward, R. (2004). Criminal Investigation, 4th ed. Cincinnati, OH: Anderson
Publishing.
Chapter 4
Report Writing
Gene L. Scaramella
Ellis University
CHAPTER OBJECTIVES
After reading this chapter, you should be able to do the following:
Chapter Outline
• Introduction
• Police Reports
• Supplemental or Investigative Reports
• Field Notes
• Concluding Remarks
47
48 ◾ Gene L. Scaramella
INTRODUCTION
Before proceeding to a discussion inclusive only of police report writing, a few words regard-
ing the importance of effective writing in a general sense seem to be in order. Regardless
of the job one seeks to attain, hiring managers who represent organizations looking for
specific skill sets in job applicants (ranging from positions in general office work to execu-
tive level management in a variety of workplaces) all identify, as one of the top criteria
for successful employment, effective communication skills, both written and oral. As this
chapter focuses on writing, it is the importance of written communication skills that will
be emphasized throughout. Nevertheless, it should be noted that effective oral and other
nonverbal forms of communication such as body language are very important, as well.
One who cannot articulate their thoughts orally or use appropriate body language during
presentations or courtroom testimony will be at a distinct disadvantage.
A relatively recent survey conducted by Stevens (2005) focused on the satisfaction levels
of more than 100 employers in Silicon Valley (the technology center of our country, located
in California) with their newly hired college graduates. Communication skills, particularly
those pertaining to writing, emerged as one of the most significant sources of employer
dissatisfaction. In response to a particular survey question asking employers to rate their
level of satisfaction with new employee writing skills, the mean score on a five-point Likert
scale fell below the minimum 4.0 level of satisfaction (p. 4). Employer responses to a similar,
open-ended question on the survey bore remarkably similar results. Responses included
such concerns as “lack of attention to detail”; “noting typographical errors on résumés and
cover letters”; “seemed reluctant to write”; “they must understand they need to write the
essay rather than bullet-list ideas”; and “our recent hires can’t organize their thoughts on
paper and can’t proofread” (p. 4). Unfortunately, many of those surveyed indicated having
to terminate employees who lacked this fundamental but critical skill we call writing.
Similarly, in a study conducted by the U.S. Department of Labor’s Office of Disability
Employment Policy (ODEP, 2008), more than 400 employers were asked to identify com-
petencies needed by young people attempting to enter the 21st-century workforce. Of the
six core competencies identified, effective writing skills made the list. As stated in their
report, “Sometimes your supervisors may specifically ask you for your opinion or ask you
to express your opinion in writing” (p. 3). Again, this fundamental but critical skill called
writing emerged as a requisite for attaining gainful employment.
POLICE REPORTS
Veteran officer to rookie partner: “What are you doing, writing a novel? Listen kid,
if you can’t fit it on the back of a matchbook it’s too much information.”
Let us hope that the direction given to the new officer by the field training officer high-
lighted above is no longer a significant issue in the field of policing. Once upon a time,
however, being as brief as possible and taking shortcuts on reports were serious prob-
lems in the field. Changes in education requirements for entry and promotion, as well
Report Writing ◾ 49
as increased focus on professionalizing the field, have improved this situation through
the years, but it remains somewhat problematic even today. Moreover, this issue varies
from department to department and is affected by a number of different variables, such
as technology; supervisory likes and dislikes; formal education; effective training, both
basic and in-service; and the ability of the field training officer to instill in young officers
the importance of the written report at the very beginning of their careers. In likewise
fashion, supervisory personnel must advocate for and sustain officers’ commitment to
effective report writing on a continuous basis and at all levels of the agency. The remain-
ing portion of this chapter addresses the various types of reports utilized by law enforce-
ment agencies, such as general incident reports, supplemental investigative reports, field
notes, and the like. Although there may be subtle differences in the format or style of these
reports, it is important to note that there are many more common denominators than
there are differences.
1. The written report serves or functions as a permanent record for incidents reported
to and actions taken by representatives of an agency, either in response to those
reported incidences or actions initiated on their own.
2. The written report supplies, or should supply, the context and details of an inci-
dent via the age-old golden rule of writing (i.e., who, what, when where, why, and
how).
3. The written report serves as a resource for incidents that require additional agency
action, such as a follow-up investigation of a crime reported to patrol officers.
4. The written report serves as an instrument that is relied upon by the various legal
authorities functioning within the criminal justice system, such as judges, pros-
ecutors, defense counsel, and those involved with civil litigation when a matter
reported to or taken by a department’s representative is at issue. Traffic accident
reports are a good example of this sort of civil litigation.
5. The written report provides information for an agency’s strategic operations and
planning, ranging from crime analysis and manpower allocations to budgeting
and tactics for emergency response preparedness.
6. The written report serves as a mechanism for local, state, and national database
systems that provide vital information to law enforcement agencies throughout the
country ranging in purpose from information on fugitives to data used for crime
mapping.
In summary, the Reporting Officer (R/O) was dispatched to the stated location
regarding a radio call of a theft. Upon arriving at the scene, the R/O was met
by the victim, who stated that at approximately 2030 hours on this date, while
he was exiting his detached garage at the rear of his lot, he was confronted by
the male offender described above. The offender told the victim, “Hand over
your watch and wallet if you know what’s good for you.” The victim complied
and the offender then fled on foot E/B through the alley.
Although such a report would certainly contain many more details, including any
actions the officer took, such as sending a flash message of the offender, the point is to
notice the differences in grammar and clarity between the two quotations. It is with
the type of formality and clarity found in the latter writing that all reports should be
written. As my field training officer told me more than 30 years ago, if you get in the
habit of writing good reports from the get go, you’ll have no problems later on (e.g.,
in court, with supervisors, during depositions). In retrospect, that was the best and
most practical advice he ever gave me.
seizure requirements, use of force, and high-speed vehicle pursuits, among others, are all
governed by statutory law, constitutional provisions, and man-made law, also referred to as
case law, which stems from judicial interpretation. Case law is very fluid in nature, always
changing. Any officer who does not keep up to date regarding the ever-evolving court deci-
sions and laws that affect police practice operate at a severe disadvantage. The consequences
of preparing improper or flawed reports are numerous and significant—for example, it could
mean the acquittal of a defendant charged with a very serious criminal offense.
Suppose Officer X was on routine patrol in his marked squad car when he noticed the
driver of the car traveling next to him giving him a “suspicious look.” Officer X then got
behind the vehicle in question, activated his emergency lights, and pulled the car over. The
officer then approached the car and asked the driver for his license, registration, and proof
of insurance. The driver complied, and Officer X returned to his squad car to check the
driver and vehicle for any wants or warrants. The computer check indicated no wants or
warrants. Still believing the driver to be “suspicious,” Officer X then had the driver step out
of his vehicle and he conducted a search of the driver’s person. The driver had no contraband
items on his person. Still trusting his instincts, the officer then began a thorough search of
the inside of the driver’s auto, checking under the front and rear seats, the glove compart-
ment, and under the dashboard. The result was the same—no contraband items were found.
Still going with his instincts, Officer X then opened the trunk of the driver’s vehicle. To his
delight, there in plain view were several handguns and assault rifles and three large plastic
bags containing a white, powdery substance, which he suspected to be cocaine. Officer X
then placed the driver under arrest, seized the contraband, requested a tow for the auto to
be impounded, and transported the arrestee to the station for processing.
Once at the station, and after bragging a bit to some of his fellow officers about his “sixth
sense,” he began the daunting task of preparing the mountain of paperwork necessary for
completing the arrest process. After checking off all of the boxes in the reports he then
found himself having to write the narrative sections. Being the honest and dutiful officer
that he was he wrote that he had initially stopped the arrestee’s vehicle because of the “suspi-
cious look” the arrestee had given him. He then continued describing the ensuing course of
events. When Officer X finally went off duty, he left the station feeling as proud as a peacock
for the fine job he had done. When Officer X reported for duty the next day, however, his
mood was to change drastically. There was a message waiting for him requesting that he call
the prosecutor’s office. Officer X then placed the call and was connected to the prosecutor
handling his case. Expecting to be congratulated on a job well done, the officer was shocked
as the prosecutor began chastising him for his “shoddy police work.” The prosecutor also
informed him that, because the initial stop of the vehicle was not based on any lawful justi-
fication, the charges were being dropped and the arrestee was being released. The officer was
also informed that his actions would more than likely expose his agency to civil litigation.
Officer X was furious and immediately began telling anyone at the station who would
listen to him how bad the prosecutor’s office was and that it was no wonder there is so
much crime when prosecutors don’t want to do their jobs. At the same time, the prosecu-
tor who had spoken to Officer X was telling other prosecutors in his office what a terrible
job Officer X had done, exclaiming that if only officers would do their jobs correctly they
would be able to put more offenders in jail. This scenario is carried out over and over again
in jurisdictions all across the country. (See “Criminal Incident Report” in the Appendix for
a good example of a well-written general offense or incident report.)
With regard to this type of rift between the police and prosecutors, Jacoby et al. (1999)
discussed several points of contention from both sides of the fence; more importantly, they
offered many sound recommendations for mitigating these issues to ultimately improve
the overall quality of police reports. Following are typical comments made by police offi-
cers and prosecutors that Jacoby et al. (1999, p. 17) identified:
Regardless of how frequently these police–prosecutor issues arise, the bottom line is the
whole focus of this chapter—the absolute necessity of writing good police reports. Jacoby
et al. (1999) offered some sound recommendations for improving this situation, the most
notable of which include the following:
In conclusion of this section, it should be noted that many jurisdictions already have
policies and procedures in place that directly involve input from the prosecutor’s office
before charges can proceed. For example, the Cook County, Illinois, State’s Attorney’s
Office has a felony review unit. Officers wishing to charge arrestees with crimes classified
as felonies are required to call the felony review unit and describe the details of the case
to a prosecutor. Based on the facts of the case as described by the officer, the felony review
unit will either approve or deny the charge. Additionally, most prosecutors’ offices provide
the law enforcement agencies in their respective jurisdictions with examples or templates
of how the various criminal complaints used during the arrest process should be worded.
Although these safeguards and the technical assistance provided by prosecutors help
mitigate certain legal issues, they do not ensure that police reports are written well. That
responsibility must be shouldered by many, including police academy training personnel via
inclusion of appropriate curricular activities, in-service training required of officers by their
respective agencies, a commitment from the supervisory ranks of these agencies to carefully
review reports before giving approval, and a desire on the part of individual officers to write
effective reports. Absent these efforts, the problems cited above will likely continue.
With respect to the vast majority of police departments in this country, when a vacancy
in the detective division, for example, occurs, departmental notices are sent asking offi-
cers who are qualified (e.g., have minimum number of years on the job, meet educational
requirements) to submit their requests for consideration. It is important to keep in mind
that crime reports turned in by patrol officers are routed to the detective division for fol-
low-up investigation. Normally, the unit commanders or designated supervisory personnel
read these reports and assign them to individual detectives for follow-up. By and large, this
is how new officers become known or establish their reputations in this regard.
As an example, when called to a burglary at a residence and after recording the neces-
sary information for the report, the officer should inform the victim and other occupants
of the residence to avoid disturbing the areas surrounding the forced entry or any other
areas or items in the house that may have been touched by the offender. The officer should
then summon the crime scene investigation unit to the scene for processing. A dutiful
officer will then conduct a neighborhood canvas, which involves attempting to contact
residents of other homes or employees of businesses that are in close proximity to the
residence to ascertain if they saw or heard anything unusual during the time in question.
That also means documenting the names, addresses, and contact information of indi-
viduals at those locations. If nobody was at home during the time of inquiry, that should
be noted as well. This demonstrates to detective division personnel that the officer did a
thorough job and provided sufficient detail in the report to assist with and enhance the
follow-up investigation. If officers conduct their business in this way on a consistent basis,
this will have a very serious and positive impact on decisions to assign or not assign them
to vacancies.
weakest link in opposing counsels’ cases. In both of these legal venues, sadly, the weakest
links are oftentimes poorly written police reports. Police officers always talk about cover-
ing their behinds, commonly referred to as “CYA.” The best way to accomplish this goal is
by writing effective and detailed reports. Stressing the importance of this in the context of
potential civil liability, Scarry (2008) offered many sound recommendations, such as:
• Document any and all injuries during an arrest or similar encounter incurred by
either the officer or arrestee, regardless of how minor the injury may have been. As
mentioned earlier, if any pertinent details are omitted from the report and raised
later, the veracity of the officer will be called into question.
• Document all statements made by offenders, victims, and witnesses. For the same
reason cited above, if it’s not documented in the report but brought up later, doubts
may very well be formed by the trier of facts, either the judge or members of a jury.
• Officers must document in detailed fashion why they took the actions they did,
particularly surrounding incidents involving the use of force. Officers must lay out
the events that led to a physical altercation and describe the circumstances regard-
ing their reasons for using force.
the offender. If the victim or a witness got a good look at the offender and Detective Tracy
eventually ends up developing a solid lead on the offender, a photo or in-person line-up
may be in order.
Let’s now assume that the victim and a witness have made a positive identification after
viewing a photo line-up. Detective Tracey then goes out and locates said suspect, takes him
into custody, and brings him to the station for interrogation. He then informs the suspect
of his rights under Miranda. The suspect waives said rights and agrees to be questioned
without an attorney present. Tracey begins questioning the suspect and eventually con-
fronts him with the fact that he has been identified in a photo line-up as being the offender.
After hearing this information, the suspect then confesses to the crime and agrees to pro-
vide a written statement.
Although the circumstances described above may seem straightforward and not overly
complicated, let’s examine all of the information that must be contained in Tracey’s sup-
plemental report:
1. Tracey must note the dates and times he made contact with the victim and witness
and what information they relayed to him regarding the robbery.
2. Tracey must also note the dates and times the victim and witness came to the police
station to view the photo line-up. The photos used in the line-up must be incorpo-
rated into the file and must be consistent with relevant case law and department
directives regarding how many photos are to be used and how they are presented
to the victim or witness. Also, the photos of the subjects must be similar in nature
(e.g., same race, age range, height, weight).
3. Detective Tracey must then document the time, date, and location where the sus-
pect was placed under arrest and whether or not the suspect resisted arrest or
attempted to flee or was taken into custody without incident. Any corresponding
action taken by Tracey must then be documented as well.
4. Upon arriving at the station with the suspect but before the questioning begins,
Tracey must document the fact that the suspect was advised of his rights under
Miranda and that the suspect understood those rights. It is highly recommended
that the suspect’s acknowledgment of receiving his rights be done in writ-
ing and with a witness present. Most agencies have standardized forms for this
procedure.
5. Because the suspect in this case waived his rights to have an attorney present and
agreed to be questioned, Tracey must also document that waiver, again in writ-
ing and in the presence of a witness. The ensuing questioning should or could
be documented in a number of ways (Wallace and Roberson, 2009). The ques-
tions and answers could be documented by Tracey or another detective taking
handwritten notes of the responses and later included in their report. Other,
more recent methods of documenting information obtained through question-
ing include audiotaping or videotaping the interrogation, particularly when the
crime is of a serious and violent nature, such as an armed robbery, sexual assault,
or murder. More and more law enforcement agencies are beginning to adopt
Report Writing ◾ 57
As you can see, what initially seemed like a relatively easy case to prepare actually
required a significant amount of careful planning and documentation. Not only must
Tracey’s report be written well in terms of clarity and the proper use of grammar and cor-
rect spelling, but it must also contain sufficient detail and documentation regarding the
steps taken by Tracey to conform to a variety of legal requirements, as well as pertinent
departmental policies and regulations. Absent this type of detail and careful preparation,
the report will more than likely open up several possible lines of attack by defense counsel.
(See the Appendix for an example of a supplemental report.) Hess et al. (2010, p. 90) aptly
stated that, “The effective report writer attends to both content and form because they are
equally important. A well-written report helps the criminal justice system operate more
effectively and efficiently, saves the department time and expense, reduces liability for the
department and the officer, and reflects positively on the investigator who wrote it.”
Examples of other types of supplemental reports include evidence inventory reports,
evidence technician reports, and forensic laboratory request and results reports, among
many others. They may vary in form and the information contained therein, but all require
the same level of detail and adherence to the basic mechanics of writing as any other report.
Reports such as these become part of a permanent case file and are subject to discovery for
trial purposes; thus, the factual information contained in them must be consistent. Such
information includes dates; times; locations; identities of victims, witnesses, and offenders;
and any actions taken by various other personnel involved with the case. In addition, any
action taken by police personnel must always be laid out to demonstrate conformity with
the law and department policies. Let’s examine a few examples of these reports.
incorporated into their reports. Although the list of things that evidence technicians must
do is a mighty long one, some of the most important points of information to be gathered
are as follows:
• They must record the date and time of arrival, who summoned them, who was on
the scene at the time of their arrival, any witnesses to the crime, and whether or not
the scene was possibly contaminated by first responders (police and/or paramed-
ics), the victim’s friends, or co-habitants. They must determine if the scene was pro-
tected before their arrival and, if so, record the name of the officer who protected
the scene and the names of anyone entering the scene prior to their arrival. In other
words, they must record all pertinent information relative to the crime scene prior
to their arrival and the scene being turned over to their exclusive control.
• As they begin processing the scene, they must carefully note their actions and
note, for example, the areas and objects they may have examined for fingerprints
or the presence of blood, the procedures used for collecting any potential evidence,
the proper identification of each piece of evidence collected, at what time the evi-
dence was transported to the crime laboratory or evidence storage facility and by
whom, and the nature of any requested laboratory tests.
• Technicians must also make detailed sketches of the crime scene that are drawn
to scale, using appropriate measurements and devices. Detailed photographs of
the scene and the evidence collected must be taken and logged. Some agencies go
a step further and require a videotaping of the scene in addition to the still photo-
graphs to provide viewers with a more broad and thorough perspective.
• Anytime any piece of evidence originally collected from the scene is subsequently
moved for any reason, the chain-of-custody log becomes a crucial, legal document.
The chain-of-custody log documents any and all movement of evidence, along
with the purpose of said movement and to whom the evidence was turned over.
This log must be carefully maintained from the time the evidence was collected up
to the point at which it is brought to court at the request of either prosecutors or
defense counsel. It should be noted that claims of an improper custody chain are
often made by defense counsel when all due diligence is not taken by the preparers
of those reports.
Thus, as was the case with the more general supplemental report, what initially may seem
like a straightforward task instead involves a tremendous amount of detail, careful plan-
ning, and coordination. (See “Crime Scene/Evidence Technician Report” in the Appendix
for an example of a crime scene technician’s supplemental report.)
information regarding the number of vehicles or pedestrians involved; the identities of the
drivers and passengers; the positions in the vehicles of any passengers; identification of the
vehicles involved (e.g., license plate numbers; year, make, and model of the vehicles; vehicle
identification numbers); the directions of travel of each vehicle prior to impact; the areas
of damage to the vehicles; possible intoxication or other vehicle code violations on the part
of the drivers and action taken, if any; a basic sketch that indicates the names of the streets
and direction of travel of each vehicle prior to collision, the point of collision, and the point
at which the vehicles came to rest; and a narrative section describing the information con-
tained in the sketch.
The completion of these reports can be fairly routine, but if serious injuries or deaths
result from the accident then chances are more than good that either a criminal prosecution
or civil litigation will follow. Thus, most departments have certified, specially trained traffic
accident investigators, commonly referred to as traffic accident reconstructionists, who will
conduct a more thorough and scientific investigation regarding the details of the accident.
Their reports are not unlike the ones completed by crime scene technicians with respect to
the detail and planning involved. These reports, along with the courtroom testimony of the
officers who prepared them, will be the center of attention regarding any subsequent crimi-
nal or civil actions taken. Moreover, the attention to detail in these reports and knowledge
of the law surrounding their specialty play pivotal roles in the outcome of any litigation. (See
the Appendix for reference to a detailed traffic accident report template.)
These reports are not just thrown in a file cabinet and forgotten about. With today’s
technology, most departments enter these reports into databases which makes retrieval
of any such reports on a certain date, time, or a proximate location an easy process. The
person encountered by Officers Friendly and Crusty may have committed a serious crime
minutes before being spotted by the officers. Detectives place great importance on these
reports, and many offenders have been identified and arrested for crimes ranging from
sexual assault, robbery, and burglary all the way to murder as a result of the information
contained in those reports. These reports also serve as potentially valuable leads for inves-
tigators working on “cold cases.” (See “Field Contact/Interview Report” in the Appendix
for an example of a field contact card or report.)
FIELD NOTES
Before proceeding to the concluding remarks section of this chapter, a few words regarding
the use of field notes are in order. Simply defined, field notes are nothing more than notes
written in small notebooks carried by officers to record information that is later incorpo-
rated into a formal report. Most police officers carry such notebooks in their pockets so
they can jot down an array of information, such as names and contact information for
victims, witnesses, and offenders; locations and times; vehicle identification information;
comments made by victims, witnesses, and offenders; and numerous other details neces-
sary for completion of an official report.
The issue involved in using these is whether or not to include field notes as a permanent
part of a case file. This matter is determined by department policy; some agencies do so,
some do not. If the policy is not to maintain field notes, this is not an issue; however, in
those agencies that do require this officers are well advised to use their notebooks for offi-
cial purposes only. It would prove very embarrassing for an officer to be asked by defense
counsel in open court why he has notations for grocery items to pick up on his way home
from work. Moreover, as insignificant as this may appear, good defense attorneys can raise
much doubt in the minds of the judge and jury members regarding the officer’s level of
professionalism and lack of adherence to department policy. The moral of the story is that
if a law enforcement agency requires, by department policy, that officers’ field notes are to
become part of the permanent file, then officers must get used to using field notes only for
official business and not personal matters.
Report Writing ◾ 61
CONCLUDING REMARKS
It is hoped that the information contained in this chapter has demonstrated the critical role
that report writing plays in the law enforcement profession and the broader criminal jus-
tice system. Reports serve several functions, perhaps the most important of which is to aid
our legal system in the prosecution of persons charged with criminal offenses. As stressed
throughout the chapter, a poorly prepared police report may very well result in defendants
literally getting away with murder or other serious crimes. In addition, several of the more
common types of reports were discussed in detail. Although all reports may differ slightly
in style and purpose, these and numerous other kinds of reports not identified here all
share many more commonalities than differences. Finally, several vital and fundamental
recommendations for writing effective reports were directed at both individual police offi-
cers and their respective agencies. Let’s conclude by revisiting those recommendations.
2. It is critical for report writing to be at the top of the list when field training officers
are assessing the performance of rookie officers. Field training officers should be
encouraged to consistently reinforce to their rookies just how important effective
report writing is, for all of the reasons highlighted throughout this chapter.
3. Department administrators must provide for periodic in-service training oppor-
tunities for all agency members in reference to effective report writing.
In the final analysis, the police officer’s pen is indeed mightier than the proverbial sword!
BIBLIOGRAPHY
Anon. (2010). 9 Tips for Rookie Success. Police Link, 258, July 1 (http://policelink.monster.com/
benefits/articles/142427-9-tips-for-rookie-success?page=10).
Baker, B. (2006). Becoming a Police Officer: An Insider’s Guide to a Career in Law Enforcement.
Bloomington, IN: iUniverse (http://www.careerpoliceofficer.com/).
Hess, K., Bennett, W., and Orthmann, C. (2010). Criminal Investigation, 9th ed. Florence, KY:
Cengage Learning.
Iowa DOT. (2011). Iowa Accident Report Form. Ames: Iowa Department of Transportation (http://
www.iowadot.gov/mvd/ods/accidents.htm).
Jacoby, J., Gilchrist III, P., and Ratledge, E. (1999). Prosecutor’s Guide to Police–Prosecutor Relations.
Washington, D.C.: Jefferson Institute for Justice Studies (http://www.jijs.org/publications/pros-
pubs/Police-Pros.pdf).
Jetmore, L. (2008). Investigations: Investigative Report Writing. Law Officer, January 31 (http://www.
lawofficer.com/article/magazine-feature/investigative-report-writing).
Miranda v. Arizona, 384 U.S. 436 (1966).
ODEP. (2008). Essential Skills to Getting a Job: What Young People with Disabilities Need to Know—
Work Ethic, Communication, and Problem Solving. Washington, D.C.: Office of Disability
Employment Policy, U.S. Department of Labor (http://www.dol.gov/odep/documents/essen-
tial_job_skills.pdf).
Report Writing ◾ 63
Scarry, L. (2008). Report Writing: What You Fail to Report Could Have Negative Consequences in
Civil Litigation. Law Officer, January 30 (http://www.lawofficer.com/article/magazine-feature/
report-writing).
Stevens, B. (2005). What Communication Skills Do Employers Want? Silicon Valley Recruiters
Respond. Journal of Employment Counseling, March 1 (http://www.allbusiness.com/sector-56-
administrative-support/administrative/1189004-1.html).
Terry v. Ohio, 392 U.S. 1 (1968).
Wallace, H. and Roberson, C. (2009). Written and Interpersonal Communication Methods for Law
Enforcement, 4th ed. Upper Saddle River, NJ: Pearson Education.
APPENDIX
SUPPLEMENTAL REPORT
Crime/Incident Date/Time of Original Report Case Number
7 Aug 2007 to 10 Aug 2007, 1700 to 1400 hrs 12 Aug 07, 1800 hrs
Narrative
After a thorough inventory of his home, Mr. Jones discovered that the following additional
items were taken in the burglary:
One (1) television; Sony; 12 inch; serial number unknown; value: $50.00
Two (2) pillow cases; pink in color (taken from second floor rear guest bedroom);
value: $20.00
Total additional value: $70.00
Mr. Jones further reports that one of his neighbors had observed two men loitering in the
block during the time frame of this incident. I responded to the neighbor’s residence where
I spoke with the following witness:
Mr. Castle reports he observed two white males placing items into a dark colored, late-
model SUV which was parked in front of the victim’s residence. Mr. Castle states he earlier
noticed the men when they were sitting inside the vehicle for an extended period of time.
Later, he noticed the men standing beside the vehicle looking around as if they were wait-
ing or looking for someone. His last observation occurred when he saw the men placing
two (2) bags inside the vehicle.
I asked Mr. Castle if he remembered the color of the bags? Mr. Castle paused for a
moment and then stated, “You know, they looked like they were pink.” Asked if he could
describe the size and shape of the bags and the type, Mr. Castle responded, “Just bags …
some kind of cloth bags.” Mr. Castle’s description of the bags he observed is consistent with
the two pink pillow cases reported taken in this report.
Mr. Castle’s observations occurred between 1200 and 1300 hrs on 8 Aug 2007.
Mr. Caste provided the following suspect descriptions:
Suspect #1: M-W-20 to 25; 5-10 to 6-00; thin build; 130 to 150 lbs; medium length red
hair; freckles on face and arms; white tee shirt; blue jeans with holes in both knees;
white tennis shoes; NFD
Suspect #2: M-W-20 to 25; 5-08 to 5-10; stocky build; 180 to 190 lbs; short dark hair;
dark sun tan; large tattoo on right forearm; green t-shirt; blue jeans; dark color
shoes; NFD
Vehicle: Dark colored late model SUV with Maryland registration possibly contain-
ing the letters: B and F; NFD
CHAPTER OBJECTIVES
After reading this chapter, you should be able to do the following:
Chapter Outline
• Introduction
• Interviewing Individuals
• Interrogating Suspects
• Key Principles of Interview and Interrogation
• Conclusion
INTRODUCTION
The process of interviewing persons and interrogating suspects has received an enormous
amount of attention from scholars and practitioners over the past several decades. Both the
interview and the interrogation consist of a sometimes deeply personal interactions between
law enforcement personnel and members of the community. And, as is generally the case
with social science topics involving human behavior, we have yet to see that substantial
breakthrough where all questions are answered and the mysteries of effective interview and
interrogation are laid to rest. In fact, in spite of technology and other modern advances,
67
68 ◾ Scott M. Mire and Robert D. Hanser
American law enforcement elicits a confession from a suspect only 45 to 60% of the time.
In other words, for all practical purposes, we are still not much better than chance in being
able to solicit a confession from a suspect as a result of interview and interrogation tactics.
This chapter is aimed at exploring some of the most important aspects of successfully
conducting interviews and interrogations. The primary objective is to explore some of the
most basic factors widely believed to have a direct impact on whether a suspect will confess.
Before going any further, however, it is important to clearly illuminate the population we
are most interested in. Some suspects who are selected for interrogation will never confess.
Consider the example of a suspect involved in narcotics trafficking who had been previously
arrested on several occasions: “I wasn’t going to tell them anything. It wouldn’t have mat-
tered what they said. I had been through that before and found out the hard way that I was
better off keeping my mouth shut. I was prepared to sit in jail for as long as I had to and just
do my time. And what was funny was that when they realized that I wasn’t going to give
them any information they got angry and began threatening me. One said he would be sure
that I spent the rest of my life in jail. It was kind of funny coming from the same detective
that had just lectured me on the importance of telling the truth and being honest.”
On the opposite end of this spectrum are those who are going to confess regardless of
the tactics employed by investigators. For these individuals, the reasons for confessing are
usually very personal and tied to extreme shame that produces profound psychological and
emotional suffering. For those individuals in this group, the confession serves as a cleansing
of emotion, substantially reducing their suffering and ultimately resulting in their life being
much more tolerable. The confession is much more about them reducing their own levels of
stress than it is about individual investigators or their method of interrogation.
Between these two extremes is a group of individuals who may confess depending on
the circumstances. And, unlike the other two groups, the tactics employed by investiga-
tors are crucial when dealing with this group of suspects. These individuals, and especially
those who have had limited contact with the police in the past, are often overwhelmed with
trepidation. Often, and especially for those individuals who are guilty, their biggest con-
cern is what is going to happen to them. The interview and interrogation process is aimed
precisely at these individuals, and it is critical that the process be carried out in a manner
that is most likely to solicit a confession, as opposed to shutting them off, a state whereby
no useful information is provided.
INTERVIEWING INDIVIDUALS
It is important to understand that, although the terms are often used interchangeably, an
interview is different from an interrogation. Generally, interviews should precede the inter-
rogation phase; they involve gathering baseline data from a person potentially associated
with a criminal event. During the interview, investigators have two primary objectives:
The importance of getting to know the individual during the interview cannot be over-
emphasized. A practical example unique to each reader may help to illuminate this point.
Think back to some point in your past or even recently when you determined that a person
(usually a good friend) was a terrible liar. Every time this person tried to fudge the truth,
you could always tell. In fact, you would know immediately that this person was beginning
to stretch the truth, and you were so accurate in your observations that after a while the
person no longer even resisted your objections. This is when people who have been effec-
tively challenged on their quest to stretch the truth are often heard to say, “Okay, it was
really 2, not 5.” Or, “Well, yeah, you’re right. It wasn’t quite that big, but you know what
I mean.” Some clue, either verbal or behavioral, has alerted the listener to the likelihood
that a false statement or a stretching of the truth is about to follow. The point here is that
this clue is identifiable on a consistent basis, sometimes with 100% accuracy. The reason
for this is because a listener who has become so accustomed to a speaker’s mannerisms is
immediately able to detect deviations from normal and becomes suspicious. In essence,
the listener knows the speaker very well. Over time, more and more variations on telling
a lie become apparent. This same phenomenon is also often the case for children and their
parents. Parents are often so in tune with their children that they are usually able to detect
immediately when their child is telling a lie.
How do these examples tie into our discussion? Ultimately, they represent one extreme
of the interview process. In other words, detectives rarely know the people they interview
so well that they are able to detect deception so readily and with such accuracy. In fact,
it is more often the case that detectives either do not know the interviewee at all or the
extent of the relationship is very limited; therefore, the interview is best thought of as the
process through which investigators get to know the interviewee as well as possible. Based
on this logic, the chances of investigators accurately predicting the truthfulness of inter-
viewees are directly related to the amount of interaction they have with the interviewees
(see Figure 5.1). Using an analogy related to scientific research, the amount of interaction
would be synonymous with the size of the sample. Generally, the larger the sample, the
10
Likelihood of successful interview
1 10
Degree to which the investigator knows the interviewee
greater the chances of reaching valid and reliable results. The ultimate goal of the interview
is for investigators to get to know the interviewee as well as possible so they can establish
a baseline of truthfulness based on the mannerisms and characteristics of the interviewee
while responding to direct questions.
One example of an interview process that has been well documented is the Behavioral
Analysis Interview (BAI) (Blair, 1999). The BAI provides a strategic and methodological
approach to assessing the likelihood of whether the interviewee may be involved in the
incident being investigated. As noted by Horvath et al. (2008), the BAI is not intended to
detect specific acts of deception but rather to be used as a tool to provide directions and
guidance for evaluating the totality of the interview and whether it is likely that someone
is being deceptive.
Generally, the BAI consists of three parts. Initially, background information is col-
lected that serves as the initial process of getting to know the interviewee. As pointed
out earlier, this is a critical part of the interview. We suggest that as much time as pos-
sible be allocated for gathering background information. In this phase of the interview,
investigators may ask questions relating to where the interviewee lives, the interviewee’s
relatives, etc. Investigators may ask questions about favorite sports teams and players as
well as the interviewee’s favorite movies and genres of music. In essence, the investigator
is attempting to create a connection with the interviewee or, in other words, a good rap-
port that will serve as the foundation for later questions that may be more uncomfortable
and intrusive.
The second part of the BAI usually consists of investigative questions. These types of
questions generally attempt to ascertain whether an interviewee could have committed the
crime in question. In other words, they try to determine the actions of the interviewee dur-
ing the estimated time frame of the alleged commissioning of some criminal act. Although
it is not very common, it is possible to completely eliminate an interviewee from further
suspicion during the phase of investigative questions. An example could include an inter-
viewee establishing an air-tight alibi for where they were during the commission of the
crime in question. In most circumstances, however, interviewees are further questioned
about their opportunity, access, motivation, and propensity to commit a crime (Horvath
et al., 2008).
The third phase of the BAI includes questions related to behavior that are meant to draw
out differences in verbal and nonverbal behavior from both innocent and guilty intervie-
wees. As an example, interviewees may be asked what they understand the purpose of the
interview to be and how they feel about being interviewed about some specific incident
(Horvath et al., 1994, 2008; Inbau et al., 1986, 2001).
What is critical to understand and remember with regard to the interview is that any
result should be a reflection of the totality of the interview and not one single phase of
the interview or a single response to a particular question within a phase. Horvath et al.
(2008) provided five specific guidelines that should always be considered when attempting
to interpret the messages and behaviors observed during the BAI:
Interview and Interrogation ◾ 71
1. Evaluate any deviations from the suspect’s normal behavior. There are no unique
behavioral indicators that are consistently associated with innocence or guilt.
It is the suspect’s deviation from his or her normal behavior that is significant.
Such normal behavior is especially reflected in responses to questions regard-
ing personal history, which are generally less emotionally provocative for both
guilty and innocent persons. For the innocent person, items in the investiga-
tive and behavior-provoking categories are less provocative than they are for a
guilty person. Therefore, it is the consistency within and between categories that
is important.
2. Evaluate the nonverbal behaviors as they occur in response to a particular ques-
tion and be attentive to repetition of these behaviors—that is, their consistency
across questions.
3. Evaluate verbal and nonverbal behaviors in conjunction with each other. Look for
discrepancies between the two channels.
4. Consider underlying factors that could affect the validity of behavior analysis.
Examples of these include the seriousness of the offense, what the suspect was told
about the offense, the suspect’s emotional stability, and the suspect’s cultural and
social environment.
5. Consider the suspect’s behavior in conjunction with factual analysis. When there
is a discrepancy between known facts and a suspect’s behavioral indicators, the
interviewer must be cautious in rendering a definite opinion of the suspect’s
involvement.
INTERROGATING SUSPECTS
Before reading about the general features of an interrogation, remember that the interview
is meant to identify possible suspects who may have engaged in some criminal activity. The
interview is generally a nonconfrontational process where investigators obtain important
information and also identify baseline reactions demonstrated by interviewees. When an
interviewee has been determined to be a possible suspect, the next phase of questioning
is carried out in the form of an interrogation. In addition, we would like to caution read-
ers that the literature is far from being in agreement on the best methods for soliciting
a confession from a suspect. In Europe, for example, a growing body of literature sug-
gests that suspects are more likely to confess when engaged with a style characterized by
less confrontation and more sensitivity (Hakkanen et al., 2008). In the United States, this
view is much less prevalent, as the general assumption is that suspects are motivated to lie
and should be interrogated as such. As a result, two significant distinctions can be made
between the interview and interrogation:
1. Purpose
2. Tactics
72 ◾ Scott M. Mire and Robert D. Hanser
Interview: John, do you have any idea of what happened to Mr. Citizen?
Interrogation: John, we know you were involved in the death of Mr. Citizen.
Interview: John, do you know why someone might have wanted to injure Mr.
Citizen?
Interrogation: John, either you killed Mr. Citizen yourself or you helped someone
kill Mr. Citizen because you wanted his money.
Numerous publications and training manuals can be found on how to interrogate sus-
pects in ways that are most likely to elicit a confession (Aubry and Caputo, 1980; Gordon
and Fleisher, 2002; Holmes, 2003; Walkley, 1987; Walters, 1996). The one manual, however,
that is still most widely used was developed by Inbau et al. (2001). Originally developed
in the 1960s, the manual is now in its fourth edition and describes the Reid technique for
conducting interrogations. The Reid technique is based on numerous observations of the
administering of the polygraph exam and the responses and reactions of those individuals
found to be deceptive.
To begin, the Reid technique calls for a particular setting in which the interrogation
should take place; for example, the room should be relatively small and should be located in
the police station. Further, the setting should be soundproof to limit distractions and mini-
mally furnished. The psychology behind such a setting is to attempt to raise anxiety levels
within a suspect by creating unfamiliar surroundings and enhancing the idea of isolation.
In some cases, the greater the feelings of anxiety and isolation, the greater the likelihood of a
confession (Inbau et al., 2001). Once the correct setting has been has been achieved, the Reid
technique consists of nine steps aimed at driving a suspect toward confession:
8. Bringing the suspect into the conversation—In this phase of the interrogation, the
suspect has usually given some indication as to which alternative is most accu-
rate. For all practical purposes, the confession has begun and the goal is to allow
the suspect to provide as much information as possible. In some cases, additional
investigators may be brought in, and suspects once again rely on the most socially
acceptable rationale for the commission of their crime. The result is that the sus-
pect confesses to now another person.
9. Confession—The final stage of the interrogation is simply ensuring that the confes-
sion will be admitted in a trial. The voluntariness of the confession will be cap-
tured, and usually suspects will be asked to provide their confession in writing.
A PRACTICAL EXAMPLE
On September 1, 2003, Detective Victor Lauria of the Novi Police Department in Detroit,
Michigan, used his training in the Reid technique to interrogate Nikole Michelle Frederick
(Layton, 2010). Frederick’s 2-year-old stepdaughter, Ann Marie, was brought to the emer-
gency room near death, with obvious signs of extensive child abuse. Frederick was her
primary caretaker and was watching Ann Marie in the time before the trip to the hospital.
The interrogation took place over 2 days, with Frederick being charged with the crime
immediately following the first sit-down. Lauria began with a simple interview, just talking
in a non-threatening way to establish Frederick’s baseline reactions:
Because Frederick appeared to be making excuses for Ann Marie’s injuries and setting
up a justification—“She was a very hard baby”—and because she was taking care of Ann
Marie when the injuries occurred, Lauria predicted guilt and began interrogating her. He
proceeded to subtle confrontation, letting Frederick know how she would be caught:
Lauria: There’s a whole line of study in police work that can determine how injuries
occur and how old the injuries are.
Frederick: … I don’t even think we’ll find out exactly what happened because the only
one that really knows is her and it’s gonna be awfully hard trying to get her to say
if anything happened, you know. I’m not trying to be rude or anything, I was just
wondering how long this is going to take.
Interview and Interrogation ◾ 75
Lauria: Well, like I said, one of the things we’re able to do with those [bruises] is we
can date bruises based upon, you know, whether they’re new bruises just coming
in, or whether they’re bruises that are already starting to heal because, you know,
doctors and forensic scientists and pathologists study those type of things.
Frederick: Okay.
Lauria: Can you think of any reason why they would determine that those bruises
were caused in the last 24 hours and that somebody would suspect that you did
this?
Frederick: Um, other than that I was there, no.
…
Lauria: Do you suspect anybody of doing this?
Frederick: No, I don’t. And that’s what I’m saying, and I, I’m having a hard time believ-
ing that it was inflicted on her because, like I said, we would have heard something,
too, you know.
Lauria: Out of all the people in the house that were there or came in last night, list all
the people that you would vouch for that you would say absolutely would not do
something to hurt Ann Marie.
Frederick: I know John wouldn’t do it. I honestly don’t think Brian would do it.
Lauria: Who’d vouch for you?
Frederick: Um, probably John. But, see, like, I don’t, I don’t necessarily, uh, believe
what the doctor’s saying and how they were inflicted, whatever.
Over two days of questioning Frederick never asked how Ann Marie was doing.
Near the end of the interview I pointed this out to her. She tried to convince me
that she had asked several times about Ann Marie’s injuries. She then asked me for
an update in her condition. I told her that Ann Marie was brain dead and that she
was probably not going to survive. Frederick stated, “Oh, my God. I’m gonna go for
murder.” I then spent another 45 minutes with various themes in an attempt to get
76 ◾ Scott M. Mire and Robert D. Hanser
Ann Marie died of her injuries, and Nikole Michelle Frederick stood trial for first degree
felony murder. She was found guilty and sentenced to life in prison without the possibility
of parole.
CONCLUSION
The process of conducting successful interviews and interrogations is often difficult. A lot
of the variability is directly associated with the individual being questioned. Some will give
information willingly, and some will offer no information; for others, the methods used
in soliciting the information are critical and ultimately decide whether they will disclose
sensitive details. It is important to understand the difference between an interview and
interrogation. When conducting interviews, the questions are usually aimed at obtain-
ing general information in order to ascertain whether the person should be considered
a suspect in some criminal event. When a person is deemed a suspect, the questioning
shifts to the form of an interrogation. The most significant difference between an interview
and interrogation is that an interrogation usually consists of intentional and deliberate
78 ◾ Scott M. Mire and Robert D. Hanser
confrontation. The suspect is told that he is believed to be responsible for the commission
of a criminal act. The ultimate goal in the interview and interrogation process is obtaining
a confession from an individual admitting that he or she did in fact commit the criminal
act or was involved in the commission of a criminal act. In the U.S. court system, a con-
fession is powerful evidence. In fact, without a confession many prosecutors will not file
charges unless there is an abundance of physical or circumstantial evidence. As a result, a
great deal of importance is attached to the process of obtaining a confession. Investigators
often have a great deal of pressure on them to figure out how to effectively obtain a confes-
sion from a criminal who has a lot to lose by confessing. It is a difficult process that must
be carefully managed.
Prior to conducting interviews and especially interrogations, investigators should take
the necessary time to obtain as much background information as possible regarding the
individual to be questioned. A thorough background investigation helps investigators plan
for the interview and interrogation. It also allows investigators to develop themes that iden-
tify the precise questions that need to be answered. Investigators should follow the facts
when questioning suspects and allow them the time to answer questions without interrup-
tion. Finally, investigators must remain professional throughout the duration of the inter-
view and interrogation. Professionalism is among the most salient tools an investigator has,
not only to get a confession but also to ensure that the confession is admissible in court.
BIBLIOGRAPHY
Aubry, A.S. and Caputo, R.R. (1980). Criminal Interrogation, 3rd ed. Springfield, IL: Charles C
Thomas.
Baldwin, J. (1992). Video Taping Police Interviews with Suspects: An Evaluation, Police Research Series
Paper 1. London: Home Office.
Blair, J.P. (1999). Detecting Deception: The Effects of the Reid Behavioral Analysis Interview Training,
unpublished master’s thesis. Macomb: Western Illinois University.
Bull, R. (1999). Police Investigative Interviewing. In Memon, A. and Bull, R., Eds., Handbook of the
Psychology of Interviewing (pp. 279–292). Chichester: Wiley.
Cherryman, J. and Bull, R. (2000). Reflections on Investigative Interviewing. In Leishman, F., Loveday,
B., and Savage, S., Eds., Core Issues in Policing, 2nd ed. (pp. 147–159). London: Longman.
Gordon, N. and Fleisher, W. (2002). Effective Interview and Interrogation Techniques. San Diego, CA:
Academic Press.
Interview and Interrogation ◾ 79
Hakkanen, H., Ask, K., Kebbell, M., Alison, L., and Granhag, P.A. (2008). Police Officers’ Views
of Effective Interview Tactics with Suspects: The Effects of Weight of Case Evidence and
Discomfort with Ambiguity. Applied Cognitive Psychology, 23:468–481.
Holmberg, U. (2004). Police Interview with Victims and Suspects of Violent and Sexual Crimes,
Interviewees’ Experiences and Interview Outcomes, unpublished Ph.D. thesis. Stockholm
University.
Holmes, W. (2003). Criminal Interrogation: A Modern Format for Interrogating Criminal Suspects
Based on the Intellectual Approach. Springfield, IL: Charles C Thomas.
Horvath, F., Blair, J.P., and Buckley, J.P. (2008). The Behavioral Analysis Interview: Clarifying the
Practice, Theory, and Understanding of Its Use and Effectiveness. International Journal of Police
Science and Management, 10(1):101–118.
Horvath, F., Jayne, B.P., and Buckley, J.P. (1994). Differentiation of Truthful and Deceptive Criminal
Suspects in Behavioral Analysis Interviews. Journal of Forensic Sciences, 39:793–807.
Inbau, F.E., Reid, J.E., and Buckley, J.P. (1986). Criminal Interrogation and Confessions, 3rd ed.
Baltimore, MD: Williams & Wilkins.
Inbau, F.E., Reid, J.E., and Buckley, J.P. (2001). Criminal Interrogation and Confessions, 4th ed.
Gaithersburg, MD: Aspen.
Jones, T., Maclean, B., and Young, J. (1986). The Islington Crime Survey, Crime Victimization, and
Policing in Inner City London. London: Gower.
Layton, J. (2010). How Police Interrogation Works, http://people.howstuffworks.com/police-interro-
gation2.html.
Milne, B. and Bull, R. (1999). Investigative Interviewing: Psychology and Practice. Chichester: Wiley.
Moston, S. (1996). From Denial to Admission in Police Questioning of Suspects. In Davies, G.,
Lloyd-Bostock, S., McMurran, M., and Wilson, C., Eds., Psychology, Law and Criminal Justice:
International Developments in Research and Practice (pp. 91–99). Berlin: de Gruyter.
Napier, M.R. and Adams, S.H. (2002). Criminal Confessions: Overcoming the Challenges. FBI Law
Enforcement Bulletin, 71(11):9–15.
Smith, D.J. (1983). Police and People in London: A Survey of Londoners. London: Policy Studies
Institute.
Vessel, J.D. (1998). Conducting Successful Interrogations. FBI Law Enforcement Bulletin,
67(10):70–78.
Vrij, A. (2003). “We Will Protect Your Wife and Child but Only If You Confess”: Police Interrogations
in England and the Netherlands. In Van Koppen, P.J. and Penrod, S.D., Eds., Adversarial Versus
Inquisitorial Justice: Psychological Perspectives on Criminal Justice Systems (pp. 55–79). New
York: Plenum Press.
Walkley, J. (1987). Police Interrogation: Handbook for Investigators. London: Police Review
Publication.
Walters, S.B. (1996). Principles of Kinesic Interview and Interrogation. Boca Raton, FL: CRC Press.
Williamson, T.M. (1993). From Interrogation to Investigative Interviewing: Strategic Trends in Police
Questioning. Journal of Community and Social Psychology, 3:89–99.
Chapter 6
Evidence
Cory Rodivich
Wichita, Kansas, Police Department
CHAPTER OBJECTIVES
After reading this chapter, you should be able to do the following:
Chapter Outline
• Nature of Evidence
• Founding Theories of Forensic Investigation
• Importance of Information Gathering
• Major Types of Physical Evidence
• Generalist Concept
• Identification, Collection, and Preservation of Physical Evidence
NATURE OF EVIDENCE
Evidence can be defined as anything legally submitted to a tribunal or trier of fact (judge
or jury) that tends to prove or disprove a fact in question. In a very practical sense, the two
fundamental questions to be answered in any criminal investigation are what happened
and who did it? Many specifics must absolutely be deduced to ultimately answer these
questions with a reasonable degree of certainty, but anything that assists the investigator
81
82 ◾ Cory Rodivich
and, in turn, the trier of fact in answering these questions can be considered evidence. The
term anything is, of course, very broad, but as we will discuss, the word evidence encom-
passes a broad range of objects, information, and observations. Evidence can be classified
into three general categories: testimonial, documentary, and physical.
TESTIMONIAL EVIDENCE
Testimonial evidence includes the statements of victims, witnesses, and suspects that are
gathered during the interview or interrogation process. Testimonial evidence, while often
beneficial in establishing and understanding certain factors such as motive, has one major
flaw—subjectivity. Humans are subjective beings, each bringing his or her own agenda and
perceptions to the interview table and witness stand. At times, an agenda can include out-
right perjury. More often than not, the nature of this subjectivity is less deceitful and more
a matter of perspective, centering on the individual’s ability to perceive and remember
events. A knife may appear to be quite large to a victim at the time of the incident and in
light of all of the emotions that accompany being victimized, when in actuality the weapon
recovered from the suspect was a small pocketknife. A witness who overhears another
witness describing some detail regarding a suspect’s appearance or behavior, which he
himself did not observe, may absorb that information and later change his statements after
convincing himself that he, too, observed this detail. Human beings, whether victim, wit-
ness, or suspect, are capable of distorting facts, sometimes purposefully for their benefit
or the benefit of others and other times unconsciously. Although testimonial evidence is
not to be ignored, the importance of documentary and physical evidence in evaluating the
statements of individuals must always be recognized (Gardner, 2005).
DOCUMENTARY EVIDENCE
The three primary methods used to document the people, places, and things involved in
criminal investigations are photography, sketching or diagramming, and notetaking.
Photographs are visual representations that provide investigators with permanent records
that can be examined and analyzed subsequent to crime scene investigations and all evi-
dence-gathering activities. Photographs, in the most basic sense, effectively demonstrate
what something looks like. Information regarding the appearance of a person, place, or thing
is more easily and often more effectively communicated to the trier of fact with photographs
rather than with verbal recollections and descriptions. Photographs are routinely entered
as evidence in criminal court proceedings, with officers or investigators testifying that each
photograph is a true, clear, and accurate representation of what they observed. Photographs
are increasingly valuable when they are utilized to capture transient or temporary condi-
tions, such as the appearance of a crime scene before it is processed or searched and the pres-
ence of items contained within before they are moved, altered, or collected. Photographs are
often the only way a piece of evidence can be preserved for viewing, as in the case of physi-
cal injuries on living persons. Injuries and resulting wound patterns cannot be physically
removed from individuals and will change over time, if not heal completely.
Evidence ◾ 83
Sketches are drawn and measurements are obtained to record information that cannot
be captured in photographs, such as the size and dimensions of a crime scene and spe-
cific locations of objects and items contained within it, as well as their spatial relationships.
Sketches and measurements made in the field can then be utilized to construct polished,
scale drawings from a two-dimensional or three-dimensional perspective; these, again, can
be presented to the trier of fact as true, clear, and accurate visual representations of what was
observed or examined by investigators. Similar to photographs, diagrams can greatly assist
the trier of fact in gaining an understanding of the people, places, and things involved and
the events that occurred during both the commission and investigation of a crime.
Notes are written to document information that cannot be captured in either photo-
graphs or diagrams, such as sounds, smells, temperatures, nonvisual postmortem changes
in a deceased victim, or the actual ambient lighting conditions present at a crime scene. To
photograph a pitch-dark room or space, with the intention of demonstrating the appear-
ance of the interior, light must be artificially injected into the room. The exposed photo-
graph will show what the interior of the room looked like, but the image itself, the room
being illuminated, does not accurately reflect how the room appeared to the investigator
at the time the photograph was taken. Notes provide a supplement to photographs and
diagrams, painting a complete and clear picture of the observations made by investigators
for the trier of fact.
PHYSICAL EVIDENCE
Physical evidence takes the form of specific, tangible items collected during criminal inves-
tigations for subsequent examination, analysis, and presentation. The term physical does not
necessarily imply that the item is visible to the eye; often, the most compelling physical evi-
dence requires some form of development or instrumentation to visualize. The underlying
importance of physical evidence is that it is real and tangible and cannot be denied; physi-
cal evidence never lies. Failure to understand the true nature and significance of physical
evidence lies strictly in the human elements of its identification, collection, and examina-
tion. Properly considered, physical evidence establishes a framework of facts and objective
knowledge that will guide both the investigator’s understanding of the crime being investi-
gated and the trier of fact’s subsequent decision as to the guilt or innocence of the defendant
(Gardner, 2005). The remainder of this chapter focuses on physical evidence.
Victim Suspect
Crime Scene
Physical Evidence
LINKAGE THEORY
The linkage theory is illustrated in Figure 6.1. The three main factors in the overall equa-
tion of most criminal investigations are the victim, the suspect, and the crime scene. Each
of these factors can be and many times is plural in number. It is important to note that,
although this chapter is not solely devoted to crime scene investigation, a definition of the
term crime scene would be beneficial. A crime scene is traditionally thought of as a loca-
tion, a home, a business, a parking lot, a vehicle, etc. This is true in every case, as the crime
has to be committed somewhere, but from an evidentiary point of view this definition
is very restrictive. A crime scene can, in fact, be any person, place, or thing from which
physical evidence can be recovered. When considering such relevant concepts as custody,
integrity, and contamination, one can see the similarities between a living room, a firearm,
a victim’s corpse, and a suspect’s clothing.
A quintessential goal of investigations involving crimes against property and persons is
to establish a linkage between these factors through physical evidence. In a very practical
sense, the linkage theory targets the investigator’s search by directing evidence-gathering
activities toward the factor missing from the equation. Suppose that the scene of a sexual
assault was reported as being the victim’s home; in this case, the investigator’s search would
concentrate on identifying and collecting physical evidence that would place the suspect
inside the scene, as that person did not reside within the victim’s home. If the crime scene
is a neutral location, such as a parking lot or outdoor venue, where the presence of neither
the victim nor the suspect can be strictly established, then physical evidence originating
from both individuals would be valuable. If the crime scene is a common location, as in
cases involving domestic violence or locations with unlimited public access and traffic
(such as a 24-hour convenience store), where the presence of both the victim and suspect
is not extraordinary, then the face value of physical evidence can possibly be diminished.
The linkage theory, therefore, also assists the investigator in assessing the probative or evi-
dentiary value of articles of potential physical evidence—that is, whether an item tends to
prove a fact in question or aids in the investigation.
Evidence ◾ 85
Factors that can potentially strengthen the linkages among victims, suspects, and crime
scenes, and thus the probative value of physical evidence, are the basic nature of the evi-
dence itself and the context in which it is located. In some cases, especially when suspects
state that they have never visited a particular scene or location, the mere presence of physi-
cal evidence, such as a fingerprint, is valuable as it refutes the suspect’s statement. Some
forms of biological or DNA evidence are inherently valuable just because of what they are
and the implications that accompany them. If the victim and suspect both state that the
suspect was invited into the victim’s home and drank a glass of water prior to the sexual
assault, then the suspect’s fingerprint on the drinking glass is explainable and not very pro-
bative. The suspect’s seminal fluid atop the couch where the assault was reported to occur
not only places the suspect inside the home but also places him there in a very specific and
probative context, that of sexual intercourse. Blood is inherently valuable because it estab-
lishes not only the individual’s presence inside of a crime scene but also his or her active
participation in a disturbance or violent crime. In the case of a non-residential burglary
where a fingerprint recovered from the remaining glass within the broken window used to
gain entry is identified as belonging to an employee of the business, the mere presence of
the fingerprint is not entirely probative because of the employee’s consistent access to the
window. If the glass within the window is double-paned and the fingerprint was recovered
from the exterior side of the interior glass panel, the probative value of the fingerprint has
now significantly increased because of the context in which it was located; the fingerprint
could not have been deposited without the exterior glass panel being shattered first.
the suspect may have taken from the scene. Soil or vegetation from the ground below the
window may be trapped in the suspect’s shoes. If entry was made by prying open a door,
paint from the door may be embedded on the marking edge of the tool used and retained
by the suspect. Investigators should strive to identify and collect not only unknown, evi-
dentiary samples but also known standards for subsequent comparison.
It is also important to note the interrelationship between the linkage theory and Locard’s
theory of exchange, with the linkage theory representing the goal and Locard’s theory the
means by which to achieve the goal. In the case of the scene of a sexual assault reported to
be the suspect’s residence, an investigator who applies the linkage theory would realize that
physical evidence left by the victim would be most probative. The application of Locard’s
theory then alerts the investigator to the specific types of physical evidence potentially
resulting from sexual intercourse. This seems very simplistic, but when presented with
the absence of obvious pieces of physical evidence, such as a used condom, the investiga-
tor’s search for bodily fluids will be affected by this information, as the fluids deposited by
males and the fluids deposited by females during intercourse are entirely different pieces
of material.
The underlying concept addressed in Locard’s theory of exchange is that of transfer, the
transfer of materials when people and objects come into contact. The materials that are
transferred, both left behind and removed, become physical evidence that assists in estab-
lishing linkages among the victim, suspect, and crime scene. The concept of transfer can
serve to direct the flow of an entire investigation; just as suspects can be tracked through
cellular phone pings and stolen credit card purchases, suspects can be tracked through the
continual transfer of physical evidence. Blood is transferred from the victim to the suspect’s
clothing in a stabbing incident, resulting in primary transfer. The victim’s blood is then pos-
sibly transferred to the driver’s seat of the suspect’s car as he flees the scene, resulting in sec-
ondary transfer. The following day, traces of the victim’s blood are then possibly transferred
to the clothing of the suspect’s roommate, who is also permitted to drive the vehicle, result-
ing in tertiary transfer. The suspect’s vehicle and the roommate’s clothing now constitute
additional articles of physical evidence that can and should be pursued by investigators.
The possibility of transfer can be either limited or expansive based on the nature of the
material involved. In the previous example, the victim’s fingerprint was not able to be trans-
ferred to the suspect’s clothing for a variety of reasons. The victim’s blood, on the other
hand, was dynamic, capable of movement and flight, offering evidentiary value of personal
identification not dependent on factors such as surface characteristics and pattern forma-
tion. As will be discussed, biological/DNA evidence and those articles categorized as trace
evidence are most often associated with this concept of continual transfer. Presented with
these materials, a skilled, observant, and inquisitive investigator can take the concept of
transfer and run with it, striving to think “outside of the box.” Upon arriving at the scene
of a residential robbery, for example, an investigator notices that the home interior is cov-
ered in hair shed from the victim’s dog. Just as in humans, unique DNA signatures are also
located in the cells of animals. Presented with statements from the victim that he and the
unknown suspect fought on the living room floor during the incident, the investigator rec-
ognizes the potential transfer of pet hair to the suspect’s clothing. The dog shed on the floor,
Evidence ◾ 87
resulting in primary transfer; the suspect then contacted the floor and removed pet hair,
resulting in secondary transfer. The examination and comparison of exemplars collected by
the investigator from the dog and samples subsequently recovered from the suspect’s cloth-
ing can objectively link the suspect to the crime scene through the victim’s pet.
material deposited by the suspect might be found on the grips and any articles required
to operate the firearm, and biological evidence from the victim might be located around
the muzzle and tip of the gun barrel. In a very practical sense, an examination of a shoot-
ing victim and information gathered from medical personnel and treatment can alert the
investigator to the number of bullets still present inside the victim. When the number of
shots fired during the incident has been established, the bullets within the victim do not
have to be searched or accounted for at the scene.
The absence of such relevant case information is a regular occurrence. Scene investi-
gators must often operate within the realm of possibility, which, as it sounds, increases
their workload. What is paramount is that investigators always err on the side of caution.
Physical evidence that is not properly documented or collected is always worthless.
FINGERPRINTS
The fingers and palms of the hands, as well as the soles of the feet, of human beings have
friction ridge skin, composed of complex patterns of hills and valleys designed for gripping
purposes. Within a fingerprint pattern are a number of features known as ridge character-
istics or minutiae, which, based upon their identity, number, and relative location, serve as
a means of personal identification.
BIOLOGICAL/DNA EVIDENCE
The chemical blueprint of life itself, DNA is found in structures contained in cells, including
nuclei and mitochondria. Because bodily fluids, tissues, and organs are comprised of cells,
these body materials can be used for DNA typing as a means of personal identification.
TRACE EVIDENCE
Trace evidence simply refers to physical evidence that is small in size and includes materi-
als and substances such as hair, fibers, paint, glass, and soil.
FIREARMS EVIDENCE
Firearms evidence includes the firearms themselves and the ammunition components con-
tained within or expelled from the gun during the firing process.
Evidence ◾ 89
TOOLMARK EVIDENCE
Toolmarks are patterns resulting from a harder marking device, or tool, being forced
against a softer object, usually in an attempt to force entry into, for example, a dwelling,
business, or storage unit.
IMPRESSION EVIDENCE
Impressions most often take the form of footwear and tire-tread marks deposited on a
variety of yielding or unyielding surfaces within a crime scene.
GENERALIST CONCEPT
Given the subjective nature of testimonial evidence and current trends in popular cul-
ture regarding the availability and popularity of forensic science and investigation among
potential jury members, a strong emphasis has been placed on physical evidence and its
analysis in the investigation and prosecution of crime. The investigation of crime scenes
and the identification, collection, and preservation of physical evidence can therefore be
considered as the foundations of criminal investigation. As previously discussed and is fur-
ther discussed in the following chapter, numerous classifications of physical evidence exist
to assist investigators in proving their cases. To ensure an efficient and effective investiga-
tion of the crime scene and all associated physical evidence, an investigator must possess
not only a detailed and thorough knowledge of the identification, collection, and preserva-
tion methods prescribed to each particular classification but also the probative value of
what the evidence may reveal.
Two positions within the field of forensic investigation are the specialist, an individual
who possesses educational and professional expertise in a particular discipline such as fin-
gerprint examination and DNA analysis, and the generalist, an individual who, although
less formally educated, possesses a well-rounded and experienced knowledge base and
skill set in a variety of forensic disciplines. Crime scene investigators may specialize in
disciplines more applicable to field investigation, such as photography, death investiga-
tion, and bloodstain pattern analysis, but ideally they are generalists who can perform a
variety of tasks with regard to physical evidence identification and collection and can draw
90 ◾ Cory Rodivich
conclusions about what an article of evidence may reveal upon examination. The ability
of the investigator to make frontline judgments as to the probative and evidentiary value
of an article of potential physical evidence can serve to direct, focus, and target the subse-
quent investigation of the case.
IDENTIFICATION
The identification of physical evidence commences with the gathering of relevant and spe-
cific case information through observation and inquiry. Before investigators can search
for evidence, they must be aware of what they are searching for. When the investigator
has gained an understanding of the available facts of the case and the events occurring
during commission of the crime, the next step in the process is application of Locard’s
theory of exchange. Directed to the types of physical evidence potentially left within the
scene and their locations, the investigator can now begin the practical process of searching.
Although different methodologies exist to adapt and increase the effectiveness of crime
scene searches to specific surroundings, it is paramount that the search be organized and
systematic to ensure that nothing is overlooked, missed, or lost, regardless if the area being
searched is as contained as the interior of a residence, as expansive as an open field, or as
specific as an article of furniture or the blade of a knife.
Directed to a specific surface or location, the investigator then employs a series of pre-
sumptive tests, proceeding from the least destructive means to the most destructive means.
The first presumptive test is the investigator’s eyes. Physical evidence can be very visible to
the eye, as in the case of firearms and the ammunition components expelled from such; it can
also be very invisible to the eye, as in the case of some bodily fluids and other DNA evidence.
The second presumptive test is essentially another set of eyes, directing light and light sources
to increase visibility. Side or oblique lighting—positioning a light source (usually a high-
powered flashlight) parallel to a surface—is particularly useful in locating physical objects
such as spent bullets or cartridge cases, as distinct shadows will be cast along the surround-
ing areas and surfaces, as well as in finding impressions such as fingerprints, toolmarks, or
footwear on flat surfaces. At this stage in the process, specific types of physical evidence can
require specific light sources to make them visible. The use of a forensic alternate light source
(ALS) is particularly useful in dealing with various types of DNA, trace, and fingerprint
evidence that respond to individual wavelengths or bandwidths of light in contrast with the
surfaces upon which they are located. These visual mediums of identification constitute the
least destructive presumptive tests, as they do not require the forensic evidence potentially
located on items being examined to be significantly handled, moved, or altered in any way.
Evidence ◾ 91
Proceeding to more destructive means, the methodologies for identifying physical evi-
dence that may require further clarification or development are dependent on the specific
types of evidence being sought. Various chemical and physical methods can be employed
to locate fingerprints and footwear impressions not readily visible under existing or
directed light. Chemical presumptive tests can be performed on suspect stains visualized
with a forensic alternate light source to distinguish bodily fluids from non-evidentiary for-
eign material. In either case, the evidentiary material is now being significantly handled,
altered, and potentially contaminated.
COLLECTION
Methods of collection likewise vary with the specific type of evidence being recovered,
but, generally speaking, physical evidence is collected by collecting the whole article, sam-
pling or removing evidence from the article, and/or photographing the article in a manner
proceeding from most transient to least transient. Similar to the process of identifica-
tion, the sequence in which specific articles of physical evidence are collected is extremely
important. This sequence is determined by the investigator after careful observation of the
nature and condition of the crime scene. Physical evidence that is transient or conditional
is collected first. Transient evidence is physical evidence that is easily moved or lost due to
factors outside the control of the investigator, including weather or environmental condi-
tions. Imagine a hair strand embedded in the broken windshield of a vehicle involved in a
vehicular homicide case on a windy day or a footwear impression in the snow being filled
in by continued snowfall. Conditional evidence is physical evidence that is easily altered,
lost, or compromised in some way, due to subsequent actions taken by the investigator.
Areas and items that need to be contacted in order for the investigator to operate within
the scene should be considered and examined before action is taken. If the tiled kitchen
floor is in the investigator’s path toward the body of a murder victim, the floor should
first be examined for possible footwear impressions prior to walking on it. Trace evidence
possibly located on the bedroom floor surrounding the bed where a sexual assault was
reported to occur should be collected prior to the investigator approaching the bed to con-
duct his examination.
The idea of conditional evidence works in tandem with the generalist concept and the
investigator’s knowledge of forensic analysis. The possibility of recovering multiple types
of forensic evidence from single objects such as firearms, soda cans, and strands of duct
tape used to bind a victim is often high. Physical and chemical methods of identification
and collection prescribed for a certain type of forensic evidence may adversely affect the
evidentiary value of another type of evidence. DNA evidence, for example, can possibly be
contaminated by any number of materials contained within chemicals used in fingerprint
processing.
An introduction to the common methods for collecting major types of physical evidence
is provided below. Some pieces of physical evidence, mainly impression evidence such as
fingerprints, footwear, and tire treads, are capable of being examined and compared from
photographs. Although photographs of these items or the surfaces that contain them are
92 ◾ Cory Rodivich
PRESERVATION
Preservation of physical evidence involves packaging and storing evidence following its
collection. The goal of evidence preservation is twofold: (1) preservation of the evidence
itself, ensuring that the item or material does not degrade or decompose, and (2) preserva-
tion of the evidentiary value of the item or material by inhibiting cross-contamination. The
preservation of evidence is accomplished by ensuring that the items are dry prior to pack-
aging, are packaged in the proper storage medium, and are stored in the proper environ-
ment following packaging. With the exception of accelerants and flammable liquids that
will evaporate if not packaged in airtight containers, the preferred storage medium for the
majority of physical evidence is paper. Paper is breathable, which allows residual moisture
to dry and inhibits the growth of molds and bacteria, which can have a detrimental effect,
particularly on biological evidence. The proper storage environment exhibits two consis-
tent characteristics, regardless of the type of evidence: the absence of direct sunlight and
consistent temperature and humidity levels. Most physical evidence can be stored appro-
priately under room-temperature conditions. Biological evidence and items bearing such
can be refrigerated; however, with the exception of whole fluid samples, this is not neces-
sary as long as the above standards are maintained.
The evidentiary value of physical evidence must be maintained by inhibiting cross-con-
tamination. Cross-contamination is directly associated with Locard’s theory of exchange
and is caused by the inappropriate handling and packaging of physical evidence, particu-
larly trace and biological evidence. By exposing one item to another, evidence from the first
is transferred to the second and vice versa. Biological evidence is especially susceptible to
this, as samples originating from different individuals can be present on the same object.
Items such as clothing and bedding articles, where different parts can be folded onto one
another and easily make contact, must be packaged accordingly to ensure the integrity of
Evidence ◾ 93
each evidentiary sample. Remember that one of the primary goals in gathering and analyz-
ing physical evidence is to establish linkages among the victim, suspect, and crime scene.
Evidence originating from each of these factors must be packaged separately to maintain
the probative value of results generated from the comparisons of unknown samples and
known standards.
It should also be noted that cross-contamination can occur much earlier, in the collec-
tion process. Whether in the field or in a laboratory setting, evidence handled with com-
mon tools and implements and on common surfaces can certainly result in the transfer of
material between items. During the course of an investigation, it is possible that the scene
investigator could respond to multiple scenes, including the residences of both the victim
and the suspect, and encounter multiple persons, including the victim and suspect, in a
relatively short period of time. The investigator must take precautions to safeguard against
the transfer of material from one location, one item, one tool, or one person to another.
This is best accomplished by the use of disposable or single-use collection implements
when appropriate and the use of personal protective equipment, including gloves, masks,
eye protectors, shoe covers, head covers, and disposable coveralls.
FINGERPRINTS
Three types of fingerprints are encountered by investigators. Patent prints are caused by
deposits of contaminants, including blood, grease, or ink, that are visible to the naked eye.
Plastic prints are deposited in soft, pliable materials, such as clay, putty, and wax. Latent
prints, the type most commonly encountered by investigators, are created by the deposit of
bodily secretions, including water, oils, salts, and amino acids; they are not readily visible
to the eye and require some form of development.
Patent prints, depending on the contaminant material used in depositing the impression,
can potentially be further developed and enhanced. Patent prints deposited with blood are
the most common form of visible fingerprints encountered during scene investigations and
are especially valuable because, based on the linkage theory, what better piece of evidence
could be recovered than the suspect’s fingerprint made with the victim’s blood? Chemical
reagents used in processing patent prints deposited with blood are designed to react with
products present in blood (proteins and amino acids). The resulting reaction forms colors
along the friction ridges that allow for better visualization. Patent prints should be pho-
tographed at examination quality before and after chemical treatment, with the substrate
itself also being collected, if possible.
Plastic prints are three-dimensional impressions deposited in soft receiving surfaces.
Plastic prints should be photographed at examination quality; light directed from a cer-
tain position, as will be discussed with footwear and tire-tread impressions, can possibly
enhance the level of detail displayed. In these instances, photographs will most often rep-
resent the best evidence, with the substrate itself, again, being collected, if possible.
Latent prints are developed by a variety of physical and chemical means. The appro-
priate processing method for developing latent prints is dependent on two major fac-
tors: surface and time. Use of powder and brush remains the primary physical method
94 ◾ Cory Rodivich
for developing fingerprints on smooth, nonporous surfaces and on items found at crime
scenes, such as glass, plastics, and vehicle frames. Fingerprint powders exist in a variety of
forms, all designed to provide contrast with the background surface and increase visibility.
The developed impressions are collected using a variety of lifting mediums, including tape,
gelatin lifters, and silicon-based casting materials. Numerous chemical methods exist to
process both nonporous and more textured, porous items, such as paper, tape, cardboard,
and untreated wood, for latent fingerprints when both time and surface characteristics
present adverse conditions.
Chemicals that react with residual body materials are particularly useful when water,
the primary component within the bodily secretions forming the print, has either evapo-
rated over time on a smooth, nonporous surface or been absorbed into a more textured,
porous surface such as paper. Some chemical processes are useful when the suspected sur-
face displays a great deal of noise, such as overlapping colors, brand names, and logos,
which could easily obscure prints even after their development. Certain chemical solu-
tions, when viewed with filtration under a forensic alternate light source, will fluoresce,
thereby highlighting the impression itself and greatly reducing the background noise. Due
to several practicalities, including the need for specialized pieces of equipment, shelf life
of chemical mixtures, and safety of those persons involved, chemical processes are almost
exclusively conducted in a laboratory setting. Fingerprints developed via strictly chemical
means are incapable of being lifted and are collected and preserved through examination-
quality photography.
BIOLOGICAL/DNA EVIDENCE
For the crime scene investigator, anything of biological origin (originating from an indi-
vidual) is a potential source of DNA evidence. According to Locard’s theory of exchange,
anything that has come into contact with an individual is a potential source of DNA evi-
dence. Clothing and jewelry, for example, are easily identifiable and simple to collect as
evidence. The identification and collection of body materials, both visible and invisible
(e.g., fluids and skin cells), are much more intensive and technical.
Bodily fluids are the most common form of DNA evidence encountered by scene investi-
gators and analyzed by examiners. Some bodily fluids, depending on their individual nature
and the contrast of the background surface upon which the stain lies, can be readily visible
to the eye, such as blood; others, such as seminal fluid, vaginal secretions, urine, saliva,
and sweat, often require the use of forensic alternate light sources to make them apparent.
Generally speaking, forensic alternate light sources direct individual wavelengths or band-
widths of light toward a surface that are then either reflected or absorbed by that surface.
Seminal fluid stains located on a couch cushion are an entirely different type of matter than
the fibers composing the cushion; therefore, the fluid stains will reflect the wavelengths or
bandwidths of light differently than the cushion’s background, thereby distinguishing the
stain from the cushion. Because the human eye can only visualize every wavelength within
the visible spectrum of light, barrier filters placed over the eyes of the investigator and the
lens of the camera greatly assist in visualizing the resulting fluorescence.
Evidence ◾ 95
While not every substance detected on various surfaces is a bodily fluid, chemical pre-
sumptive tests designed to react with specific enzymes, such as acid phosphatase in semi-
nal fluid and amylase in saliva, can then be employed to further indicate the presence of
bodily fluids and distinguish them from other foreign materials. Blood does not fluoresce
under a forensic alternate light source, but blood on dark-colored surfaces can be detected
at certain wavelengths due to its absorption rate contrasting with that of the background.
Most often, blood is visible at crime scenes and upon the items contained within. Various
chemical solutions are available to detect latent bloodstains, possibly resulting from a sus-
pected clean-up attempt, and to test presumptively for blood to safeguard against false
positive reactions or to distinguish blood from similar-looking substances.
There are four primary methods for collecting DNA evidence from crime scenes and
objects contained within. Easily portable articles, including clothing, jewelry, cigarette
butts, and discarded pieces of chewing gum, can simply be collected. Some DNA samples,
such as seminal fluid stains on carpet and whole urine in a toilet, can also be physically
removed or cut from the substrate. DNA samples of bodily fluids and epithelial skin cells
sloughed from hands in contact with rough or abrasive surfaces can also be sampled or
absorbed using sterile cotton or polyester swabs. Bodily fluids in dry form can also be
scraped into packaging mediums such as glassine envelopes or druggist folds using sterile,
sharp implements.
As is discussed in the following chapter, the end result of a DNA analysis is a statistic that
defines the probability of the chance duplication of a particular DNA profile within ethnic
groups—in other words, the chance of the generated DNA profile belonging to a person
other than the one represented in the submitted exemplar. The discriminatory nature and,
hence, the evidentiary value of this statistic is determined by two major factors: size and
purity. With regard to collection, the investigator should strive to recover and concentrate
as much of the sample as possible, with as little dilution or contamination of the sample as
possible. This is particularly important when articles of physical evidence can be processed
for both fingerprints and DNA, such as firearms, soda cans, latex gloves, and patent prints
deposited with blood, or when known DNA sources are being processed for unknown or
evidentiary DNA sources, including cases involving bitemarks and fingernail scrapings,
where improper or imprecise collection techniques can make the known person being pro-
cessed the major contributor in a mixture of DNA profiles.
TRACE EVIDENCE
Trace evidence includes materials and substances, such as hairs, fibers, paint, glass, and
soil, which are small in size and easily transferred from one person or object to another. The
stray head or pubic hair shed by an unknown suspect can be a valuable piece of evidence, as
hair is also a potential source of DNA. Oblique lighting and the use of a forensic alternate
light source are useful techniques for observing and locating hairs at the crime scene or
upon suspects’ or victims’ bodies and clothing. When hair strands have been located, they
can be collected using tweezers, forceps, or even sticky notes and placed into primary con-
tainers, such as druggist folds or glassine envelopes. The use of tape lifts when systematically
96 ◾ Cory Rodivich
processing distinctive areas at the crime scene, including carpeting, furniture, and vehicle
interiors, is also effective in isolating freshly deposited hair evidence. The identification and
collection of fiber evidence are accomplished in similar ways, with the assistance of a foren-
sic alternate light source and the use of the picking or tape-lifting methods.
Paint evidence is commonly associated with vehicle crashes or collisions and pry tools
utilized in forcing entry into structures and storage mediums. Intact paint chips are ide-
ally suited for examination, as they reveal layering characteristics; they can be collected
with the use of tweezers, forceps, or tape lifts and then packaged in storage mediums such
as druggist folds and glassine envelopes. Paint smears or scrapings are often the result
of objects forcibly contacting each other. If feasible, the article bearing the paint smear
should be collected as evidence. If necessary, the sample can be scraped into the packaging
medium with a sharp instrument, taking care to recover the entire sample or as much of
it as possible.
Glass fragments resulting from broken windows in burglary incidents or broken
windshields and headlamps in vehicular assaults are often transferred to the victim or
suspect and their clothing. The previously described collection methods of picking, scrap-
ing, and tape lifting are also effective with glass evidence. Due to the sharp and brittle
nature of glass, such packaging mediums as evidence tins should be selected to ensure
both safety and preservation. Large fragments of glass should be preserved intact to facili-
tate additional forensic examinations, such as fracture comparisons and direction of force
determinations.
Soil evidence is often recovered from shoes, tires, and vehicle wheel wells and under-
carriages and is associated with like forms of impression evidence. Soil samples can be
taken at certain distance intervals from the impressions or areas of contact to ensure that
representative samples from the areas involved are obtained. The previously described col-
lection methods of picking, scraping, and tape lifting are also effective for soil evidence. In
cases involving the compaction of soil on surfaces such as vehicle wheel wells and under-
carriages, efforts should be made to recover intact samples to preserve the layering and
stratification of the soil content which may be representative of particular locations.
FIREARMS EVIDENCE
Firearms and the ammunition components present within and expelled from them are vis-
ible objects; however, fired projectiles and cartridge cases ejected from specific firearms can
be difficult to locate, considering the myriad factors involved in a shooting incident that
can affect their behavior. Establishing the trajectories of fired projectiles using tools such as
trajectory rods and lasers can assist investigators in locating both projectile fragments and
spent cartridge cases by isolating the paths taken by the fired projectiles and the physical
locations of shooters within scenes. Once directed to specific locations, investigators can
then utilize techniques such as oblique lighting or tools such as metal detectors to assist
in the search. The condition and functioning properties of a firearm, such as the status of
the safety mechanism and the presence of any chambered rounds, should be noted prior
to its unloading and collection. Revolvers hold ammunition inside of individual chambers
Evidence ◾ 97
within a rotating cylinder, and the chamber aligned with the barrel should be noted before
the cylinder is released. Firearms should never be collected by inserting a tool inside the
barrel, so as to not destroy any possible DNA or trace evidence or alter the rifling of the
barrel. Likewise, fired projectiles and spent cartridge cases should never be collected using
sharp or metal instruments, so as to not obliterate, obscure, or alter any identifiable mark-
ings used for comparison.
TOOLMARK EVIDENCE
Toolmarks commonly encountered by the investigator are made by prying, clawing, or
cutting instruments being impressed into or slid across a surface. Portable items bear-
ing toolmarks, such as metal strike plates on doorjambs and cut padlock bolts, should be
collected intact. Samples from cut wiring, such as telephone wires cut to disable security
alarms and bound copper wiring cut or stolen from electrical boxes to sell, can be cut from
the remaining wiring, being sure to include the end severed by the suspect’s tool. Prior to
packaging, the end of the wire sample cut by the investigator should be designated to alert
the examiner of which end requires his attention. Toolmarks on immovable or nonport-
able items can be recovered using silicone-based casting materials that are extruded or
smeared onto the surface bearing the markings. Once dry, the cast can then be removed
and packaged accordingly. Intact samples as described above and toolmark casts should
be packaged in such a manner to avoid abrasive contact with the markings. Similarly, care
must be taken to protect the blades, edges, or marking surfaces of recovered tools for sub-
sequent comparison.
IMPRESSION EVIDENCE
Footwear and tire-tread impressions can be deposited onto two-dimensional, unyielding
surfaces, such as glass, tile, linoleum, or wood flooring, and onto three-dimensional, soft,
yielding surfaces, such as wet soil and snow. Similar to fingerprints, footwear and tire-
tread impressions can be examined and compared using photographs. Impressions must
first be photographed at examination quality, with light directed from a specific position.
Two-dimensional impressions are best visualized with oblique lighting directed from a
position parallel to the surface. The detail and tread patterns in three-dimensional impres-
sions are best visualized by directing light from an angle above the surface to cast shadows
from the raised areas in the impression into the valleys. An addition to photographs of
lengthy tire-tread impressions is a tape measure or some form of measuring device to track
the progress of capturing the entire circumference of the tire(s).
Similar to fingerprints, two-dimensional impressions can be patent or latent and,
depending on certain factors, can be further enhanced or developed. Patent impressions
made of dirt or soil are commonly encountered by investigators in cases such as burglaries
involving forcible entry via kicking. Patent impressions deposited with blood can be fur-
ther developed with similar blood reagents. Latent impressions encountered by investiga-
tors commonly take the form of residual moisture on the soles of shoes or disturbances in
98 ◾ Cory Rodivich
dusty surfaces. Latent impressions made with residual moisture can be further developed
with fingerprint powder. Disturbances in dust, on the other hand, will simply be eradi-
cated with the use of powder and a brush.
Two-dimensional impressions can be collected in a variety of ways. Patent blood impres-
sions cannot be lifted after they have been chemically treated, thus the surface upon which
the impression lies should be collected. Patent impressions deposited with dirt or soil,
latent impressions developed with fingerprint powder, and impressions deposited on dusty
surfaces can all be collected using various lifting mediums, including fingerprint tape and
gelatin lifters. Impressions deposited on or made with dust matter can also be collected
with electrostatic lifting devices. Three-dimensional impressions deposited in wet soil,
snow, and other pliable mediums are collected by casting. Dental stone, a powdery sub-
stance used in dental laboratories when making crowns and similar items, is often the best
suited material for casting three-dimensional impressions. The recovered lifts and casts
should then be packaged in such a manner as to avoid creasing, folding, and breaking.
BIBLIOGRAPHY
Fish, J.T., Miller, L.S., and Braswell, M.C. (2007). Crime Scene Investigation. Newark, NJ: LexisNexis–
Anderson Publishing.
Gaensslen, R.E., Harris, H.A., and Lee, H.C. (2008). Introduction to Forensic Science and Criminalistics.
New York: McGraw-Hill.
Gardner, R.M. (2005). Practical Crime Scene Processing and Investigation. Boca Raton, FL: CRC
Press.
Lee, H.C., Palmbach, T., and Miller, M.T. (2001). Henry Lee’s Crime Scene Handbook. San Diego, CA:
Elsevier Academic Press.
Saferstein, R. (2009). Forensic Science: From the Crime Scene to the Crime Lab. Upper Saddle River,
NJ: Prentice Hall.
Chapter 7
CHAPTER OBJECTIVES
After reading this chapter, you should be able to do the following:
1. Define forensic science and its use in the criminal investigative process.
2. Identify the major responsibilities of the forensic scientist.
3. Discuss the potential information generated from the forensic analysis of
physical evidence.
4. Discuss the potential results generated from the forensic analysis of physical
evidence.
5. Describe the divisions of a typical, full-service crime laboratory.
6. List specialized forensic services available to investigators.
Chapter Outline
• Forensic Science and Criminal Investigation
• Responsibilities of the Forensic Scientist
• Forensic Analysis of Physical Evidence
• Results Generated from Forensic Analysis of Physical Evidence
• Modern, Full-Service Crime Laboratories
• Specialized Forensic Science Services
the process of investigating crime. Forensic science encompasses myriad disciplines and
professions, each containing a specific knowledge base and skill set utilized in the process-
ing and analysis of physical evidence to produce investigative leads. The two fundamental
questions to be answered in any criminal investigation are what happened and who did
it? Many specifics must certainly be deduced to ultimately answer these questions, with
forensic science providing answers such as the identification of unknown substances, the
linkage of persons and items to crime scenes, and the reconstruction of the sequence of
events involved in a crime. It is imperative that the investigating officer be aware of the
opportunities afforded by the application of forensic analysis and techniques.
Some forensic disciplines typically associated with the modern crime laboratory, such
as drug chemistry, toxicology, and DNA analysis, are traditionally scientific, with analysis
being performed in a laboratory setting utilizing processes such as microscopy, chroma-
tography, mass spectrometry, electrophoresis, and associated pieces of equipment. Other
forensic disciplines, found both inside and outside of the modern, budgeted crime lab-
oratory, such as fingerprint examination, document examination, forensic engineering,
bloodstain pattern analysis, and shooting incident reconstruction, while very technical,
are traditionally less scientific and performed outside of the traditional laboratory setting.
They utilize alternative pieces of equipment and rely on expert interpretation and specific,
experimented principles associated with the discipline, such as the reaction of certain inks
to ultraviolet and infrared energy, the structural failure rates of steel, the visual interpreta-
tion of bloodstain patterns and actions that could cause their deposit, and bullet perfora-
tion characteristics of specific materials and substances.
Regardless of the scientific or technical nature of the practicalities involved in the appli-
cation of a forensic discipline, scientists must always be aware of their primary responsi-
bilities and discharge them methodically, reliably, and consistently.
inquisitive observation of the crime scene, for example, forensic scientists then formulate a
hypothesis or plausible explanation proposed to answer the question. Developing ways to
test the hypothesis through experimentation is the heart of the scientific method. The test-
ing process must be controlled, thorough, and generally accepted as valid by the scientific
community. Finally, when the hypothesis is validated by data generated from extensive and
continuous experimentation, it becomes suitable as scientific evidence for use in criminal
investigations and criminal court proceedings.
The inherent principles of the scientific method, specifically applied to criminal inves-
tigation, provide a safeguard by which the conclusions generated from the analysis of
physical evidence cannot be tainted by bias or human emotion or compromised by the dis-
tortion or ignorance of contradictory evidence. In the context of criminal investigations,
the scientific method distinguishes evidence from coincidence, pursues generalities to the
level of specific details, disallows hypotheses more extraordinary than the facts themselves,
allows tests to either prove or disprove alternative explanations, qualifies possible alterna-
tive results, and quantifies their degree of certainty (James and Nordby, 2005).
with information that may assist in solving the case. Exploring the types of information
that can be generated from the analysis of physical evidence helps to clarify its value to
criminal investigations.
CORPUS DELICTI
Corpus delicti is a Latin term referring to the body or elements of a crime. These elements
are provisions articulated in local ordinances and state and federal statutes that the prose-
cutor is obligated to prove beyond a reasonable doubt to secure a conviction of the accused
based on the charges filed. In a case involving illegal drug possession, for example, the
green botanical substance recovered from the suspect’s pockets must be established as con-
taining Cannabis (marijuana). In a case involving the accused being suspected of driving
a vehicle under the influence of alcohol, the prosecutor must demonstrate that the defen-
dant’s blood-alcohol content was above the legally allowed limit. In the case of an alleged
sexual assault, the identification of seminal fluid on vaginal swabs obtained from the vic-
tim establishes the crucial element of penetration.
MODUS OPERANDI
Modus operandi is a Latin term for “method of operation.” As criminals reoffend, they
often repeat behaviors, which become known as their preferred method of operation. Some
burglars, for example, will use the same tools and techniques to gain entry into structures
each time. The examination of toolmark impressions recovered from entry doors pried
open or footwear impressions recovered from the ground below forced window units could
yield similarities that allow investigators to attribute several cases involved in a burglary
trend to the same suspect.
IDENTIFICATION OF PERSONS
The reliable and accurate identification of persons involved in criminal investigations is
absolutely critical to the operation of a criminal justice system. Fingerprints and biological
or DNA evidence are inherently valuable because they can be used to identify people, be
they suspect, victim, or witness. The ability to identify decomposed or skeletonized human
remains is invaluable in cases of individual death or mass disaster incidents.
Role of Forensic Science ◾ 103
recovered from the interior of a stolen vehicle can be compared to the known fingerprints
of a suspect obtained while the suspect was being booked for a previous crime. Seminal
fluid recovered from the victim of a sexual assault during the forensic nurse’s examination
can be compared to the known DNA standard of the suspect. The composition of a green
botanical substance discovered in the pocket of a suspect during an officer’s routine pat
down can be compared to the known chemical composition of marijuana.
CLASS/FAMILY CHARACTERISTICS
The first step in the analysis of physical evidence is classification. Whatever the item being
examined, it must first be classified within a family or group of similar items; that is, it must
be identified. Shoes, for example, are manufactured in a variety of styles, sizes, shapes, and
colors. We can recognize their differing appearances while still identifying and classifying
them as shoes. A group can be very broad (e.g., a white, cotton fiber), or a group can be
somewhat specific (e.g., a footwear impression revealing the brand, size, and tread pattern
of a shoe). An article of physical evidence that, upon examination, yields a level of detail
that allows the item to be classified within a group of similar items (or people) is said to
exhibit class or family characteristics.
INDIVIDUAL CHARACTERISTICS
The second step in the analysis of physical evidence is individualization, the attempt to
narrow the classification until only one item remains in the class. “In forensic science, indi-
vidualization can mean either of two things: (1) that in some way, by examining the vari-
ous characteristics of something, it can be recognized as unique—one of a kind—among
members of its class; or (2) that when a questioned or unknown object or item is compared
with a known or exemplar item, they are found to have a common origin” (Gaensslen et al.,
2008, p. 26). An article of physical evidence that, upon examination, yields a level of detail
that allows the item (or person) to be individualized from all other members of the class or
group of similar items (or people) is said to exhibit individual characteristics. It is impor-
tant to realize that only certain types of physical evidence, including pattern evidence such
as fingerprints, firearms/toolmarks, footwear impressions, tire-tread impressions, bite
marks, and fracture comparisons, because of the level of detail potentially exhibited, are
commonly able to be individualized.
Recent advances in DNA technology have ushered some biological evidence and DNA
profiling into this group as well. Chemical and materials evidence, such as paint, soil,
metallic residues, drugs, and fibers, cannot be strictly individualized. It is possible, how-
ever, that these types of items and other trace/transfer evidence can be associated to such
a small class that in some incidents where the number and types of items, weapons, par-
ticipants, and/or vehicles, for instance, can be limited in scope the classification itself can
provide strong investigative leads.
Role of Forensic Science ◾ 105
INCLUSIONS
When the classification of an article of physical evidence can be narrowed, but not to the
point of individualization or exclusivity, the finding is known as an inclusion. In other words,
the questioned item could match the known. The questioned item cannot be excluded as
having come from the known. The questioned item is consistent with the known. A sample
of glass recovered from a burglary suspect’s clothing or a sample of paint collected from the
suspect’s vehicle in a hit-and-run can be compared to known samples collected from the
glass remaining within the window frame of the suspect’s point of entry and paint exem-
plars collected from the victim’s vehicle. The glass samples can be shown to share common
chemical compositions and optical properties, and the paint samples can be shown to share
color and layer structure. The question facing the forensic scientist is how to interpret these
findings. The glass and paint have been placed into small classes, with many different glass
and paint sources being excluded, but it remains unknown and impossible to evaluate how
many sources exist other than the glass panel at the burglary scene and the paint covering
the victim’s vehicle (Gaensslen et al., 2008). Often, an inclusion is the best possible result
generated from the analysis of certain types of physical evidence.
EXCLUSIONS
The opposite end of the spectrum regarding the comparison of unknown samples and
known exemplars is the exclusion. Contrary to inclusions, exclusions are absolute. If differ-
ences exist in the class or individual characteristics between unknown samples and known
exemplars, the known standard is excluded as a potential source of the questioned sample.
Similar to inclusions, however, exclusions still provide investigative leads by redirecting
or targeting an investigation through the elimination of potential suspects, weapons, etc.
As Sir Arthur Conan Doyle stated, through his immortal character and forensic pioneer,
Sherlock Holmes, in the novel The Sign of the Four, “When you have eliminated the impos-
sible, whatever remains, however improbable, must be the truth.”
FINGERPRINTS SECTION
The examination of fingerprints has been an integral part of policing and forensic science for
well over 100 years. The principal reason for this is that fingerprints constitute a unique and
permanent means of personal identification. Fingerprint analysts have formulated three basic
106 ◾ Cory Rodivich
principles that encompass these ideas of the uniqueness and stability of fingerprint identifi-
cation: “A fingerprint is an individual characteristic. No two fingers have yet been found to
possess identical ridge characteristics” (Saferstein, 2009, p. 168). The fingers and palms of the
hands of humans have friction ridge skin, composed of complex patterns of hills (ridges) and
valleys (furrows) designed for gripping. Similar friction ridge skin can also be found on the
soles of the feet. Within a fingerprint pattern are a number of features known as ridge char-
acteristics or minutiae. Fingerprint ridges form the minutiae in three primary ways: by end-
ing abruptly (forming a ridge ending), by splitting into two ridges (forming a bifurcation),
and by being short (forming a dot). The minutiae can then combine to form additional pat-
terns, such as two bifurcations facing each other, forming an island or enclosure (Gaensslen
et al., 2008). The individuality of a fingerprint is determined by a careful examination of the
identity, number, and relative location of these ridge characteristics, meaning that, if two
fingerprint impressions are to match, they must reveal characteristics that are identical and
have the same relative location to one another. The accuracy of fingerprint identification has
been verified by the millions of individuals who have had their fingerprints classified during
the last 110 years, including the nearly 50 million fingerprint records in the Federal Bureau of
Investigation (FBI) database. An identical impression shared by two different people, includ-
ing identical twins, who share an identical genetic makeup, has yet to be discovered.
A fingerprint does not change during an individual’s lifetime (Saferstein, 2009). The
skin is composed of layers of cells, with those nearest the surface making up the outer
layer of skin, known as the epidermis, and those making up the inner layer of skin, known
as the dermis. The shape of a boundary of cells, known as dermal papillae, separating the
epidermis and dermis, determines the pattern of the ridges on the surface of the skin. Once
these dermal papillae form during embryonic development, the ridge patterns and char-
acteristics remain unchanged throughout life, except to enlarge during growth phases.
Attempts to obliterate or obscure one’s fingerprints will prove futile, as it is impossible to
obliterate all of the ridge characteristics on the hand and the presence of permanent scars
only provides new characteristics for identification.
The general ridge patterns of fingerprints allow them to be systematically classified
(Saferstein, 2009). All fingerprints are divided into three classes on the basis of their gen-
eral pattern, which then form the basis for all ten-finger classification systems currently in
use: loops, whorls, and arches. Each pattern has its own general characteristics, which can
be further subdivided into distinct groups. The original classification system, developed
by Sir Edward Henry in the late 19th century, converted ridge patterns on all ten fingers
into a series of letters and numbers arranged in the form of fractions. In the United States,
due to the limited capacity of the original Henry system and the ever-increasing number
of fingerprints on file, the FBI expanded its classification capacity by modifying the Henry
system and adding additional extensions (Saferstein, 2009). This system is used by most
law enforcement agencies in the United States today. A fingerprint classification system in
and of itself cannot be used to identify an individual; it simply provides the examiner with
an organized system of class characteristics from which a list of candidates can be gener-
ated. The identification must always be made and verified by a final, visual comparison of
the questioned print’s and the file print’s minutiae.
Role of Forensic Science ◾ 107
Ten-print card files, however, provide little assistance in cold searches for a single fin-
gerprint when the name of a suspect has not been generated in a specific case. The develop-
ment of computerized fingerprint search systems, or Automated Fingerprint Identification
Systems (AFISs), revolutionized the field by enabling timely and efficient cold searches,
considering that single prints or partials of single prints are generally recovered from crime
scenes or evidence. AFIS technology enables a computer to scan and digitally encode fin-
gerprint minutiae so they can be subject to high-speed processing and searches: “The com-
puter’s search algorithm determines the degree of correlation between the location and
relationship of the minutiae for both the search and file prints” (Saferstein, 2009, p. 175).
During the search for a match, in databases containing both the fingerprints of known
offenders and previously unmatched fingerprints recovered from crime scenes or evidence,
the computer uses a scoring system that produces a list of known prints that most closely
correlate to the minutiae identified on the questioned print input into the system by the
examiner. All of the prints selected by the AFIS system are then visually compared against
the questioned print by the examiner, who makes the final verification of the fingerprint’s
identity. AFIS searches can range in scope from local city, county, and state databases to,
since 1999, a nationwide database, the Integrated Automated Fingerprint Identification
System (IAFIS), which links state AFIS computers with the FBI database containing nearly
50 million fingerprint records.
BIOLOGY/DNA SECTION
Forensic science was again revolutionized throughout the 20th century with early advances
in the analysis of blood and physiological fluid evidence and the advent of modern DNA
(deoxyribonucleic acid) typing. Until the 1980s, when DNA typing was developed, foren-
sic biologists relied on what is now referred to as classical or conventional genetic mark-
ers to try to individualize blood and bodily fluid evidence. The first major category of
conventional genetic markers was blood groups. The first blood group, the ABO system,
was discovered in 1901 and used extensively during the 20th century, prior to modern
DNA typing. Other genetic markers, including isoenzymes, plasma proteins, and hemo-
globin variants, followed suit. The analysis of biological evidence, in its conventional form,
yielded typing matches between an evidence sample and a known person, representative
of inclusions, indicating that the person could be the source of the deposited evidentiary
sample. Modern DNA typing has made considerable strides toward the individualization
of biological evidence.
Genetics is the study and science of inheritance, how parents pass their traits and char-
acteristics to their offspring. By the 1940s, it was clear to scientists that DNA is the genetic
material, the chemical blueprint, of life itself. DNA in humans is found in all cells that con-
tain a nucleus, except red blood cells. As cells divide and differentiate to form the millions
of cells that make up different organs and tissues, DNA is replicated; thus, each cell contains
an identical copy of the person’s DNA, known as the genome. Because most body cells have
a copy of that person’s DNA, almost any fluid, tissue, or organ can be used for DNA typ-
ing. And, because people, whether victims or suspects, are involved in the commission of
108 ◾ Cory Rodivich
crime, DNA evidence can possibly be recovered on any type of case. The bodily fluids that
are most commonly encountered in forensic laboratories are blood, semen, vaginal secre-
tions, saliva, and urine (Gaensslen et al., 2008). DNA typing technology is now sufficiently
sensitive that the possibility of generating a profile from seemingly very small articles of
biological evidence has greatly improved: “Bits of fingernail, dandruff flakes, the skin cell
residues on cigarette butts or filter tips and shed cheek cells from the dried saliva sur-
rounding bite marks have all been successfully DNA profiled in recent years” (Gaensslen
et al., 2008, pp. 224–225).
The analysis of physical evidence bearing potential DNA material, the source of which
can be specified based on the unique facts of a case, consists of several steps, including
preliminary or presumptive screening to detect the possible presence of bodily fluids, con-
firmatory testing to prove that the material being tested for is actually present, species
determination to further specify the probative value of the material (particularly useful in
cases designed to enforce wildlife regulations and bloodshed incidents where the possibil-
ity of encountering animal blood is high), isolation of the actual DNA material from the
known and questioned samples, analysis of specific regions or loci on the DNA strand so a
DNA profile can be generated, and comparison of the profiles generated from both samples
to determine whether the known individual is not the source of the questioned sample or
can be included as a possible contributor to the questioned sample.
Each molecule of DNA consists of a long, spiral structure, the double helix, which has
been likened to a twisted ladder. The “handrails” of the ladder string together the ladder
“rungs.” Each rung consists of two (2) of four (4) varieties of nucleic acids, which are then
combined in pairs. The sequencing of these base pairs constitutes the genetic coding of
DNA. The human genome consists of approximately 3 billion base pairs, about 3 million
of which vary from person to person. Person-to-person differences within a particular seg-
ment of a DNA sequence are known as alleles. DNA typing focuses on identifying and iso-
lating specific fragments of these alleles. Identical fragments appearing on both the known
and questioned samples are considered to represent a match. To determine the likelihood
of this match being mere coincidence, the particular combination of alleles is compared
to the frequency with which it statistically appears in a given population (Lushbaugh and
Weston, 2009).
The study of population genetics examines how often alleles at specific genetic loci occur
in a population. Modern DNA technology and analysis have led forensic scientists to uti-
lize DNA typing kits that examine multiple genetic loci, which provide a very high level
of individualization. By examining multiple loci where variation occurs, a DNA profile
can be produced. When comparing questioned and known DNA profiles, a difference of a
single allele can exclude the known individual as the donor of the questioned sample. The
more loci that exhibit the same allele pattern, the stronger and more statistically significant
the evidence becomes that both samples originate from the same individual (Lushbaugh
and Weston, 2009). As Gaensslen et al. (2008, p. 256) noted, “The level of individuality
produced by DNA typing depends on the population genetics of the loci and the types that
are chosen for the overall DNA profiling.”
Role of Forensic Science ◾ 109
Following inclusion of the known individual in the questioned or evidence profile, sta-
tistical calculations are performed to estimate the probability of the chance duplication of
the DNA profile in the population. For many complete DNA profiles, this probability is
extremely low; however, although the resulting figures can be astronomical, such as 1 in
100 billion, they still remain only probabilities. They do not mean that there cannot be
another person with the same profile. An additional factor to realize is that there are differ-
ent estimates of the probability of chance duplication according to racial or ethnic group:
“Because the frequencies of types within loci can and do vary in different populations, the
different estimates for each of them are commonly given by the analyst so as not to mislead
the courts” (Gaensslen et al., 2008, p. 258). Most DNA laboratories, based on the avail-
able data, can compute these probabilities for Caucasian, African American, and Hispanic
populations. It is important to understand that in a forensic case the race or ethnic group
of the depositor is not known with certainty; even in a DNA-match case with very low
probabilities of chance duplication, there is still a small chance that another person shares
the same profile (Gaensslen et al., 2008).
DNA analysis, as discussed thus far in the field of forensic science, commonly refers
to nuclear DNA analysis. Additional structures contained in the cell, at a rate of hun-
dreds to thousands, are mitochondria, which are responsible for making energy for the
cell to function. Mitochondria contain a small quantity of their own DNA, consisting of
about 16,000 base pairs, making it roughly 10,000 times smaller in size than nuclear DNA.
Another feature is that mitochondrial DNA is strictly inherited maternally. The stability of
the mitochondrial DNA sequence allows it to be traced through the maternal lineage for
many generations. This quality has implications for the use of mitochondrial DNA typing
in cases involving the identification of human remains. Mitochondrial DNA typing has
also proven useful in the analysis of old, degraded, decomposed, or potentially skeleton-
ized samples, where nuclear material is either present in only very small quantities or no
longer available (Gaensslen et al., 2008).
Similar to fingerprints, DNA evidence is represented by a system of classification. DNA
profiles are written as a series of numbers. Modern computer technology has allowed DNA
profiles to be stored in searchable files. CODIS (Combined DNA Index System) is a com-
puter software program developed by the FBI that maintains local, state, and national data-
bases of DNA profiles generated from the known standards of convicted offenders and,
depending on individual state legislation, arrestees (referred to as the offender database),
unsolved crime scene evidence (referred to as the forensic database), and the known stan-
dards of missing persons. Similar to AFIS, CODIS allows analysts to cold search ques-
tioned samples for no-suspect cases and compare both offender and forensic samples on
cases believed to be linked to the same suspect (Saferstein, 2009).
Toolmarks
A toolmark can be defined as a pattern resulting from a harder marking device, or tool, being
forced against a softer object (Gaensslen et al., 2008). Toolmarks commonly encountered by
forensic examiners are created by screwdrivers, pry bars, snips, wire and bolt cutters, claw-
ing instruments, and various other tools, most often used for forced entry into, for example,
a dwelling, business, storage unit, or storage medium. Toolmarks can be classified into two
main types: impressions and striations. Impressions occur when a tool is forced or pushed
into a surface. Striations result when a tool slides or is moved across a surface, depositing a
pattern of scratches (stria) caused by tiny defects along the face, blade, or edge of the tool.
Toolmarks can be recovered as a combination of the two, as in the case of a flat-head screw-
driver being used to pry open a residential entry door. Striations caused by the blade of the
screwdriver could be deposited on metal strike plates lining the doorjamb, while impressions
caused by the round shaft of the screwdriver could be deposited in the wood door itself.
Toolmarks can exhibit either class or individual characteristics, sometimes both.
Impressions most often exhibit class characteristics, as the basic size and shape of the tool
is depressed into a surface. Single-bladed tools, such as pry bars and flat-head screwdrivers,
can easily be distinguished from double-bladed tools, such as the claw end of a hammer or a
nail-puller on the end of some pry tools. Individual characteristics are usually exhibited by
large distributions of striations deposited on metal surfaces. Softer materials, such as wood,
can yield or splinter, reducing contact with the blade of the tool. Cutting instruments used
to cut through wire or a padlock hasp can deposit impressions that can be classified as sin-
gle-edged or double-edged and also leave visible striation patterns, depending on the nature
and size of the surface being cut (e.g., telephone wire vs. bound copper wiring). Impressions
can potentially exhibit granular-type individual detail, depending on the condition of the
tool itself and the elasticity of the surface or material being marked.
A major issue facing toolmark examination is the difficulty in accurately reproducing
the toolmark recovered from the crime scene. Because the toolmark is made by imperfec-
tions on the blade, edge, or marking surface of the tool, the marks left by the tool slid-
ing across or being impressed into a surface at a particular angle may differ from marks
produced when the tool is held at a different angle. The examiner must obtain a series of
exemplars, applying the suspect tool at various angles and pressures, to most accurately
reproduce the evidentiary sample. The primary concern, however, for investigating officers
is locating the suspect tool in a timely manner. The longer the interim between the tool-
mark’s deposit and the toolmark examination, the greater the chance that the defects and
imperfections on the tool’s marking surface have been altered by continued use.
Firearms
“A firearm is a device that, using the rapid combustion of an energetic chemical, is designed
to accelerate a projectile to a high velocity while directing it toward a target” (Gaensslen et
al., 2008, p. 182). In order to understand the principles and practices involved in the exami-
nation of firearms evidence, an introduction to the construction and function of firearms
and ammunition is warranted.
Role of Forensic Science ◾ 111
A cartridge, or live round, consists of four basic components. The cartridge case is the
container of the unit, holding the other three components together; in handguns and rifles,
the cartridge case is a cylindrical piece of brass or nickel-plated brass. The cartridge case is
filled with a propellant (smokeless powder), which can take many shapes, including small
disks, tubes, or balls. The projectile, or bullet, usually constructed of lead or copper-coated
lead, is put into the cartridge case, which is then squeezed around the bullet in order to
make a tight seal. The final component is the primer, which takes the shape of a soft, metal
cup built into the cartridge case at the end opposite the bullet. The primer contains a small
hole, known as the flash hole, in contact with the propellant. A shotshell, or live round fired
through a shotgun, shares similar components, with the main difference being that shot-
shells usually contain multiple projectiles, or pellets, rather than a single bullet (Gaensslen
et al., 2008).
When a cartridge is loaded into the firing chamber and the trigger is pulled, the fir-
ing pin strikes the primer, causing shock-sensitive material within the primer to ignite.
A spark is then transferred through the flash hole to the propellant. The burning powder
exudes heat and creates gases that develop high pressure inside the cartridge case. Because
the bullet is sealed into the cartridge case, this pressure builds rapidly until finally the bul-
let is forced from the case and propelled down the firearm’s barrel at high velocity. This
process, regardless of the size of the ammunition and the firing action of the firearm itself,
remains consistent among firearms. Differences between firearms primarily occur before
and after the firing process—that is, how the cartridge enters the firing chamber and how
the cartridge case is disposed of.
The majority of handguns can be classified into two distinct groups: revolvers and
semiautomatic pistols. Revolvers have cylinders comprised of a number of individual
chambers, each holding a single cartridge. With each successive pull of the trigger, the
cylinder rotates so a new cartridge is placed into the firing chamber and aligned with the
barrel. The fired cartridge cases remain in the cylinder until manually removed. In semi-
automatic pistols, cartridges are contained in magazines that fit into the grip of the pistol.
With each successive trigger pull, the spent cartridge case is mechanically extracted and
ejected from the firing chamber; a new cartridge is then fed into the chamber from the
magazine.
Long guns, or firearms with long barrels designed to be fired from the shoulder, can be
classified into two major groups, rifles and shotguns. Many subclassifications exist within
these two groups, based on their firing actions. The majority of rifles contain magazines,
which feed new cartridges into the firing chamber. The fired cartridge cases can be mechan-
ically extracted and ejected, as in the case of semiautomatic rifles, or manually extracted
and ejected, as in the case of bolt-action and lever-action rifles, although the ejection of
cartridge cases from rifles is not strictly manual. Although the shooter must manually
retract and replace a bolt or lever during the entire process, mechanisms within the fire-
arm actually make contact with the cartridge case during the ejection process. Similarly,
shotguns can contain magazines, often tubular in shape and located below the barrel. The
fired shotshell cases are either mechanically extracted and ejected, as in the case of semi-
automatic shotguns, or manually extracted and ejected (similar to bolt-action and lever-
112 ◾ Cory Rodivich
action rifles), as in the case of pump-action shotguns. Similar to revolvers, shotshells can
be manually loaded and fired, and shotshell cases can be manually removed, as in the case
of single- or double-barrel break action shotguns.
As the process implies, cartridge cases and shotshell cases fired in mechanically extract-
ing and ejecting firearms have the potential to yield more detail of forensic value because,
like toolmark impressions, mechanisms within the firearm make more contact, like a pry
tool on a metal strike plate, with the cartridge or shotshell case, producing additional
marks of interest. The firing pin strikes the primer, producing toolmark #1. The expand-
ing gases within the firing chamber, which produce the force that propels the bullet down
the barrel, then force the cartridge or shotshell case backward in the firing chamber. The
cartridge or shotshell case then strikes the breechface, the surface at the rear of the firing
chamber, producing toolmark #2. Firing pins and breechfaces are machined parts, uni-
versal to firearms regardless of size or firing action. Quality firearms are manufactured by
machining and metal-working blocks of hard steel (Gaensslen et al., 2008). These processes
leave fine stria on the exposed surfaces of the firing pin and breechface, which can then be
transferred or impressed into the primer and base of the cartridge case. In mechanically
extracting and ejecting firearms, there exists the potential for two more points of compari-
son. Following the cartridge or shotshell case striking the breechface, the extractor mecha-
nism latches onto the rimmed edge of the cartridge case, producing toolmark #3, and the
ejector mechanism then strikes the rim of the cartridge case when discharging it from the
firing chamber, producing toolmark #4.
Similar to the machined parts responsible for propelling a bullet from a cartridge case,
the barrel of the firearm itself is tooled for a specific purpose. In handguns and rifles, the
barrel is composed of a series of spiraling grooves known as rifling. Rifling is imparted to
a barrel by devices containing a series of sharp raised areas (teeth) circling a central shaft.
The grooves are cut by pulling or pushing this shaft through the steel barrel and turning
it simultaneously. The raised areas in the barrel between the grooves are called lands. The
desired result is the bullet emerging from the barrel in a rapid spin, following the helical
path of the lands and grooves, in order to improve accuracy (Gaensslen et al., 2008). The
machining process, again, leaves fine stria on the interior surface of the barrel, which can
then be imparted to the bullet as it travels. Shotgun barrels, considering the plastic body
of shotshells and the presence of multiple projectiles or pellets, are typically smooth and
not rifled.
The examination of firearms and firearms evidence consists of three main phases. The
first step in the process is testing the firearm for functionality—in other words, determin-
ing whether the firearm is capable of being fired and whether its safety features are func-
tional. During this process, the firearm is also test fired to obtain exemplars of cartridge or
shotshell cases and bullets to compare against evidence samples. The second step in the pro-
cess is classification, comparing the class characteristics of the exemplars and the evidence
samples. Basic class characteristics include caliber (determined by the inside diameter of
the barrel), shape of the firing pin impression, number and width of the lands and grooves,
and the direction of spin (right or left) imparted on the bullet. The final step in the process
is individualization. If the exemplar and evidence sample share class characteristics, the
Role of Forensic Science ◾ 113
examiner will then attempt to individualize the evidence sample to the exemplar (and
hence the firearm) by comparing the striation patterns present on the cartridge or shotshell
case and the bullet. Of considerable benefit to forensic examination, toolmarks imparted
on firearms evidence by the internal mechanisms involved in a firearm’s firing and func-
tion are highly reproducible. Unlike the defects and imperfections located on the blades of
pry tools and cutting instruments, firearms and the surface characteristics discussed above
will not typically change drastically over time with continued use.
Similar to fingerprint and DNA evidence, firearms examinations are now aided by the
use of computerized databases that allow for cold searching, particularly in cases where the
suspect firearm has not been recovered. The FBI maintains a central, computerized General
Rifling Characteristic (GRC) file, consisting of the class description of thousands of fire-
arms, based on the rifling characteristics imparted to fired bullets. Most of the forensic
laboratories in the United States and many abroad contribute data to this file as examiners
encounter firearms not already listed. Firearms examiners can enter the caliber, number
of lands and grooves, width of the lands and groves, and direction of rotation noted on
an evidence bullet and perform a rapid computer search for known firearms that share
similar class characteristics. Maintained by the Bureau of Alcohol, Tobacco, Firearms,
and Explosives, the National Integrated Ballistics Information Network (NIBIN) contains
images of bullets and cartridge cases recovered from crime scenes and those test fired from
recovered firearms submitted for examination. NIBIN allows these images of bullets and
cartridge cases to be searched and possibly associated with the same firearm, even if the
firearm has yet to be recovered, thereby establishing linkages between cases, potentially
across jurisdictional lines.
Fracture Comparisons
Because similar principles, skills, and equipment are required, firearms and toolmark
examiners can also be called upon to conduct fracture comparisons or physical matches.
Fracture comparisons are performed in an attempt to match randomly fractured or broken
pieces of a solid material or object to show that the broken pieces were originally part of the
same object (Gaensslen et al., 2008). Materials commonly encountered in such compari-
sons include glass, plastic, and metal. Vehicular assault or hit-and-run scenes, for instance,
may contain broken pieces of head lamp lenses or license plate frames. A broken fragment
of a knife blade may be present inside the scene of a stabbing incident or still inside the vic-
tim’s wound. If the suspect vehicle or remaining knife blade can be located prior to repair
or disposal, the edges of both objects, much like a jigsaw puzzle, can be fitted together and
realigned, thus linking the objects to the victim, suspect, and crime scene.
number through a variety of methods to preclude tracking the firearm from manufacturer
to seller to owner. The pressure applied as the number is imparted into the firearm is such
that it deforms the crystal structure of the metal to a depth below the actual indentations
forming the number. When the crystal structure of the metal is strained or deformed, the
metal is more susceptible to attack by chemicals (Gaensslen et al., 2008). The examiner
first smoothes out the area where the number was originally stamped, removes any dirt or
oil, and polishes the surface to a mirror-like finish. The examiner then carefully applies a
strongly acidic or basic (depending on the material being processed) etching solution. The
etching solution dissolves the deformed or strained metal at a faster rate than the unaltered
metal, revealing the pattern of the original numbers. If the suspect doing the defacing did
not go deep enough to eliminate the entire area of strain, then this process often can be
repeated until the entire original serial number is restored.
Hair
An examination of the morphology or structural characteristics of hair, including color,
length, diameter, scale structure, and medullary index, can potentially determine whether
the hair is human or animal in origin, the body area from which the hair originated, the
racial origin of the depositor (especially true for Caucasian or African American head
hair), and whether the hair was forcibly removed from the body of the depositor (Saferstein,
2009). Trace analysis of hair, similar to other materials, cannot, in and of itself, yield indi-
vidual characteristics. Because hair is of biological origin, DNA analysis and determina-
tions must be relied upon for any attempt at individualization.
Fibers
Fibers can be classified into two broad groups, natural and manufactured. Natural fibers
are derived from animal sources, including sheep, goats, or alpacas, or plant sources, such
as cotton. Manufactured fibers are fibers derived from either natural or synthetic poly-
mers, which are substances composed of large numbers of chain-linked molecules. Fibers
manufactured from raw materials, such as cotton or wood pulp, that require the extrac-
tion and chemical treatment of cellulose are classified as regenerated fibers (e.g., acetate,
rayon). Most fibers currently manufactured, however, are produced solely from synthetic
chemicals and are therefore classified as synthetic fibers (e.g., acrylic, nylon, polyester).
Manufactured fibers are marketed under hundreds of trade names. To avoid confusion,
the U.S. Federal Trade Commission has approved generic or family names for the various
groups of all manufactured fibers used to produce goods such as clothing, home furnish-
ings, and vehicle mats and seatbelts. Many of these generic classes (e.g., acrylic, nylon,
polyester, spandex) are produced by numerous manufacturers and sold under a variety of
trade names (Saferstein, 2009).
An examination of the morphological features of fibers, such as color, dye composition,
diameter, cross-sectional shape, chemical composition, and absorption rate of infrared
light, can potentially classify fibers into broad groups and then further classify manu-
factured fibers into generic classes. Many types of nylon, for example, are available for
purchase in consumer markets. Although all types of nylon share common properties,
each may differ in appearance and dye-absorption ability due to modifications in the basic
chemical structure made during the manufacturing process (Saferstein, 2009). As in all
areas of forensic examination, the narrower the classification, the stronger the linkage
among victims, suspects, and crime scenes.
116 ◾ Cory Rodivich
Paint
Most paints have four basic components: (1) binder, a polymeric substance used to bind
paint to the surface; (2) pigments, or coloring agents; (3) fillers and additives; and (4) a
carrier solvent, which allows the paint to be applied easily. The number of combinations
of these basic components is substantial and makes different paints distinguishable upon
analysis (Gaensslen et al., 2008). The examination of paint with regard to color, surface
texture, color layer sequence, and chemical composition of binders and pigments can yield
class matches between known and evidentiary samples, such as samples collected from a
door utilized as the point of entry in a burglary case and samples recovered from a pry tool
suspected of being used to force the door open. In traffic-related cases, an analysis of paint
recovered from the crash or crime scene can often assist in identifying the color, make, and
model of an unknown vehicle based on the various manufacturers’ specifications.
Glass
“Glass is a hard, brittle, amorphous substance composed of sand (silicon oxides) mixed with
various metal oxides. When sand is mixed with other metal oxides, melted at high tem-
peratures and then cooled to a rigid condition without crystallization, the product is glass”
(Saferstein, 2009, p. 423). Glass, based on its chemical composition and manufacturing pro-
cess, can be categorized into many types, such as borosilicates, which are used in vehicle
headlights; soda-lime glass, which is used in most windows and bottles; tempered glass,
which is used in the side and rear windows of vehicles; and laminated glass, which is used
in the front windshields of vehicles. The physical properties of density and refractive index
are used for class matching glass fragments. Density, the measurement of mass per unit of
volume, is a property of matter that remains the same, regardless of the size of an object. A
simple procedure for determining the density of a solid is to first weigh it and then measure
its volume by noting the volume of water it displaces when submerged (Saferstein, 2009).
Refractive index, another physical property of matter that is not dependent on the size of
an object, is defined as the ratio of the speed of light in a vacuum to the speed of light in a
given medium. Refraction refers to the bending of a light wave due to a change in velocity.
The refractive index of a substance varies with its temperature and the wavelength of light
passing through it. This determination is best accomplished by the immersion method, in
which evidentiary and known fragments of glass are immersed in a liquid medium whose
refractive index is adjusted by changing temperature until it equals the refractive indices of
the glass fragments. If both samples of glass exhibit minimum contrast with the immersion
liquid, they can be said to have comparable refractive indices (Saferstein, 2009).
Soil
“For forensic purposes, soil may be thought of as any disintegrated surface material, natural
or artificial, that lies on or near the Earth’s surface” (Saferstein, 2009, p. 435). Generally, these
materials are naturally occurring vegetation, rocks, minerals, and animal matter, but they
can also be such manufactured trace elements as glass, paint, asphalt, and brick fragments,
the presence of which gives soil particular characteristics applicable to a specific location.
Role of Forensic Science ◾ 117
Soil evidence found adhering to a victim’s or suspect’s clothing or shoes or to the tires
and undercarriage of a vehicle can be compared to known exemplars collected from the
crime scene. The forensic value of soil increases in relation to variations in its composition at
the crime scene; if, for example, soil content and composition are indistinguishable for miles
surrounding the crime scene, the soil evidence would have little to no value in associating
soil found on the suspect with that found at the crime scene. Microscopic examination of
soil is conducted for the comparative value of class characteristics, such as color, texture,
presence of plant and animal material and artificial debris, and the color, geometric shape,
density, and refractive index of rocks and minerals present. Considering the potential variety
in soil colors, rocks, minerals, and artificial debris possibly present, trace analysts schooled
in geology can be presented with many points of comparison among specimens.
TOXICOLOGY SECTION
Toxicologists detect and identify drugs and poisons (toxins) in bodily fluids, tissues, and
organs. Samples may include a vial of drawn blood from a suspect in a DUI case, whole
blood and urine samples from the victim of a sexual assault who reports being given a
drug, or fluid and hair samples obtained from deceased victims in suspected overdose or
118 ◾ Cory Rodivich
homicidal poisoning cases. Similar to drug identification testing, analysts employ a series
of screening and confirmatory tests to identify the chemical structure, or signature, of
substances. As the human body is an active chemistry laboratory, few substances enter and
completely leave the body in the same chemical state; therefore, a thorough understand-
ing of how the body alters and metabolizes the chemical structure of a drug is essential to
detecting its presence in appropriately collected samples (Saferstein, 2009).
PHOTOGRAPHY SECTION
The functions of a complete photographic laboratory are both numerous and vital, as
documentation is a key aspect of any forensic investigation, whether in the field or in a
laboratory setting. This section can be responsible simply for processing and storing film
negatives and digital images obtained by examiners during their analyses, but technicians
can also be tasked with processing photographic prints and enlargements and preparing
photographic exhibits for courtroom presentations. To effectively assist examiners, foren-
sic photographers must also be skilled in manipulating cameras and various light sources
and spectra to best capture articles of physical evidence, such as impressions, whose exam-
ination can be conducted using photographs. Forensic photographers can also use their
expertise and the technology made available to them to generate evidence that cannot be
seen by the human eye; for example, ultraviolet and infrared photography can be used to
detect document forgeries, as well as bloodstains or gunshot residue particles on dark-
colored surfaces. This section can also be responsible for the analysis and enhancement
of video evidence, most often involving security or surveillance videos that have captured
persons, actions, or vehicles relevant to investigations.
FORENSIC MEDICINE
Forensic medicine can be divided into two distinct fields, forensic pathology and forensic
nursing. Forensic pathologists are doctors of medicine with advanced forensic training
who are expert in determining the cause and manner of death. The cause of death is a
medical determination, a medical explanation for why a person died (e.g., gunshot injuries,
sharp force trauma, blunt force trauma, asphyxiation). The manner of death (homicide,
suicide, accidental, or natural) is a medicolegal determination that considers all available
information, including that gathered from crime scenes, police investigations, and foren-
sic laboratory examinations. The pathologist, or medical examiner in most jurisdictions,
makes this determination after conducting an autopsy, or postmortem examination, of the
decedent. Postmortem examinations generally entail, but are not limited to, the removal of
the internal organs of the chest, abdomen, and head, which are then dissected to determine
disease or injury, as well as the collection of fluid, tissue, and organ samples for subsequent
toxicological analyses. Similar to any crime scene, the decedent is a valuable source of
physical evidence, including DNA, trace evidence, and possibly impressions, which can be
used to identify suspects and establish linkages. As the medical examiner holds jurisdic-
tion over the decedent, the pathologist is also tasked with the search and collection of such
evidence. In most major jurisdictions, the medical examiner’s office is directly associated,
both in location and administration, with the forensic laboratory.
120 ◾ Cory Rodivich
Forensic nurses are registered nurses employed by hospitals, clinics, or other medical
facilities. They have received advanced forensic training in the identification, collection,
and preservation of physical evidence derived from living patients. Forensic nurses are
most often involved in this process during the investigation of sexual assault incidents.
Many jurisdictions, in conjunction with local police agencies and medical facilities, have
assembled a Sexual Assault Nurse Examiner/Sexual Assault Response Team (SANE/SART),
which is staffed with forensic nurses who conduct medical examinations of sexual assault
victims. The SANE/SART examination consists of two parts: (1) physical examination of
the victim to locate, document, and treat associated wounds or injuries; and (2) collection
of the standardized sexual assault evidence collection kit. The sexual assault evidence col-
lection kit serves the dual purpose of collecting known standards of biological material
from the victim and collecting evidence samples of possible biological material transferred
from the suspect. Components of a sexual assault evidence collection kit include vaginal
and rectal swabs, pubic hair combings, and fingernail scrapings. In cases involving the
suspected use of narcotics, whole blood and urine samples are also collected for toxicologi-
cal analysis.
FORENSIC ANTHROPOLOGY
Forensic anthropologists are physical anthropologists specialized in examining human
skeletal remains. Depending on the condition and amount of skeletal remains recovered,
forensic anthropologists can provide class estimates of the age, sex, stature, and group or
ethnic affiliation of the individual, in addition to analyzing any skeletal abnormalities or
trauma present. Forensic anthropologists can often assist field investigators in the recov-
ery of remains, whether scattered about the surface or buried in the ground, as they are
highly skilled in the basic principles and methodology of archaeology. Forensic anthro-
pologists can also lend their knowledge and skill to the science of forensic taphonomy,
which deals with the history of a body after death. Forensic taphonomy can be an impor-
tant part of a criminal death investigation, as postmortem changes in human remains
can affect estimates of time since death, identification of the individual, and the ability
to determine the cause and manner of death (James and Nordby, 2005). Although not
directly included in the forensic anthropologist’s responsibilities, an associated discipline
known as forensic sculpture or forensic facial imaging involves specialists attempting to
reconstruct what an individual’s face may have looked like based on observable features
of a recovered skull.
FORENSIC ODONTOLOGY
Forensic odontologists are forensic dentists who conduct two major types of analyses involv-
ing human teeth. The first is the identification of human remains that are so altered by
decomposition, fire, or explosion that they cannot be identified by visual means. Typically,
the odontologist will compare postmortem dental x-rays with dental x-rays taken when the
person suspected of being the decedent was alive. Like forensic anthropologists, forensic
Role of Forensic Science ◾ 121
odontologists are very useful in this manner on the scenes of mass disaster situations. The
second major examination conducted by forensic odontologists is comparing known and
evidentiary bite-mark impressions (Gaensslen et al., 2008).
FORENSIC ENTOMOLOGY
Entomology is the study of insect species. Forensic entomologists can analyze the life cycles
of insect species (from egg to larva to pupa to adult) recovered from corpses and combine
their results with environmental factors from the scene, such as temperature and length of
daylight hours, to calculate an estimate of the individual’s time of death when the issue is
in question.
FORENSIC PSYCHOLOGY
Forensic psychologists evaluate criminal offenders to determine competence to stand trial
and may also be involved in offender treatment programs. Specialists in this area may also
profile criminal cases, primarily those involving serial murder or serial rape. Profilers can
sometimes provide useful investigative leads about the characteristics of unidentified sus-
pects based on their modus operandi, behavior patterns, and crime scene patterns.
FORENSIC ENGINEERING
Forensic engineers are professionals expertly trained in a particular engineering specialty
(e.g., mechanical, electrical, civil). Forensic engineers can assist law enforcement in the
investigation of transportation system disasters, materials failure cases, and building or
structure collapses.
FORENSIC RECONSTRUCTION
Reconstruction can be defined as “the use of physical evidence and its analysis to try to
understand the events that produced that evidence” (Gaensslen et al., 2008, p. 27). The recon-
struction of the sequence of events that occurred prior to, during, and subsequent to the
122 ◾ Cory Rodivich
commission of a crime is heavily based on observations made at crime scenes, findings from
postmortem examinations of victims, and forensic analysis of recovered physical evidence.
Statements of living individuals involved in the incident are also evaluated during the for-
mulation of a reconstruction hypothesis, but, like hypotheses in general, testing conducted
both in the field and in the laboratory can either support or disprove those statements. The
reconstruction of a crime is very much a collaborative effort between law enforcement per-
sonnel and forensic investigators. Forensic or crime scene reconstruction can be interpretive
or very scientific and mathematical. What is paramount, however, is that strict adherence
to the scientific method is maintained, which, above all, includes the qualities of objectivity
and falsifiability, the ability of a theory to be disproved when presented with other plausible
alternatives. Reconstructionists can be well trained and highly skilled field investigators or
laboratory analysts who have immediate access to the scenes of incidents, or they can be pri-
vate consultants, perhaps retired after years of professional forensic experience and training,
who are enlisted to provide their expertise. In either circumstance, thorough and detailed
scene documentation is crucial. As previously discussed, reconstruction of the sequence of
events occurring during the commission of a crime can be both interpretive and very sci-
entific or mathematical. The three major disciplines or areas of study specifically applied to
scene reconstruction are vehicle or traffic crash reconstruction, bloodstain pattern analysis,
and shooting incident reconstruction, also known as external ballistics.
involves the consideration of such factors as number, dispersion, shape, size, volume, orien-
tation, location, and surface textures. Information potentially generated from the interpre-
tation and in some cases mathematical calculation of bloodstain patterns includes the basic
nature of the action causing the pattern, the direction from which the blood originated, the
angle at which a blood droplet struck a surface, the approximate location or position of a
victim at the time a blood-drawing wound was inflicted, the approximate location of the
suspect inflicting the blood-drawing wound, the minimum number of blows that struck a
bleeding victim, and the movement characteristics of a bleeding individual at a crime scene
(Saferstein, 2009). As blood is a fluid affected by the laws of physics, bloodstain patterns
resulting from a particular action are capable of being reproduced by the analyst.
BIBLIOGRAPHY
Chisum, W.J. and Turvey, B.E., Eds. (2007). Crime Reconstruction. Burlington, MA: Elsevier.
Gaensslen, R.E., Harris, H.A., and Lee, H.C. (2008). Introduction to Forensic Science and Criminalistics.
New York: McGraw-Hill.
Girard, J.E. (2008). Criminalistics: Forensic Science and Crime. Sudbury, MA: Jones & Bartlett.
Houde, J. (1999). Crime Lab: A Guide for Nonscientists. Ventura, CA: Calico Press.
James, S.H. and Nordby, J.J., Eds. (2005). Forensic Science: An Introduction to Scientific and Investigative
Techniques, 2nd ed. Boca Raton, FL: CRC Press.
Lushbaugh, C.A. and Weston, P.B. (2009). Criminal Investigation: Basic Perspectives, 11th ed. Upper
Saddle River, NJ: Prentice Hall.
Saferstein, R. (2009). Forensic Science: From the Crime Scene to the Crime Lab. Upper Saddle River,
NJ: Prentice Hall.
Saferstein, R. (2011). Criminalistics: An Introduction to Forensic Science, 10th ed. Upper Saddle River,
NJ: Prentice Hall.
3
Property Crimes and Financial Investigations
Chapter 8 ■ Vandalism
125
Chapter 8
Vandalism
Matthew O’Deane
San Diego California District Attorney’s Office
CHAPTER OBJECTIVES
After reading this chapter, you should be able to do the following:
1. Identify the impact of vandalism and what purpose it serves to those engag-
ing in it.
2. Describe how the police respond to the vandalism problem.
3. Identify ways in which communities can prevent vandalism.
4. Discuss how vandalism cases are prosecuted and addressed in the court
system.
Chapter Outline
• Introduction
• Vandalism Impact
• Taggers vs. Gangs
• Vandalism Reveals Monikers
• Graffiti Is All about Respect, or Disrespect
• Folks and People Alliances
• Police Response
• Gang Injunctions
• Graffiti Search Warrants
• Control Techniques
• Educating Parents and the Community
• Vandalism and the Media
• Vandalism Prosecution
127
128 ◾ Matthew O’Deane
INTRODUCTION
The most visible and most problematic form of vandalism in the United States is the unlaw-
ful application of graffiti. The existing research on graffiti does not make it easy to deter-
mine where graffiti got its start in America. If writing on cave walls counts, then the first
taggers were prehistoric. More recently, during World War II, the phrase “Kilroy was here”
was written on tanks and military equipment throughout Europe and was later seen in the
subway systems in New York. In the 1950s, street gangs began using graffiti to mark their
territory, promote their gangs, and intimidate the community. The word “graffiti” comes
from the Italian word for scratch, graffio. Graffiti is any unauthorized inscription, word,
figure, mark, or design that is written, marked, etched, scratched, drawn, or painted on real
or personal property, with the intent of having it be seen by the passing public. The negative
impact of graffiti on a community is significant, as it can instill feelings of fear and insecu-
rity, it causes significant problems for local jurisdictions that have to keep the community
clean, residents and businesses often flee the area, and property values plummet. The pres-
ence of graffiti vandalism is an affront to all who live, work, and visit a community. Such
unauthorized inscriptions and graffiti are a major problem around the world, not just in
the United States. Graffiti is often referred to as the “newspaper of the streets” in the gang
and tagger subculture. If that is true, we as law enforcement officers need to make sure we
get the subscription so we can tell what is going on around us. We need to understand all
of the basic elements of graffiti—why it is used and what it means. Gangs use graffiti to gain
recognition or express the identity of the gang, and gang members are motivated to put
up graffiti to reflect their loyalty to their gang. In some cases, members may be ordered by
their gang to put up graffiti to demonstrate their worthiness to join and to prove that they
are committed to the gang. A gang’s desire to mark their territory and let others know who
they are can be exploited by investigators.
It is a critical skill to understand the graffiti in your area and to be able to read it,
explain it, and document it so the graffiti can be used against the gangs and crews and
their individual members. Graffiti offers many practical investigative tips; for example, it
can help in identifying the size and strength of the local gang, their monikers, pending or
past crimes, ongoing rivalries, and their boundaries. Gangs use graffiti to claim their turf
by marking their neighborhoods with graffiti on fences, schools, sidewalks, walls, homes,
and street signs. Graffiti is a very important element in the investigation of street gangs. In
many ways, gang graffiti is a code, and, like most codes, it is susceptible to analysis if you
take the time and effort to do so.
VANDALISM IMPACT
The dollar amount spent on graffiti cleanup is enormous. In 2000, the national cost for
graffiti cleanup exceeded $4 billion dollars, which is widely seen as a very conservative
estimate, as only a fraction of vandalism incidents are ever reported. The police try to work
closely with other city departments, such as public works or parks and recreation, as well as
private property owners, to address this problem. The average cost of removing or painting
Vandalism ◾ 129
over graffiti is $552 per incident in Los Angeles County, and the county spends over $30
million per year in graffiti cleanup costs. This is not unique to Los Angeles; every major city
in this country has similar issues, and graffiti vandalism has significant economic reper-
cussions everywhere it appears. The money used to clean up the damage could be directed
instead toward many more productive programs or to putting more police officers on the
street or addressing a wide range of social ills. Also, business owners who have to clean up
their businesses after taggers hit typically offset their costs by charging higher prices for
their products. Aside from the cost, graffiti makes our cities look rundown and trashed.
One of the more costly forms of vandalism occurs when people etch or scribe their names
into glass, such as commercial business or bus windows. The replacement cost of glass in
windows is typically between $20 and $30 dollars per square foot, depending on the grade
of the glass, thickness, cut, and whether the glass is tempered or tinted. When vandals use
glass as their canvas, repairing the damage can cost up to 50 times more than for conven-
tional graffiti painted on a concrete wall. This type of vandalism is difficult to prevent, as
a number of hard objects can be used to etch glass, luan, Lucite®, or other surfaces such as
anodized or polished aluminum or stainless steel. In many cases, governmental agencies
are tasked with cleaning up graffiti. With budgets having to be cut everywhere, govern-
ments can ill afford the millions of dollars required to deal with graffiti. On a positive note,
technology has allowed crime prevention concepts to be designed into many products to
make the financial impact of vandalism less costly. These techniques are discussed later in
the chapter.
The only people that I have met who enjoy looking around vandalized communities
are the gang members and taggers that put the graffiti there. Graffiti is believed to have a
direct link to other crimes in a neighborhood; when it is not quickly removed and is left
unchallenged, it often attracts more serious criminal activity. Graffiti leads to a loss of
neighborhood pride, and people begin to feel intimidated in their own neighborhoods.
Graffiti lowers property values and negatively impacts local business, as people tend to
avoid businesses that have been vandalized in this way. In areas where gangs are allowed to
destroy property at will, the physical environment supports the gang subculture and gives
the local gang more power and more control over the target area. According to the “broken
window” theory proposed by Kelling and Wilson (1982), if a window in a building is bro-
ken and left unrepaired, the rest of the windows will soon be broken, as this is taken as an
indicator that the community does not have any interest in how the neighborhood looks.
The authors suggested that untended physical disorder, antisocial behavior, and nuisance
activity all lead to the breakdown of social control and increases crime.
When residents perceive that crime is rising, they often react by avoiding public spaces
such as parks, and their involvement in neighborhood events is significantly reduced.
That is why gang enforcement in many neighborhoods focuses on the central community
parks where gangs tend to congregate so the parks can be reclaimed for legitimate public
activities. The common neighborhood response of not using public spaces for recreation
and leisure because of the gang’s presence disrupts social balance and community attach-
ment to the park and subsequently decreases the community’s ability to regulate criminal
behavior.
130 ◾ Matthew O’Deane
As crime in a community increases, so does fear of the local gang. Those with the means
to do so tend to move out of the area, leaving behind those who are either unable or unwill-
ing to counter the presence of the local gang (Shaw and McKay, 1942). The remaining
residents become even less likely to report crimes committed by the gang and less likely to
provide information to the police. The community purposefully or inadvertently helps the
gangs evade justice for crimes committed against the community. In areas where gangs are
allowed to destroy property at will, the physical environment supports the gang subculture
and gives the local gang more power and more control over the target area (BJA, 1998;
Dubin, 1959; Goldstein, 1990).
In 1992, a group of police, prosecutors, and neighborhood residents in Los Angeles
gathered and determined that the need for other remedies such as trash collection, graffiti
cleanup, and building and code enforcement to improve the quality of life in neighborhoods
should go hand in hand with each injunction (Skogan, 1988). Thus, civil gang abatement
is often viewed as most effective when used as part of a coordinated effort involving law
enforcement, community mobilization, and the restoration of municipal services essential
to quality of life (Hanh, 1992). Graffiti may be considered a low priority compared to other
crimes, but to the small business owner it is very costly, both in clean-up and in the nega-
tive perception of being in unsafe areas. One thing everyone seems to agree on is that local
businesses smeared with paint and markers are suffering heavy financial and emotional
costs, and it scares away potential customers, which results in businesses increasing prices
to offset their losses.
Taggers come from every race and socioeconomic background; most taggers are males.
Taggers can be identified in many cases by the graffiti written on their clothing, such as
their shoes or inside their baseball caps; schoolbooks; notebooks; backpacks; compact
disc covers; and bedroom furniture or walls. They frequently wear baggy pants and carry
backpacks when headed out to vandalize, carrying with them cans of spray paint, various
colors and types of magic markers, etching tools, piece books, slap tags, and cameras to
photograph their creations. Many times taggers carry the tools used for etching glass or
mirror surfaces such as spark plug porcelain, drill bits, screwdrivers with a sharpened tip,
small rocks, or any other type of sharp instrument. They may also carry stickers that have
drawings or a tagging moniker written on them. These stickers are used to “slap tag”—that
is, they are slapped on a surface and are difficult to remove and generally leave a residue.
Many times taggers can be identified by paint or marker residue on their fingertips, and
they may carry notebooks that contain tagging drawings. They tend to visit tagging web-
sites, subscribe to tagging magazines, or have photographs of tagging in their possession.
Taggers generally tag in or near their own neighborhoods and, like traditional gang mem-
bers, associate with other people who exhibit these same traits.
Tagging has long been considered a steppingstone to gang membership. The term “tag”
is believed to be derived from an early group of graffiti artists who called themselves the
“Tuff Artist Group.” Taggers in many cases are not the same as gang members, although
many taggers and their crews have turned into gangs over the years. A tagger is a person
who adopts a nickname (i.e., tag) as opposed to a gang member’s moniker. They write their
tag in as many places as possible so it can be seen by as many people as possible. Taggers
enjoy greater popularity and reknown among their peers when their tags can be seen in
many locations, especially those difficult to access. Taggers have their own subculture,
language, and dress that set them apart from street gangs. Their clothing tends to be very
baggy to conceal their spray paint and brighter than the clothing worn by gangs. Many
wear clothing designed specifically for taggers and emulate popular hip-hop culture. Some
crews are all one ethnicity, but taggers as a whole care less about the race of the person
and more about how often they can get the crew name up on walls, freeway signs, subway
trains, buses, and other public places.
Taggers tend to be younger kids, typically 12 to 18 years old. The older kids are often
referred to as “kings,” the younger kids as “toys.” Tagger crews can range in size from 4 to
as many as 200 members. When rivalries occur between crews, they sometimes solve the
dispute with a “battle,” a competition where the rival crews have a designated time frame
in which to mark a particular area. Their work is then judged by a predetermined third
party. The winner keeps their name; the loser has to change their name.
Tagger crew names are typically three letters, although they can range from two to five
letters; the letters represent the full name of the crew (e.g., RCA for Ruthless City Artists,
RTS for Running the Show, SEK for South East Kings). Numbers in a crew name can derive
from a phone pad number (e.g., 787 for RTS) or can be a code that represents letters (e.g.,
1 = A, 2 = B). They can also be telephone area codes, penal codes, or a combination of any
of these elements to add to the confusion; for example, 1972 on a wall could represent the
Sycho Pathic Crew (i.e., the 19 equals S from the number/letter code, and 7 equals P and
132 ◾ Matthew O’Deane
2 equals C from the phone pad). A lot can be learned about gang members based on their
monikers, and the same is true when looking at the name of a tagging crew. Many tag-
gers consider themselves just a group of writers, not vandals; they feel that they have the
talent of professional writers and as such often incorporate the term “writer” into their
name. Examples include Able to Rite (ATR), Kalling All Riters (KAR), Writers Making
Masterpieces (WMM), or The Write to Survive (TWTS). Some crews honor their favorite
method for applying graffiti, such as Spray Kan Artists (SKA), Living on Aerosol (LOA),
or Krylon Criminals (KC). Other crews honor the destructive nature of their activity, such
as Trash Shit Up (TSU), City under Siege (CUS), or Leaving Serious Damage (LSD). Some
names tell you what targets the gang prefers, such as All Over Buses (AOB), Rapid Transit
District Killers (RTDK), or Interstate Freeway Taggers (IFT). Others tell you the ethnicity
of the gang, such as Mexicans Taking Kontrol (MTK), The Mexican Kings (TMK), or Krazy
Ass Mexicans (KAM). Some names give away the gender of the group, such as Bitches with
Attitude (BWA), Queens Causing Trouble (QCT), or Crazy Fantasy Girls (CFG). Still other
names suggest how the crews view themselves, such as Criminals Out Shooting (COS) or
We’re No Angels (WNA).
Taggers as we know them today have made a significant transition from the early days.
Crews have become more violent, and many have been classified as “tag bangers” by police.
Once a tagger crew starts to claim a turf, jump members into the group, actively attack
rivals for entering their turf, and align with other gangs for protection, they are no longer
a tagger crew. It is important to clarify that a tag banger is a gang member. From a law
enforcement perspective, it is important to investigate taggers in the same manner as we
do street gangs. The first thing many officers need to do is eliminate the mindset that it is
“just tagging.” Vandalism and property crimes take a back seat to violent crimes for many
officers, but not dealing with the graffiti problem in an aggressive manner allows the gang
problem to get worse. It is also important to note that many street gang members have tag-
ger friends and may even adopt a tag so they can claim to be “just” a tagger when stopped
by police.
Increasingly, they are wannabe gangsters who use the mobility and guise of a tagger
crew to take their crimes beyond the boundaries of their turf. They generally work under
the cover of darkness, particularly when doing extensive murals and marking freeway
signs and other public places where risk of exposure is high. They will, however, deface
property whenever they have the opportunity to do so. Taggers typically plan graffiti mis-
sions in advance and conduct prior surveillance of locations to check for security, cameras,
and potential escape routes.
Gang graffiti serves one of the following purposes:
Gang members have placed a major emphasis on identifying themselves and their gang
affiliation, and they use a variety of methods to communicate with each other and carry
out their gang-related business, one of the most visible being graffiti. Graffiti illustrates the
individual gang member’s commitment to the gang and their claim to the neighborhood; it
tells the world who they are and what they represent. Graffiti is also great evidence against
gang members and has tremendous investigative significance for anyone who investigates
gang members and gang crimes.
For Hispanic gangs from Southern California, the number 13 (often written on the
streets as XIII or X3) represents the fact that these gangs are Surenos (Southerners). The
number 13 represents the letter M, which is the 13th letter of the alphabet, and the letter M
stands for “Eme,” or the Mexican Mafia. Gangs from Northern California, called Nortenos,
may use the number 14 (XIV or X4), which represents N, the 14th letter of the alphabet,
and the letter N stands for Nuestra Familia. The Fresno Chankla Bulldogs, for example,
use 14 to indicate that they are aligned with the north, and the Old Town National City
(OTNC) gang uses 13 to indicate that they are aligned with the south. Many gang names,
particularly those from Southern California, include the numbers or names of the streets
on which the gang was originally founded (e.g., 18th Street and 38th Street in Los Angeles,
7th Street in San Bernardino, or 30th Street in San Diego). Many Los Angeles area gangs
use telephone area codes in their graffiti. Sometimes the side of town may also be indicated
by number, such as 519, which represents the East Side (i.e., 5 for E, 19 for S).
Gang graffiti helps the police investigate gangs and understand many aspects of gangs,
including the different ways in which a gang can express its name. Graffiti typically helps
the police identify a street gang’s territory and provides other useful information, such as
the monikers of individual street gang members, indications of pending gang violence,
current rivalries, and overall size of the gang based on gang rosters. When detectives start
from what is believed to be the center of a gang’s territory and follow the graffiti out in
every direction, they can define the borders of that gang. Having recent examples of graffiti
around the perimeter of an area is one of the best and most accurate methods to show the
gang’s recent presence in the area and help prove their claim on the area to a court of law.
unknown offender. The moniker may reflect a distinctive aspect of a gang member’s personality,
physical characteristics, reputation, or other trait. These names may be quite simple and typi-
cally refer to the appearance or personality of the gang member, such as “Lonely,” “Silent,”
“Playboy,” “Droopy,” “Boxer,” “Popeye,” “Shy Boy,” “Pony,” “Pirate,” “Sneaky,” “Speedy,”
“Gordo,” or “Flaco.” A moniker can also shed some light on the person’s status or a particu-
lar talent; for example, someone known as “Trigger” or “Shooter” likely has a propensity to
use or possess firearms.
Identifying the monikers of gang members is very important for documentation and
conducting gang-related investigations. Gang members now use monikers so dependably
that they can provide a critical source of investigative information. Self-admissions, graffiti,
informant interviews, and monitoring or recording inmate visits or conversations among
gang members are some ways to identify gang members’ monikers during an investigation.
Typically, graffiti will include the name of the gang, nicknames of the members, and slo-
gans, messages, or symbols exclusive to the gang (see Figure 8.1). Gang names are usually
abbreviated to two or three letters but the affiliation of the gang may be written out (e.g.,
Crips, Bloods, Surenos, Nortenos, Folks, People), as well as their slogans.
gain the recognition they desire by applying their tag name in as many places as pos-
sible, despite the impact on the community. Because members of different gangs often live
in close proximity to one another, graffiti can and usually does provoke confrontations.
Gangs may misspell or alter a rival gang’s name or symbol as a sign of disrespect, or they
may add “Killer” to a rival gang’s name; for example, a Blood member might paint “Crip
Killer” or abbreviate it as “CK.” A West Coast Crip gang member will use “FUCC” for the
word “FUCK,” because he does not want to use the letters “CK,” which could be mistaken
as standing for Crip Killer, which he most definitely is not. Often graffiti threatens or chal-
lenges rival gangs. A gang typically will cross out the graffiti of a rival gang or gang mem-
ber or write “187” (for homicide) or some other derogatory term next to it.
POLICE RESPONSE
Many law enforcement operations targeting gangs are designed to protect the physi-
cal environment and limit social disorganization in the neighborhoods (Akiyama, 2003;
Livingston, 1997; Wilson, 1988). When gang members are in possession of marker pens,
spray paint cans, or other sharp objects capable of defacing private or public property, they
are ready to damage property where they feel it is appropriate. As such, it is important for
law enforcement to address such minor violations to limit the potential damage to public
and private property and hinder gang members’ ability to advertise themselves to the com-
munity. When the police apprehend gang members spray painting, marking with marker
pens, scratching glass windows of shops or public transit, applying stickers, or otherwise
applying graffiti on any public or private property, including but not limited to streets,
alleys, residences, block walls, vehicles, or any other real or personal property, they are
helping protect the environment of the neighborhood, in theory, and holding gang mem-
bers responsible for even minor violations. A police agency may want to organize a trap for
a tagger operation, which may include selecting an area that is heavily targeted by vandals,
finding a wall to paint clean as a tempting target, and conducting surveillance. The key is
to know the area well; taggers typically tend to run upon contact, so it is essential to have
136 ◾ Matthew O’Deane
a sufficient number of officers to cut off potential escape routes. Video surveillance makes
these cases easy to prove, and because the witnesses are police officers citizen informants
are not necessary.
GANG INJUNCTIONS
Provisions of gang injunctions include restricting the possession of marker pens, spray
paint cans, or other sharp objects capable of defacing private or public property, as well
as spray painting, marking with marker pens, scratching, applying stickers or otherwise
applying graffiti on any public or private property, including but not limited to streets,
alleys, residences, block walls, vehicles, or any other real or personal property. Some injunc-
tions contain wording that restricts damaging or vandalizing the property of another, both
public and private property, including but limited to any vehicle, light fixture, door, fence,
wall, gate, window, building, street sign, utility box, telephone box, trees, or power poles
(Crowe, 2000). In 1982, the Los Angeles city attorney and the Los Angeles police took a new
approach to addressing the problem of gang graffiti. A civil gang injunction was obtained
against three gangs; Dogtown, Primera Flats, and the 62nd East Coast Crips. Seventy-two
members of the three gangs were targeted with a civil gang injunction that had restrictions
only aimed at reducing graffiti, including prohibiting graffiti on private property, on public
property, and trespassing on private property with the intent to place graffiti. The injunc-
tion also contained an order for the gang to clean up the graffiti that displayed the name
of their gangs. The graffiti attributed to these gangs covered storefronts, billboards, houses,
and fences and allowed the gangs to control their territory. The injunction required the 72
named defendants to do 5 hours of community service to clean up their graffiti. The drive
for this graffiti cleanup was based in part on the theories of Thrasher (1927), who suggested
that gang graffiti promoted solidarity, group awareness, and attachment to a local territory.
CONTROL TECHNIQUES
Vandalism control can be accomplished in several ways: by dealing with at-risk youth who
may become vandals (prevention), dealing with those that have already joined gangs or tag-
ger crews (intervention), and holding vandals accountable for their actions (suppression).
PREVENTION
True vandalism prevention seeks to work in innovative and creative ways to enable young
people to feel empowered to make safe and informed choices. One approach is to work with
young people to raise their awareness of the risks of gang and tagger crew involvement, the
consequences of engaging in criminal acts of vandalism, and developing exit strategies for
those who are already involved in doing acts of vandalism. Vandalism prevention includes
the strategies, actions, and efforts used to dissuade youth from getting involved in gangs
and tagger crews, violence, and antisocial behavior. The goal is to find those youth who are
most likely to join a gang in the future and offer them alternatives and support to make bet-
ter choices. Examples include information campaigns, after-school and summer programs,
truancy and dropout prevention, and prenatal and infancy support. Stopping youth from
joining in the first place will obviously reduce gang membership and gang crime. Also
138 ◾ Matthew O’Deane
INTERVENTION
Intervention includes the strategies, actions, and efforts used to dissuade youth from
continuing their involvement in a gang and to discourage violence and antisocial behav-
ior. Intervention targets active gang members and their close associates, and it requires
aggressive outreach, ongoing recruitment, and careful planning and coordination. A mul-
tidisciplinary intervention team can provide assessment, intervention planning, and case
management, relying upon the proverbial carrot and stick, where the carrot represents
opportunities and the stick accountability.
The Los Angeles County Sheriff’s Department and the cities of Downey, La Mirada,
Norwalk, Santa Fe Springs, and Whittier launched Aware Teens against Graffiti (ATAG),
an innovative delinquency prevention program that targets first-time tagging and vandal-
ism offenders between the ages of 9 to 15 and their parents. The weekend-long program
focuses on the parents receiving an intensive two-day skill-building training, and the
youth offenders participating in community service projects and group discussions while
being supervised by law enforcement. The goal is to get the first-time offender through the
system and encourage them not to reoffend.
What motivates graffiti vandals? Some of them just want to damage property, but most
get a thrill out of seeing their art or tags in places where lots of other people can see them,
too. If you can deny graffiti vandals this thrill, they will go elsewhere next time or may
reduce their involvement in vandalism activity altogether. Over the past several years,
graffiti vandalism has exploded nationwide; particularly hard hit is San Diego, CA, where
graffiti costs the city millions of dollars annually. Many individual citizens and commu-
nity-based groups are working to stop the vandals and repair the damage they are causing.
Also, modern advances are reducing the costs associated with repairing vandalism; for
example, San Diego transit buses now have a thin layer of plastic on both sides of the glass
that can be more easily replaced when vandals scratch their names in the glass, keeping
transit cleaner for less money.
Law enforcement personnel report that many graffiti vandals claim to have stolen or
“racked” the paint, markers, or etching tools used in their crimes. Vandals also claim that
they have no problem buying spray paint from retail stores. The city’s Responsible Retailer
Program is a direct and practical response to this problem, where retailers voluntarily step
up employee education and internal security to deprive graffiti vandals of the legitimate
products they misuse to commit property crimes. The program involves in-store activi-
ties designed to reduce retail theft of potential graffiti tools and to stop the illegal sale of
spray paint to customers under the age of 18. It includes training store employees, stra-
tegically placing signs at display and check-out points, and displaying potential graffiti
tools in a prudent manner. Through awareness and strengthened self-policing, San Diego
Vandalism ◾ 139
retailers are constricting the flow of products into the hands of those who use them in
graffiti crimes. Further, by joining the program, participating retailers can curtail costly
theft from their stores while demonstrating an active concern for the problems of the com-
munity in which they do business.
There are also laws that compel compliance similar to that promoted by the Responsible
Retailer Program; for example, the Los Angeles Municipal Code (§47.11) states: “Every
person who owns, conducts, operates, or manages a retail commercial establishment sell-
ing aerosol containers or marker pens with tips exceeding four millimeters in width, con-
taining anything other than a solution which can be removed with water after it dries,
shall store or cause such aerosol containers or marker pens to be stored in an area view-
able by, but not accessible to, the public in the regular course of business without employee
assistance, pending legal sale or disposition of such market pens or paint containers.” The
Los Angeles Municipal Code (§47.16) also states that, “Every person who owns, conducts,
operates, or manages a retail commercial establishment selling glass-etching cream or
any commercially available glass-etching products, whether sold separately or in a kit
in an area viewable by, but not accessible to, the public in the regular course of business
without employee assistance, pending legal sale or disposition of such glass etching cream
or glass etching product is in violation of this section. No person who has not yet attained
the age of 18 years can purchase such items. Therefore this ordinance requires anyone
who displays for sale glass etching cream, or any commercially available glass etching
product, whether sold separately or in a kit, to display it under lock and key and allow its
sale only to persons 18 years of age or older.”
The California Penal Code (§594.1) addresses the sale, purchase, or possession of aerosol
paint container and mandates posting of notice by retailers: “(a) It shall be unlawful for any
person, firm, or corporation, except a parent or legal guardian, to sell or give or in any way
furnish to another person, who is in fact under the age of 18 years, any aerosol container
of paint that is capable of defacing property without first obtaining bona fide evidence of
majority and identity. (b) It shall be unlawful for any person under the age of 18 years to
purchase an aerosol container of paint that is capable of defacing property. (c) Every retailer
selling or offering for sale in this state aerosol containers of paint capable of defacing prop-
erty shall post in a conspicuous place a sign in letters at least three-eighths of an inch high
stating: Any person who maliciously defaces real or personal property with paint is guilty
of vandalism which is punishable by a fine, imprisonment, or both.” The California Penal
Code (§594.2) also addresses the possession of specified instruments with intent to com-
mit vandalism or graffiti: “Every person who possesses a masonry or glass drill bit, a car-
bide drill bit, a glass cutter, a grinding stone, an awl, a chisel, a carbide scribe, an aerosol
paint container, a felt tip marker, or any other marking substance with the intent to commit
vandalism or graffiti, is guilty of a misdemeanor. For the purposes of this section, ‘felt tip
marker’ means any broad-tipped marker pen with a tip exceeding three-eighths of one inch
in width, or any similar implement containing an ink that is not water soluble. Marking
substance means any substance or implement, other than aerosol paint containers and felt
tip markers, which could be used to draw, spray, paint, etch, or mark.”
140 ◾ Matthew O’Deane
A common application of nuisance abatement laws is forcing owners to act against gang
use of their buildings or face a governmental takeover; for example, landlords have been
court-ordered to clean up graffiti, erect security gates, install lighting, remove abandoned
cars, and evict known drug dealers. Such orders are commonly coordinated with com-
munity policing tactics to reinforce the owner’s ability to act against gangs. Local building
and housing codes can also be used against gang locations, compelling property owners to
comply with fire, health and sanitation, and zoning requirements.
Eliminating potential targets of gang crime can be accomplished in a number of ways.
Many times, physical changes to a location can make it less desirable to a gang as a tar-
get because it requires significantly more effort or increases the risk of apprehension.
Sometimes, simply adding a light or a lock on a gate may be enough to make the gang
member move on to an easier target. These strategies are part of a broader concept, men-
tioned earlier, known as Crime Prevention Through Environmental Design (CPTED).
Further targets are areas where gangs tend to congregate. Many times they plan crimes at
these locations, and they serve as safe havens for gang members after they have committed
a crime. Having detailed information about these locations is critical to gang investigators
and increases the chances of capturing suspects and solving crimes. Understanding the
physical layout of these gang hangouts can aid in cutting off potential escape routes, and
crime prevention techniques can be applied to make these locations less desirable.
Crime Prevention Through Environmental Design is based on the idea that situational
factors such as the environment (e.g., poor lighting) can make crime more likely to occur
at a particular time and place. CPTED measures can include installing additional lighting,
cleaning up the area, removing graffiti, and addressing housing issues. Some locations that
are well-known crime hot spots are poorly supervised, poorly managed, and inadequately lit.
Changing some of those situational factors can help reduce levels of crime in these places.
Traditional local law enforcement typically operates on a reactive basis; that is, police
wait for a call for service and react by arriving at the scene and, when appropriate, mak-
ing an arrest. The emphasis in law enforcement circles today is to become more proactive
to prevent crimes from occurring in the first place. Community policing is a proactive
form of policing that still encompasses reactive law enforcement. The community polic-
ing philosophy emphasizes identification and resolution of gang problems and conditions
that cause gang crime rather than focusing exclusively on individual gang incidents. The
approach requires close cooperation between citizens and police officers, and many view
community-oriented policing as an attractive option for addressing fears that often are
prevalent among minority communities. Police agencies must sell their anti-gang pro-
gram to community members so they will not consider it a form of repression against their
neighborhoods and will see it for what it is: a response the community deserves to protect
it and remove violent offenders from the area.
Following are some suggestions related to CPTED and reducing the threat of gangs:
• Erect fences between your business and public property to better define your
boundaries and make it more difficult for graffiti vandals to get close enough to
your walls.
Vandalism ◾ 141
• Remove large trees or bushes that block people’s view of vandals. The best landscap-
ing in graffiti-prone areas is short bushes planted along the walls to keep potential
vandals from getting too close. Make sure to keep the bushes well trimmed.
• Use pebbles around the building to create noise when people are walking, although
this will only make a difference if someone is around to hear the noise, see what is
happening, and do something about it.
• Move dumpsters to the end of an alley to reduce graffiti. Call dumpster companies
and ask them to keep graffiti off of dumpsters.
• If payphones or benches close to your business encourage people to hang out, see
about getting them removed.
• Use motion-detector lights. Keeping the lights on all night makes it easier for peo-
ple to see graffiti vandals, but it also lets the vandals see what they are doing and
lets others see the graffiti when they are done. Also, if an area is usually dark, it will
be more noticeable if it is suddenly lit up.
• Install video cameras, especially systems that activate by sensor and start recording
when someone is on the property. These systems reduce the time needed to review
recordings and more importantly can alert owners via text when the system has
been activated. These systems are also beneficial when used in connection with
sting operations; once a system has been triggered, officers can move into the area
covertly and make an arrest.
• Conduct weekly inspections on your property and in your community to help
prevent graffiti.
• Clean up graffiti right away, but only after it has been documented. Gang members
and taggers take the messages they read in graffiti seriously, and the longer graffiti
is left up in a neighborhood the greater the risk that the threats will be acted upon.
The swift removal of the graffiti will let gangs know that people in the community
will not tolerate their vandalism and that they care about their community.
One important factor to consider when instructing citizens to clean graffiti is their per-
sonal safety. Many citizens have been the victim of violent crimes because they were clean-
ing graffiti off of their property. In some gang neighborhoods, graffiti is cleaned by the
police so the gangs see that the police are responsible for the graffiti being cleaned up, not
local citizens. We do not want to turn cleaning graffiti into a death sentence for members
of the community. When graffiti is not cleaned up immediately, it can often multiply as
different gangs cross out their rivals’ messages and add their own. The faster you remove
the graffiti, the less of a thrill the vandal gets. This is an important point. Removing graffiti
promptly is the best way to prevent it from occurring again. Some cleanup jobs take just a
few minutes, but others can take all day.
The police encourage property owners to use graffiti-resistant surface coatings. There are
products on the market, such as graffiti-proof paint, that make it easier to clean off the paint;
these products can prevent spray paint, permanent marker, and ink from penetrating the
surface, thus making graffiti removal simpler and allowing the use of water-based or other
standard cleaning products. Applying a clear-coat finish can protect painted and unpainted
142 ◾ Matthew O’Deane
surfaces. Repainting the entire wall leaves no trace of graffiti ever having been there and does
not draw the attention of vandals. This approach is much more effective than painting over
just the graffiti. When repainting over graffiti, it is advisable to use the same color paint as
the wall or a neutral color such as gray, white, or beige. The closer the color match, the more
effective it will be in preventing further vandalism. The key is to be persistent. It may be nec-
essary to clean up the graffiti three times before the vandals realize it is not worth their effort.
The vandals’ objective is to have others see their tag name, so they are drawn to walls that are
not routinely cleaned immediately because they know their tag will be up longer and seen
by more people. Before attempting to clean up graffiti, it is important to identify the method
used by the vandals to apply the graffiti and the type of surface to which it has been applied.
Smooth, hard surfaces are the easiest to clean; rough, porous surfaces the most difficult. The
materials used to apply the graffiti (e.g., spray paint, grease pencils, felt tip pens, water-based
paint, stickers, shoe polish, crayons) affect the difficulty of cleaning up the graffiti.
Many times the most obvious removal methods work, such as soap, water, and a soft
brush. Try this method first to do the least amount of damage to the surface being cleaned.
If using soap and water does not work, then the use of a more powerful removal product
appropriate for the application method and surface is recommended. In many cases, graf-
fiti can be cleaned using a removal product rather than painting over it. Removing graffiti
is preferred since it is easier than painting and eliminates the difficulty of matching paint.
SUPPRESSION
The involvement of law enforcement when criminal activity occurs is an appropriate
response. Gang leaders and hardcore members should be targeted for aggressive suppres-
sion backed by the full force of the law. Law enforcement, parole and probation officers,
and prosecutors must work together to remove dangerous and influential gang members
from the community through effective use of gang intelligence (e.g., wiretaps, informants,
enhancements), targeting, and vertical prosecution.
on the information provided and the action taken. A graffiti reward program application
and approval from the Los Angeles County Sheriff’s Department are required before any
reward funds are distributed. No rewards are awarded until each case has cleared the judi-
cial system and sentencing has been established.
GRAFFITI HOTLINES
Graffiti abatement hotlines allow citizens to call in and report vandalism and have it
removed. San Diego’s hotline, for example, receives over 4000 calls per year. In addition to
reporting the graffiti, callers can learn more about prevention. A frequent complaint about
these hotlines is the response time, as there is often a significant delay between a property
owner calling about the graffiti and the actual removal of it. Eliminating such delays should
be a consideration for any jurisdiction planning on operating a hotline. Local jurisdictions
must convince the callers that their complaint of vandalism will be a priority and that it
will be cleaned up right away. If the jurisdiction does not have the resources to respond to
complaints in a timely manner, the value of the hotline diminishes. Crews must be able to
respond to individual service calls made to the graffiti hotline as well as focus on cleanup
near schools, parks, and major intersections and transit routes to have the biggest impact.
VANDALISM PROSECUTION
Like all other gang and tagger cases, a gang expert is necessary when prosecuting vandal-
ism cases. In 1993, I had the opportunity to be part of a 2-month undercover operation
that targeted tagger crews. Officers posed as members of an Australian movie production
144 ◾ Matthew O’Deane
company called Star Productions that was doing a documentary on taggers. Officers dis-
tributed posters and flyers throughout the tagger community, seeking participants for the
documentary. Taggers who came into the studio thought they were going to be in the
film; they were asked to fill out an information sheet, submit to an interview, and show
the film crew examples of their work in the studio and in the field. Thirty-seven people
were arrested during this 6-month sting operation. Letting their egos rule, these taggers
unwittingly took officers who they thought were producers on a graffiti tour of the county,
proudly pointing out their artwork on walls and freeways. Their admissions were captured
on videotape. Hundreds of acts of vandalisms in the San Diego area were solved. The key
to this operation was aggregation of the individual incidents of vandalism which caused
the total dollar amount in damage to rise above the level that constitutes a felony. Expert
testimony can be extremely useful in graffiti vandalism prosecutions, as it can be used to
explain how graffiti vandals operate, their motivation, their terminology, and psychology.
Further, this type of testimony can be used to prove damages when a damage amount is
required by your offense or for the purpose of restitution.
sample that we know has been written by our suspect, that writing is called an exemplar,
the sample we will compare to the other unknown incidents of vandalism. Photographs of
graffiti may be admitted into evidence for the purpose of proving that the writing was made
by the defendant (§1410.5(b)), and they should be evaluated by an expert.
We all have different writing styles, and so do taggers and gang members when they
apply their graffiti. Samples of their writing can be obtained when an officer sees a sus-
pect actually do the writing or they can come from graffiti seized from a suspect’s per-
sonal property. The police can compare known graffiti samples in several ways. The key to
studying a tag or a moniker is to study each letter in the word to identify beginning and
ending strokes, as well as the connecting strokes, heights of letters, and slant and spacing
of letters. Look for similar curves. Do they follow the same general direction? Look at the
crowns or caps on letters, the horizontal strokes or curved strokes at the top of the staff of
capital letters. Look for a similar pattern in how each sample is written, the alignment of
the different samples (baseline, headline, and top line in each sample), the proportion of
each letter in the word, the spacing between certain letters in each sample, and how each
letter, if at all, is connected in each sample. Do the slant of the letters in each sample, the
spelling, trademarks such as punctuation and diacritics, and level of skill and ability of
each sample match?
these costs can be greater than one might think; for example, when an overhead freeway
sign is vandalized, the costs to clean it up include costs associated with closing travel lanes,
bringing in the necessary trucks and equipment, and the salaries of the workers assigned
to clean up the graffiti. Many cities or community groups have specific groups charged
with cleaning up graffiti who can testify to the cost of the damage.
RESTITUTION
Restitution is often an issue when a case has been successfully prosecuted. Experts can be
called to testify at a restitution hearing or can be consulted with regard to the amount of
restitution to request. If a minor is personally unable to pay a fine levied for acts prohibited
by this section, the parent of that minor shall be liable for payment of the fine. A court may
waive payment of the fine, or any part thereof, by the parent upon a finding of good cause.
Section 4.24.330 of the Revised Code of Washington states that an adult or emancipated
minor who commits criminal street gang tagging and graffiti under §306 of this act by
causing physical damage to the property of another is liable in addition to actual dam-
ages, for a penalty to the owner in the amount of the value of the damaged property not to
exceed $1000, plus an additional penalty of not less than $100 nor more than $200, plus all
reasonable attorneys’ fees and court costs expended by the owner.
1. ASSOCIATIONS
1a. You shall not associate with any persons known to you to be a member of a
tagging crew. (Especially the tagging crew).
1b. You shall not associate with anyone known to you that tags or does graffiti.
1c. You shall not associate with .
1d. You shall not act in furtherance of, in association with, or for the benefit of any
tagging crew.
1e. You shall not possess any graffiti materials, including, but not limited to, spray
paint cans, tips for spray cans, marker pens, liquid shoe polish, slap tags, or
etching tools, etching cream, acrylic paint, paint sticks, latex/cloth or rubber
gloves.
2. REGISTRATION. You shall register as a gang member. As required by Penal Code
§186.30 et seq., you shall report to the police/sheriff station which has jurisdiction
in the area in which you reside and register within 10 days of the date of this order
150 ◾ Matthew O’Deane
or 10 days from your release from custody and every time you change residence
within the next 5 years. Failure to comply with these registration requirements
during the next 5 years is a crime (California Penal Code §186.33).
3. CURFEW. You shall abide by curfew limits as set by the court or the probation
department. You shall not be outside your residence between the hours of
p.m. and a.m. at any time except as set by the court or probation depart-
ment to accommodate going to and from employment or emergencies or activities
preapproved by the court or probation department.
4. SEARCH AND SEIZURE. You shall submit your person, property, place of resi-
dence, vehicle, and personal effects to search at anytime, with or without a warrant
or reasonable cause, by any probation officer or peace officer per United States v.
Knights, 534 U.S. 112 (2001).
5. TRUE NAME AND ADDRESS. You shall use only your true name and date of
birth when questioned by any peace officer or probation officer at any time. Your
current true address is: .
6. WEAPONS
6a. You shall not own, carry or possess any weapons, including, but not limited to,
knives, firearms, explosives, or ammunition.
6b. You shall surrender all firearms under your control at the date of this order.
6c. Except in the presence of a peace officer, you shall not remain in any building,
vehicle, or in the presence of any person where dangerous or deadly weapons,
firearms, ammunition, or explosives are known by you to exist.
7. SCHOOL. You shall not be on the grounds of any school unless enrolled in that
school or with prior administrative approval.
8. VICTIMS AND WITNESSES. You shall not contact nor come within 100 yards of
any victims or witnesses connected with this case. (Protective orders are attached
to court files and provided to defendants.)
9. LOCATIONS. You shall not come within 100 yards of the following locations:
.
10. CLEAN-UP CONDITIONS
10a. You shall clean up, repair, or replace the damaged property located at
.
10b. You shall keep the property located at free
of graffiti for up to one year at your expense.
11. SUSPENSION of driver’s license pursuant to Vehicle Code §13202.6.
12. WARNING. Penal Code §594.7 mandates incarceration in jail or prison for third
violation of Penal Code §594, regardless of the amount of damage caused, if there
was any previous incarceration for those priors.
13. OTHER. .
14. You shall comply with all terms, conditions of probation, and orders imposed by
the court. You shall obey all laws.
Vandalism ◾ 151
(Signed) (Dated)
• Submit to testing of blood, breath, or urine to detect the use of alcohol, narcotics,
controlled substances, or poisons whenever requested by any peace officer.
• Submit person, residence, or property under your control to search and seizure at
any time of the day or night by any law enforcement officer with or without a war-
rant (WIC §790.4).
• Cooperate in a plan for psychiatric/psychological testing or treatment.
• Pay fines to the general fund of the county through the Probation Officer in such a
manner as the Probation Officer shall order, in addition to any penalty assessment
and surcharge (Penal Code §1464, Government Code §76000).
• Make reparation on all related losses as determined by the Probation Officer,
including a service charge, as authorized by Welfare and Institutions Code §276.
• Make restitution to the restitution fund.
• Do not drive any motor vehicle.
• Surrender operator’s license to the court clerk, who shall comply with §13352 of
the Vehicle Code.
• If a minor, your parents are ordered, pursuant to WIC §727, to complete ten class
sessions of a parent education program and to file proof of completion with the
Probation Officer.
• Participate in after-school and weekend tutorial, vocational, and recreational
activities as directed by the Probation Officer.
• Participate in the High School Graduate/GED/WIN program and make continu-
ing progress toward completion of high school.
• Do not possess any lighters, matches, or other incendiary devices. Do not possess
any spray cans, markers, or other marking devices.
BIBLIOGRAPHY
Akiyama, C. (2003). Book Review for Gangs, Graffiti, and Violence: A Realistic Guide to the Scope
and Nature of gangs in America, by Duane A. Leet, George E. Rush, and Anthony M. Smith.
Criminal Justice Review, 28(1):173–175.
BJA. (1998). Addressing Community Gang Problems: A Practical Guide. Washington, D.C.: U.S.
Department of Justice, Office of Justice Programs, Bureau of Justice Assistance.
Vandalism ◾ 153
Crowe, T. (2000). Crime Prevention Through Environmental Design, 2nd ed. Boston: Butterworth-
Heinemann.
Davis, K. (2008). Graffiti Formats: Are They Gangs or Graffiti Crews? Journal of Gang Research,
15(2):1–18.
Dubin, R. (1959). Deviant Behavior and Social Structure: Continuities in Social Theory. American
Sociological Review, 24:147–163
Ganz, N. and Manco, T. (2004). Graffiti World: Street Art from Five Continents. New York: Harry N.
Abrams.
Goldstein, H. (1990). Problem-Oriented Policing. New York: McGraw-Hill.
Grody, S., Shanahan, D., and Prigoff, J. (2007). Graffiti L.A.: Street Styles and Art. New York: Harry
N. Abrams.
Hanh, J.K. (1992). Civil Gang Abatement: A Community-Based Policing Tool of the Office of the Los
Angeles City Attorney. Los Angeles: Los Angeles City Attorney’s Office.
Kelling, G.L. and Wilson, J.Q. (1982). Broken Windows. The Atlantic Monthly, March.
Livingston, D. (1997). Police Discretion and the Quality of Life in Public Places: Courts, Communities,
and the New Policing. Columbia Law Review, 97:551.
Miller, W.B. (1958). Lower Class Culture as a Generating Milieu of Gang Delinquency. Journal of
Social Issues, 14:5–20.
Miller, W.B. (1959). Implications of Urban Lower-Class Culture for Social Work. Social Service
Review, 33:219–236
O’Deane, M. (1993). Will They Ever Run Out of Spray Paint? Law Enforcement Quarterly, November.
O’Deane, M. (2008). Gang Investigator’s Handbook: A Law-Enforcement Guide to Identifying and
Combating Violent Street Gangs. Boulder, CO: Paladin Press.
O’Deane, M. (2010). Gangs: Theory, Practice and Research. San Clemente, CA: LawTech Custom
Publishing.
Phillips, S. (1999). Wallbangin’: Graffiti and Gangs in L.A. Chicago: University of Chicago Press.
Rahn, J. (2002). Painting without Permission: Hip-Hop Graffiti Subculture. Westport, CT: Greenwood
Publishing Group.
Shaw, C. and McKay, H. (1942). Juvenile Delinquency and Urban Areas. Chicago: Chicago University
Press.
Skogan, W. G. (1988). Community Organizations and Crime. In Tonry, M. and Morris, N., Eds.,
Crime and Justice: A Review of Research (pp. 39–78). Chicago, IL: The University of Chicago
Press.
Thrasher, F. M. (1927/1963). The Gang: A Study of 1,313 Gangs in Chicago. Chicago, IL: University
of Chicago Press.
Wilson, C.R. (1997). What’s in a Name? Gang Monikers. FBI Law Enforcement Bulletin, 66(5):14–17.
Wilson, P. (1988). Preventing Vandalism and Graffiti. Journal of Security Administration,
11(2):28–29.
Chapter 9
CHAPTER OBJECTIVES
After reading this chapter, you should be able to do the following:
Chapter Outline
• Introduction
• Larceny
• Burglary
• By the Numbers
• Preliminary Investigative Techniques
• Follow-Up Investigation
• Offender Characteristics
• Shoplifting
• Prevention Techniques
INTRODUCTION
The crimes of larceny and burglary are offenses considered by most large law enforce-
ment agencies to be low-profile investigations. Depending on the size of the community
and law enforcement agency, many times the cost of investigations and prosecutions
outweighs what prosecutors believe to be the severity of the crime. Agencies aim con-
siderable resources toward investigating major crimes such as robbery, assaults, rapes,
155
156 ◾ Walter J. Wywadis
and homicides. In medium and smaller agencies that do not experience numerous major
crimes, these investigations are more of a priority because burglary and larceny crimes
are the most likely to touch members of the community. These crimes normally do not
rate front-page headlines in today’s media, and some investigators consider investigating
these crimes as less than glorious assignments. Larceny and burglary crimes are catego-
rized together under the umbrella term of property crimes for statistical purposes. Law
enforcement agencies organize investigative units or squads in this same fashion to inves-
tigate property crimes. This allows for improved communication among squad members
through sharing of information gathered and assisting one another in case investigations.
Investigating larceny and burglary can be satisfying with the proper training, knowledge,
and mindset. This domain of investigations can offer a wonderful opportunity for investi-
gators to learn the techniques and develop the skills necessary to solve major crimes.
LARCENY
The crime of larceny is the same as theft. Many jurisdictions list one or the other as offenses.
Each state has different levels of classification based on specific dollar amounts to distin-
guish between a felony and a misdemeanor offense. By definition, the act of larceny or theft
is the unlawful taking of property from another or exerting control over the property by
possessing it without the authority to do so. Examples of these offenses include shoplift-
ing and pocket picking, and acts of larceny or theft are generally associated with the act
of burglary. Variations of laws enacted by different state, counties, or municipalities may
specifically address the theft of gas, theft of services, and theft by deception. Motor vehicle
theft has its own classification and is separate from general larceny/theft in most agencies.
BURGLARY
The crime of burglary consists of unlawfully entering or attempting to enter the property
of another with the intent to commit a felony or larceny with or without force. The property
can be a fixed structure, vehicle, or boat. For charging purposes, no distinction is made
among these structure types, although in many jurisdictions this information is usually
designated on the original offense reports filed by officers. Burglaries represent one of the
most common crimes to which officers respond. Both residential and business burglaries
require the same investigative techniques.
RESIDENTIAL BURGLARY
Usually residential burglary occurs while the residents are away, often during daylight
hours. The perpetrator will most often look for an open or easy entrance that would involve
the least amount of effort or noise. Targets are usually small items such as jewelry, cash, or
anything of value that can be easily carried away. Occasionally, a burglar enters a residence
when the owner is home, usually by mistake. State law normally classifies this type of bur-
glary as aggravated burglary.
Larceny and Burglary ◾ 157
10,400,000
10,300,000
10,100,000
10,000,000
9,900,000
9,800,000
9,700,000
2004 2005 2006 2007 2008
FIGURE 9.1 Property crime offenses, 5-year trend from 2004 to 2008. (From FBI, 2008
Crime in the United States: Property Crime, Federal Bureau of Investigation, Washington,
D.C., 2009.)
NON-RESIDENTIAL BURGLARY
Burglaries to businesses generally occur at night when the businesses are closed. Most
often, cash registers or safes small enough to be removed are the targets, along with what-
ever items a business might offer that are of interest to the suspect. Entry is normally a
“smash and grab,” accomplished in a very short time frame, unless the suspect knows the
business is not protected by alarms or cameras. The more professional or organized burglar
may enter the business through the roof by cutting a hole and dropping in, by using heater
or air conditioning vents, or by punching a hole through an exterior wall.
BY THE NUMBERS
According to the 2008 FBI Uniform Crime Reporting (UCR) program, property crime
includes the offenses of burglary, larceny/theft, motor vehicle theft, and arson. There were
an estimated 9,767,915 property crime offenses in the United States in 2008 (Figure 9.1).
The estimated rate of property crimes was 3212.5 offenses per 100,000 inhabitants. An esti-
mated $17.2 billion in losses resulted from property crimes in 2008 (FBI, 2009a). In 2008,
an estimated 2,222,196 burglaries were committed, and burglary accounted for 22.7% of
the estimated number of property crimes that year. Burglaries of residential properties
accounted for 70.3% of all burglaries. Victims of burglary offenses suffered an estimated
$4.6 billion in lost property, and overall the average dollar loss per burglary offense was
$2079 (FBI, 2009b). The FBI also reported that an estimated 6.6 million acts of larceny or
theft occurred nationwide in 2008; they accounted for an estimated 67.5% of all property
crimes that year. The average value of property taken during an act of larceny or theft was
$925 per offense. Applying the average value to the estimated number of larcenies and
thefts, the loss to victims nationally was nearly $6.1 billion (FBI, 2009c).
158 ◾ Walter J. Wywadis
Pocket-picking 0.4%
Purse-snatching 0.5%
Bicycles 3.4%
All others
31.9%
From buildings
11.4%
Shoplifting
16.2%
From motor vehicles
(except accessories)
26.0%
FIGURE 9.2 Larceny–theft, percent distribution in 2008. (From FBI, 2008 Crime in the
United States: Larceny–Theft, Federal Bureau of Investigation, Washington, D.C., 2009.)
Although property crimes showed a decease from 2004 through 2008, due to aggres-
sive prosecutions, proactive enforcement, and prevention programs, the estimated num-
bers reported to the FBI for larceny or theft and burglary still represent big business. The
criminal element of American society will continue committing these crimes unless law
enforcement, the community, and courts intervene and arrest, convict, or rehabilitate
repeat offenders. These crimes and the criminals who perpetrate them lower the quality of
life for all citizens within the communities they live. Citizens should not have to be afraid
to go to work or school or participate in recreational activities for fear of returning home
violated. Distributions of the direct costs associated with these crimes reflect themselves
through higher costs of insurance, uncollected taxes, and higher prices at retail businesses.
These crimes are far more startling when the data are analyzed at the national rather than
at a local level (see Figure 9.2). Keep in mind that these figures represent just two types of
crimes being committed nationwide.
By now, you are likely wondering what law enforcement, courts, and probation and parole
officers are doing about this widespread epidemic of crime. Nationwide arrests reported by
the FBI during 2008 totaled 1,687,345, or 565.2 per 100,000 inhabitants. Arrests for prop-
erty crimes increased 5.6% in 2008 as compared to 2007 (FBI, 2009d). The FBI has pub-
lished a report on 10-year arrest trends in which it compares 1999 to 2008 (FBI, 2009e,f):
Larceny and Burglary ◾ 159
As if these statistics are not alarming enough, to get a better grasp of the totality of these
crimes keep in mind that not all law enforcement agencies throughout the United States
report to the FBI Uniform Crime Reporting system. Many smaller jurisdictions choose not
to be reporting agencies; therefore, an unknown additional number of crimes and arrests
are not reported to the FBI.
from a larger department that has specialists to respond to particular types of crime scenes.
An important thing to remember is that the first responding officers have overall respon-
sibility and are in charge of making decisions regarding the crime scene and investigation
until a senior officer or a ranking supervisor relieves them.
Officers should approach the scene in an organized fashion and treat every scene as if
the crime has just occurred and the suspect may still be there until it is determined that it is
a past crime and the scene is cleared. If the residents or owners have been within the crime
scene, the officer should take an organized approach when meeting with them.
Here is a great example of the need to treat every call as if the suspect was still there.
I used to be a K-9 officer working the night shift. On this particular night in the early
morning hours, dispatch sent me to a call of aggravated burglary. The suspect entered the
residence by way of a back entry door to a garage, and the victim confronted him. The sus-
pect then ran from the residence. The first responding officer arrived at the scene, walked
around the outside, and did not observe the suspect; he advised me to disregard the call,
stating, “The suspect is gone.” Because I was only a couple of blocks away, I responded to
the scene anyway. Upon arrival, I walked up to the officer and asked where the suspect
had been. The officer took me to the open door that the suspect kicked in to gain entry. I
decided to use my K-9 partner for the heck of it. Upon giving him the command to “smell
find,” my K-9 left the doorway and immediately began pulling me across the back of the
house and around the corner, ultimately going under a low-lying evergreen bush 20 feet
from the doorway. Thinking my K-9 was tracking a cat or a rabbit, I restarted my partner
at the doorway again. The K-9 trailed to the same bush. I then pulled him back and he
immediately went back under the bush. This time when I pulled him back, he had a shoe in
his mouth! Checking closer, I found the suspect lying under the bush right up next to the
house he had just broken into. As stated previously, treat all burglary calls as if they had
just occurred and the suspect is still there until determined otherwise.
Upon making contact, a good immediate approach is to advise victims not to touch or
move anything, and take reasonable precautions in protecting the integrity of the scene and
any evidence. Remove the victims from the scene, which removes them from the tempta-
tion to clean up. If possible, interview the victims at another location outside of the crime
scene. Countless times in the author’s experience, the residents or owners cannot resist
moving items or picking items up that were moved, eradicating possible evidence while in
the presence of the interviewing officers. This is human nature. The victims are violated,
and they want normalcy to return as soon as possible in their lives. Officers should be
firm but gentle in dealing with the emotions of the victims and go well beyond normal
expectations in explaining the process of gathering evidence to accomplish a successful
investigation. In my experience, this area is one of the biggest challenges for first respond-
ing officers.
Officers should keep in mind that victims have had their minds clouded by the media
through unrealistic television shows that portray one tiny hair or drop of blood evidence
being able to clear cases by the end of a hour-long show. The victim is the most impor-
tant aspect of any investigation. Taking time to explain processes and providing a realistic
timeline can go a very long way in helping the victim process this traumatic experience.
Larceny and Burglary ◾ 161
The officer should make a determination concerning securing the crime scene area out-
side around the building or residence to search for possible evidence. Several things must
occur if the decision is made to secure the area outside. Officers need to make sure the area
secured is large enough to cover the entire area believed to be the crime scene, which can
be determined by interviewing the victims and witnesses at the scene. It is far better to
secure too much rather than not enough area, and later it can be difficult to get evidence
found outside the crime scene area entered in court as evidence. This can be an uphill bat-
tle, and many times evidence, no matter how important it is to the case, may be excluded
by the courts because it was recovered from an unprotected area. Officers should keep in
mind that often a case hinges on physical evidence and its integrity during the collection
processes, as often it is the only link to a suspect. This is especially important any time you
are operating with a search warrant to give you legal access.
The rule of thumb that I have always gone by is to take the biggest possible area and later,
when the search is completed, reduce it down; resources such as additional officers can be
relieved and allowed to return to normal duties. When possible, station as many additional
officers as it takes outside and around the perimeter of the crime scene and cordon off the
area with crime scene tape.
The officer in charge outside at this time should start a crime scene log and note infor-
mation on all persons who enter, being sure to log who enters, at what time and for what
reason, and when they leave. The outside area of the business or residence is the first area
processed for evidence, as it poses the greatest risk for lost evidence or possible contamina-
tion of evidence. An important rule to remember in all crime scenes is that everyone who
enters or leaves a crime scene will either deposit something or take something with them.
This emphasizes the importance of limiting the amount of foot traffic and the number of
people who enter a crime scene.
A big problem at just about every law enforcement agency is the number of officers that
will show up at a major crime scene and want to enter it. Usually, initiating a crime scene log
will cut down on the number of these people entering. Rather than entering, they instead
will hang around the outside to avoid having their names appear on the crime scene log
and later explaining in court why they entered. In addition to having officers at the scene,
natural causes, such as weather, can also contribute to a loss of critical evidence.
All points of entry and any possible points of entry may contain evidence to process. It is
important to remember that many times a suspect will attempt several points of entry in an
effort to find the best entry point that requires the least amount of effort. Suspects will try all
doors and windows before deciding to break a window or enter a door by kicking or prying,
potentially drawing attention to their activities. In most burglaries, physical evidence found
at the point of entry is best. This is where the suspect will spend most of his or her time.
When the outside scene and the point of entry have been processed, the officer should
take the time to walk through the crime scene with the victim to obtain knowledge of all
items moved or handled. Many times, suspects bring items into a crime scene that they
inadvertently leave, such as tools, gloves, hats, or even their wallets.
162 ◾ Walter J. Wywadis
DEVELOPING EVIDENCE
In any crime scene, everything should be considered evidence until it is determined other-
wise! Too often, items that have been disregarded at the scene as evidence have later been
determined during interviews to be important evidence. When dealing with a crime scene
and documenting evidence, there is one point I cannot stress enough: pictures, pictures,
and more pictures! You can never take too many photographs. Photographs are inexpen-
sive and can be discarded from the case file when it is determined that they are not needed.
With today’s digital media cameras, it is easy and extremely worthwhile to fill as many
disks with photographs as necessary. Later, while reviewing these images with prosecu-
tors, pictures can be eliminated as candidates for courtroom presentation. Take pictures
of evidence collected, footprints, fingerprints, items moved, overall rooms, points of entry,
and outside scenes around the building. The old saying that “a picture is worth a thousand
words” has applied many times in court proceedings I have been involved in. Pictures
often save time on the stand in testimony and give a very accurate depiction of the scene to
jurors. Here are some reminders to remember when processing crime scenes:
• Fingerprints are the standard evidence being sought; they are obtained by dusting
areas such as the point of entry and all items that have been moved or touched.
• Also important are photographs and cast impressions of footprints outside, around
the building, on doors kicked open, and within the business or residence on floor
surfaces.
• The suspect may have tracked in mud or dirt after entering. Many times these tracks
inside can help determine the point of entry and potential avenues of escape.
• Blood may be found at crime scenes from suspects who have cut themselves enter-
ing or exiting. Possible comparisons through DNA and blood typing later can
positively identify or exonerate a suspect.
• When a broken window is the point of entry, fibers from clothing, blood, and skin
often are present and can be collected for comparisons. If no blood is found at the
point of entry and within the business or residence, do not overlook the possibility
that fibers are present. The suspect’s clothing may have gotten snagged. Check the
point of entry carefully for this type of physical evidence and collect it for future
comparisons.
• Develop toolmark impressions from the point of entry if a door or window has
been pried open. These impressions can later be compared to a tool or implement
found at the scene, at another location, or on the suspect.
• Suspects apprehended soon after an incident may still be wearing the same
clothes.
was actual glass fragments! These glass fragments were also on his pants and in the cuffs of
his pants, and they matched the type of glass from the broken window at the crime scene
point of entry.
A neighborhood canvass should be performed before any crime scene investigation is
complete to gain additional witness information. Many times, these canvasses reap enor-
mous additional evidence. Maybe a vehicle was observed parked in an unusual place, or
someone was observed in the area. From this new information, additional areas might
possibly be pinpointed and searched for evidence, or a description of the possible suspect
or their vehicle can be developed. The canvass is sometimes referred to as a door-to-door
“knock and talk.” Officers identify everyone contacted and document their observations.
Finally, before any crime scene is released a final walk-through should be done to ensure
that nothing has been missed or forgotten. This is the final chance for investigators to
review the scene before releasing it to the victim.
Any officer who was involved, no matter how minor the involvement, should assemble a
complete and accurate report. Many times during court proceedings, attorneys will attempt
to discredit the investigation because an officer did not document one small particular
aspect of the case investigation. If the first responding officer, crime scene technician, or
investigator approaches the preliminary investigation in an organized fashion to obtain as
much information as possible from the victim and thoroughly processes the crime scene
for as much physical evidence as possible, the case is well on the way to answering the who,
what, where, when, why, and how of the crime.
FOLLOW-UP INVESTIGATION
After the initial reports are completed, the case is typically sent to the Criminal Investigative
Division (CID) for preliminary review. During the supervisor review process, the reports
and the evidence are considered in combination with solvability factors. If the case meets
these factors, an investigator is assigned the case. If the case does not meet these solvability
criteria, it is logged for informational purposes; if additional information develops with
regard to the case, it will be assigned. Some law enforcement agencies assign these cases as
“in-house” assignments.
An investigator has the specific duty to review the case, make contact with the vic-
tim, and gather any additional information that they may have regarding the case. If no
new information develops to raise the solvability factors, the case will remain logged and
filed. This concept also fulfills the community expectation of follow-up on all cases. Each
law enforcement agency applies its own procedures and criteria during the review process
based on the size of the agency, budgetary guidelines, and community expectations.
During the follow-up investigation, it is imperative for the officer or investigator to
review all reports and evidence gathered and documented, as well as the preliminary
statements of the victims and witnesses. After review, the follow-up investigation usually
begins by contacting the victim. This contact may clarify facts originally reported or help
determine if any information not originally reported during the initial interview can move
the investigation forward. Often, victims talk with neighbors, who will tell them things
164 ◾ Walter J. Wywadis
that they would not tell officers during the neighborhood canvass for fear of involvement or
reprisal. When this happens, it gives the case investigator a reason to contact the neighbors
again. In some cases, examination of the victim’s background may be necessary to confirm
or deny the victim as a possible suspect; for example, if victims have a history of making
large insurance claims, insurance company investigators will communicate their suspi-
cions to law enforcement agencies when such losses are reported. Insurance investigators
then work in conjunction with law enforcement to help resolve the claim. In any event, the
investigator should always look at the background of the victim during the follow-up phase
of the investigation to rule out that he or she is a professional victim reaping the proceeds
of insurance fraud.
If there are no known potential suspects, the follow-up investigation will entail devel-
oping potential suspects by examining intelligence networks within the agency and other
area agencies with similar types of burglaries. Considered are the specific types of items
taken, similar points of entry, the use of similar tools for prying, the presence of similar
size and pattern of footprints, similar days of week or time of day, and locations of the
incidents. This type of crime comparison is termed a crime analysis; it examines all the
characteristics of the crime and compares them to those of crimes that have occurred prior
to this case. Often, these similarities uncover a pattern or crime hot spot within the com-
munity that law enforcement can use in predicting future occurrences. Sharing this kind
of information with other officers provides the opportunity to implement strategies such
as a stake out in an attempt to catch the suspect in the act.
The Topeka Police Department is one of many law enforcement agencies utilizing
CompStat (comparative statistics) meetings, which involve command staff of the agency
discussing statistics and developing crime strategies to deal with reported crime. They meet
once a week to examine two questions: (1) Where is crime happening? and (2) What are we
doing about it? A vital part of this program is the crime analysis unit, whose responsibilities
are to review all crimes reported and provide weekly updates on crime statistics, including
individual crime categories, crime patterns, and developing trends. This process is referred
to as intelligence-led policing, and it allows agencies to target high-crime areas, concentrat-
ing resources to reap the most benefit in crime reduction and apprehension. It also allows
agencies to be proactive in target hardening neighborhoods and businesses by contacting
them when discovered trends surface. The analysis area of law enforcement has made sig-
nificant advances; analysts can predict crime patterns based on the statistics available and
can estimate rates of reduction or escalation in crime rates. Gone are the days of agencies
just sending police units out and randomly patrolling areas of a city and occasionally dis-
covering or deterring crime.
Investigators can develop suspect pools because they normally have a stable of infor-
mants who can provide information about current thieves that might be active. This is
sometimes risky, as many times informants will tell investigators what they want to hear
just so they can get paid, or they may want to make a deal. Often the informants themselves
may be the suspects, or they may give information on others to cut down on their competi-
tion. Information gained through informants must be confirmed before taking action.
Larceny and Burglary ◾ 165
Another approach to solving theft cases is to try to track the items taken. Every town
has pawn shops or flea markets that buy items from the street and resell them. Countless
times, I have gone into shops such as these and identified an item previously reported sto-
len. Reputable businesses will have information on file about the people from whom they
have bought items. Once identification of an item is made, a hold can be placed on it until
the victim has been notified. Usually the victim has the option of buying back the personal
belonging for the price paid at the business. The author has investigated many cases where,
although it was not possible to identify the suspects for prosecution, at least it was possible
to make the victims happy by locating their stolen items. Also, getting information about
stolen items out to these businesses and informants makes them aware of the items that
were stolen, and they can report back to investigators about who is attempting to sell simi-
lar items. Case investigators then follow up on this information.
Most agencies have an affiliation with a Crime Stoppers type of program, which accepts
anonymous tips on crimes, or an investigator can use the local media to get information of
the crime out to the public, requesting that anyone with information contact the agency.
This type of information sharing has solved cases and led to search warrants and the recov-
ery of stolen property.
No one should know the case better than the suspect and the assigned case investigator.
Investigators need to use this information to their advantage at all times. When investi-
gators meet with and interview potential suspects, it is not unusual for comments made
during these interviews to indicate that those being interviewed might know more about
a case than they are letting on. At this point, investigators must decide whether the case
can be solved without a confession. If the investigator has no physical evidence, it is time to
regroup and work toward possible recovery of the stolen items. Countless times, when the
author has asked potential suspects for written consent to search their property without
a search warrant, they have given their consent in an attempt to continue to claim their
innocence, even though they know the property is at their residence. They tempt fate by
thinking it will not be found by investigators. Finding stolen items gives investigators more
leverage to use during further interviews.
Earlier in the chapter, the importance of thoroughly processing the crime scene was
explained. If the crime scene was thoroughly processed and hair, blood, fingerprints, or
fibers were found and collected as evidence, the investigator can apply for a search warrant
for the person of the suspect for blood, spit, hair, and fingerprints to compare to what was
collected at the scene. If the investigator is lucky, the suspect already may have fingerprints
on file somewhere from a previous arrest. It is always a good tactic to give suspects the
opportunity to comply with a consensual waiver to confirm whether they are willing to
cooperate and allow this personal physical evidence to be gathered without a search war-
rant. This allows investigators to keep the lines of communication open and helps gain the
trust of suspects. If they refuse, use a search warrant as a last resort. I have always found
it a best practice to give the suspect the opportunity to comply with a request for all of the
items. The investigator is now on his or her way to positively identifying or eliminating a
suspect to the crime. All of the items should be sent to a crime lab for comparisons.
166 ◾ Walter J. Wywadis
If there are any possible eyewitnesses who may have seen the suspect, a photo line-up
should be prepared and shown to the witnesses for possible identification. Photo line-ups
are currently under scrutiny because of the number of reported incorrect identifications.
Each agency will have guidelines regarding photo line-ups. If they are used, they should
consist of six similar photos that include one of the possible suspect. Most recent sugges-
tions are to have an investigator not directly involved in the case show the line-up. No sug-
gestions should be given to the witnesses that a suspect has been placed under arrest, and
witnesses should be strongly advised not to make a positive identification if they are not
100% positive. In a best-case scenario, a positive identification will be made and physical
evidence recovered at the scene that positively matches to the potential suspect. Along with
the stolen items recovered from the suspect’s residence or vehicle, you now have a prosecut-
able case! This is why it is so important for the first officer responding to the scene to pay
attention to proper crime scene processing, for reports to be complete and accurate, and
for interviews to be conducted.
OFFENDER CHARACTERISTICS
The reasons why burglars and thieves do what they do are as varied as their methods of
operation (MOs), or how they commit the crimes. Much published literature has suggested
that these crimes are fueled by drug addiction, because addicts need a constant supply
of funds to purchase drugs. I believe that this theory does have some validity but does
not totally explain the burglary and theft problem. Generally, economic conditions of any
community are a significant factor. A high rate of unemployment can have a strong bear-
ing on the amount of crime within and around a community. Security precautions within
a community can also influence the ability of criminals to locate easy targets. Sometimes
people just take things because of an overwhelming desire to have them at no cost.
We have all seen the television version of professional burglars. Usually dressed in dark
clothing, masked, gloved, and sneaking in the dark, they carry a bag of goodies used to
pick locks; they are able to overcome the best alarm systems and likely have a dark getaway
vehicle parked down the block. Some burglars do, indeed, match this description, and they
go to great extremes to remain undetected. Usually these professionals do not enter homes
unless they suspect great wealth lies within. They generally target businesses to try to get
the biggest haul for the least amount of effort; the hauls are often in the form of cash from
safes and targeted big-ticket items within the business. These organized burglary offenses
are generally not detected until the victim returns home or someone reports to work at
the business the next day, because the entry points are well thought out, such as rooftops
that officers do not have the ability to check during patrol activities. These criminals are
usually caught only when they get overconfident and sloppy. Police generally do not catch
these types because they make their haul and move down the road to another city; they are
transient in nature.
Serial burglars target and watch potential victims for long periods until they learn their
usual routines. They often follow victims while they are going about their daily activities.
These burglars may break into homes for the psychological thrill or sexual satisfaction.
Larceny and Burglary ◾ 167
They tend to take small personal items, such as underwear, jewelry, or pictures of the vic-
tim so they can relive the moment later. This type of criminal may advance to breaking
into homes while the residents are home or to sexual crimes such as rape. These partic-
ular criminals are difficult to catch, and it normally takes many hours to pattern these
suspects.
Most often local police spend a great deal of time chasing around unorganized burglars
and thieves, who do some general targeting of homes and businesses looking for likely
targets. These unorganized criminals will also target friends and family in their quest for
money. Drug addicts generally fall into this category, as do juveniles. Their crimes normally
consist of “smash and grabs” at businesses to take whatever items strike their fancy, along
with any cash found. They also often graduate, if undetected, to prying open doors, kick-
ing doors, and smashing windows at residences. These suspects target jewelry, cash, guns,
tools, electronics, and generally anything they think that they can sell for cash. Juveniles
have a tendency to target electronics and many times eat while they are in the residence.
A simple theory that explains how crime occurs proposes that, first, there must be a
motivated offender; second, the offender must find a suitable target worth the effort; and,
third, there must be minimal chance of apprehension. This theory certainly lends itself
to burglars being viewed as “optimal foragers” (Johnson and Bowers, 2004). The optimal
foraging theory suggests that, when predatory animals select hunting areas and prey, they
optimize their rewards by weighing the nutritional value of the potential prey against the
effort and risk involved in obtaining it. Similarly, burglars maximize their revenues by
selecting neighborhoods and dwellings that require little effort to enter, contain valuable
items, and give the impression that the likelihood of being apprehended is low.
SHOPLIFTING
Shoplifting costs businesses millions of dollars every year. Consumers have to absorb the
added costs passed on in the form of higher prices due to shrinkage, and countless tax dol-
lars are not collected by local and state governments. Shoplifters may be any age or gender,
from any economic or ethnic background. They can be classified as either organized or
unorganized. Shoplifters are the ultimate opportunists, taking advantage of heavy cus-
tomer traffic times, employee shift changes, and opening and closing times. Generally,
the most important aspect in successfully carrying out this crime is the ability to conceal
the item on their person or within other packages or bags. They wear baggy clothing or
heavy clothing in warm weather, or they carry bags or purses that are larger than aver-
age. Organized teams distract customers and employees while others are concealing items.
Price tag switching or altering is a tactic used to pay an unreasonably low price for an item.
Bernice Yeung (2010) wrote, “U.S. retail thefts are becoming a big moneymaker for orga-
nized crime—pulling in as much as $10 billion a year.” This article was based on the arrests
of a 21-member theft ring located in Georgia. They allegedly were paid $100 to $300 a day
to steal cans of baby formula for eventual resale in the black market. This theft ring is part
of the rising trend of organized retail crime (ORC). There are currently four bills before
Congress in an effort to battle these crimes and theft rings.
168 ◾ Walter J. Wywadis
PREVENTION TECHNIQUES
The best intentioned crime prevention initiatives cannot be successful without community
support. This premise is primarily based on the philosophy of Sir Robert Peel, known as
the father of modern-day policing. Peel observed that, “The police are the public and the
public are the police.” Think about it. Police acquire their authority from laws approved
and determined by the public. The public decides what types of laws need to be enforced.
Police agencies use public funding to provide equipment for officers and to pay wages. A
law enforcement agency is useless without public trust. Thus, the public are the police, and
police officers are members of the public who choose to be paid. Many of the most success-
ful crime prevention programs are community based. Debate about the benefits of com-
munity policing has gone on for years, but, undeniably, many of today’s crime prevention
programs are based on facets of community policing. The basic definition of community
policing varies but its methodology is unmistakable: “The police designate a community
in which they will engage in problem solving, develop relationships with the population,
collaborate with them to diagnose problems that have generalized impact, prescribe and
implement interventions to solve the problems and continuously monitor the results”
(Flynn, 1998).
SAFE STREETS
These concepts are the basis for the Safe Streets organization. Safe Streets’ mission involves
organizing neighborhoods and communities for action, developing leadership among
youths and adults, and bringing community and strategic partners together on specific
problems or opportunities relevant to building safe communities (Safe Streets, 2011). The
organization operates based on the following premises:
Safe Streets also incorporates and supports the development of neighborhood improvement
associations (NIAs). Neighbors work together and organize activities as ways to improve
their quality of life, developing alliances to work together in determining community issues
and working with the local police to effect change. Some neighborhoods develop groups
such as Citizens on Patrol that assist law enforcement in patrolling neighborhoods and
contact them when suspicious activity is found. Others work on quality-of-life issues, such
as cleaning up neighborhoods. Studies have shown that in neighborhoods that appear to be
cared for (e.g., less trash, fewer run-down homes) crime is lower, because cared-for neigh-
borhoods suggest neighborhood involvement. Involvement equals greater opportunities
for detecting crime, thus making criminals move on to less cared for neighborhoods.
Larceny and Burglary ◾ 169
CRIME STOPPERS
Crime Stoppers is a nonprofit, community-based organization designed to assist law
enforcement in reducing and solving crime. It offers cash rewards to anyone who calls in
anonymously and gives useful information that leads to solving a crime. Crime Stoppers
is based on the principle that “someone other than the criminal has information that can
solve a crime,” and it was created to combat three major problems faced by law enforce-
ment in generating information: fear of reprisal, apathy, and reluctance to get involved
(Crime Stoppers USA, 2011).
COMMUNITY PARTNERSHIPS
Communities and law enforcement can initiate and implement community partnership
strategies designed to prevent and reduce crime. Several years ago, the Topeka Police
Department embarked on such a program with the local Safe Streets organization to
become the Safest Capital City in America Program (with a population of 100,000 and
over). The vision of this program is to compare crime statistics of cities of similar size
and become the safest city with the least amount of crime reported in the national rank-
ing. Through this program, several crime reduction initiatives have been undertaken. One
such program is Lock It, Remove It, or Lose It. The city of Topeka was experiencing a
large number of vehicle burglaries, and this program was developed to remind citizens to
remove valuable items from their cars and make their cars less appealing to burglars. Since
2007, Topeka has experienced a 21% overall drop in crimes reported, including theft from
vehicles. In 2009, Topeka had 452 fewer thefts reported than in the prior year.
Another program instituted to work in conjunction with Lock It, Remove It, or Lose
It is a theft deterrence and recovery program called Record It, Report It, and Recover It.
This program encourages citizens to inventory their valuables and record the identification
170 ◾ Walter J. Wywadis
numbers. In addition, the program introduced citizens to invisible markers that could be
used to mark these items with personal identification numbers (e.g., driver’s license num-
ber). The marker is not visible until it is held under blue light. The markers are made avail-
able to the public through the Topeka Police Department, neighborhood improvement
associations, and local pawn shops. This program allows citizens to identify personal items
that have been stolen and can assist in the recovery of them.
Citizens themselves can take actions to make their homes less appealing to burglars and
thieves:
Precautions should also be taken while at home. Never leave doors open or garage doors
up when doing yard work or other chores, as open doors invite thieves. An open garage
door allows thieves to walk in and take whatever they desire, undetected. Generally, people
become victims when they have become very comfortable in their daily lives. By just taking
a few minor precautions victimization can be avoided.
Businesses can protect themselves by taking extra precautions in day-to-day operations
by implementing good business practices. No shoplifters will steal merchandise if they are
obviously being watched. Make them feel watched by employees or have video cameras
visible. Compare packages customers are carrying when they leave with their receipts.
Minimize opportunities for customers to conceal expensive items. Keep displays away from
windows in an effort to discourage “smash and grabs.” To prevent switching of price tags,
use tamperproof labels. Daily or weekly inventories of merchandise can detect a problem
before it gets out of control. The design of business buildings can help determine if a business
will be a victim of burglary or theft. Municipalities can require new buildings or residential
neighborhood designs to include CPTED inspections and practices during developmental
phases. The use of laminated glass can make it more difficult to smash the glass to gain
entry, good commercial locks will cost a burglar more time to enter a business, and motion-
sensing alarms coupled with 24/7 video surveillance can be valuable deterrents.
Larceny and Burglary ◾ 171
BIBLIOGRAPHY
Crime Stoppers USA. (2011). What Is Crime Stoppers?, http://www.crimestopusa.com/AboutUs.asp.
FBI. (2009a). 2008 Crime in the United States: Property Crime. Washington, D.C.: Federal Bureau of
Investigation (http://www2.fbi.gov/ucr/cius2008/offenses/property_crime/index.html).
FBI. (2009b). 2008 Crime in the United States: Burglary. Washington, D.C.: Federal Bureau of
Investigation (http://www2.fbi.gov/ucr/cius2008/offenses/property_crime/burglary.html).
FBI. (2009c). 2008 Crime in the United States: Larceny-Theft. Washington, D.C.: Federal Bureau
of Investigation (http://www2.fbi.gov/ucr/cius2008/offenses/property_crime/larceny-theft.
html).
FBI. (2009d). 2008 Crime in the United States: Arrests. Washington, D.C.: Federal Bureau of
Investigation (http://www2.fbi.gov/ucr/cius2008/arrests/index.html).
FBI. (2009e). 2008 Crime in the United States: Ten-Year Arrest Trends (1999–2008). Washington,
D.C.: Federal Bureau of Investigation (http://www2.fbi.gov/ucr/cius2008/data/table_32.html).
FBI. (2009f). 2008 Crime in the United States: Arrests, by Race. Washington, D.C.: Federal Bureau of
Investigation (http://www2.fbi.gov/ucr/cius2008/data/table_43.html).
Flynn, D.W. (1998). Defining the “Community” in Community Policing. Washington, D.C.: Police
Executive Research Forum (www.policeforum.org/library/community-policing/cp.pdf).
Johnson, S. and Bowers, K. (2004). The stability of space–time clusters of burglary. British Journal of
Criminology, 44:55–65.
Mesa, AZ, Police Department. (2011). Crime Prevention Through Environmental Design, www.
Mesaaz.gov/POLICE/literature/pdf/CPTEDlong.pdf.
Safe Streets. (2011). About Safe Street, http://www.safest.org/Page.aspx?nid=7.
Yeung, B. (2010). Shoplifting, Inc., The Crime Report, March 4 (http://thecrimereport.org/2010/03/04/
shoplifting-inc/).
Chapter 10
Auto Theft
Donald Munday
Pratt Community College
CHAPTER OBJECTIVES
After reading this chapter, you should be able to do the following:
Chapter Outline
• Introduction
• Auto Theft Defined
• Methods Commonly Used to Steal a Vehicle
• Most Frequently Stolen Vehicles
• Investigation Processes and Techniques
• Processing the Recovered Stolen Vehicle
• Auto Theft Prevention and Programs
INTRODUCTION
Motor vehicle theft has plagued society for decades, costing insurance companies and law-
abiding Americans billions of dollars every year. This crime is perceived to be a victimless
crime, but it is not. Each person in America who pays auto insurance is subject to increased
insurance premiums due to this crime.
173
174 ◾ Donald Munday
The occurrence of violent and non-violent crime in the United States is illustrated by the
FBI’s Crime Clock Statistics (Table 10.1); for example, according to these data, a motor
vehicle theft occurs every 33 seconds. Research has shown that auto thieves can steal a
vehicle in less than a minute. Many of these autos are stolen for parts, such as the airbags.
Reports to law enforcement indicate that autos are stolen from shopping malls, parking
lots, car dealership lots, streets, apartment complexes, and airport parking lots, among
other public and private areas (Layman, 2011).
JOYRIDING
Joyriding generally refers to the theft of autos by teenagers. Offenders are usually 15 to
19 years old (Swanson et al., 2009). Teenagers look for the easiest target, such as a vehicle
left running with the doors unlocked outside an apartment, house, or convenience store.
The young auto thief simply opens the car door, gets in behind the steering wheel, and
drives off. The motive of this crime is impressing one’s peers or street gang membership
initiation.
176 ◾ Donald Munday
THEFT BY OPPORTUNITY
All over the country, on cold winter days, many car owners like to warm up their vehicles
before driving them. They start their vehicles and leave them running while they go back
inside. Sometimes, too, people will park in front of a convenience store and run inside,
leaving their car running so it stays warm. The auto thief looking for an easy target has just
found one. The thief simply opens the unlocked door, slides inside the now warm vehicle,
and drives off. Some cities have enacted laws to try to prevent this type of crime from
occurring.
Auto Theft ◾ 177
AUTO CLONING
Over the years, auto thieves have continued to develop new ways to steal and sell stolen
autos. One method is to clone the auto. The auto cloning process begins with the auto thief
locating an auto that is of interest. The auto thief copies the legitimate vehicle identification
number (VIN) and then steals a similar auto. The VIN of the stolen auto is replaced with
the copied VIN. To complete the process, the auto thief either forges ownership documents
for the cloned auto or obtains ownership documents by fraud. Once this process has been
completed, the auto thief can now sell the cloned auto to an innocent party for a premium
price. Typically, it is quite easy to insure and license a cloned auto if it has been purchased
in another state because most licensing agencies do not check for duplicate ownership of
an out-of-state auto. The National Insurance Crime Bureau has found that luxury cars are
usually targeted for cloning, generating estimated illegal profits in the United States in
excess of $12 million each year (NICB, 2004).
must continually gather information and intelligence from arrested auto thieves. This
information can be used to identify new auto theft techniques and possible auto theft rings.
Among the many reasons, motor vehicles are stolen for:
The first step for a law enforcement officer is to become familiar with the vehicle iden-
tification number (VIN), which serves as the fingerprint of a specific motor vehicle. In the
United States, since 1954, automobile manufacturers have utilized the VIN instead of the
engine number as an identifier. Prior to 1968, although all VINs were inscribed on metal
plates, they were not uniformly located on vehicles, and there was no standard method for
attaching VIN plates to vehicles (Swanson et al., 2009). Later, in 1981, the U.S. National
Highway Traffic Safety Administration (NHTSA) passed a regulation that required all
motor vehicles to have a 17-character VIN. This action by the NHTSA standardized the
identification system of vehicles sold or manufactured in this country (NHTSA, 2010).
Vehicle identification numbers after 1981 consist of combinations of 17 numbers and
letters (I,O, and Q are not used). This number can be considered the fingerprint for each
vehicle. The VIN can give a law enforcement officer important information, such as the
owner of the vehicle, and it can help determine if the vehicle was stolen. The first three
characters are the world manufacturer identifier, the next five digits describe components
of the vehicle, and the last eight characters are the vehicle indicator section (Flynn, 2008).
Let’s decode a sample VIN: 1F2DH34B1DS234567
The check digit is very important for verifying the accuracy of a VIN. The somewhat
lengthy check digit calculation is summarized briefly below:
1. A key is used to assign a numerical value to each letter in the VIN; in our example,
1 = 1, F = 6, 2 = 2, D = 4, etc.
2. A specific weight factor for each character is assigned based on its position in the
VIN, except for the ninth character, which is the check digit character; in our
example, the first characters has weight 8; the second, 7; the third, 6; etc.
3. The value of each character is multiplied by the weight; in our example, F would be
6 × 7 = 42). These 16 values are added together and divided by 11. The remainder
represents the check digit; for example, if the remainder is the number 10, then the
check digit is X, and an X is placed in the VIN.
The VIN is typically located on the left side of the dashboard. It is easily seen by looking
through the windshield. It can also be found on a sticker on the driver’s side door post. The
sticker shows the VIN as a bar code. This bar code can be read only with special equip-
ment (Gilbert, 2009). If the sticker is missing or the code does not match any of the hidden
manufacturer-marked auto parts, this indicates that the vehicle has possibly been stolen.
To assist in deterring auto theft and to identify stolen vehicles, in 1984 Congress passed
the Motor Vehicle Theft Law Enforcement Act. This new law required auto manufacturers
to add permanent VIN markings to at least 14 major parts on the auto. These auto parts
are in high demand by auto thieves and chop shops. The additional parts that are marked
include:
• Transmission
• Both doors
• Both fender wells
• Front and rear bumpers
• Hood
• Rear quarter panels
• Engine
• Decklid
• Tailgate or hatchback
PRELIMINARY INVESTIGATION
A vehicle theft investigation can be initiated in different ways. The most common is when a
vehicle owner notifies local law enforcement by calling 911 or another emergency number.
The police officer or sheriff officer who receives the call from the dispatcher then responds
to the location of the vehicle owner or reporting party. The first step in the preliminary
investigation phase is determining if the alleged vehicle theft is factual. In some cases, the
180 ◾ Donald Munday
The vehicle owner should provide a detailed list of items that were in the vehicle, such
as a computer, credit cards (account numbers), handgun or rifle, items of identification
(driver’s license, military ID, Social Security card), portable DVD player, purse or wal-
let, vehicle military installation pass, or any other valuables, as well as their serial and/or
model numbers. During the preliminary investigation, the officer should gather as much
detail as possible concerning the stolen vehicle and the contents that were in it at the time
of the theft, including serials numbers, to assist in the recovery of the items. In many cases,
such information can assist officers and investigators in making arrests and recovering
property. If the owner left a purse or wallet in the vehicle, the auto thieves may use the
contents to commit identity theft. Soon after the interview with the stolen vehicle owner,
the officer should make a serial numbered case and enter the VIN and other descriptors
into the National Crime Information Center (NCIC) system. The NCIC entry will assist
officers in identifying this vehicle throughout the country. Also, the officer should enter
into the NCIC any serial numbers and descriptors of property in the vehicle at the time it
was stolen.
Auto Theft ◾ 181
After the officer completes the preliminary interview and the auto theft report, a visual
search of the area around the owner’s residence a few blocks in all directions should be
conducted. There is a chance that the stolen vehicle or property may be found. In the case
of joyriding by juveniles, they frequently abandon the stolen vehicle close to the site of the
theft (Gilbert, 2009). Studies indicate that officers should always check the area close to
the location of the offense for recovery purposes (Lu, 2003). If the officer locates the stolen
vehicle, he should protect the vehicle from evidence contamination and notify the crime
scene investigative unit. There may be physical evidence present that can lead to the arrest
of a viable suspect.
FOLLOW-UP INVESTIGATION
The auto theft investigator must verify the information in the responding officer’s prelimi-
nary report. This can be done by contacting the owner and reviewing the stolen vehicle
information contained in the officer’s report. When this has been done, then the investi-
gator should become familiar with the case by reviewing all of the information available,
including the vehicle owner and witness statements. From this information, the investi-
gator may be able to connect this case to others. The investigator should also review any
suspicious character reports that officers submitted around the date, time, and location of
the theft. This information could give the investigator a solid person of interest to locate
and interview concerning the case.
During the follow-up investigation, the investigator must keep an open mind. The vehi-
cle theft could be a case of insurance fraud, the vehicle could have been taken to a chop
shop, it could have been stolen for cloning purposes, or it might have been stolen for export
to another country. There are many informational sources available to assist auto theft
investigators in these types of cases. Investigators should consider these sources as investi-
gative tools that can assist in solving a cases and locating suspects.
One such tool is the International Association of Auto Theft Investigators (IAATI). IAATI
is a network of investigators that share knowledge and expertise. IAATI also sponsors
training seminars. Another major resource to assist auto theft investigators is the National
Insurance Crime Bureau (NICB). The NICB has database services available to the law
enforcement community, which include the following (Swanson et al., 2009):
• Export file—Export declarations from the U.S. Customs Service, which can assist
in the detection of illegal exports
• Information-wanted file—Information concerning a person who has not made
payments to a financial institution but has purchased insurance on a vehicle from
a NICB member company
• Insurance theft file—Insurance company theft records containing ownership and
insurance information from over 1000 insurance companies in the United States,
from the Canadian Automobile Theft Bureau (CATB), and from most European
countries
182 ◾ Donald Munday
• Salvage files—Salvage vehicle reports that are filed with insurance companies and
include information on both buyers and sellers
• VIN Assist—No-cost service provided to the law enforcement community that
validates VINs
A valuable resource that the NICB offers is their Passenger Vehicle Identification Manual,
which is published annually. This publication contains information pertaining to vehicle
theft prevention standards, VIN locations, federal safety certification labels, VIN struc-
ture, and vehicle assembly recorded information (Swanson et al., 2009).
One of the most widely utilized and valuable resources for auto theft investigators is the
FBI’s National Crime Information Center. Investigators and officers alike can make inquires
online to NCIC concerning license plate registration information, motor vehicle informa-
tion, motor vehicles wanted in conjunction with felonious criminal activity, recovered sto-
len license plates, and recovered stolen vehicle component parts (Swanson et al., 2009).
Investigators should take note that thefts of older vehicles have tended to remain con-
stant. This indicates that auto thieves are targeting these vehicles for parts. It has been
estimated that a stolen motor vehicle valued at $20,000 can be stripped in a chop shop and
converted into $30,000 worth of parts (Layman, 2011). A recent trend has been the theft of
airbags, which are resold and cost insurance companies and consumers an average of $50
million a year (Berg, 2007). Investigators should check questionable auto body shops and
salvage yards for stolen parts. Intelligence information from undercover operations can
assist auto theft investigators in identifying such places.
UNDERCOVER INVESTIGATIONS
In recent years, there has been a movement in law enforcement to conduct undercover
auto theft investigations. The use of bait cars by law enforcement agencies has proven to be
effective. A hidden camera is installed inside the bait car along with a GPS system and an
ignition immobilizer, more commonly known as a kill switch. Investigators park the bait
car in a parking lot or on the street, and surveillance teams positioned around the bait car
wait for an individual to break into the car and steal it. When the offender starts the car
and drives off, the ignition immobilizer is activated and the car rolls to a stop as officers
approach it to arrest the offender. The auto theft is captured on video along with audio
which assists in the criminal prosecution of the offender.
The emergence of corrupt auto body shops, chop shops, and salvage yards involved in the
purchase and selling of stolen autos and auto parts has created a need for undercover inves-
tigations. Undercover investigators pose as auto thieves selling stolen vehicles or as someone
looking for stolen auto body parts to buy or sell. These investigators may be able to purchase
a stolen auto or stolen parts from the corrupt business during the initial contact, but it may
take more than one meeting to establish a level of trust with the seller. Using a confidential
informant (CI) to introduce an undercover investigator to the seller in many cases will assist
in building this trust, but it can be risky. The CI may play both sides. During the investiga-
tion, background checks should be conducted on all individuals involved in the potential
transactions. This gives the undercover investigator vital intelligence to fully understand
the depth of the operation and the individuals being investigated. There may be existing
outstanding warrants on these individuals or they may be on federal or state parole.
During an undercover operation, it is very important that the undercover investigator
wear a well-hidden body wire so that all conversations between the parties are recorded for
use in a criminal prosecution. As in any undercover operation, backup officers in the area
should be monitoring the conversations in case the undercover investigator needs assis-
tance. The undercover operation team should choose a word or phrase for the investigator
to use in case of an emergency or when immediate back-up officers are needed. This proce-
dure is a must in any “buy–bust” situation. One of the goals of the undercover investigator
should be to make enough purchases of stolen property from an individual to indicate that
the business is working with auto thieves as a criminal enterprise. In most jurisdictions
in the United States this would culminate in the issuance of a search warrant to enable
investigators to search the corrupt business for stolen autos, documents related to an illegal
operation, and stolen auto parts. The execution of the search warrant may lead to recovery
of stolen property, arrests of involved individuals, fruits of other crimes, and investigative
leads that may solve other criminal cases.
• Visually inspect the vehicle from the outside for damage, new or old. Remember to
take precautions to preserve any and all trace evidence that is identified.
• Examine the exterior of the vehicle for any trace evidence such as blood, foreign
substances, hair, or paint transfer. Trace samples should be carefully collected and
submitted for later comparison.
• Take photographs of the vehicle’s exterior, interior, and VIN located on the dash-
board and door. Photographs should be taken of any property or evidence that is
located inside the vehicle.
• Examine the interior of the vehicle closely for any trace evidence such as blood,
fibers, hair, mud, or any other items of interest. If there are any hair brushes or
combs found in the vehicle, inspect them for hair samples. Collect the hair samples
Auto Theft ◾ 185
for evidence. The hair samples may identify the auto thief through DNA compari-
son at a later date.
• Collect all property and physical evidence. Properly package and take measures to
preserve any trace evidence for future forensic lab comparisons and analysis.
• Utilize fingerprint powder on the rearview mirror and other areas of the stolen
vehicle where the offender may have touched. It is not unusual for the auto thief to
adjust the rearview mirror with an ungloved hand out of habit. If latent prints are
located and lifted properly, then the investigator should have them run through
the Automated Fingerprint Identification System (AFIS) for comparison. If the
auto thief has any prior arrests or convictions, his or her fingerprints will be on file
with a federal, state, or county agency.
When the stolen vehicle has been carefully and properly processed for physical evi-
dence, then the seat position should be checked. This can assist the investigator or officer
in determining the possible height of the auto thief, which, in turn, can help determine the
auto thief’s motive—for example, joyriding by a juvenile. Also, the information can assist
in placing a person of interest in the vehicle when it was stolen.
ALTERED VINS
During an auto theft case follow-up investigation, the investigator may discover that the
VIN on the vehicle may have been altered. This suspicion usually occurs when the investi-
gator computes the check digit of the 17-digit VIN and discrepancies appear. The NICB’s
VIN Assist program aids the law enforcement community by analyzing suspicious VINs
from recovered stolen vehicles (Swanson et al., 2009). Investigators can further check the
validity of a suspicious VIN on a vehicle by comparing it with hidden VINs. The vehicle
may still have one or more of the 14 manufacturers’ marked parts that have the correct
VIN number inscribed on them. If the suspicious VIN does not match a hidden VIN, then
the investigator has uncovered an altered VIN.
BIBLIOGRAPHY
Berg, B. (2007). Criminal Investigation, 4th ed. New York: McGraw-Hill.
FBI. (2008). 2008 Uniform Crime Report. Washington, D.C.: Federal Bureau of Investigation.
Flynn, K. (2008). What’s in a VIN? Decoding Vehicle Identification Numbers Puts the Brakes on
Auto Theft, Cloning, and Chop Shop Operations. Law Enforcement Technology, 35(6):90–96.
Gilbert, J.N. (2009). Criminal Investigation, 8th ed. Upper Saddle River, NJ: Pearson Education.
Helperin, J. (2008). Evaluating Stolen Vehicle Recovery Systems: The Pros, Cons, and Pricing, July 9,
http://www.edmunds.com/car-technology/evaluating-stolen-vehicle-recovery-systems.html.
Insurance Information Institute. (2010). Auto Theft. New York: Insurance Information Institute
(http://www.iii.org/issues_updates/auto-theft.html).
Layman, M. (2011). Criminal Investigations: The Art and the Science, 6th ed. Upper Saddle River, NJ:
Pearson Education.
Lu, Y. (2003). Getting Away with the Stolen Vehicle: An Investigation of Journey-after-Crime. The
Professional Geographer, 55(4):422–433.
NHTSA. (2010). Vehicle Identification Numbers (VIN). Washington, D.C.: National Highway Traffic
Safety Administration (http://www.nhtsa.gov/Vehicle+Safety/Vehicle-Related+Theft/Vehicle+
Identification+Numbers+%28VINs%29).
188 ◾ Donald Munday
NICB. (2004). Doing a Double-Take: Vehicle Clones Are a Street-Level Problem for Insurers. Palos
Hills, IL: National Insurance Crime Bureau (www.nicbtraining.org/Vehicle_Cloning.pdf).
NICB. (2009a). Passenger Vehicle Identification Manual, 80th ed. Palos Hills, IL: National Insurance
Crime Bureau.
NICB. (2009b). Thefts Cool but California Remains a Hot Spot for Hot Cars: Border Areas Show Mixed
Results [press release]. Palos Hills, IL: National Insurance Crime Bureau.
NICB. (2009c). Hot Wheels: Vehicle Theft Continuing to Decline [press release]. Palos Hills, IL:
National Insurance Crime Bureau.
NICB. (2010). Car Thefts Continue Downward Spiral: Western Cities Still Popular Among Car Thieves
[press release]. Palos Hills, IL: National Insurance Crime Bureau.
Pasquale, D. (2006). The Key to Auto Theft. Police Magazine, June 1 (http://www.policemag.com/
Channel/Patrol/Articles/Print/Story/2006/06/The-Key-to-Auto-Theft.aspx).
PR Newswire. (2010). H.E.A.T. Celebrates 25 Years of Auto Theft Awareness and Prevention in Michigan
[press release]. Livonia, MI: Help Eliminate Auto Thefts (http://www.miheat.org/new/Media/
releases.htm).
SDCDA. (2010). Undercover Auto Theft Operation Nets 51 for Selling Stolen Cars, Drugs: Task
Force Partners with Military for Six-Month Crackdown [press release]. San Diego, CA: Office
of the District Attorney County of San Diego (www.sdcda.org/files/Operation%20Hotel%20
California%203-5-10.pdf).
Swanson, C., Camelin, N., Territo, L., and Taylor, R. (2009). Criminal Investigation, 10th ed. New
York: McGraw-Hill.
TXDPS. (2010). Texas H.E.A.T. Program. Austin: Texas Department of Public Safety (https://records.
txdps.state.tx.us/DPS_WEB/Heat/index.aspx).
Wheeler, K. (2010). Vehicle Theft Investigation Ends in 51 Indictments. City News Service, March
5 (http://www.sdnn.com/sandiego/2010-03-05/local-county-news/vehicle-theft-investigation-
ends-in-51-indictments).
Chapter 11
Arson Investigation
Cliff Roberson
Kaplan University
CHAPTER OBJECTIVES
After reading this chapter, you should be able to do the following:
Chapter Outline
• Introduction
• Fire Triangle
• General Issues in Arson-Suspected Fires
• Detecting Arson
• Who Investigates
• Uniform Guidelines for Fire Investigations
• Conducting a Fire Investigation
• Summary
INTRODUCTION
It is a capital mistake to theorize before one has data. Insensibly, one begins to twist
facts to suit theories instead of theories to suit facts.
—Sherlock Holmes (A Study in Scarlet, by Sir Arthur Conan Doyle)
At common law, arson was defined as the malicious burning or exploding of the dwelling
house of another, or the burning of a building within the curtilage, the immediate sur-
rounding space, of the dwelling of another. Present-day criminal statutes have broadened
189
190 ◾ Cliff Roberson
the definition of arson to include the burning or exploding of commercial and public
buildings (e.g., restaurants, schools) and structures (e.g., bridges). In many states, the act
of burning any insured dwelling, regardless of whether it belongs to another, constitutes
arson if it is done with intent to defraud the insurer. In addition, the common-law rule that
the property burned must belong to another person has been completely eliminated by
statute in some states. To establish the crime of arson, two elements are necessary:
1. Evidence of a burning
2. Evidence that a criminal act caused the fire
The accused must intend to burn a building or other structure. Absent a statutory descrip-
tion of the conduct required for arson, the conduct must be malicious and not accidental.
Malice, however, does not mean ill will. Intentional or outrageously reckless conduct is suf-
ficient to constitute malice. Motive, on the other hand, is not an essential element of arson
(Wallace and Roberson, 2011).
In most states, arson is divided into degrees, depending sometimes on the value of the
property but more commonly on its use and whether the crime was committed in the day
or night. A typical statute might make the burning of an inhabited dwelling house at night
first-degree arson; the burning of a building close enough to a dwelling so as to endanger
it, second-degree arson; and the burning of any structure with intent to defraud an insurer
thereof, third-degree arson. Many statutes vary the degree of the crime according to the
criminal intent of the accused.
The U.S. Department of Justice published a guide entitled Fire and Arson Scene Evidence:
A Guide for Public Safety Personnel (Technical Working Group on Fire/Arson Scene
Investigation, 2000). Members of the technical working group that created the guide repre-
sented law enforcement, prosecution, defense, and fire and arson investigation communities,
and their collective expert knowledge, experience, and dedication made the effort a success.
The authors would encourage anyone who investigates fires or suspected arson scenes to
obtain the guide and use it. As noted by then-U.S. Attorney General Janet Reno (p. iii):
Actions taken at the outset of an investigation at a fire and arson scene can play
a pivotal role in the resolution of a case. Careful, thorough investigation is key to
ensuring that potential physical evidence is not tainted or destroyed or potential
witnesses overlooked.
protect property against further damage. Fire scenes often involve all manner of
public entities: emergency medical, law enforcement, and fire services. Public utili-
ties such as gas and electric companies may be involved. Passers-by, owners, ten-
ants, customers, delivery agents all may have relevant information. The press and
curious individuals attracted to large fire scenes can complicate investigations, as
they make security a necessity. As has frequently been said, “A fire investigation is
like a picture puzzle. Everyone involved with it has some of the pieces, but no one
has the whole picture. It is up to the investigator to gather enough of these pieces
together to solve the puzzle.”
FIRE TRIANGLE
An arson investigation should start with the fire itself. To create and sustain a fire, three
factors, known as the fire triangle, must be present:
• Oxygen
• Fuel source
• Heat
Generally, the concentration of oxygen necessary to sustain a fire must be above 16%. The
fuel may be any flammable substance. The heat source needs to be at least the ignition tem-
perature of the fuel. In a fire involving arson, one or more of the factors in the fire triangle
will have been tampered with. The arsonist may have increased the fuel load by the use of
flammable material or by adding accelerants such as kerosene, gasoline, or alcohol. The
arsonist may increase the oxygen content of a structure by opening windows or increasing
the flow of air by making holes in the ceilings or walls. Fire will generally follow the high-
est concentration of oxygen to its source. By ventilating a structure at the top and starting
a fire at the bottom of the structure, an arsonist can cause the fire to race upward through
the structure. The fire will rapidly involve the whole structure rather than be confined to
one room. An arson fire involves the introduction of a heat source, which can be as simple
as a match or as complex as chemicals with very low ignition temperatures. By definition
a fire is considered an arson fire after all other accidental caused have been ruled out. To
consider the fire an arson, the investigator should have evidence that one of the factors in
the fire triangle was tampered with (Steck-Flynn, 2009).
• A fire can be a complex event whose origin and cause are not obvious.
• The training and preparation of qualified fire investigators are costly and time
consuming.
• More often than not, the destructive power of the fire compromises or destroys the
evidence from the outset.
• The larger the fire, the less evidence that will remain after the fire is terminated.
• Fires generally draw crowds of people, including fire, rescue, emergency medi-
cal services, utility company personnel, and health and safety personnel, which
increases the chances that the fire scene security will be compromised and critical
evidence will be contaminated, moved, or destroyed.
• Often, the responsibility for the investigation of a fire will be divided among dif-
ferent public agencies, especially where the origin of the fire is not immediately
apparent.
DETECTING ARSON
The Santa Clara County, California, Fire Department is one of the few agencies in the Bay
Area to staff full-time fire investigator positions, augmented by on-call personnel. Fire
investigations provide information on the origins and causes of local fire problems, and
this information can be shared with the local news media to promote fire safety education
and arson awareness. The department also relies on Rosie, who is a Labrador Retriever
trained to detect several different types of flammable liquids. Rosie and her handler were
trained at the ATF Canine Training Center in Front Royal, Virginia, and have been in ser-
vice together since 2004. They respond to and assist at fires within the county fire jurisdic-
tion and in other cities in the county.
Rosie’s predecessor, Dolph, could detect a substance containing a concentration of only
one part per trillion (1/1,000,000,000,000,000) in the atmosphere, and his sense of smell
was much more sensitive than any sophisticated equipment. Dolph could detect a half-
drop of flammable liquid in the ruins of a fire. Dogs such as Rosie and Dolph, which are
recertified annually throughout their working careers, claim an accuracy record of 95 to
99% in detecting an accelerant. Other breeds of dogs might become aggressive and alert to
dangers, but a Lab concentrates on working to find the scent of an accelerant. According
to the department, some of the benefits of using a flammable liquid detection K-9 include
(SCCFD, 2011):
WHO INVESTIGATES
The initial determination of who investigates a fire is difficult because most of the time it is
not immediately clear whether the fire was accidental or arson. Possible agencies that may
be involved in investigating a fire include:
FIRST RESPONDERS
The first responder is usually the first public safety person to arrive on the scene, whether
law enforcement, firefighter, or emergency medical services personnel. The one overriding
concern of first responders is the safety of the victims, bystanders, and public safety per-
sonnel. When approaching a fire scene, the first responders should observe and note condi-
tions and activities. Generally, the responders will need to make mental notes followed as
soon as practical with permanent documentation. Information that first responders should
collect includes
• Weather conditions
• Any unusual circumstances at the scene
• Any fire suppression techniques used
• Status of alarms and sprinklers
• Fire suppression activities, which may wash away or dilute the evidence or destroy
fire patterns
• Salvage activities, which may involve moving or removing potential evidence
• Necessary medical treatment of victims
• Witnesses and victims leaving the scene
• Personnel walking through the scene who may tamper with or remove potential
evidence
• Vehicles moving across the scene, which may introduce fluids or other materials
• Power tools or equipment, which may introduce contamination from external
sources
• Changing weather conditions, which may destroy potential evidence
Steps that may be taken to protect the evidence include the following:
COORDINATION OF ACTIVITIES
Rarely will only one agency report to the fire scene. Emergency operations at the scene
may involve many different agencies, and each agency will probably have a different focus.
Accordingly, coordination among the agencies is essential. To assist in the coordination,
first responders should establish an incident command system to allow for the systematic
flow and transfer of critical scene information. The coordination planning should provide
for at least:
1. Identify and contact the current incident commander and present your
identification.
2. Conduct a briefing and debriefing with the commander.
3. Ascertain who has jurisdiction and authorization (legal right of entry) and iden-
tify other personnel at the scene.
4. Determine the level of assistance required and if additional personnel are needed.
5. Determine initial scene safety prior to entry; consider environmental as well as
personnel safety concerns.
6. Define the extent of the scene.
7. Identify and interview witnesses at the scene.
8. Assess scene security at the time of the fire.
9. Identify resources required to process the scene.
10. Photograph or videotape the scene.
11. Describe and document the scene.
12. Process the evidence.
SUMMARY
Arson is especially difficult to investigate because often the fire destroys much of the evi-
dence. In addition, the fire suppression efforts may also destroy evidence. It is critical for
the first responder to secure the scene and document the evidence. Often the success or
failure of an arson investigation will depend on the actions of the first responder. An indi-
vidual assigned the duty as a fire investigator should study and follow the procedures out-
lined in NFPA 921.
BIBLIOGRAPHY
NFPA. (2011). NFPA 921: Guide for Fire & Explosion Investigations. Quincy, MA: National Fire
Protection Association
SCCFD. (2011). Fire/Arson Investigation. Santa Clara, CA: Santa Clara County Fire Department.
(http://www.sccfd.org/fire_investigation.html).
Arson Investigation ◾ 197
Steck-Flynn, K. (2009). Crime Scene Investigation: Crime Scene Processing. Crime & Clues, http://www.
crimeandclues.com/index.php/crime-scene-investigation/40-crime-scene-processing/96-
arson-investigation.
Technical Working Group on Fire/Arson Scene Investigation. (2000). Fire and Arson Scene Evidence:
A Guide for Public Safety Personnel. Washington, D.C.: U.S. Department of Justice (www.ncjrs.
gov/pdffiles1/nij/181584.pdf).
Wallace, H. and Roberson, C. (2011). Principles of Criminal Law, 5th ed. Upper Saddle River, NJ:
Prentice-Hall.
Chapter 12
Financial Investigation
Michael J. Palmiotto
Wichita State University
CHAPTER OBJECTIVES
After reading this chapter, you should be able to do the following:
Chapter Outline
• Introduction
• What Is Fraud?
• Association of Certified Fraud Examiners
• Why Financial Investigations?
• Approach to the Investigation of Financial Crimes
• Association of Certified Fraud Examiners
• Summary
INTRODUCTION
Fraud has occurred throughout this country’s history, although it seems more prevalent in
our contemporary society. Today, it seems that fraud occurs daily to someone we know or
in the business world. Fraud is a serious, often underrated offense that seems to be ignored
by many private individuals who practice no prevention methods or are unaware that they
are potential victims of fraud. The business world can be just as oblivious when they fail
to put in place strategies to prevent fraud. In the last several decades, though, awareness of
fraud has grown.
199
200 ◾ Michael J. Palmiotto
Fraud in America can be traced back to the colonial period when fake health cures were
promoted. These medical frauds involved phony medicines, spiritual cures, and bloodlet-
ting. Also, land swindles were not unusual at the time, and either the buyer or the seller
of the land could be the swindler. Immigrants or Indians were often the victims. During
America’s frontier period, land swindler activity increased substantially when expanding
government involvement in acquisitions provided an opportunity for collusive land deal-
ings between land swindlers and government officials. When corporations evolved in the
19th century, fraud occurred when illegal stock was issued by corporate fraudsters. Frauds
involving corporations and governments have continued to persist up to the present day
(Jensen, n.d.).
Before continuing, fraud itself should be defined. The variety of definitions available all
seem to differ slightly. Fraud has been defined by the American Heritage Dictionary (2011)
as “a deception deliberately practiced in order to secure unfair or unlawful gain. A piece
of trickery; a swindle. One who defrauds; a cheat.” Albrecht and Albrecht (2004) provided
what they considered to be the most common definition:
Fraud is a generic term, and embraces all the multifarious means which human
ingenuity can devise, which are restored to by one individual, to get an advantage
over another by false representations. No definite and invariable rule can be laid
down as a general proposition in defining fraud, as it includes surprise, trickery,
cunning, and unfair ways by which another is cheated. The only boundaries defin-
ing it are those which limit human knavery.
Fraud has several components, including deceit, intentional acts, broken trust, econom-
ical losses, secrecy, and fraudsters who may give the appearance of respectability. Joseph
Wells, the founder of the Association of Certified Fraud Examiners, stated, “Fraud can
encompass any crime for gain that uses deception as a principal modus operandi. There
are but three ways to illegally relieve a victim of money: force, trickery, or larceny (Wells,
2008, p. 8).
WHAT IS FRAUD?
Fraud is a crime that can be investigated by sworn law enforcement personnel and private
citizens who are trained in investigating financial crimes. Sworn law enforcement offi-
cers (federal, state, or local) have more authority and power than private fraud examiners;
for example, sworn law enforcement officers have arrest powers, whereas fraud examiners
do not. Both law enforcement investigators and fraud examiners must follow legal pro-
cedures in conducting an investigation dealing with fraud. It is common for former law
enforcement officers to become fraud examiners and to work for corporations or operate
their own business. Because financial crimes occur not only against individuals but also
against corporations and nonprofit organizations, fraud examiners are often employed to
determine if a financial crime has occurred. Corporations are concerned with identify-
ing and dealing with fraud that may be causing a financial loss. They may not take legal
Financial Investigation ◾ 201
action against fraudsters when they locate them, because they may not want the negative
publicity. Generally, fraud examiners will not investigate financial crimes committed by
corporations; this is generally left to law enforcement officers. A wide variety of federal
statutes provide for taking criminal action against both corporations and private indi-
viduals. Individuals unfamiliar with fraud frequently rely upon auditors to locate it during
reviews of a company’s financial records.
Fraud examiners and financial investigators have different objectives compared to audi-
tors. Auditing is routine and is conducted on an ongoing basis; it involves a general exami-
nation of the financial records of an organization, with opinions provided. The approach
that auditors take is one of skepticism. Conversely, fraud examination occurs only with
sufficient provocation, reasonable suspicion that an inappropriate act may have occurred.
The object of the fraud examination is to locate the fraudster and forward the proof to the
prosecutor. Fraud examinations are adversarial, thorough investigations that prove or dis-
prove allegations of fraud (Wells, 2008).
• Identity crimes are defined as the misuse of personal or financial identifiers in order
to gain something of value and/or facilitate other criminal activity. The Secret
Service is the primary federal agency that investigates identity crimes, including
credit card fraud, check fraud, bank fraud, false identification fraud, and passport/
visa fraud.
• Counterfeit and fraudulent identification, as the name implies, involves possession
of false identification documents or counterfeit documents.
• Access device fraud involves false credit cards, debit cards, computer passwords,
personal identification numbers, and long distance access codes.
• Computer fraud involves computer crime.
• Forgery investigations address forged U.S. currency and bonds.
• Money laundering investigations focus on the laundering of monetary proceeds
from criminal acts.
• Electronic benefits transfer fraud investigations look into food stamp fraud.
• Advance fee fraud investigations track Nigerian schemes, known as “4-1-9,” which
promise victims millions of dollars.
The FBI concentrates on corporate fraud, securities and commodities fraud, healthcare
fraud, financial institution fraud, mortgage fraud, insurance fraud, and mass marketing
fraud. The FBI investigates fraud under its Financial Crimes Section (FCS). The mission
202 ◾ Michael J. Palmiotto
of the FCS is to oversee the investigation of financial fraud and to facilitate the forfeiture
of assets from those engaging in federal crimes. The FCS is divided into four units: the
Economic Crimes Unit, Health Care Fraud Unit, Financial Institution Fraud Unit, and the
Asset Forfeiture/Money Laundering Unit:
• Among industries with at least 50 fraud cases, the largest median losses occurred
in manufacturing ($441,000), banking ($250,000), and insurance ($216,000).
• Small business is especially vulnerable to occupational fraud.
• Lack of adequate internal controls was most commonly cited as the factor that
allowed fraud to occur.
• After discovering that they had been defrauded, 78% of the organizations modi-
fied their anti-fraud controls.
• Occupational fraudsters are generally first-time offenders.
• The most commonly cited behavioral red flags were perpetrators living beyond
their apparent means (39%) or experiencing financial difficulties at the time of the
fraud (34%).
detail the movement of money during fraudulent acts. They must identify the money trail
and show the chain of events suggesting financial crime. If no money trail exists, the inves-
tigation may have to stop. Information valuable to a financial crime investigation can come
from a wide variety of sources, such as informants, government records, business records,
public records, checking and bank savings accounts, motor vehicle registrations, and real
estate records, including mortgages and deeds. Additional information that may be valu-
able in establishing a money trail includes computer hard drives, computer disks, utility
bills, credit card records, divorce records, recent purchases, and outgoing and incoming
telephone records.
Financial investigators have the responsibility of obtaining evidence suggesting that
financial crimes have been committed or deciding that such crimes did not occur. The
investigator must decide where to look and what to look for in conducting a financial
investigation, keeping in mind the resources required to do so. Financial investigators
must use caution when selecting a suspect for an investigation. It may not always be easy
to determine whom to target; they do not want to accuse innocent people of crimes and
damage their reputations. Investigations generally begin with a suspect who might be a
good source for inside information. When conducting financial investigations, investiga-
tors should seek out anyone who can provide financial information and has the authority
to obtain that information.
One method of investigating fraud is to obtain what is known as direct proof, which
proves the involvement of the suspect in the illegal financial scheme. The investigator
attempts to establish an uninterrupted connection between the proof or evidence found
and particular financial transactions; that is, they build a paper trail of evidence that can
be documented and presented to a jury. The indirect method involves analyzing an indi-
vidual’s net worth and changes in the suspect’s income and liabilities that cannot be read-
ily accounted for.
The goal of solving a crime should be based on ethics, legal guidelines, accuracy, and a
sincere search for the truth (Palmiotto, 2004). Financial investigators must follow the legal
procedures required to lead to arrests and convictions. All investigations must be based on
law, either federal law or state law, and all actions taken while conducting an investigation
must be documented and follow proper protocol. The investigation of financial crimes is
a specialized one that requires precise placement of responsibility, intensive training, and
experience to develop and maintain skills (Eastman and Eastman, 1971).
fraud investigation field (it should be noted that some private investigators who have not
obtained certification also investigate financial fraud). ACFE refers to a fraud investigation
as an examination, a term they consider to be less harsh than investigation. Fraud examin-
ers investigate fraud for companies where workers are generally well-educated profession-
als. Many of the people interviewed are high-powered executives, including presidents and
chief financial officers. Not everyone interviewed by fraud examiners is necessarily a sus-
pect; the vast majority of them will not be suspects but witnesses who can provide general
information about the potential offense. Fraud examiners must not be offensive, as they
require the cooperation of those familiar with the business operation. Fraud examiners
who are abrasive, arrogant, and rude will obtain little cooperation and information from
individuals who would otherwise be willing to offer their assistance.
A fraud examination is undertaken when there exists predication or sufficient reason
to initiate an examination. Fraud investigations rarely have benefit of direct evidence or
eyewitnesses, and offenders do not tend to admit to fraud immediately. Like any investiga-
tion, the examination follows a number of steps, and examiners must develop a hypoth-
esis to explain how the alleged fraud has been committed and who the suspects could be.
Assumptions must be made to solve the case; initially, these assumptions are based on the
known facts. Following is a summary of the steps involved (Wells, 2008):
Fraud examiners must know how to review financial statements, records, and support-
ing documents. These documents can provide an indication of fraud upon which an exam-
ination can be conducted. Fraud examiners must conduct such reviews in a legal manner
and follow the rules of chain of custody. Examiners who are weak in reading financial
statements should receive extra training or work with an examiner who has familiarity
with financial statements and records.
The examiner must also know how to conduct an effective interview. It should be noted
that internal fraud committed by employees of a company is the most common type of
fraud (Wells, 2008). Most good interviewers have excellent people skills; they are people
who others want to share information with. Generally, interviews that are kept low key
are the most successful. The interviewer should not be biased, and it is expected that
the interviewer will be on time, dressed professionally, and fair minded in dealing with
interviewees.
Fraud examiners must be able to use the powers of observation to observe behavior,
displays of money, or even offenses being committed (video surveillance is useful in this
regard). Surveillance involves the planned observation of people, places, and things; usu-
ally, places and things are observed to obtain information about people. Surveillance can
be either mobile (following someone) or fixed (stationary). Surveillance can be valuable in
obtaining information about suspects (ACFE, 2011).
206 ◾ Michael J. Palmiotto
Albrecht and Albrecht (2004) also outlined specific steps that a fraud examiner should
take:
The financial investigations of fraud examiners are similar to those of law enforcement
investigators but they do not have the legal authorities given to government officials. Fraud
examiners may have to be more careful than law enforcement investigators who have the
power to charge someone with a crime or to conduct an interview longer than the inter-
viewer would like. Fraud examiners cannot use the term arrest or testify that a suspect
committed a crime. They can only present their information and let the prosecutor and
jury make the decision.
SUMMARY
Fraud occurs on a daily basis. No one is free from being a victim, including individu-
als, married couples, small businesses, and large corporations. No organization, no matter
how small or large, is immune from fraud. Any business that an individual can think of
has been, currently is, or potentially will be a victim of fraud. Federal investigative agen-
cies have been given legal authorization to investigate financial crimes. Although many
federal agencies have authority to investigate fraud, this chapter concentrated on the two
best known agencies with authority to investigate financial crimes, the FBI and the Secret
Financial Investigation ◾ 207
BIBLIOGRAPHY
ACFE. (2008). Report to the Nation on Occupational Fraud and Abuse. Austin, TX: Association of
Certified Fraud Examiners.
ACFE. (2011). Fraud Examiners Manual. Austin, TX: Association of Certified Fraud Examiners.
Albrecht, W.S. and Albrecht, C. (2004). Fraud Examination and Prevention. Mason, OH: South-
Western.
Anon. (2011). American Heritage Dictionary of the English Language, 5th ed. New York: Houghton
Mifflin Harcourt.
Cronin, M., McCarroll, T., and McWhirter, W. (1990). Predator’s Fall: Drexel Burnham Lambert, Time,
February 26, pp. 46–52 (http://www.time.com/time/magazine/article/0,9171,96948-6-6,00.
html).
Eastman G. and Eastman E. (1971). Municipal Policing. Washington, D.C.: International Association
of Chiefs of Police.
FBI. (2009). Financial Crimes Report to the Public Fiscal Year 2008. Washington, D.C.: Federal Bureau
of Investigation (http://www.fbi.gov/stats-services/publications/fcs_report2008).
Groupwatch. (1990). Hidden Mysteries—Religion’s Frauds, Lies, Control: Praise the Lord, Frankston,
TX: HiddenMysteries.com/TGS Services (http://www.hiddenmysteries.org/religion/evange-
lists/PTL.shtml).
Jensen, B. (n.d). History of Fraud in America. San Antonio, TX: Trinity University (http://www.trin-
ity.edu/rjensen/FraudAmericanHistory.htm).
Palmiotto, M.J. (2004). Criminal Investigation, 3rd ed. New York: University Press of America.
Secret Service. (2010). Criminal Investigations. Washington, D.C.: U.S. Secret Service (http://www.
secretservice.gov/criminal.shtml).
U.S. Department of the Treasury. (1993). Financial Investigations, Publ. No. 1714 (Rev. 6-93), Catalog
15271F. Washington, D.C.: U.S. Government Printing Office.
Wells, J.T. (2008). Principles of Fraud Examination, 2nd ed. Hoboken, NJ: John Wiley & Sons.
4
Crimes against Persons
Chapter 15 ■ Robbery
209
Chapter 13
CHAPTER OBJECTIVES
After reading this chapter, you should be able to do the following:
1. Define an assault.
2. Define the crime of felonious homicide.
3. Explain the classifications of death.
4. Explain the aims of a death investigation.
5. Define wounding patterns and explain why they are important.
Chapter Outline
• Assault and Homicide Defined
• Aims of a Death or Assault Investigation
• Manner of Death
• Autopsy and the Role of the Coroner or Medical Examiner
• Motive, Method, and Opportunity: Putting the Investigation All Together
• Interviewing Witnesses
• Physical Evidence
• Summary
another, under such circumstances as create well-founded fear of imminent peril, coupled
with apparent present ability to execute attempt, if not prevented” (Black, 1968; Naler v. State,
1933; State v. Staw, 1922). In some states (e.g., Missouri and Louisiana), the crime of assault
covers both the attempt and the actual resulting harm, but in others (e.g., Kansas) the crime
of assault is the attempt to do harm, and the actual harm or injury is known as the crime of
battery. In some states (e.g., Missouri and Louisiana), the actual amount of harm or actual
potential for harm determines the degree of the crime; for example, first-degree and second-
degree assault can be a felony, and third-degree assault a misdemeanor. Also, in Kansas, for
example, the presence or use of a weapon as well as the degree of harm or potential for harm
can distinguish aggravated assault/battery (a felony) from simple assault (a misdemeanor).
If the injury inflicted in the assault is severe enough, it can turn into a homicide. Black
defined homicide as “the act of a human being in taking away the life of another human
being” (Black, 1968; Hogan v. State, 1934; Sanders v. State, 1901). Black suggested that not
all homicides are crimes and further subdivided his definition to explain justifiable, excus-
able, and felonious homicides (Black, 1968; People v. Connors, 1895). Felonious homicide
occurs when a human being is wrongfully killed without justification or excuse in law. A
justifiable homicide occurs when a human being is lawfully killed either by legal court
order (i.e., death warrant for a lawful execution) or in protection of life as provided by law,
such as a law enforcement officer killing a robber who is shooting at the officer. An excus-
able homicide is a killing that occurs either by misadventure (homicide per infortunium)
or in self-defense (homicide se defendendo) (Black, 1968). Both assaults and homicides are
investigated in a similar manner. The primary difference is that, in an assault, we usually
have the victim available to provide evidence against their attacker. In a homicide, certain
evidence can still be provided by the corpse of the victim, but unless it is a deathbed state-
ment it is usually not verbal testimony.
MANNER OF DEATH
Everybody dies eventually, some sooner than others. People die every day. If you don’t
believe it, look in the obituary section of your local paper to see who just died. According to
the Centers for Disease Control (CDC), about 803.6 people per 100,000 in the United States
will die each year (CDC, 2011a). Not all deaths are criminal, but some are. The manner of
death can be classified as natural causes, accidental, suicide, and homicide (Gilbert, 2004;
James and Nordby, 2003).
Homicide and Assault ◾ 213
NATURAL CAUSES
In the case of a death by natural causes, the most common type, the death is usually the
result of a disease or other known infirmity. It is often expected, even by the victim. The
attending physician can sign the death certificate and no further law enforcement action is
required; however, if the attending physician will not sign the death certificate, it becomes
the responsibility of the coroner, in which case law enforcement involvement is highly prob-
able, if only to gather facts for the coroner. Law enforcement officers should be sure that the
death is not a murder or suicide being made to look like death from a natural cause.
ACCIDENTAL DEATHS
Death in an accident or other misadventure is the second leading cause of death in the
United States. An accidental death is a death caused by unintentional injuries (CDC, 2011a).
Accidental deaths include automobile accidents, industrial accidents, home accidents, and
most drug-induced deaths (overdoses). These deaths are investigated, as is any other death
investigation, for possible civil or criminal action. Special care must be undertaken by the
investigator to ensure that the death was actually accidental and not a homicide or suicide
being made to look like an accident.
SUICIDE
A suicide is self-inflicted death. According to the CDC (2011a), suicide ranks as num-
ber 11 among the top 15 causes of death in the United States. The predominant ways in
which people commit suicide in the United States are firearms, suffocation, and poisoning.
Investigators should note that a suicide note is not always present. Suicide is sometimes
faked by suspects to hide the murder of a victim, and sometimes suicide is made to look
like murder by family or friends to cover suicide (usually for religious or insurance rea-
sons). In most states, assisting a person to commit suicide is a criminal offense.
HOMICIDE
Homicide is the unlawful killing of a human being by another. According to the CDC
(2011a), it ranks as number 15 of the top 15 causes of death in the United States. Common
elements of the crime of homicide may include intent, malice, and aforethought.
involved. In some jurisdictions, they maintain a fully staffed investigative office, including
medicolegal death investigators, who attend crime scenes with law enforcement officials.
In other jurisdictions, law enforcement officials bring the evidence and the body of the
victim to the coroner for examination. An autopsy is a postmortem examination of the
deceased conducted by a coroner or medical examiner to determine the cause of death of
the deceased. The procedure gathers evidence on the mechanism of death. The coroner
determines the identity of the victim and cause of death of the individual. In homicides
and suicides, coroners or medical examiners rule out accidental or natural causes (Cataldie,
2006; Fisher, 2000; Ramsland, 2008).
PRELIMINARY CONSIDERATIONS
Upon arrival at an incident, the absolute first thing that a law enforcement officer must
do is to make sure that the scene of the incident is secure. This is an essential priority in
any first response. Securing the scene begins with clearing the scene and making sure that
there is no imminent danger to the officer or the public. This might be as simple as glancing
around to see who is there and if it is safe. However, if the bomb is still ticking or if the bad
guy is still there and poses a threat, it is important to keep in mind that the first responder
could get killed. As a first responder, remember that the pool of blood that you should
examine is supposed to be someone else’s, not your own. Officers have arrived at homicide
scenes where the murderer was still standing there with the smoking gun in his hand. It is
rare, but it does happen. Safety first!
Contact the reporting party. Identify the reporting party and determine what occurred.
What is the reporting party’s role in this—victim, witness, suspect? Who else is involved?
Witnesses and suspects need to be identified to conduct a proper investigation (Geberth,
2006; Weston and Lushbaugh, 2003). If applicable, secure the scene of the crime. A saying
among the investigations community is that, “Evidence has legs!” This means that your
evidence will walk off or be contaminated if the scene is not secured and protected. Even
the simple act of too many people walking through the scene can destroy or remove hair,
fiber, footprints, tire tracks, etc. Protect the scene to preserve any evidence (Fisher, 2000;
Geberth, 2006; Girard, 2011; James and Nordby, 2003; Ogle, 2004; Saferstein, 2004).
The first responder needs to look for anything that could be considered as evidence.
Identification of evidence by the initial responder ensures that the evidence will be properly
collected, processed, and analyzed. This is a most important function. Detectives cannot
examine evidence that was never identified and collected by investigators. The investigators
must make sure that the evidence is legally collected; at times, investigators may need to get
a search warrant or advise suspects of their Miranda rights. There is no “homicide excep-
tion” to the need to obtain a search warrant if one is needed (Mincey v. Arizona, 1978). The
investigator also must make sure that the evidence is properly packaged, marked, turned
in, and stored in such a way as to maintain the chain of custody. Evidence can be spoiled
by contamination, which reduces its evidentiary value, or it can be excluded because it was
collected illegally (Fisher, 2000; Geberth, 2006; Girard, 2011; James and Nordby, 2003; Ogle,
2004; Saferstein, 2004).
Homicide and Assault ◾ 215
CRIME SCENE
Upon arriving at the crime scene, investigators should first secure the crime scene if it has
not already been accomplished by the first responder. They should make sure that they
have the right to legally seize any evidence present and get a search warrant when neces-
sary (Mincey v. Arizona, 1978). Using procedures described in Chapter 2, the investiga-
tor should make an initial walk-through of the crime scene. The crime scene should be
thoroughly diagrammed and photographed. Possible evidence includes the victim’s body,
biological evidence, fingerprints, trace evidence, impression evidence, and weapons. As
previously mentioned, all evidence needs to be properly collected, packaged, and turned
in for further analysis.
Investigators need to locate and examine the body of the victim. The body may be read-
ily apparent, but it may have been moved by the suspect from the initial crime scene and
concealed. Investigators looking for a victim’s body sometime use cadaver dogs to assist in
the search; these dogs are often able to detect a body that has been buried in a clandestine
grave (Geberth, 2006; Hallcox and Welch, 2006). Ground-penetrating radar is also used to
detect buried bodies (GSSI, 2011). Other indications of a concealed grave are changes in the
color and depth of vegetation and soil at the site (Davenport et al., 1992).
When the victim’s body has been located, investigators should carefully observe the
position of the body (Lyman, 1999). Are any wounds visible on the body? Are any of these
wounds defensive wounds? Is rigor mortis or livor mortis apparent? Is there visible decom-
position of the body? Don’t move the body until the coroner or medical examiner says it
is all right to do so. If the intended roles are played out properly, the scene belongs to the
police investigator, and the body belongs to the coroner or medical examiner. A thoroughly
processed crime scene can assist in successfully solving a case.
called in for cases involving small children or babies who have been abused and suffered
broken bones. A child’s death may prompt taking postmortem x-rays to determine any
evidence of abuse while the child was alive (Weston and Lushbaugh, 2003).
In the case of skeletonized remains, the first thing that a forensic anthropologist does
is to determine if the bones are human. If so, a forensic anthropologist may be able to
determine the race, sex, and approximate age, height, and weight of the deceased. Facial
reconstruction of the victim is sometimes possible; such models of a victim’s face can aid
in identification of the victim and has been used successfully in many cases in the United
States.
where the body was found, what type of foods the victim ate (or didn’t eat), and whether
the victim smoked, drank, or used drugs. What was the victim’s daily routine? Was there
anything different about it that day? Were there things the victim was in the habit of doing
around the house that are not done? Did the victim normally drive down this road? The
list of questions is endless.
The body begins the change process at the time of death. The longer the period of time
between death and when the body is discovered, the less precise will be the estimation of
the time of death. Changes to the body progress in a relative orderly process, and the ques-
tion to be answered typically is at what point in this process was the body found?
The factor used most often to determine the time of death is algor mortis, or the process
of the body cooling off. Geberth (2006) used the following information as a rule of thumb:
If the body is warm, death occurred a few hours ago; if the body is cold and clammy, death
occurred anywhere between 18 and 24 hours ago. As a general rule, the normal tempera-
ture of the healthy person is 98.6°F. The generally accepted rate of cooling is about 1.5°F
per hour. So, to determine the number of hours since death, the following formula can
be used: (98.6 – current body temperature) ÷ 1.5. Even assuming that this is an accurate
indicator, it is still necessary for the body to have been at 98.6°F at the time of death. In the
case of pneumonia or cocaine death, the temperature could be around 105°F or, in the case
of heat stroke, even 110°F. In contrast, in cases of impaired metabolism, the body tempera-
ture at death could have been 93°F; it could be even lower in cases of exposure to cold (i.e.,
hypothermia). At some point, the body temperature loses relevance, as the body will tend
to approximate the temperature of the environment. This makes it necessary to determine
the rectal temperature of the body and the temperature of the environment.
Rigor mortis is a common form of determining time since death, although it is the least
accurate method (Geberth, 2006). Rigor mortis is the stiffening of the muscles related to
chemical changes occurring after death. It fixes the body in the position assumed at death.
If a person dies in a seated position and rigor mortis sets in, the body will retain that posi-
tion when moved. Rigor mortis is not a permanent condition. It begins at the same time
throughout the body, although it first becomes evident in the shorter muscles, such as the
face, becoming evident in the larger muscles later. This process generally begins in 2 to 4
hours, is completed 8 to 12 hours, and begins leaving the body at 18 to 36 hours. The begin-
ning of the process can be accelerated or delayed, thus affecting the entire time line. If the
body or the environmental temperatures are high, the onset of the process will be speeded
up, while a cold environmental temperature will delay the onset.
A concept often confused with rigor mortis is cadaveric spasm. Cadaveric spasm is the
stiffening of a single group of muscles occurring immediately after death, such as a hand
still gripping the gun used to commit suicide. In contrast, rigor mortis is a process involv-
ing all muscles of the body, and the stiffening of cadaveric spasm does not leave the body,
as in the case of rigor mortis.
Postmortem lividity (livor mortis) is the purple discoloration at the lowest parts of
the body after death. When the heart no longer beats, the blood ceases to flow; gravity
takes over, and the blood settles to the lowest part of the body. Without oxygen, the blood
changes to a purple color. In the body of a victim lying on his back, the blood will settle
218 ◾ Gregg W. Etter and Roger L. Pennel
to the shoulders, back buttocks, and backs of the thighs and calves. An exception to this is
when the body is in direct contact with the floor (also called blanching). These same areas
(shoulder blades, buttocks, and backs of the thighs and calves) will be a white color rather
than purple, as the pressure of the floor does not permit blood flow into these areas. When
the cause of death is chemical death by means of carbon monoxide poisoning, the color of
these areas will be cherry red.
Livor mortis may be helpful in determining how long the victim has been dead and
whether the body has been moved after death. If two parts of the body, such as the back
and one side, have similar colors, then it is possible the body was moved after death. Livor
mortis begins in approximately 30 minutes, becomes perceptible in about 1 to 4 hours,
is well developed after 3 to 4 hours, and becomes fixed at 8 to 10 hours. The term “fixed”
means that the livor patterns have settled in one position and cannot be shifted, even by
moving the body to a different position. The point of fixing does not necessarily mean that
the blood has lost its fluid nature, but that the blood is being obstructed from flowing out
of the capillaries by the gelled blood.
The contents of the gastrointestinal tract can provide clues as to the last time the victim
ate, what the victim ate, or where the victim ate. There is a general lack of agreement as to
how long it takes for the stomach to empty, although Geberth (2006) suggested that the
stomach empties its contents within 4 to 6 hours after a meal. If there is no evidence of
food in the stomach, it may be necessary for the forensic pathologist to examine the small
intestines, where food may remain for up to 12 hours. The process of the stomach empty-
ing its contents may be affected by the type of food, the amount of food, at what rate the
body metabolizes the food, and the presence of any type of medication. If there is any pos-
sibility that food may figure into the death, particularly at a residence, samples should be
collected.
Postmortem decomposition is a process where the body basically turns on itself. This
process has two components: autolysis and putrefaction (the major component of decom-
position). Autolysis occurs when digestive juices break down the tissues of the gastroin-
testinal tract, which may result in perforation of the stomach within a few hours of death.
During life, digestive juices act on food; during death, they act on the body.
Putrefaction occurs when bacteria within the body acts on the cells of the body, initiat-
ing a decaying process. During this process, gases are produced that distort and discolor
the tissues of the body. The body begins to swell and produce a foul odor. The process is
initially indicated in the area of the abdomen by a greenish color; it then spreads to the
remainder of the body. A general timeline may be loosely derived from Casper’s dictum
regarding the rate of putrefaction: One week of putrefaction in air = two weeks in water =
eight weeks buried in soil. A similar decay process occurs in the blood vessels. The blood
breaks down and stains the vessels, producing a greenish-black discoloration along the
blood vessels. The marbling, due to the dark color and being close to the skin, will be
evident.
Some of the changes discussed above will naturally occur in most environments if the
body is not found is sufficient time. Other changes only occur when a body has been placed
in a particular type of environment. Adipocere is produced when a body is left in water or
Homicide and Assault ◾ 219
IDENTIFYING SUSPECTS
Suspects may be identified by the victim, by witnesses to the crime, or by informants.
Suspects can be identified by physical evidence such as fingerprints or DNA, or they may
confess to the crime out of remorse. The investigator often begins looking for suspects
by examining all those persons who last had contact with the victim: friends, associ-
ates, enemies, family, etc. The identification of a suspect is another essential part of the
investigation.
220 ◾ Gregg W. Etter and Roger L. Pennel
MOTIVE
The motive is the cause or reason why the perpetrator attacked or killed the victim (Black,
1968). There can be a single motive or a combination of motives in an assault or killing.
Motives can include (Osterburg and Ward, 2010; Weston and Lushbaugh, 2003):
METHOD
The method is how the attack was actually accomplished or attempted against the victim.
Did the suspect point a gun at the victim? Stab the victim? Strike the victim with his hands
or feet? Each type of attack produces a different type of injury or, in the case of a swing and
a miss, no injury at all, but it is still an assault. The investigator must be able to determine
how the attack occurred in order to prove the crime.
OPPORTUNITY
In order to prove that the suspect committed the crime, the investigator must show that
the suspect had the opportunity to commit the crime. Was the suspect physically present
at the time of the crime? Could the suspect physically do what was necessary to accomplish
the alleged assault?
Homicide and Assault ◾ 221
INTERVIEWING WITNESSES
Witnesses are a crucial part of any assault or homicide investigation; therefore, identifying
witnesses and conducting timely interviews are essential. Investigators have to get a wit-
ness’ story down before it changes or the witness disappears. Don’t expect witnesses to wait
around for hours to voluntarily talk to an inspector. Witnesses may not even want to be
involved in the case (Bennett and Hess, 1991; Gerber and Schroeder, 1974).
Many prosecutors and police prefer to have eyewitness testimony about a crime; how-
ever, eyewitness testimony can have its drawbacks and is not necessarily reliable or accu-
rate. As an example, picture the face of a clock, and suppose that Witness 1 is standing at
the 12. Witness 2 is at 2, Witness 3 is at 11, Witness 4 is at 8, and the victim is in the center
of the clock. The suspect is at 6. Obviously, each witness saw what happened a little differ-
ently. It is necessary to document where every witness was in relation to the victim and
suspect, as well as what they actually saw, heard, tasted, or smelled. If you don’t find these
witnesses and document exactly what they experienced, you can be sure that the defense
attorney will! Be careful not to put words in anybody’s mouth. Some investigators, for
example, would not even mention finding a knife to avoid planting the idea of a knife in
a witness’ mind; instead, they would simply ask the witness exactly what the witness saw
or heard (Pena, 1997). Accurately document what they saw or didn’t see. Can the witness
place the victim at the scene? Can the witness place the suspect at the scene? Did the wit-
ness hear any threats or argument? All of these questions are relevant, even those with
negative answers.
Statements taken by investigators from witnesses have to be credible; therefore, wit-
nesses must be kept separate to prevent creating a “collective memory” of what happened.
We want to know what each person witnessed, not hear a compromised account obtained
by group discussion. People usually mean well but they do talk to each other and memories
become corrupted.
PHYSICAL EVIDENCE
Just as important and in some cases even more important is the physical evidence in the
case. Ogle (2004) noted that physical evidence gives investigators valuable clues as to what
happened, can prove or disprove statements by the defendant, provides the jury with a
tangible object to see to strengthen the case, and is not subject to memory loss as is witness
testimony. Physical evidence in homicides and assaults can consist of weapons, trace evi-
dence, biological evidence, impression evidence, photographs, etc. Be aware, though, that,
“Physical evidence has value in court proceedings only when the forensic scientist who tes-
tifies about it understands—and can explain to a jury—how the results of this analysis may
be interpreted in the context of the crime scene” (Girard, 2011). Some examples of physical
evidence are discussed in the following sections.
222 ◾ Gregg W. Etter and Roger L. Pennel
WEAPONS
Weapons are the means used by assailants to assault or murder their victims. The use of
a weapon may or may not cause injury to the victim; for example, a victim who has been
shot at but the bullet missed has still been assaulted. Various types of weapons may cause
different wounding patterns. Walker (1983) stated that, “In an armed assault, the recovery
of the weapon that was used is of primary concern, particularly if it was a firearm.”
Personal Weapons
Personal weapons are the most readily available, as they consist of the assailant’s various
body parts (e.g., hands, head, teeth, feet). The use of body parts as a weapon can cause
injury or even death. The actions taken by the suspect might be as simple as a push or a
shove to cause the victim to fall off of a cliff or building. Investigators should examine pos-
sible contact surfaces such as the knuckles of the hand for abrasions, contusions, or other
signs of contact with the victim. Bite marks can be matched to their owner by a forensic
dentist using forensic odontology. Bite marks may be offensive or defensive wounds (State
v. Peoples, 1980).
Blunt Instruments
A blunt instrument can be anything used as a club, a rock, a brick, an automobile bumper,
etc. Blunt instruments bludgeon the victim and often leave a crushing injury, such as bro-
ken bones or contusions. Injury or death can occur. Examine the weapon for fingerprints
or biological or trace evidence. This type of weapon can leave impression evidence.
Firearms
Firearms are weapons that use the explosion of a gunpowder charge to propel a projectile
or bullet. Firearms are generally considered to be handguns, rifles, muskets, and shotguns.
If the bullet strikes the victim, it usually causes a penetrating (puncture) or grazing (abra-
sion) wound. Investigators should examine the weapons, cartridge cases, and expended
bullets for fingerprints, ballistic evidence, and biological evidence.
consumed by the flames, leaving only trace evidence (usually pieces of bone or teeth). A
victim’s body may show signs of charring and other extensive body damage. Investigators
should look at fire burn patterns to determine the probable point of origin. Investigators
should also look for the presence of an accelerant that would indicate that the fire had been
set on purpose. Fires are sometime set to cover murders or other crimes. Explosives have
different blast patterns and different chemical signatures; they often dismember victims
with tremendous force. Sometimes victims are killed by the concussion of the blast, which
can leave the victim with no external signs of injury but blunt injury trauma to internal
organs (Walker, 1983).
Poisons
Poisons are toxic substances that can induce injury or death in the victim. While often
used as a method of suicide, poison is fairly rare as a method of homicide (Geberth, 2006).
Poisons may be biological or chemical, which can be solid, liquid, or gaseous. They may
be administered orally, intravenously, by inhalation, or through osmosis. Poisons leave
trace evidence that can be identified through chemical analysis and forensic toxicology
(James and Nordby, 2003; Saferstein, 2004). Corrosion or the appearance of burning at the
mouth may be present in victims who ingested a caustic substance. Dilation of the eyes
may be present in poisoning from atropine or belladonna, but opiate alkaloids or nicotine
cause contraction of the pupils in victims. The color of lividity on the victim’s body may
be affected (e.g., red vs. purplish in cyanide victims). The contents of the victim’s stomach
often give clues as to the poison involved (Fisher, 2000).
Other Weapons
Perpetrators have been very imaginative in the use of everyday objects as weapons. A sim-
ple pillow can be used to smother someone to death. A length of rope or an electrical cord
becomes a ligature or garrote used to strangle someone. An electric curling iron is usu-
ally harmless, but when plugged in to electricity and pitched into the bathtub with one’s
estranged wife it becomes deadly. The possibilities are endless. Injuries will vary according
to the objects used. The crime scenes often are made by the suspect to look as though a
natural or accidental death occurred.
WOUNDING PATTERNS
The wound is the actual damage done by the assailant to the victim’s body. Different
wounding patterns are caused by the usage of different weapons. It is important for the
investigator to have knowledge of and be able to recognize different wounding patterns.
Abrasion
There are three types of blunt force trauma: abrasion, contusion, and laceration. Abrasion
occurs when a body scrapes against a surface and the outer layer of skin is damaged. The
seriousness of the external wound depends on such factors as the force of the contact, the
roughness of the surface, and the location of the wound. An injury caused by a person
224 ◾ Gregg W. Etter and Roger L. Pennel
falling out of a moving vehicle onto an asphalt or concrete surface will result in a serious
abrasion; an injury that occurs when a person slips on a grassy surface and scrapes the calf
of his leg will be less serious. Abrasions are also more serious where the bone is close to
the surface. Abrasions, as far as general appearance, may be considered to be the least seri-
ous type of injury, although they can be deceptive because the force of the impact may be
severe enough to result in internal injuries. Abrasions form a reddish-brown scab when the
skin oozes fluids and blood. An object used with prolonged force can also leave an abrasion
mark on the victim; this type of injury is known as pattern abrasion. An example is the
pattern left on the victim’s neck when a rope or a curtain cord was used to kill the victim
by means of ligature strangulation. The same result may be observed on the wrists when
handcuffs or ropes are used to confine the person’s hands.
Contusion
A contusion (or bruise) is an injury to a person caused by the impact of blunt force but the
skin is not broken. When this blunt force contacts the skin but does not break it, blood
vessels rupture, which is evident in the changing color of the skin as the blood spreads out.
Often overlooked are the body organs below the surface where the blow was delivered. The
location of the bruising will be immediately below or in the general vicinity of where the
blow was administered. In some cases, though, this may not be true. An example of this
would be a very severe blow to the forehead. At the point of contact, a pronounced swelling
will be visible due to the loss of blood into the tissue, and the bruising will spread out from
that location. If this is severe enough, there may be significant migration of the blood to
various areas of the face. In several days, the eye may become discolored, with the blood
then traveling to the cheek area, the side of the face, and ultimately to the chin and neck
area. It is likely that the total healing process in this case may take several months.
The severity of contusions differs among individuals, depending on the type of tissue in
the area of injury and the extent of the blood supply. Factors that may be present can affect
the severity of a bruise (Knight, 1996):
Due to these variables, the intensity of the blow may not always be indicated by the appear-
ance of the contusion. It is important for the investigator not to confuse the presence of
contusions with postmortem lividity. If contusions are interpreted to be lividity, their pres-
ence may give the investigator the false impression that the victim may have been moved,
when in fact the victim had not.
Evidence of a cutting injury will continue to be apparent due to the presence of a scar.
In the case of a contusion, however, once the location has healed there often will be no evi-
dence of the injury. For this reason, it is necessary to photograph the injury. The contusion
Homicide and Assault ◾ 225
will go through a series of color changes, so photographs should continue to be taken for
the next several days, even up to a week, to document the changes in color and size. In the
case of an abdominal injury caused by a seat belt, the extent of the initial injury may be a
slightly reddened area, 2 inches wide from one hip to the other hip. Within several days,
though, the injury site may well be from 4 to 6 inches wide with major discoloration, more
accurately reflecting the actual severity of the contusion.
Although contusions routinely change in color after the initial impact and during the
healing process, there is a lack of precision in gauging the age of contusions by their color
(Geberth, 2006). It is best to simply determine whether a contusion is relatively old or new.
Consider an angry female who wants her significant other arrested. She may display a con-
tusion and report that she was assaulted several hours ago, but the color of the contusion
is yellow or brownish. This would indicate that the assault, at the least, took place several
days ago; therefore, it would classified as “old.”
According the Bernard Knight (1996), a British forensic pathologist, medical textbooks
in the past had attempted to determine a timeline of assaults based on the color of contu-
sions. He suggested that, “It is not practicable to construct an accurate calendar of these
color changes … as there are too many variables for this to be reliable.” Listed below is a
very general guideline to the progression of color change:
A victim with a contusion that is yellowish or brown in color who indicates that she was
assaulted the previous day is probably lying, because the contusion would be considered to
be more than one day old.
When photographing contusions, a color scale should be used for accuracy and proper
color when the photographs are printed. Depending on a number of variables of the cam-
era, including the f/stop, the time of exposure, and the lighting of the area, the color on the
photograph will often be different for the actual color of the injury.
Lacerations
A laceration is an injury due to blunt force creating a tear in the skin. This is the most
serious of the three types of blunt force injuries. Although many instruments can create
this injury, it will usually be an instrument that is not too sharp, in which case it would be
more comparable to an incision, and not too round, in which case there may be no break-
ing of the skin. The tearing of the tissue is brought about by a shearing or a crushing blow.
Lacerations that come to the attention of the investigator will usually be external, although
it may additionally include an internal injury involving the tearing of an organ. In some
cases, the force may be of such a nature that there is no external injury, only an internal
226 ◾ Gregg W. Etter and Roger L. Pennel
injury. Lacerations normally have ragged edges, with each side possibly possessing both
an abraded and a contused area. A laceration will not completely separate the two sides, as
there will be a “bridging” effect due to the nerves and blood vessels. It is occasionally pos-
sible to confuse a laceration with an incision, but incisions have no bridging of the nerves
or blood vessels; the two sides are completely separated.
An avulsion is a form of laceration where the force of the instrument hits at such an
angle as to rip the skin and soft tissue from the bone. Another way to describe the injury
would be a scooping effect.
The instrument used in the assault may be capable of transferring evidence to the body
and picking up evidence from the body. Paint or any type of evidence adhering to the
weapon may be left in the injury site, while fibers, hair, or blood may be transferred to the
weapon. It may occasionally be possible to determine the relative size and shape of the
weapon.
A laceration to the head, depending on the weapon and the force used, can be very seri-
ous. If a single blow is administered to the head, it may be difficult to determine whether
the cause was a blow or a fall. It is possible that a victim’s head can exhibit abrasions, contu-
sions, and lacerations. Two things that will usually be present in this type of head injury is
a fracture of the skull and bruising of the brain. A coup injury is a brain contusion located
directly under the site of blunt force impact. It is caused by the bending of the skull at the
fracture site, causing compression of the brain. Coup injuries are often associated with
a blow to the head (moving object hitting the stationary head). A contrecoup injury is a
contusion located on the opposite side of the brain from the site of blunt force impact; it
is commonly the result of a fall (moving head hitting a stationary object). Either type of
injury results when the brain hits the skull. It is possible to have bruises both under the
fracture site and on the opposite side. In a fall, the contrecoup injury will usually be more
severe than the coup injury, but the coup injury from a blow will be more severe than the
contrecoup injury.
Two types of bleeding in the brain are caused by blunt force. A epidural hematoma
is a blood clot that forms between the skull and the top lining of the brain (dura). This
blood clot can cause pressure on the brain. A subdural hematoma is a blood clot that forms
between the dura and the brain tissue. The sudden onset of such a clot is referred to as acute
subdural hematoma.
Asphyxia
Asphyxia is a type of death where the body cannot take in oxygen and cannot eliminate
carbon dioxide. If no oxygen can reach the lungs, the blood in the body cannot absorb
the oxygen necessary for survival. This is most critical for the brain, as brain damage can
occur within 4 to 6 minutes of being deprived of oxygen (Geberth, 2006). There are several
ways in which a person may die of asphyxia, with some of them being almost exclusively
a result of homicide and others more likely to be self-inflicted or even accidental. One
indication of inadequate oxygen within the blood is the presence of cyanosis, where the
skin exhibits a bluish color. Another indicator of asphyxia is the presence of petechiae,
small, pinpoint hemorrhages in the whites of the eyes, although the absence of these does
Homicide and Assault ◾ 227
not mean that asphyxia was not the cause of death. Three ways of dying from suffocation
are smothering, where the nose and mouth are blocked, preventing the air from reaching
the lungs; choking, where the upper airway is blocked by food or some other object; and
mechanical asphyxia, where pressure is applied to the outside of the body to prevent the
physical act of breathing.
Items used for smothering people include the hands, a gag, a pillow, a blanket, or a plastic
bag. Each of these items is readily available to an attacker. In most cases, when a plastic bag
has been used, it is a case of suicide, and the person likely has consumed drugs. This is a
method of suicide suggested by Humphry (1991) in his book on assisted suicide. Accidental
smothering of an adult is seldom found; this is more likely to be found among babies and
small children, often due to a drycleaning bag.
It is difficult to smother an unwilling adult, but where it is suspected a major source of
evidence can be found in the mouth and on the face. Sufficient force used in smothering
will usually produce signs of bruising or lacerations, particularly on the lips and cheeks.
There may also be scratch marks on the face, in which case fingernail scrapings should be
taken from the victim as well as any suspect apprehended soon after the crime. As with any
crime involving an assault, there will probably be evidence of a struggle. An examination
should be made of the mouth and nose for the presence of foreign material from the object
used, such as fibers, feathers, or related material.
A method seldom used for homicide is choking, and it is usually classified as a natural
death. It is very difficult to force an object into the upper airways of an adult. The obstruc-
tion usually responsible for this type of death is caused by attempting to swallow a too large
amount of food. The Heimlich maneuver is used to dislodge the object. Choking may be
more likely to occur when an individual has used an excessive amount of alcohol.
Mechanical asphyxia is usually accidental. A person who dies of a crushed chest while
working on a vehicle is the victim of mechanical asphyxia caused by the jack failing to keep
the vehicle elevated. Another example is when a trench collapses on trapped workers. In
either of these cases, the victim’s head may not be buried or crushed, but death occurs if the
chest is. This is also a cause of death when a fire breaks out and large number of people stam-
pede to the limited number of exits, crushing each other. A person on drugs or intoxicated
can fall into a compressed area that restricts movement of the chest. An example of this
would be rolling out of bed and becoming lodged between the bed and a wall. It is even pos-
sible for an intoxicated person to stumble or fall into such a position that his body becomes
restricted and he is unable to move. Occasionally, mechanical asphyxia may be used for
murder, particularly of elderly people who have little strength to fight back. In this case, a
person might sit on the victim’s chest and cut off oxygen to the victim’s mouth and nose. The
term “burked” is used to describe this method of murder, named after an individual who
used this method in Scotland in 1828 to obtain cadavers to sell to medical schools.
Strangulation is caused by constriction or compression of the neck, resulting in the
obstruction of blood vessels and air passages. Pressure on the carotid arteries can lead to
unconsciousness in 10 seconds. The three methods of strangulation are hanging, ligature
strangulation, and manual strangulation. Hanging is strangulation by means of a rope,
cord, or similar ligature that is tightened by the weight of the body dropping. This method
228 ◾ Gregg W. Etter and Roger L. Pennel
is usually suicidal, although homicide should not be ruled out until after the crime scene
investigation and the autopsy. There generally must be sufficient pressure on the neck to
either cut off the flow of air or interrupt the flow of oxygenated blood. The body can be fully
suspended or partially suspended.
Two major factors in determining whether the hanging was a result of suicide are the
position of the rope and the location of the lividity. Due to the weight of the body, the rope
will leave an impression in the skin of the neck. This impression will be above the upper
part of the neck, due to the weight of the body. The noose leaves a very deep impression at
the point opposite the suspension point, where the knot is located. The impression at that
point exhibits an inverted V shape and indicates the application of less pressure.
Once death occurs, the rope impression will remain. The pattern of the rope (pattern
abrasion) will often be imparted to the neck. If it is necessary to remove the ligature at the
scene, do not touch the knot; instead, cut the area opposite from the knot and then reattach
the cut ends with a smaller piece of cord. It is best to let the ligature remain on the victim,
letting the forensic pathologist remove it during autopsy.
Postmortem lividity patterns would be expected in several locations. If the body is in an
upright position, the majority of the blood would be found in the feet and lower legs, in the
hands, and in the area immediately above the rope, where it was not possible for the blood
to travel any further. If the blood has not collected at the lowest portion of the body or if
there are inconsistent patterns, then homicide should be considered, although homicidal
hangings are rare.
Ligature strangulation is a type of death where the pressure on the neck is caused by
a constricting band that is tightened by a force other than body weight. Strangulation or
garroting is usually homicide, since suicide by this method is not possible. An individual
attempting to do so would release the pressure when passing out. A garrote is a weapon
where each end of the cord or wire is attached to a handle. As in the case of hanging, liga-
ture strangulation also leaves a permanent groove in the neck; however, there are enough
differences that we can distinguish between the two. With ligature strangulation, the mark
will completely surround the neck, usually at the mid-point of the neck below the larynx.
Internal injuries may be found in the neck. A tender U-shaped bone attached to the end of
the tongue may be fractured. In the case of a hanging, this would not be expected because
the ligature would have slid above the larynx to a higher part of the neck. The presence of
petechial hemorrhages may be apparent in the whites of the eyes and skin of the face. The
victim may bite his own tongue (Geberth, 2006).
The third type of strangulation is manual strangulation, also known as throttling. The
pressure is caused by pressure of the hand, arm, or other limb, causing neck compression
sufficient to kill the victim. This approach is homicidal, never suicidal. The hands are the
most likely weapon of choice. Scratches, abrasions, contusions, and fingernail marks may
be found on the victim’s neck, since most likely the victim struggled. Fingernail scrapings
may be found under the victim’s nails. Petechial hemorrhages and cyanosis will usually be
present (Geberth, 2006). As noted, both manual and ligature strangulation will often frac-
ture the hyoid bone, a small U-shaped bone attached to the tongue. This is seldom found
with hanging.
Homicide and Assault ◾ 229
The third type of asphyxia is chemical asphyxia, which occurs when the victim inhales a
gas that prevents the body from using oxygen at the cellular level. The cause of this type of
death is usually due to acute exposure, where the person received a single, brief dose of the
substance. The most common gas used for chemical asphyxia is carbon monoxide. Carbon
monoxide is an odorless, colorless gas, usually produced by internal combustion engines.
When it is inhaled, it enters the blood and attaches to the hemoglobin, resulting in death
and postmortem lividity that is cherry red rather than the typical purple color. This type
of death is usually suicidal; investigators should look for such things as a tube attached to
the tail pipe and placed in a window or a vehicle that has no gas but the ignition is in the on
position. In order to rule out homicide, an examination of the crime scene and the history
of the victim are in order.
Autoerotic Deaths
Autoeroticism is a type of incident involving “sexual feeling or sexual gratification that is
self-induced without having sexual relations with another” (Hazelwood et al., 1983). Such
an act performed in a private setting ordinarily would be of little concern to the police, as
normally no violation of the law is involved. Investigators become involved, however, when
this activity results in death or a possible near-death experience. This type of activity is
observed in many societies. In the United States, it involves all races and both genders, but
most of the victims are white males from a middle-class background. The average age is 26.5
years old. Most knowledge of this activity comes from cases where a death has occurred, as
living participants are not likely to discuss it, and the police become involved only when a
death or near-death has been reported. Those unfamiliar with this activity might assume
that such deaths are suicides; however, in most cases, autoerotic fatalities are accidental,
although they may be homicidal, suicidal, or natural. Autoerotic fatalities are most com-
monly caused by asphyxia used to achieve a state of euphoria during the sexual activity.
This can be accomplished by hanging (neck compression), suffocation (airway obstruction),
chest compression, or oxygen exclusion. Hazelwood et al. (1983) developed a list of twelve
key death scene characteristics often found at an autoerotic death scene. Not every charac-
teristic will be present at every scene, but the scene should be examined for each of these:
• Location—This is usually an area where the victim was not likely to be disturbed.
• Position of victim—If a rope is used, the victim will usually be found in a sup-
ported position, usually on the floor.
• High-risk agents/elements—To enhance the level of sexual and physical pleasure,
the victim likely used a rope, restrictive containers, handcuffs, gag, or some other
type of restrictive mechanism.
• Self-rescue mechanism—This mechanism is employed to enable the victim to
reduce or remove the effects of the high-risk elements. This might be the ability to
stand up or having a handcuff key available.
• Bondage—The victim might have also used some type of a binding device, such as a
rope, chain, handcuffs, or any other device that restricts movement. It is important
to determine whether the victim could have put him- or herself in this position.
230 ◾ Gregg W. Etter and Roger L. Pennel
• Masochism—The scene of the death may include various means to inflict pain,
especially to sexual areas. Examples include genital restraints, nipple clips, electri-
cal wires inserted into the penis or anus, cigarettes, and ball gags.
• Clothing/attire—Male victims often are found wearing some type of female
garment.
• Protective measures—The surface of the restriction, particularly a rope applied to
the neck, will in most cases result in an abrasion. Some type of padding is often
inserted under the rope to prevent potentially visible marks.
• Sexual paraphernalia—Sexual objects found in the area may include pornography,
diaries, mirrors, video cameras, dildos, vibrators, or female attire.
• Masturbatory activity—Often there is evidence of the victim having masturbated.
• Evidence of prior experience—There will usually be evidence that this person has
done this many times before, such as a worn spot on the wood from which the rope
was suspended or semen stains from previous sessions.
• No apparent suicidal intent—An indication of whether there were suicidal inten-
tions is critical. If they were planning future events, had no depression, or had not
indicated such intentions, suicide in all likelihood was not the intent.
The following characteristics, at the very least, must be present for an autoerotic death
determination. At a minimum, to assume an accidental death, investigators must deter-
mine that this was a solo activity, that prior evidence of such dangerous activity exists, that
the victim possessed no suicidal intent, and that the victim had an expectation of privacy.
When major questions arise as to how the death came about, the investigation of these
deaths often hinges on a detailed examination of the crime scene and the victim’s history
The pass-out game (self-asphyxiation) is a popular activity among young people to cre-
ate a natural high by cutting off oxygen to the brain, but it sometimes results in death.
Most literature covering this area primarily focuses on the natural high with no sexual
focus. This activity may start in the preteen years. Despite distinct differences between
scenes involving self-asphyxiation and those involving autoerotica, there is little indication
at what point in time the activity transitions from being a game to autoerotica.
Gunshot Wounds
The condition of a victim’s gunshot wound is a direct reflection of the components of the
cartridge casing, among other variables. The cartridge case, bullet, bullet coating, and metal
jacket contain specific elements that can be detected. Examination of a gunshot wound will
reveal the presence of gunpowder (burned and unburned), soot, bullet and jacket frag-
ments, primer compounds (lead, antimony, barium), and copper, brass, and nickel from
the cartridge case (DiMaio, 1999). Wounds are categorized according to the distance from
which the shot was fired—contact wounds, intermediate wounds, and distant wounds.
Contact wounds exhibit a number of recognizable characteristics. There will always be
scorching at the edges of the wound, with soot deposited on the wound edges. There may
be a muzzle impression, particularly if the gun had been held firmly against the victim. If a
contact wound occurs to the head, soot may be deposited on both the outer and inner table
Homicide and Assault ◾ 231
of the skull. Depending on the firmness of the contact, there may be a stellate (star-shaped)
wound due to gases building between the skull and the skin. The skin reaches its expansion
point and then tears. With a light contact wound, the soot expands beyond just the wound
edges. A contact wound over clothing will usually result in the soot and powder being
deposited on the clothing but not the skin, although they will still enter the wound.
An intermediate wound is close enough for “tattooing.” This tattooing is caused by
grains of powder, both burned and unburned, being deposited in the skin. The density and
diameter of these deposits can be measured by firing the same type of cartridge casing at
various distances. The tattooing may appear from a distance of 24 to 48 inches, depending
on the type of powder. Soot will be found on the body from a distance of 6 to 10 inches.
This can be wiped off of the body, but the tattooing cannot. There is very little to say about
the distance shot other than it is farther than the intermediate wound and will not leave
any soot or tattooing. Without this, the precise range cannot be determined.
Both entrance and exit wounds can divulge additional information. At the entrance, an
abrasion ring is caused by the friction of the bullet against the skin. This ring will be pres-
ent regardless of the distance of the shot. There will also be a bullet wipe at the entrance
where the skin wipes off debris from the bullet. As a rule an entrance wound tends to be
smaller than the caliber of the bullet, circular and smooth. The smaller size is a result of the
skin stretching and then rebounding after the bullet has moved through. The exit wound
is usually larger in size than the entrance wound and more irregular, due to bones and
other body debris becoming secondary missiles. This is especially the case when the bullet
is designed to expand while in the body; thus, the size of the projectile is, in fact, larger
when it exits. A situation where an exit wound may resemble an entrance wound is when
the area of the exit is shored up or supported by some external item, such as a belt or some
type of hard surface.
The path made by the bullet as it travels through the body is known as the bullet track.
This will usually be straight, giving an accurate estimation of the angle from which the
bullet was fired. An exception to this is when the bullet is deflected by a bone. Other factors
that may affect the bullet track are the velocity of the bullet, the type of bullet, and whether
the bullet ricocheted (Geberth, 2006).
As the bullet enters the body it causes a rearrangement of the interior of the body. A
permanent cavity is created along the path of the bullet. Much larger than this cavity is
a temporary cavity caused by kinetic energy transferred by the projectile’s passage. This
explains, for example, why sometimes with an abdominal shot organs in the vicinity suffer
severe injury, but not near the bullet track.
Water Death
Drowning is not usually a means of murder. According to the FBI (2011), drowning was
used as the means of death in 0.0011% (15 times out of 13,230) of the murders from 2000
to 2004. In the vast majority of drowning cases, the cause will be accidental, but it can be
suicidal or homicidal. As a rule, healthy adults rarely drown unless there is an intervening
reason, such as heart disease or severe cramping that happened to occur while they were
in the water. There is no specific finding at an autopsy that proves the person died from
232 ◾ Gregg W. Etter and Roger L. Pennel
drowning; it is usually a diagnosis of exclusion. When every other cause of death has been
ruled out, this fact alone with evidence at the scene leads the forensic pathologist to the
drowning conclusion.
The ability to swim is not an important correlate of drowning, as most victims of drown-
ing are able to swim (Pollanen, 1998). A swimmer may attempt to perform some daring
feat and too late realize that he is in trouble. Drowning in the United States is the second
most common cause of death for children between the ages of 1 and 14 (CDC, 2011b). Of all
non-pool drownings from 2002 to 2004 among children younger than 5 years of age, more
than 80% involved children under 2 years of age (CPSC, 2007).
Not all drownings are accidental; some may be homicide or suicide. The police get called
in light of the fact that a death has occurred, and the investigator may well be the only
one to bring up the initial suspicion of a non-accident. What are some characteristics of
a drowning death? The hands and feet of a drowning victim are wrinkled or prune like.
Drowning victims may exhibit a white froth or foamy type of substance coming from the
nose and mouth due to pulmonary edema. This substance may appear pink when mixed
with blood. The blood results from the lungs tearing due to increased pressure during
the drowning. It is possible that the lungs may contain sand or some other type of water-
related debris.
The victim should always be examined for any signs of trauma, such as strangulation
marks, contusions, and other wounds that are not products of an accidental drowning.
Contusions, abrasions, or lacerations may be present, but the likelihood is that they are a
result of underwater injuries. Injuries discovered on the top or front of the head, the top of
the feet, or on the fingers and back of the hands are probably natural, based on how a body
floats in death. The body should be examined for marine life bite marks. The decomposi-
tion process will cause bodies to bloat and float to the surface, but the temperature of the
water may be cold enough to retard the decomposition, and the body will not float. If the
water temperature rises, the decomposition process will begin and the body will float to
the surface.
Diatoms can be used to determine the location where a drowning occurred, particularly
when the body has been moved to another location. Diatoms are found in both freshwater
and saltwater, and they differ from one body of water to another. Diatom populations also
can vary seasonally within the same body of water. When diatoms are extracted from mar-
row (especially from the long bones), investigators can infer that these organisms became
lodged in the marrow cavity while the person was drowning. The diatoms in the bone
marrow can then be compared with diatoms in the body of water where the drowning was
believed to have occurred.
A water death may require some additional precautions compared to other crime scenes.
A body may change drastically from the time it is removed from the water until the begin-
ning of the autopsy, so it is necessary to take photographs at both locations. Injuries to
the body may be readily apparent initially but difficult to see later on. A variety of trace
evidence can be obtained in drowning cases, including evidence accumulated prior to
entering the water and evidence accumulated in the water. To secure as much evidence as
possible, bring two clean bed sheets to the scene. Spread one sheet out and then the second
Homicide and Assault ◾ 233
one on top of that one. Place the body on top of both sheets. Fold the top sheet over the
body, and then the bottom sheet. At this point, place the body in a body bag. More evidence
will be collected with such a process (Castro et al., 1993).
Electrical Injury
One mode of death seldom associated with murder is an electrical injury. Many investiga-
tors will not do a crime scene search in such cases because they assume that these are natu-
ral deaths. Electrical accidents that occur to adults often occur in a work setting and involve
high voltage. In many cases, knowledgeable witnesses are available who can verify that it
was an accident. A suspected electrical death at a residence, however, generally receives little
investigation.
Three variables are used in determining the possibility of an electrical death: the amount
of current (measured in amperes), the amount of electrical resistance (measured in ohms),
and the electromotive force (measured in volts). The most critical of these is amperes; 0.1
amp is sufficient current to cause ventricular fibrillation and death. Resistance is reduced
in the presence of water—100,000 ohms for dry skin vs. 1000 ohms for wet skin. The num-
ber of volts in a residence is normally 110 volts. Using the formula volt/ohms = amperes, we
can determine the number of amperes. Dividing 110 volts by 1000 ohms (as in wet skin or
in a bathtub) gives us 0.110 amperes, which is sufficient to produce death.
A problem at such scenes is that this type of injury often leaves no external injuries, such
as might be expected with lightning or high-voltage incidents. Because an electrical injury
scene does not appear to be a potential crime scene, investigators may not learn of the elec-
trocution until an autopsy is completed, if one is done at all (James and Nordby, 2003).
should be examined for make, model, serial number, finish, caliber, and barrel length.
Evidence of attempts to remove or deface the serial number of the firearm should be thor-
oughly examined. Firearms can often be traced through their serial numbers.
As the bullet travels down the rifled barrel of a weapon, the lands and grooves of the
rifling give the bullet spin. They also leave identifiable marks. Great care should be taken
to recover bullets; often they can be traced to a specific firearm through ballistic examina-
tion. The exception to this rule is smooth-bore weapons such as most shotguns and some
muskets. Ballistics examination can also determine the path of the bullet from the weapon
to the victim.
Expended cartridges can also provide evidence such as fingerprints. When the weapon
is fired the firing pin strikes the cartridge primer, causing primer marks that are specific
to each weapon. In weapons that eject the expended cartridge, an ejector mark will prob-
ably be present. This mark can also be identified through ballistic comparisons to a specific
weapon. The exception to this rule is a revolver, which generally does not leave an iden-
tifiable ejector mark when the cylinder is opened and the cartridges are removed. Some
revolvers that use a side-gate type of cartridge ejection may leave no mark at all (DiMaio,
1999; Fisher, 2000; Warlow, 2005).
BIOLOGICAL EVIDENCE
Biological evidence is a broad category that includes body parts (flesh), bodily fluids (blood,
saliva, semen, sweat, urine, feces), DNA, and other things that are or once were living, such
as insects or plant evidence. Forensic toxicology involves examining biological specimens
to determine the presence of alcohol, drugs, poisons, or other toxic substances that may
have been used to kill the victim. Forensic serologists perform tests on blood samples to
determine the type and characteristics of the blood, examine blood stains, and give tes-
timony or presentations at trials; they also analyze semen, saliva, and other body fluids
and may or may not be involved with DNA typing. Deoxyribonucleic acid (DNA) is the
building block for a person’s genetic makeup. Except for identical twins, everyone’s DNA
is different. DNA may be obtained from biological evidence, even evidence that is decades
old (Rudin and Inman, 2002). Because of the danger of bloodborne pathogens or other dis-
eases, investigators should always use universal precautions when collecting or handling
this type of evidence. The analysis of bloodstain patterns by a trained investigator can
reveal (Bevel and Gardner, 1997):
• The relative position in the scene of the suspect, victim, or other related objects
during the incident
• Sequencing of multiple events associated with an incident
• In some cases, which hand delivered the blows from a beating
FINGERPRINTS
Fingerprints are collected at the crime scene and off of evidence. Fingerprints may be col-
lected from almost any surface that was touched by the suspect or victim. Sometimes fin-
gerprints can be collected from the body of the victim (Fisher, 2000). Fingerprints are
compared with those in various databases by qualified fingerprint examiners. Fingerprints
are unique to the individual, so they are useful evidence in any investigation.
TRACE EVIDENCE
Trace evidence includes glass, hair and fur, fibers, paint, soils, and gunshot residue. Forensic
chemists analyze various types of evidence, including trace evidence, which is often so
minute that the crime scene technician may not even be aware that it has been collected.
Chips of paint, for example, reveal information about the paint color, number of layers of
paint and primer, source of the paint, and even the manufacturer. Forensic chemists may
be able to identity small amounts of drugs, dyes, fibers, or hair. Forensic geologists can
determine such things as where the suspect or victim walked by examining soil samples
taken from their shoes or feet. They are capable of determining the various characteristics
of soils within a sample, as well as the percentage distribution of each, and the presence of
organic or inorganic substances which may ultimately narrow down its location of origin
(Fisher, 2000).
IMPRESSION EVIDENCE
Impression evidence includes footprints, tire tracks, and toolmarks. Impression evidence
from footprints can indicate the physical presence of the suspect or victim, direction of
travel, or the scene of a struggle. Footprints can also reveal the type and brand of footwear.
Several different sizes of shoes may use the same size of sole, so any indications of shoe
size may be a general one. Specific imperfections or marks on the footwear may make the
footwear identifiable to a specific shoe (Bodziak, 1990).
236 ◾ Gregg W. Etter and Roger L. Pennel
Impression evidence from tire tracks can indicate the physical presence of a vehicle,
the direction of travel, and the brand and size of the tire. Many different tires can fit on a
wheel, but knowing the size of the tire reduces the number of vehicles that must be consid-
ered. As with footwear, individual imperfections in the tire can make the tire more identi-
fiable (McDonald, 1993). The three categories of toolmarks are compression (or indented)
toolmarks, sliding toolmarks, and cutting toolmarks (James and Nordby, 2003). Toolmark
evidence could possibly confirm the physical presence of a suspect, identify the point of
entry, and reveal what type of tool was used. Toolmarks can often be matched to the indi-
vidual tool or type of tool used in the crime.
SUMMARY
A successful homicide or assault investigation requires careful examination of the scene,
witnesses, and evidence. Investigators must be able to identify victims, witnesses, and sus-
pects. The successful investigator must be able to identify the suspect’s motive, method,
and opportunity for committing the crime. All evidence seized and interviews conducted
must be done in a legal manner. The evidence must be analyzed and the investigator must
be able to show how the evidence relates to the crime. These types of investigations require
impeccable paperwork. An investigator’s case file is the most important tool in making
sure a suspect gets charged with the crime and more importantly convicted. Investigators
must make sure the file is organized and accurate. It is not enough to know who committed
the crime; an investigator must be able to prove it in court. Successful assault and homicide
investigations require detailed, accurate, and timely police work to solve the case and get
a conviction.
BIBLIOGRAPHY
Bennett, W. and Hess, K. (1991). Criminal Investigation, 3rd ed. St. Paul, MN: West Publishing.
Bevel, T. and Gardner, R. (1997). Bloodstain Pattern Analysis: With an Introduction to Crime Scene
Reconstruction. Boca Raton, FL: CRC Press.
Black, H. (1968). Black’s Law Dictionary, 4th ed. St. Paul, MN: West Publishing.
Bodziak, W. (1990). Footwear Impression Evidence. New York: Elsevier.
Castro, S., Galbreath, N., Pecko, J., and Zeliff, D. (1993). Autopsy: A Forensic Manual for Criminal
Investigators. Wright Patterson AFB, OH: U.S. Air Force Institute of Technology.
Cataldie, L. (2006). Coroner’s Journal: Stalking Death in Louisiana. New York: Putnam.
CDC. (2011a). Mortality Data. Atlanta, GA: Centers for Disease Control (http://www.cdc.gov/nchs/
deaths.htm).
CDC. (2011b). National Vital Statistics Report. Atlanta, GA: Centers for Disease Control (http://
www.cdc.gov/nchs/products/nvsr.htm).
CPSC. (2007). U.S. Consumer Product Safety Commission Report. Washington, D.C.: U.S. Consumer
Product Safety Commission (http://www.cpsc.gov/).
Davenport, G.C., France, D.L., Griffin, T.J., Swanburg, J.G., Lindemann, J.W., Tranunell, V.,
Armbrust, C.T., Kondrateiff, B., Nelson, A., Castellano, K., and Hopkins, D. (1992). A
Multidisciplinary Approach to the Detection of Clandestine Graves, Journal of Forensic Sciences,
37(6):1445–1458.
DiMaio, V. (1999). Gunshot Wounds: Practical Aspects of Firearms, Ballistics, and Forensic Techniques,
2nd ed. Boca Raton, FL: CRC Press.
FBI. (2011). Uniform Crime Reports. Washington, D.C.: Federal Bureau of Investigation (http://www.
fbi.gov/about-us/cjis/ucr/ucr).
Fisher, B. (2000). Techniques of Crime Scene Investigation, 6th ed. Boca Raton, FL: CRC Press.
Geberth, V. (2006). Practical Homicide Investigation: Tactics, Procedures, and Forensic Techniques, 4th
ed. Boca Raton, FL: CRC Press.
Gerber, S. and Schroeder, O. (1974). Criminal Investigation and Interrogation. Cincinnati, OH: W.H.
Anderson Co.
Gilbert, J. (2004). Criminal Investigation, 6th ed. Upper Saddle River, NJ: Prentice Hall.
Girard, J. (2011). Criminalistics: Forensic Science, Crime, and Terrorism, 2nd ed. Sudbury, MA: Jones
& Bartlett.
GSSI. (2011). Ground Penetrating Radar for Forensic Investigations. Salem, NH: Geophysical Survey
Systems, Inc. (http://www.geophysical.com/forensics.htm).
Hallcox, J. and Welch, A. (2006). Bodies We’ve Buried: Inside the National Forensic Academy, the
World’s Top CSI Training School. New York: Berkley Publishing Group.
Harvey, W. (1976). Dental Identification and Forensic Odontology. London: Henry Kimpton
Publishers.
Hazelwood, R., Dietz, P., and Burgess, A. (1983). Autoerotic Fatalities. Lexington, MA: Lexington
Books.
Hogan v. State, 127 Tex. Cr. 182 (1934).
Humphry, D. (1991). Final Exit: The Practicalities of Self-Deliverance and Assisted Suicide for the
Dying. New York: Dell.
Illinois v. Gates, 462 U.S. 213 (1983).
James, S. and Nordby, J. (2003). Forensic Science: An Introduction to Scientific and Investigative
Techniques. Boca Raton, FL: CRC Press.
Knight, B. (1996). Forensic Pathology, 2nd ed. New York: Arnold.
238 ◾ Gregg W. Etter and Roger L. Pennel
Lyman, M. (1999). Criminal Investigation: The Art and Science, 2nd ed. Upper Saddle River, NJ:
Prentice Hall.
McDonald, P. (1993). Tire Imprint Evidence. Boca Raton, FL: CRC Press.
Mincey v. Arizona, 437 U.S. 385 (1978).
Naler v. State, 25 Ala. App. 486 (1933).
Ogle, R. (2004). Crime Scene Investigation and Reconstruction. Upper Saddle River, NJ: Prentice
Hall
Osterburg, J. and Ward, R. (2010). Criminal Investigation: A Method for Reconstructing the Past, 6th
ed. New Providence, NJ: Lexis Nexis.
Pena, M. (1997). Practical Criminal Investigation, 4th ed. Incline Village, NV: Copperhouse
Publishing.
People v. Connors, 35 N.Y. Supp. 472 (1895).
Pollanen, M. (1998). Forensic Diatomology and Drowning. New York: Elsevier.
Ramsland, K. (2008). Beating the Devil’s Game: A History of Forensic Science and Criminal Investigation.
New York: Berkley Publishing Group.
Rudin, N. and Inman, I. (2002). An Introduction to Forensic DNA Analysis, 2nd ed. Boca Raton, FL:
CRC Press.
Saferstein, R. (2004). Criminalistics: An Introduction to Forensic Science, 8th ed. Upper Saddle River,
NJ: Prentice Hall.
Sanders v. State, 113 Ga. 267 (1901).
State v. Peoples, 227 Kan. 127, 60S P.2d 135 (1980).
State v. Staw, 97 N.J.L. 349 (1922).
Walker, J. (1983). Department of the Treasury: Crime Scene and Evidence Collection Handbook.
Washington, D.C.: Government Printing Office.
Warlow, T. (2005). Firearms, the Law, and Forensic Ballistics. Boca Raton, FL: CRC Press.
Weston, P. and Lushbaugh, C. (2003). Criminal Investigation: Basic Perspectives, 9th ed. Upper Saddle
River, NJ: Prentice Hall.
Chapter 14
Sex Crimes
John Padgett
Capella University
CHAPTER OBJECTIVES
After reading this chapter, you should be able to do the following:
Chapter Outline
• Introduction to Sex Crimes
• Nature of Sex Crimes
• Date/Acquaintance Rape and Drugs
• Children as Victims of Sex Crimes
• Continuing Education for Investigators of Sex Crimes
• First Responder’s Responsibility at the Crime Scene
• Crime Scene Investigations
• Crime Scene Search
• Nature of Sex Crime Evidence
• Photographic and Video Evidence
• Types of Evidence Encountered at Sex Crime Scenes
• Protocol of a Sex Crime Scene Search
• Glossary
239
240 ◾ John Padgett
• Approximately 71% of male victims were first raped before their 18th birthday;
17% were 18 to 24 years old, and 12% were 25 or older.
• Males are the least likely to report a sexual assault, although it is estimated that
they make up 10% of all victims.
• An estimated 22% of male inmates have been raped at least once during their
incarceration, roughly 420,000 prisoners each year.
This NCVC report also concluded that males are more likely to be the victims of non-
homosexual gang rape than females. In these incidents, the victim is more likely to have
multiple sexual acts forced upon him, and offenders are more likely to display or use weap-
ons against him. Male victims are also more likely to experience more severe physical
injuries than female gang rape victims.
The Federal Bureau of Investigation (FBI) reported that the number of reported forcible
rapes dropped from 94,504 in 1989 to 89,000 in 2008 (FBI, 2009a). (Note that the figure of
89,000 was later adjusted to 90,479.) This downward trend continued, with 88,097 forcible
rapes being reported to law enforcement in 2009 (FBI, 2010).
• Embarrassment
• Fear of family members’ reactions
• Fear of retaliation
• Lack of faith in law enforcement and the justice system
• Revictimization
• Self-blame
• Social stigma and ostracism
• Threats and intimidation
• Trauma associated with the trial process
Sexual assault has devastating life-long consequences for survivors, families, and com-
munities. Recognizing and understanding the chronic, long-term impacts of sexual trauma
will enhance sex crime investigators’ skills, allowing them to hear and see red flags that
others may discount or overlook. Adult females with sexual trauma histories have been
shown to have poor health and physical functioning, including higher rates of documented
chronic physical illnesses, such as migraine headaches, pelvic disorders, arthritis, fibromy-
algia, asthma, and gastrointestinal disorders, which cannot be attributed to psychosomatic
origins or depressed mood (Golding, 1999). Research is needed to determine if the same
242 ◾ John Padgett
impact is found among males with a history of sexual assault. Regardless of their gender,
victims may develop sexually transmitted diseases as a result of the sexual assault and
may unknowingly pass these on to their family members. Long-term emotional and psy-
chological consequences of trauma may exacerbate survivors’ physical impairments and
illnesses.
Each year, an estimated 3000 sexual assaults result in conception and pregnancy
(RAINN, 2011). One victim becomes two, as both the victim and unborn child face the
long-term consequences of sexual assault. The victim must cope with the physical changes
of being pregnant, as well as the emotional trauma of having part of the perpetrator grow-
ing inside her. She must deal with the fear of the unknown, including the impact of the
perpetrator’s genetic makeup on the development of the child. She must struggle with the
reality of her situation, her religious and moral upbringing, and the views of her family
and friends regarding such issues as pregnancy resulting from sexual assault, pregnancy
out of wedlock, use of the morning-after pill, abortion, and adoption as she copes with the
assault and its aftermath. She and others may question her ability to love and care for her
attacker’s offspring, and she fears that her attacker will resurface, claiming parental rights
and subjecting her and the child to a lifetime of abuse. She may be hesitant to report the
assault due to potential repercussions for her child.
The long-term emotional and psychological consequences for victims of sexual assault
focus on recurring memories of the attack, issues of self-blame and responsibility, issues
surrounding self-identity and self-concept, continued fears, depression, grief, anger, self-
harm, escape and addictive behaviors, trust and relationship issues, role boundary and
family script confusions, maladaptive social skills, power and control issues, and sexual
intimacy issues. The victim may experience sleep disruptions and even insomnia due to
recurring nightmares and night terrors related to the assault. Flashbacks of the assault
and the surfacing of suppressed memories may occur during sexual intimacy or as a result
of other triggers. The victim may experience body memories related to her attack during
intimacy or as the result of other triggers. Body memories are frightening for the vic-
tim and those unaware of what is taking place. Her body will replay the physiological
responses from the attack. She may tremble or shake violently, become short of breath,
or even lose consciousness. She may cry uncontrollably, have difficulty hearing or seeing,
smell or taste her attacker, and even vomit as she relives the attack in intense reality. Body
memories are commonly associated with posttraumatic stress disorder and require profes-
sional attention.
The victim often struggles with self-blame and personal responsibility for a variety of
reasons, including messages provided by the perpetrator, unsupportive family members,
or disbelieving family members. Victims may view themselves as bad, unworthy, dam-
aged, or dirty; they may feel culpable due to any biological responses of sexual arousal and
pleasure during the attacks or seeking out any form of attention from the abuser to validate
being loved. Victims’ perceptions of self-identity and self-concept are also impacted as they
internalize these messages and self-judgments. Victims may define themselves as objects
of victimization rather than recognizing the strength and courage required to overcome
such trauma.
Sex Crimes ◾ 243
Most victims have been conditioned by their attackers using fear and intimidation,
which keep many victims silent and in many cases allows long-term abuse to continue for
years. The fear does not end after the last physical attack, but continues for extended peri-
ods of time. Sometimes victims believe they have conquered their fears, only to later feel its
grips on their lives once again. Many victims fear further sexual assaults and retaliation by
the offender or the offender’s family members or friends. Victims may fear undiscovered
physical harm, such as infertility. Others fear that they will become perpetrators them-
selves and continue patterns of abuse or that their own children or other family members
will be victimized, as well. Left untreated, fears stemming from sexual assault can cause
paranoia or panic attacks that paralyze victims. Depression, grief, and anger result from
the victim’s loss of the person they were before the attack and might have become had the
attack not taken place. The victim mourns for the innocence, trust, and security they had
before the attack and the loss of power and personal control. Changes in relationships
and unexpected lack of support from friends and family members add to the sense of loss
experienced by the victim and fuel their anger. Healthy expressions of grief and anger are
essential for healing; otherwise, the victim may act out these emotions in self-destructive
ways, including numbing and escape through substance abuse, self-mutilation, or eating
disorders, or they may even commit suicide to end the pain.
Developing and maintaining intimate relationships can be problematic for survivors of
sexual trauma due to difficulties trusting their own emotions, perceptions, and assessments
of other people and the settings in which they find themselves, not to mention difficulties
trusting others. Role confusion exacerbates this problem, due to a lack of physical and inti-
mate boundaries. Victims do not trust themselves to establish healthy reasonable bound-
aries between themselves and others due to the abnormal examples they have experienced.
Judging appropriateness of parental touch may be difficult due to abuse by a caretaker.
Unhealthy patterns of communication and interaction have been learned and interfere
with the formation of functional relationships. Many victims find that they are uncomfort-
able in social settings due to the development of maladaptive or nonexistent social skills,
particularly if the perpetrator kept the victim isolated from peers physically and emotion-
ally. Society may further this isolation due to insensitivity, ignorance, and blaming of the
victim. The loss of power and control can also interfere with appropriate social skill devel-
opment. The victim may need to exert extreme power and rigidity to remain in control and
prevent ever being victimized again. At the other end of the pendulum, the victim may
relinquish all power and control, becoming passive and weak in social exchanges.
Sexual intimacy is an area of obvious anxiety for victims of sexual assault. Developing
and maintaining a healthy sexual identity and intimate relationship with a mate can be
a lifelong struggle for victims of sexual trauma. Victims may try to hide their sexuality
under layers of baggy clothing. They may maintain extremes in body weight or practice
poor personal hygiene in order to appear unattractive to potential attackers. Victims must
regain ownership of their own body and develop a healthy respect for their own sexual-
ity. Confusion related to interruptions in childhood sexual development and the differ-
ences between normal sexual impulses and urges and dysfunctional sexuality must be
addressed.
244 ◾ John Padgett
Victims must learn to associate sexual intimacy and touch with pleasure rather than
pain and discomfort. Sexual intimacy and relationships may be physically and emotion-
ally threatening, uncomfortable, or even painful for the victim. Victims may emotionally
or physically withdraw during intimacy, going through the motions as if not really present.
Victims may even dissociate, or detach themselves from their body, during physical close-
ness. They may or may not be aware of this taking place and may be frightened when they
realize what has happened, fearing that they are going crazy or are permanently damaged
in some way. Dissociation is a common form of self-protection for many victims of sexual
trauma. It is not a sign of insanity or damage, but instead a means of self-preservation
that is no longer needed and now requires treatment to control and extinguish. Extreme
cases of dissociation are referred to as dissociative identity disorder or multiple identity
disorder.
To heal and develop a healthy intimate relationship, victims must give themselves
permission to say “no” to sexual advances and to remain in conscious control during
intimate relations. This requires patience from the intimate partner and open communi-
cation. Intimate partners must understand that these victims are not rejecting them, but
are instead learning to identify, accept, and communicate their own sexual needs. This is
a gradual process, and victims will need to feel safe, unpressured, and in control during
intimate relations. They may intentionally sabotage intimate relationships due to feelings
of unworthiness, discomfort, pain, or confusion related to sex. Victims may be unable to
verbalize their fears and anxieties during the coupling. They may need to step away and
examine their own responses before sharing these with their partner. Relinquishing con-
trol, letting go, and achieving climax may be especially difficult, uncomfortable, and even
emotionally painful for the victim. Intimate satisfaction, especially for victims of sexual
assault, is not dependent on achieving climax with every coupling, but instead achieving
emotional closeness and a loving bond.
Ironically, many victims are unable to discern between love and the act of sex and may
be unable to express genuine nurturing or concern for her intimate partner. The young
victim of sexual abuse may be perceived as being highly promiscuous and sexualizing all
relationships and interactions, even nonsexual exchanges. Victims may repeatedly mis-
interpret interactions with others (e.g., religious leaders, bosses, friends’ mates, relatives),
frequently reporting that they are hitting on them. They may feel that the only way to know
that they are loved and cared for is through sex.
Adults with a history of sexual trauma may give their children erroneous or conflict-
ing messages regarding relationships and intimacy. A young girl may be encouraged to
openly discuss sexuality with her father only to be accused of being promiscuous when
holding her boyfriend’s hand. Mothers may tell their daughters that all men are evil and
warn them from an early age to fear the pain of sexual intercourse. Pubescent boys may
be shunned when their victimized mothers finds evidence of masturbation. Young chil-
dren may be exposed to sexual content as a means to teach them about sex at an early
age. When parents send children such messages regarding sexuality, a red flag is raised,
suggesting a prior or ongoing history of sexual abuse of the parent and the potential for
harm to the children.
Sex Crimes ◾ 245
conducted by a trained and experienced forensic interviewer who can elicit as accurate,
informative, and detailed information as possible regarding the assault. It is advised that
the child protective services investigator conduct a joint investigation with the law enforce-
ment entity having jurisdiction over the case. The child protective services investigator will
typically have training and experience working with traumatized children. Some may be
trained forensic child interviewers. Inexperienced investigators and interviewers without
access to skilled forensic child interviewers must be cautious not to lead or direct victims in
their statements; they must also be cautious not to imply or suggest that victims “pretend,”
“make believe,” or “play a game” as it relates to the content and context of their questions
and the child’s subsequent responses. Forensic child interviewers are trained to establish
the child’s understanding of time, place, relationship, anatomy, and sexual acts which dif-
fers extensively from adult views depending on the child’s developmental stage. This can
lead to defense assertions that the child’s testimony was dramatized, fictional, or simply
not based in reality.
Child victims of sexual crimes often experience the same fears, emotional challenges,
and memory repressions as their adult counterparts, with the added component that they
may feel that their very existence is based on the offender. Children often have a loyalty
or love for their abusers that has been nurtured from their dependencies on their abusive
caretakers.
It is imperative that this training and education be continuous in order to stay abreast of
current professional developments, practices, and technologies in the field.
Sex Crimes ◾ 247
RESPOND
Upon your initial receipt of the call from the dispatcher, you should focus on officer safety,
not only as it pertains to your response to the scene but also what you might be faced with
once you arrive on the scene and what equipment may be necessary for you to effectively
carry out your mission. You should begin focusing your professional investigative observa-
tion skills while en route, taking mental and written notes about all details you feel might
be pertinent to the case. Remember to employ due regard and caution when responding to
your call for assistance; if you do not make it to the scene, you help no one.
EVALUATE
Upon arrival, whether to an assault in progress or an assault completed, you should begin
your evaluation of everyone and everything you come into contact with, including:
or drugs? If so, what? Is the individual able to identify the offender/victim? If so,
what details were they able to provide (e.g., name, physical description, clothing
description, race, scars, marks, tattoos, foreign accent, unusual odor)?
• Scene safety—Look for anything obvious at the scene that may put you or anyone
else in immediate physical danger and must be addressed before you proceed, such
as live uncovered electrical wires, natural or propane gas leaks, fire accelerant, bio-
logical or chemical hazards, weapons, vicious animals, or structural damage. Do
you require protective clothing, eyewear, gloves, etc.?
• Scene assistance—After your initial survey of the scene, determine whether you
need additional emergency back-up assistance; additional non-emergency person-
nel support; a supervisor, investigator, or crime scene unit to respond, etc.
• On-scene notations—Immediately begin written documentation of everything
you observe and hear, whether it be from the victim, witnesses, or offender. What
were their physical, mental, and emotional states while in your presence? Did they
change? Did they make any statements referring to accusations, admissions of
guilt, admissions of negligence, admissions of intent, admissions of pre- or post-
incident knowledge, etc.?
• Information gathering—Conduct cursory information-gathering interviews with
possible witnesses, including neighbors, family members, bystanders, and other
non-law enforcement emergency personnel who may have arrived at the scene
before you.
• Visible evidence—Take written notes about any possible evidence that you observe
that the scene and its location, being careful not to disturb the evidence. If evi-
dence is disturbed for any reason, note why it was disturbed and by whom and
where it is now. Do not attempt to replace or reposition an evidentiary item in the
crime scene once it has been disturbed or moved. If dangerous or fragile evidence
must be collected due to safety concerns or exigent circumstances, collect it in
appropriate evidence collection containers; mark, bag, and tag all evidence col-
lected; and log it into the evidence log.
SECURE
After initial evaluation of the scene and tending to any emergency needs, crime scene secu-
rity must be implemented by establishing marked (crime scene tape or rope) perimeters
(both outer and inner) accessible to authorized personnel only and manned by officers
assigned to protect against unwarranted entry. The outer perimeter establishes a bright
line not to be crossed by unauthorized or non-emergency personnel. The inner perimeter
provides access to those directly involved in the ongoing investigation of the incident. A
crime scene attendance log must be initiated to establish scene control. This log should
provide the name of every person who has entered the crime scene since your arrival,
beginning with you; it should include the time of their entry to the scene, time of their
exit, and purpose for their being at the scene. Unauthorized personnel, including family
Sex Crimes ◾ 249
PROTECT
Now that you have taken measures to secure your scene, you must protect it from being
destroyed or disturbed by nature (e.g., inhospitable weather) or by human, animal, or
mechanical traffic. Locard’s theory of transference must be remembered and protected
against. Smoking, eating, or drinking should be strictly prohibited within the crime scene
perimeter.
OBSERVE
Observation truly begins during your initial evaluation stage and continues with nota-
tions of the time you were originally dispatched and your time of arrival, basic narrative of
the incident, description of the scene upon arrival, basic sketch of the scene, condition of
the scene if indoors (e.g., points of forced entry, doors or windows left unsecure, internal
temperature, lights on or off, condition of the interior), and condition of the scene if out-
doors, including weather conditions, temperature, and possible tracks, markings, or other
evidence. Take photographs or video of crowds gathered at the crime scene, etc.
NOTIFY
Once at the scene, it now falls to you to make necessary requests of support personnel,
including supervisors, coroner or medical examiner, investigators, emergency medi-
cal personnel, emergency utilities personnel (gas, water, electric), and possibly relatives.
Depending on your local sexual assault and child abuse protocols, you may also be respon-
sible for notifying these team stakeholders.
DOCUMENT
From the initial receipt of the call you should have begun your documentation, which
should now include the following: basic narrative with a description of the scene, crime
scene attendance log, basic crime scene sketch, identification of victim, offender, witnesses,
visible evidence sheet, evidence log, etc.
First responders must also be cognizant of other dangers that may arise in the moments
immediately following an incident. Such dangers could arise when suspects or offenders
reappear at the scene prior to additional assistance arriving. If the incident location is
near a roadway where it can be observed by passing motorists, the first responder must
be aware of interested observers (a.k.a., rubberneckers) who slow traffic because they are
curious about what is happening at your scene and could cause a traffic accident. Many
first responders have been struck and killed by preoccupied passersby while performing
250 ◾ John Padgett
their duties at the incident location. Other threats may result from the incident you are
responding to being gang related; while you are attempting to sort things out, you could
discover yourself in the midst of a retaliatory drive-by shooting. First responders must
be able to control their emotions, handle sudden rushes of adrenaline, work calmly and
proficiently through extreme stress, and multitask, all while fulfilling their RESPOND
responsibilities.
• When and what route would I take and how would I identify, wait for, and approach
a victim?
• Where, how, and following what path would I take the victim to make sure we
were not interrupted?
• How would I deal with potential physical evidence?
• When, where, and in what state would I leave the victim, and how would I prevent
her from reporting the crime and identifying me?
• When, how, and following what path would I take to make sure I got away without
being noticed or identified?
• What would I do with damaged or soiled clothing, and how would I secure a
change of clothing?
• What would I do about any injuries that I might have, and how could I explain
these?
• Where would I go following the attack to establish an alibi, and how and when
would I get there?
• Who would I likely encounter after leaving the scene?
the victim’s body, typically, injuries or torn or bloodied clothing, and on the attacker’s
body or clothing should be photographed and documented. Physical signs of the struggle
will typically be photographed by medical personnel at the hospital or jail. Clothing will
be collected and processed as evidence.
These basic questions can provide the investigator with crucial information that may
result in the preservation of evidence, crime scenes, and even the accidental abortion of an
already developing fetus unrelated to the assault.
Keep in mind that sexual assault victims and their offenders are also crime scenes and
must be properly processed. The processing of victims begins at the hospital with admin-
istration of a Sexual Assault Evidence Kit (SAEK), more popularly known as a “rape kit.”
The collection of evidence via these kits is an extremely invasive procedure, even though
it is performed by medical professionals. Investigators must be cognizant of the emotional
trauma the victim has sustained prior to collecting rape evidence. The victim has already
254 ◾ John Padgett
been violated by the offender and is now suffering the discomfort, humiliation, and indig-
nation associated with the evidence collection procedure. Following collection, the evi-
dence is properly bagged, tagged, and sealed, and a chain-of-custody transfer is made to
forward the evidence to the crime lab for processing.
Once the victim has been identified and a search warrant obtained, the suspect will be
processed at the hospital with a medically collected Suspect Evidence Collection Kit and
possibly a Buccal Swab Kit for DNA comparison. Again, this is an invasive procedure that
may result in some discomfort for the offender. Following collection, the evidence is prop-
erly bagged, tagged, and sealed, and the chain-of-custody transfer is made to forward the
evidence to the crime lab for processing.
The types of physical evidence found at the scene of a sex crime are not that dissimilar
to what you might find at any other crime scene, but it is associative evidence that connects
the offender to the victim to the crime scene. Such associative evidence might include
(Savino and Turvey, 2005):
• A used condom containing the offender’s seminal fluid on the interior and the
vaginal cells of the victim on the exterior
• The offender’s seminal fluid in the victim’s rectum
• Pubic hair of the victim intertwined in the pubic hairs of the offender
• Paint residue from the offender’s workplace on the victim’s clothing
• The offender’s fingerprints on a glass in the sink of the victim’s home
• The offender’s saliva on a cigarette butt put out on the victim’s abdomen
detailed log of each photograph and each video shot. This log notes various aspects of each
photograph taken, such as a description of the photograph, whether polarization filters
were used, whether a tripod or stand was used, which lens was used, whether a flash was
used, the direction the photographer was facing at the time of the photograph, the f/stop
and shutter speed used, and the distance to the object photographed. This photographic
evidence log becomes a component of the chain of custody and is turned over to the crime
lab with the investigator’s photographs or video.
The use of photography in sex crime investigations is not limited to documenting the
crime scene or visible injuries. Normal photography uses visible light to illuminate the
subject and capture the subject on the film. Using visible light to photograph facial bruis-
ing around a victim’s eye will produce an image resembling what could be viewed with the
normal eye; however, employing the use of ultraviolet photography with specialized filter-
ing will allow the camera to capture the full extent of the bruising, even that not visible to
the normal eye or captured by the use of visible light photography. If the victim’s injuries
have completely healed and are no longer visible, reflected ultraviolet light photography
has the ability to penetrate the skin and reveal bruising, scarring, impact marks, and bite
marks not visible for up to 6 months or longer afterward (Robinson, 2010; Weiss, 2008).
protectors, and hazmat coveralls to protect themselves from sharp objects penetrating
the skin and to prevent blood and bloodborne pathogens from being transferred to their
shoes or clothing. There have been many instances of emergency responders becoming
infected away from the crime scene when they took off their shoes and had their hand
penetrated by an infected needle, razor, or piece of glass trapped in the tread of the shoe
at the crime scene.
Investigators must keep in mind that we live in the technology-rich 21st century, where
low-cost, everyday technologies (e.g., flash memory cards, CDs, DVDs) capable of holding
vast amounts of digital evidence are available in almost any retail store. Technology has
also witnessed the creation of affordable cellular telephones, digital cameras, and digi-
tal video recorders that are pocket size with the ability to record, play, and transfer data
in vast amounts in milliseconds. Computers, laptops, and netbooks come complete with
editing software and webcams to produce and share information literally across the globe.
When charged with conducting searches for evidence at locations controlled by suspects
or offenders, investigators must be aware of these technologies, as well as internal and
external hard drives, peripheral devices, and computer networks, and their capabilities
when applying for search warrants. Sex offenders often take photographs or videotaped
recordings of their victims during the crime to keep on hand so they can relive the event
at a later date (Dutelle, 2011).
GLOSSARY
Chain of custody—The movement and location of real evidence, and the history of those
persons who had it in their custody, from the time it is obtained to the time it is
presented in court (Garner, 2009).
Child molestation—Any indecent or sexual activity on, involving, or surrounding a
child; usually under the age of 14 (Garner, 2009).
Child pornography—Material depicting a person under the age of 18 engaged in sexual
activity. Child pornography is not protected by the First Amendment, even if it falls
short of the legal standard for obscenity (Garner, 2009).
Crime scene—Any location that is being investigated by law enforcement as a result of a
criminal act; it is comprised of that area where evidence may be located.
Forensic odontology—A branch of forensic medicine that, in the interests of justice, deals
with the proper examination, handling, and presentation of dental evidence in a
court of law; it includes the identification of human remains, bite mark evaluations,
postmortem identification, and dental profiling.
Habitual sex offender—A person who has been convicted of, or has pleaded guilty to,
committing multiple sexually oriented offenses (Garner, 2009).
Incest—Sexual relations between family members or close relatives, including children
related by adoption (Garner, 2009).
Indecent exposure—An offensive display of one’s body in public, especially of the geni-
tals (West, 2009).
Necrophilia—Sexual intercourse with dead bodies. The three types are pseudo necro-
philes, regular necrophiles, and homicidal necrophiles (Hickey, 2005; Holmes,
2009; Terry, 2006).
Opportunistic sexual offender—Offenders described as exhibiting adventure-seeking,
impulsive, or delinquent lifestyles; also referred to as “recreational” or “situational”
offenders, as they tend to commit offenses while involved in carrying out another
crime (e.g., burglary, kidnapping, robbery) (Terry, 2006).
258 ◾ John Padgett
Tertiary crime scene—A location not deemed the primary or secondary crime scene;
instead, it is another location (or multiple locations) that has become affixed to the
primary event as a result of multiple moves on the part of the offender or victim and
where evidence of the primary event may be located.
BIBLIOGRAPHY
APA. (1994). Diagnostic and Statistical Manual of Mental Disorders, 4th ed. Washington, D.C.:
American Psychiatric Association.
APA. (2004). Diagnostic and Statistical Manual of Mental Disorders, 4th ed., rev. Washington, D.C.:
American Psychiatric Association.
BJS. (2010). Rape and Sexual Assault. Washington, D.C.: Bureau of Justice Statistics, Office of Justice
Programs, (http://bjs.ojp.usdoj.gov/index.cfm?ty=tp&tid=317).
Dutelle, A.W. (2011). An Introduction to Crime Scene Investigation. Mississauga, Ontario, Canada:
Jones & Bartlett.
FBI. (2009a). Table 1: Crime in the United States by Volume and Rate per 100,000 Inhabitants, 1989–
2008. In 2008 Crime in the United States. Washington, D.C.: Federal Bureau of Investigation
(http://www2.fbi.gov/ucr/cius2008/data/table_01.html).
260 ◾ John Padgett
FBI. (2009b). Uniform Crime Reports. Washington, D.C.: Federal Bureau of Investigation (http://
www.fbi.gov/ucr/ucr.htm#cius).
FBI. (2010). Table 1: Crime in the United States by Volume and Rate per 100,000 Inhabitants, 1990–
2009. In 2009 Crime in the United States. Washington, D.C.: Federal Bureau of Investigation
(http://www2.fbi.gov/ucr/cius2009/data/table_01.html).
Finkelhor, D., Ormrod, R., and Chaffin, M. (2009). Juveniles Who Commit Sex Offenses Against
Minors. Juvenile Justice Bulletin, December (http://www.ncjrs.gov/pdffiles1/ojjdp/227763.pdf).
Garner, B.A., Ed. (2009). Black’s Law Dictionary, 9th ed. New York: West.
Georgia General Assembly. (2009). Official Code of Georgia, http://www.lexis-nexis.com/hottopics/
gacode/Default.asp.
Georgia Supreme Court Commission on Equality. (2003). The Georgia Justice System’s Treatment of
Adult Victims of Sexual Violence: Some Problems and Some Proposed Solutions. Atlanta: Georgia
State University College of Law.
Golding, J.M. (1999). Sexual Assault History and Long-Term Physical Health Problems: Evidence
from Clinical and Population Epidemiology. Current Directions in Psychological Science,
8(6):191–194.
Hickey, E.W. (2005). Sex Crimes and Paraphilia. Upper Saddle River, NJ: Prentice Hall.
Hill, G.N. and Hill, K.T. (2002). The People’s Law Dictionary: Taking the Mystery Out of Legal Language.
New York: MJF Books.
Holmes, R.M. (2009). Sex Crimes: Patterns and Behavior, 3rd ed. Thousand Oaks, CA: Sage.
LeBeau, M.A., Andollo, W., Hearn, W.L. et al. (1999). Recommendations for toxicological investiga-
tions of drug-facilitated sexual assaults. Journal of Forensic Sciences, 44:227–230.
LPD Forensic Identification Laboratory. (1998). First Responder Crime Scene Training [PowerPoint
presentation]. Lincoln, NE: Lincoln Police Department.
NCVC. (2008). Male Rape. Washington, D.C.: National Center for Victims of Crime (http://www.
ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&DocumentID=32361).
RAINN. (2011). Rape, Abuse, and Incest National Network, Washington, D.C. (http:www.rainn.
org/).
Robinson, E.M. (2010). Crime Scene Photography, 2nd ed. Burlington, MA: Elsevier.
Savion, J.O. and Turvey, B.E., Eds. (2005). Rape Investigation Handbook. Burlington, MA: Elsevier.
Terry, K.J. (2006). Sexual Offenses and Offenders: Theory, Practice, and Policy. Belmont, CA:
Wadsworth.
Twain, M. (1909). Letters from Earth. New York: Harper & Row.
Weiss, S.L. (2008). Forensic Photography: The Importance of Accuracy. Upper Saddle River, NJ:
Prentice Hall.
Chapter 15
Robbery
J. Harrison Watts
Washburn University
CHAPTER OBJECTIVES
After reading this chapter, you should be able to do the following:
Chapter Outline
• Robbery Defined
• Categories of Robbery
• Robbery Target Selection
• Parties to the Crime
• Investigating Robberies
• Prosecuting Robberies
• Summary
ROBBERY DEFINED
Robbery is oftentimes confused with burglary. A typical scenario in Anytown, USA, is
upon returning home from vacation a family finds that their residence has been broken
into. They call the police department and report that they have been robbed. In actuality
they have not been robbed; rather, they have been burglarized. There is a distinct difference
between burglary and robbery. So what is robbery? Robbery is defined as using force or the
threat of force to commit theft from an individual. More specifically, according to the Texas
Penal Code (§29.02), a person commits a robbery if, in the course of committing theft and
261
262 ◾ J. Harrison Watts
ATTEMPTED ROBBERY
Criminal attempt statutes generally designate that the punishment for an attempted crime
would be one degree lower than if the crime was completed. In other words, in California,
if an individual plans a robbery, puts on a mask, walks into a convenience store, and
demands money, but the clerk brandishes a weapon from behind the counter and scares
off the robber, then an attempted robbery has occurred. The California statute for criminal
attempt specifies that, if the crime attempted is punishable by imprisonment in the state
prison (which in this case it is), then the person guilty of the attempt shall be punished by
imprisonment in the state prison for one-half the term of imprisonment prescribed upon a
conviction of the offense attempted. The punishment for this type of robbery in California
is a second-degree felony with a possibility to serve up to 5 years in prison, but in a crimi-
nal attempt half of that sentence would be mitigated by the fact that the robbery was an
attempt.
CATEGORIES OF ROBBERY
BANK ROBBERIES
Bank robberies are unique in that a person who commits a bank robbery actually violates
both state and federal statutes as they relate to robbery. Title 18, Section 2113, of the United
States Code (18 USC §2113) is the federal criminal bank robbery statute. Subsection (a)
of this code prohibits the taking or attempted taking by force, intimidation, or extortion
of any property, money, or any other thing of value belonging to, or in the care, custody,
control, management, or possession of, any bank, credit union, or savings and loan asso-
ciation, which are defined in federal statutes. Generally, the FBI is the lead agency in the
investigation of bank robberies; however, local police departments respond to emergency
calls or silent alarms in the initial response to a bank robbery. Typically, the local law
enforcement agency will be the initial responding agency but will call the local office of the
FBI to respond, and both agencies will work together in the investigation of the crime. If a
suspect is identified, the FBI will pursue the case through the federal court system rather
than the state system. There are exceptions to the rules, and one can find cases where a
bank robber has been prosecuted through state courts rather than federal courts, but this
would be an exception rather than the rule.
Local law enforcement agencies are considered the first responders to bank robber-
ies, and they have special procedures that they generally follow. Police departments put
into place policies that deal with the handling of the initial reporting of bank robberies in
progress. Generally, the police want the robbers to get out of the bank believing that they
have not been detected by the police. Most banks have silent alarms that notify the police
dispatch. Officers are then dispatched to the location of the bank. Contrary to police tele-
vision shows, the police may not be running with lights and sirens to the scene of a bank
robbery; rather, the police prefer to use stealth to catch the robbers once they are away
from the bank and innocent civilians. Local police may have predetermined hidden areas
264 ◾ J. Harrison Watts
away from the bank but within eyesight of the bank entrance. When the police respond to
a silent alarm in one of these areas, they wait for the robbers to come out of the bank, at
which time they are taken down.
HOME INVASIONS
Home invasions are incidents where robbers make entry into a habitation while the resi-
dents are at home. The robbers generally display weapons and threaten the homeowners
with violence unless they tell the robbers where their valuables and cash are located. Home
invasions have been prevalent in the Asian community, as many Asian immigrants tend to
keep cash in their homes rather than depositing it in banks. Kidnapping or false imprison-
ment charges may accompany a robbery charge in the case of a home invasion. The 2002
movie Panic Room is centered around a secure room built in a residence in case of a home
invasion.
MUGGING
Muggings are also called street robberies. These types of robberies are likely to occur in
parking lots, outside of shopping malls, on city sidewalks, in alleyways, and in places
where people might be carrying a purse or wallet. A mugging is usually a very quick action;
the victim is caught by surprise and usually offers a minimal amount of resistance. In a
mugging, victims may be injured when they are pushed to the ground by their assail-
ants. The elderly are targeted for muggings due to their perceived slow reaction time, and
they typically offer little resistance. Automated teller machines (ATMs) also provide rob-
bers with targets who have cash in hand. In fact, robberies at ATMs are such a concern
that the Credit Card Accountability, Responsibility, and Disclosure Act of 2009 includes a
provision for the Federal Trade Commission to study and report to Congress on the cost
effectiveness of making available ATM emergency PIN technology that would enable bank
customers under duress to electronically alert a local law enforcement agency. The Federal
Trade Commission is researching emergency PINs or reverse PINs and alarm button tech-
nologies as a potential response to ATM robbery.
Robbery ◾ 265
2.6 2
5.5
13.8 Bank
Street/highway
Misc.
43.1 Residence
16.3 Commercial
Convenience store
Gas station
16.7
FIGURE 15.1 Robbery by location. (Adapted from FBI, 2008 Crime in the United States,
Federal Bureau of Investigation, Washington, D.C., 2008; http://www2.fbi.gov/ucr/
cius2008/data/table_23.html.)
CARJACKING
California Penal Code §215(a) defines carjacking as the felonious taking of a motor vehicle
in the possession of another, from his or her person or immediate presence, or from the
person or immediate presence of a passenger of the motor vehicle, against his or her will
and with the intent to either permanently or temporarily deprive the person in posses-
sion of the motor vehicle of his or her possession, accomplished by means of force or fear.
California Penal Code §215(b) further stipulates that carjacking is punishable by impris-
onment in the state prison for a term of 3, 5, or 9 years. Carjackers look for opportunities
to gain control of a vehicle. This could be at a stop light or in a parking lot when the victim
is just getting into the vehicle. Carjackers tend to forcibly remove the victim and take the
vehicle, or they will push the victim into the passenger seat while forcing their way into
control of the vehicle. The typical carjacker seeks to gain control of the vehicle rather than
kidnap the victim. Victims may also be robbed of valuables, such as their jewelry, wallet, or
purse, and anything that the robber can secure quickly that may be valuable.
planning, but others do not. Bank robberies provide a good example of a planned robbery.
Generally speaking, bank robbers watch the bank for weeks and sometimes even months in
advance. They go into the bank prior to the robbery to get a feel for the layout and security.
After casing the bank, a decision is made as to the suitability of the bank for a robbery.
INVESTIGATING ROBBERIES
IDENTIFYING SUSPECTS
In 2010, according to FBI statistics, 6753 persons were known to be involved in bank rob-
bery, bank burglary, or bank larceny; Table 15.1 breaks them down by race and sex. FBI
investigations had resulted in the identification of 3325 (49%) of these 6753 persons. Of
Robbery ◾ 267
these 3325 identified persons, 1173 (35%) were determined to be users of narcotics and 557
(17%) were found to have been previously convicted in either federal or state court for bank
robbery, bank burglary, or bank larceny.
money. Generally, robbery suspects do not leave much physical evidence at the scene of the
crime; however, robbers may leave fingerprints or footprints, or they may discard some-
thing that could be valuable in the investigation. It is the responsibility of the responding
police officers to secure the crime scene, making sure that any physical evidence that was
left at the scene is not disturbed until the investigators arrive.
CLOSED-CIRCUIT TELEVISION
In an attempt to deter robberies, many businesses utilize closed-circuit television (CCTV).
The video from CCTV has improved remarkably over the past several years. Banking insti-
tutions utilize heavy video surveillance. Much of this video surveillance is now in digital
form, which provides a high-quality images for police. Robbers attempt to defeat video
surveillance by wearing disguises. These disguises can be quite elaborate or may be very
simple. In 2005, in Tucson, AZ, three women and one man were arrested in connection
with a string of robberies dubbed the “clown robbers” due to the clown disguises they
wore. The break in the case came when reviews of outside surveillance videos from the
robbery locations led police to the vehicle the group was using.
PROSECUTING ROBBERIES
LEVEL OF PROOF
Since larceny is an element of robbery, all the issues that exist in defining larceny are also
issues in defining robbery. The common law rules that prevent the taking of real property
or services from being larceny, for instance, may also prevent the forcible taking of these
things from being robbery. Likewise, since the taking that results from a mistaken but hon-
est claim of ownership is not a theft because there is no intent to deprive the rightful owner,
such taking with force is not a robbery in most states because there is no theft. Hall of Fame
football star Orenthal James Simpson, known commonly as O.J. Simpson, was convicted of
armed robbery and ten other charges for gathering together five other men and raiding a
hotel room, where they seized several game balls, photographs, and plaques. Mr. Simpson
and his lawyers argued, unsuccessfully, that the incident was not a robbery but an attempt
to reclaim mementos that had been stolen from him (Associated Press, 2008).
After meeting all the elements of larceny the prosecutor must then meet the requirement
of force or intimidation. This element is what distinguishes robbery from larceny or theft.
Purse snatchings or muggings happen so quickly that sometimes victims do not know that
they have lost their property. If this is the case, the crime may be a larceny rather than a
robbery. When victims do recognize the act of someone attempting to take property from
them and struggle, and the perpetrator uses force to remove the property, these cases are
classified as robbery. The threat of violence qualifies as force in the sense of the definition
of robbery. The threat must be of an immediate nature and be specific.
Robbery ◾ 269
SUMMARY
Robbery is defined as using force or the threat of force to commit theft from an individual.
Burglary is often mistakenly referred to as robbery. Robbery is more closely aligned with
theft or larceny as larceny is an element of robbery. In all states, robbery is a felony crime
and punishable by incarceration in a penitentiary. Robbery is classified as being in the first
degree or second degree. Some states refer to first-degree robbery as aggravated robbery.
Robberies occur most often as street crimes or muggings. Robberies can be planned, such
as robberies of a bank or jewelry store, or they can be opportunistic, such as convenience
store robberies. Robbery is not limited to businesses and people walking on the street,
as some robberies occur when perpetrators forcibly enter homes while the occupants are
inside and hold the occupants hostage while taking their valuables. These robberies are
classified as home invasions. Robbery is a crime that may have more than one offender per
offense. An accomplice is someone who knowingly, voluntarily, and with common inter-
est, participates in the commission of a crime and can be charged with the same crime for
which the accused will be tried. In addition, an individual who assists in the planning of
the robbery or aids in the concealment of the robbery after the fact could be considered
complicit in the wrongful act.
Investigating robberies involves identifying suspects, collecting physical evidence, and
interviewing witnesses and victims. One technology that has assisted investigators in the
investigation of robberies is closed-circuit television. Proving the elements of robbery is
accomplished through the testimony of witnesses and victims, as well as examining physi-
cal evidence. All of the elements of larceny plus the use or threat of the use of force to
accomplish the larceny must be proven beyond a reasonable doubt.
BIBLIOGRAPHY
Anon. (2010). Robbery—Particular Requirements. Law Library–American Law and Legal Information,
http://law.jrank.org/pages/1982/Robbery-Particular-requirements.html.
Associated Press. (2008). O.J. Simpson Found Guilty on All Charges in Robbery–Kidnapping Trial.
FoxNews.com, http://www.foxnews.com/story/0,2933,432663,00.html.
FBI. (2008a). Table 1, Crime in the United States by Volume and Rate per 100,000 Inhabitants, 1989–
2008. In 2008 Crime in the United States. Washington, D.C.: Federal Bureau of Investigation
(http://www2.fbi.gov/ucr/cius2008/data/table_01.html).
270 ◾ J. Harrison Watts
FBI. (2008b). Table 1a, Crime in the United States: Percent Change in Volume and Rate per 100,000
Inhabitants for 2 years, 5 years, and 10 years. In 2008 Crime in the United States. Washington,
D.C.: Federal Bureau of Investigation (http://www2.fbi.gov/ucr/cius2008/data/table_01a.
html).
FBI. (2008c). Table 2, Crime in the United States by Community Type, 2008. In 2008 Crime in the
United States. Washington, D.C.: Federal Bureau of Investigation (http://www2.fbi.gov/ucr/
cius2008/data/table_02.html).
FBI. (2008d). Table 3, Crime in the United States: Offense and Population Percent Distribution
by Region, 2008. In 2008 Crime in the United States. Washington, D.C.: Federal Bureau of
Investigation (http://www2.fbi.gov/ucr/cius2008/data/table_03.html).
FBI. (2008e). Table 12, Crime Trends by Population Group, 2007–2008. In 2008 Crime in the United
States. Washington, D.C.: Federal Bureau of Investigation (http://www2.fbi.gov/ucr/cius2008/
data/table_12.html).
FBI. (2008f). Table 21, Robbery, by State, Types of Weapons, 2008. In 2008 Crime in the United
States. Washington, D.C.: Federal Bureau of Investigation (http://www2.fbi.gov/ucr/cius2008/
data/table_21.html).
FBI. (2008g). Table 23, Offense Analysis: Number and Percent Change, 2007–2008. In 2008 Crime in
the United States. Washington, D.C.: Federal Bureau of Investigation (http://www2.fbi.gov/ucr/
cius2008/data/table_23.html).
Kirby v. Illinois, 406 U.S. 682 (1972).
Lins, S. and Erickson, R.J. (1998). Stores Learn to Inconvenience Robbers. Security Management,
42(11):49–53.
O’Connor, T. (2006). Accomplice Law, http://www.drtomoconnor.com/3010/3010lect03.htm.
Steblay, N., Dysart, J., Fulero, S., and Lindsay, R.C.L. (2003). Eyewitness Accuracy Rates in Police
Show Up and Line Up Presentations: A Meta-Analytic Comparison. Law and Human Behavior,
27(5):523.
5
Specialized Investigations
Chapter 17 ■ Cybercrimes
271
Chapter 16
Narcotics Investigation
Donald F. Vespa
U.S. Drug Enforcement Administration (Retired)
CHAPTER OBJECTIVES
After reading this chapter you should be able to do the following:
Chapter Outline
• Introduction
• Case Initiation and Preparation
• Drugs of Abuse
• Surveillance
• Informants
• Undercover
• Undercover Purchase
• Operational Safety Plan
INTRODUCTION
Drug trafficking, illegal drug use, drug abuse, and violent drug-related crimes are just a
few of the enormous challenges a narcotics investigator faces. In order for the narcotics
investigator to be efficient and successful at fighting drug traffickers, the investigator must
be creative, innovative, and dedicated to developing a basic investigative strategy to combat
drug traffickers and drug organizations. The investigator must utilize all of the available
273
274 ◾ Donald F. Vespa
resources at hand to identify, target, and eventually arrest drug traffickers. Today’s drug
traffickers and drug trafficking organizations are equally creative, innovative, and dedi-
cated in their determination to distribute illegal drugs throughout our country and the
world. Experience has repeatedly demonstrated that, when inadequate planning, tactics,
and resources are used, deaths and injuries may result needlessly among innocent civil-
ians, drug violators, and law enforcement personnel; therefore, it is very important that
every narcotics enforcement activity be thoroughly planned by a supervisor, case agent,
and participating personnel.
In the planning and execution of all narcotics enforcement operations (e.g., arrests,
search warrants, undercover activity), the first priority should be given to the safety of par-
ticipating personnel and the public, the second priority to the security of the money, and
the third priority to the achievement of investigative objectives. It is essential that an oper-
ational safety plan be prepared for all enforcement activities. In any narcotics enforcement
operation, safety should be paramount. When narcotics operations are properly planned
and executed with safety in mind, the probability of injury and death are minimized.
The success of a narcotics investigation or narcotics enforcement operation is depen-
dent in part upon reliable intelligence information. Today, drug trafficking organizations
have become highly sophisticated in guarding their illegal operations from law enforce-
ment authorities. These organizations are extremely violent, adaptable, and resourceful, so
mutual law enforcement cooperation is essential in combating these sophisticated violent
drug traffickers. It should be noted that, because of a single initial tip or lead, many suc-
cessful large-scale drug dealers and trafficking organizations have been dismantled and
put out of business. For this reason, it is very important for investigators to methodically
follow all leads and tips, regardless of how trivial they seem.
One of the main goals of a drug enforcement operation is to arrest the highest level of
drug violators and seize the largest quantity of illicit drugs before they reach the street.
This at times can be a very daunting task due to a lack of complaining witnesses; there are
only drug sellers and drug buyers. The drug investigator must develop a narcotics case
based on fundamental principles of drug investigation that involve intelligence, surveil-
lance, informants, and undercover operations. These fundamental resources are the key
components in any successful narcotics investigation. The successful end result of these
investigations is a reflection of the hard work and dedication to the law enforcement per-
sonnel assigned to the cases.
It is important to realize that many drug trafficking cases overlap jurisdictional boundar-
ies; thus, it is important to develop a good cooperative relationship with other law enforce-
ment agencies. In addition, it is equally important to work closely with the prosecutor in
a narcotics investigation. The success or failure of your investigation often is determined
by small procedural and legal details, all of which should be discussed with the prosecutor
during the initial stages of case development. In other words, if it is at all possible, have the
prosecutor on board from the beginning of your investigation to minimize potential legal
problems. In this chapter, we discuss and describe some of the basic fundamental methods,
principals, and techniques involved in a narcotics investigation.
Narcotics Investigation ◾ 275
investigator can learn a lot of valuable information about a suspected individual by closely
observing his daily activities. In addition, criminal history checks, police offense reports,
traffic records, court records, public utilities, telephone records, public records, motor
vehicle registration records, subsequent interviews, and informant development can all
help to corroborate the information received. After the preliminary information indicat-
ing possible drug law violations or other law violations has been verified by independent
sources, it is time to develop a case strategy on how best to further the investigation. It is
important to remember that the overall objective of a drug case is to arrest, prosecute, and
incarcerate drug traffickers to reduce drug availability in the community. In addition, the
narcotics investigator should be aware of the asset forfeiture laws concerning drug traffick-
ers and of the financial component in any drug investigation.
Regardless of whether you are investigating a low-level street dealer or a large-scale drug
trafficking organization, a drug dealer’s primary objective is to make a profit. Drug traf-
fickers need cash to operate, buy silence from witnesses, pay bribes, pay legal expenses,
establish stash houses, and obtain new drug sources of supply. For this reason, the assets,
the financial component, are a major factor in any criminal drug organization that must
be addressed by the investigator. Today’s drug investigators should focus not only on the
traditional objectives of arresting the drug dealer and seizing large amounts of drugs but
also on identifying and locating all of the illegally obtained assets of a drug dealer or drug
organization for possible seizure and forfeiture.
Proper planning of a drug investigation is crucial to whether or not the investigation
will be successful. The target of the investigation and available law enforcement resources
will determine the investigative response. For example, the level at which the dealer is
distributing drugs is important in the planning stages of the investigation. Whether the
dealer is a low-level street dealer or a large-scale multijurisdictional source of supply will
determine the type of investigation initiated. All of these factors will affect the length of
the investigation, type of arrests, and the amount of resources dedicated to the case. If the
dealer is a low-level dealer, it might be more prudent to conduct a “buy–bust” instead of a
“buy–walk,” which has the potential to turn the suspect into a valuable informant or CS
early on in the investigation. Remember, in many cases it takes investigative acumen to
determine the credibility and value of a good CS. A narcotics investigator should not take
everything a CS says at face value.
In many cases, a CS will try to embellish the information provided to the investigator.
Whether the narcotics investigator chooses to conduct an undercover (U/C) agent buy or
an informant (CS) buy or simply to pursue a drug possession case will depend on all of the
aforementioned factors. The overall success of an investigation in part is determined by
how the investigator obtains information and prepares the criminal case. To ensure suc-
cessful prosecution of a case, it is wise to establish a close working relationship with the
prosecutor. It would be futile to conduct an extensive complex narcotics investigation if the
prosecutor refuses to present the case in court. It is always advisable to seek legal assistance
early in any investigation to prevent legal problems that could negate weeks’ or months’
worth of investigative effort. If there is ever any question about the legality of any action,
the prosecutor should be contacted before any action is taken.
Narcotics Investigation ◾ 277
DRUGS OF ABUSE
Cocaine is a drug listed under Schedule II of the Controlled Substance Act. It is described
as a white crystalline substance, chemically known as benzoylmethylecgonine, which orig-
inates from the coca plant (Erythroxylon coca), grown chiefly in Bolivia and Peru in the
Andes Region of South America. It is considered a powerful central nervous system stimu-
lant or “upper” and has both physical and psychological addictive properties. Known on
the street as coke, flake, or snow, cocaine can be inhaled or injected into the body. It has a
high melting point, so before it can be smoked it must be converted to base or crack, which
has a much lower melting point. Crack, the street name for the smokable form of cocaine,
resembles tiny chunks or rocks. Users smoke crack cocaine in small pipes or in tobacco
and marijuana cigarettes.
When users smoke crack, they get high very quickly. Both physical and psychological
dependence develops very quickly with continued crack use. Illicit cocaine is distributed
as a white crystalline powder, frequently diluted by a wide variety of ingredients, including
278 ◾ Donald F. Vespa
sugars such as lactose, mannitol, and inositol, as well as lidocaine, a local anesthetic. As a
result of the high cost of cocaine, there is a proclivity to adulterate the substance at each level
of drug distribution. The most common method of administering cocaine is by snorting
the product through the nose. Large-scale cocaine dealers usually sell cocaine in kilogram
quantities, whereas low-level street dealers deal in ounces or lesser gram amounts. The
price of cocaine varies depending on the demand, availability, and quantity purchased.
Ecstasy (3,4-methylenedioxymethamphetamine, or MDMA) is what is commonly
referred to as a synthetic or designer drug. Manufactured in clandestine laboratories,
Ecstasy is a stimulant with mild hallucinogenic properties, similar in chemical compo-
sition to both 3,4-methylenedioxyamphetamine (MDA) and methamphetamine. Most
MDMA seized in the United States originates in Europe. Even though the natural sub-
stance starts out in powder form, the normal dosage unit for Ecstasy or MDMA is a tablet.
The tablets usually have unique designs imprinted on them. Most MDMA tablets are white
to off-white in color, although some tablets are green, blue, or yellow. Ecstasy is referred to
as the “love drug” or “hug drug”; on the street, Ecstasy is known simply as E or X. MDMA
is frequently sold retail for $10 to $60 per tablet at all-night dance clubs known as “rave
clubs.” It is a Schedule I drug under the Controlled Substances Act. (Schedule I drugs have
no legitimate medical purpose.)
There is a tremendous mark-up between the wholesale and retail price on MDMA.
Producers of MDMA usually sell it to wholesale distributors in 10,000-tablet lots, typically
charging between $1.50 and $5.00 per tablet. Subsequently, the wholesale dealers smuggle
the drug into the United States via couriers. Wholesale MDMA dealers then sell the MDMA
in lots of 1000 tablets to mid-level distributors, who in turn sell the drug to retail distributors.
Ecstasy is popular with young adults and adolescents at rave parties because it increases the
sensitivity to touch. Some of the physical effects are muscle tension, hyperthermia, blurred
vision, rapid eye movements, faintness, involuntary teeth clenching, sweating, and tremors.
As a result of the increase in energy, young people at rave parties dance and party continu-
ously, resulting in dehydration, exhaustion, and high blood pressure.
Another Schedule 1 drug under the Controlled Substance Act is gamma-hydroxybu-
tyrate (GHB), a powerful central nervous system depressant that is frequently used illicitly
for its sedative and euphoric effects. Adolescents and young adults appear to be the pre-
dominant users of GHB. GHB is one of the drugs most commonly used in drug-facilitated
sexual assaults due to its powerful sedative characteristics. Prior to such a sexual assault,
the drug is usually covertly mixed into the intended victim’s drink to mask its salty taste. It
is quickly absorbed and metabolized by the body. The onset of the drug’s effects normally
occurs within 15 to 30 minutes of ingestion, and the effects generally last for 3 to 6 hours
depending on the potency and amount of GHB administered. Vomiting is a common result
of GHB consumption. An overdose of GHB can lead to respiratory depression and death.
Heroin is produced by a chemical process from raw opium obtained from the opium
poppy. It is known on the street as horse or smack. It is listed under Schedule I of the
Controlled Substance Act and varies in color from white to dark brown because of impuri-
ties left from the manufacturing process or the presence of additives such as cocoa, food
coloring, or brown sugar. Pure heroin is a white powdery substance that is bitter in taste;
Narcotics Investigation ◾ 279
it is rarely sold on the streets. Street heroin is often sold to street addicts in a single dosage
unit called a “bag,” which is heavily diluted and mixed with powdered milk, sugar, starch,
and quinine. Historically, heroin use in the United States has varied over periods of rising
and falling demand. The demand for heroin ranges from traditional inner cities to wealth-
ier affluent suburbs. The combination of higher purity, greater availability, and lower cost
has made heroin use more appealing to young people. The new higher purity heroin can be
snorted or smoked instead of being injected. Heroin comes from Mexico, Asia, and South
America. The financial incentive for heroin trafficking is high. Heroin can be purchased
relatively inexpensively outside the United States, but the price increases greatly after
reaching this country. Mexican drug trafficking organizations using established marijuana
networks have expanded their product line to include black tar and brown heroin.
Ketamine hydrochloride is a Schedule III drug under the Controlled Substance Act.
Common street names for ketamine are special K, K, vitamin K, cat valium, lady K, and
super K. It is a dissociative anesthetic that has a combination of stimulant, hallucinogenic,
depressant, and analgesic properties. Ketamine is legally used as a preoperative veterinary
anesthetic and is abused for the aforementioned properties. It is illegally used to facilitate
sexual assault and often is distributed at raves, nightclubs, and private parties. Most of the
ketamine illegally distributed in the United States is diverted or stolen from legitimate
sources or smuggled into the United States. It can be taken orally in tablet or capsule form
or snorted as a powder.
Lysergic acid diethylamide (LSD) is listed under Schedule I of the Controlled Substance
Act. LSD is a hallucinogenic drug that became popular during the drug culture of the
1960s. LSD can cause delusions and hallucinations and a poor perception of time and dis-
tance. It is usually sold in the form of tablets, as thin squares of gelatin, or as impregnated
paper (referred to as “blotter acid”). It is often referred to on the street as microdot or acid.
All forms of LSD are sold by the dose and are normally taken orally.
Marijuana is a term that refers to the Cannabis plant and to any part or extract of it
that produces somatic or psychic changes in an individual. Marijuana is a tobacco-like
substance produced by drying the leaves and flowering tops of the plant. It varies in its
potency, depending on the source and selectivity of the plant, and is commonly smoked
in a variety of ways. The potency of the marijuana plant depends on its concentration of
the psychoactive agent THC. The higher the concentration of THC in the marijuana plant,
the higher the potency level. Sinsemilla is prepared from unpollinated female Cannabis
plants and has an extremely high THC concentration. Marijuana price ranges vary con-
siderable, depending on the quality and geographic location of the country. Marijuana is
often referred to as pot, grass, sinsemilla, reefer, or weed. Marijuana prices fluctuate greatly
depending on the geographic location and quantity purchased. It is usually sold in ounce
and pound quantities.
Methamphetamine is listed under Schedule II of the Controlled Substance Act and
is commonly referred to on the street as speed, crank, glass, meth, ice, or crystal. It is a
synthetically produced central nervous system stimulant that induces effects similar to
those of cocaine; however, it metabolizes much more slowly in the body than cocaine
and thus has longer lasting effects. Ice, named for its appearance, is a smokable form of
280 ◾ Donald F. Vespa
SURVEILLANCE
Surveillance in modern-day law enforcement is a valuable and effective procedure that
produces viable intelligence when all else fails. It is used for a variety of reasons and has
multiple applications in the field, although the primary purpose of surveillance is to obtain
information. In addition, it is frequently used to verify and corroborate information previ-
ously obtained. This also includes updating existing intelligence information to prevent it
from becoming stale and ineffective. It can also be used to provide security for ongoing
undercover operations, to obtain probable cause for a search warrant, to identify drug
violator associates, and to provide an avenue for apprehending drug dealers in the act of
committing crimes. The methods used to conduct surveillance are only limited by one’s
imagination and creativity. Surveillance can be by foot, motor vehicle, boat, or aircraft,
or it can take place in a fixed location. A multitude of equipment is available to aid the
investigator in these activities, including radios, cell phones, cameras, special surveillance
vehicles, aircraft, video equipment, binoculars, high-powered telescopes, and sophisticated
electronic tracking and listening equipment.
Many sophisticated large-scale drug trafficking organizations have been disrupted, dis-
mantled, and put out of business as a result of information obtained during basic surveil-
lance operations; therefore, it would be wise for any drug investigator to work hard at
becoming proficient in the various methods, adaptations, and techniques of surveillance.
Narcotics Investigation ◾ 281
A successful surveillance is no easy task and can be a very difficult process for the inex-
perienced investigator. This task is compounded if the subject under surveillance is sus-
picious, which is often the case with paranoid drug dealers. This is the reason why basic
surveillance practices and principles must be followed and implemented. Good judgment
and common sense go a long way in the field of surveillance. Generally speaking, the more
practice and experience an investigator has in surveillance operations, the more efficient
and successful those operations will be.
Surveillance is an investigative technique that requires patience and perseverance
from the investigator. Patience can be developed through practice and determination.
Surveillance is a proven established investigative technique that an investigator utilizes to
develop additional pertinent information to proceed with an investigation. It is one of the
most valuable investigative measures that a criminal investigator can develop and use, if
done correctly.
The American Heritage Dictionary of the English Language defines “surveillance” as the
close observation of a person or group, especially of one under suspicion. In a concise law
enforcement context, it simply refers to watching the bad guy without the bad guy know-
ing you are doing so. In a sense, the surveillance team must appear as if they are invisible
to the suspect or target being observed. Maintaining this cloak of invisibility in a surveil-
lance operation can be very difficult. Many drug violators are extremely street smart and
conscious of surveillance; as a result, they are constantly looking around for indicators of
police surveillance.
There are a number of terms used by surveillance members that should be defined here.
The suspect or target is the person being observed. The surveillant is the person doing the
observing. Burned is a term used to indicate that the surveillance has been recognized by
the suspect or target. Eye-ball or simply eye refers to the law enforcement agent or officer
who is the closest observer to the suspect or target. Tail refers to a surveillance agent or
officer. Trip means to travel from one location to another. Loose refers to maintaining a
discreet distance between the target and the closest surveillant. Tight refers to maintaining
a close distance between the target and the closest law enforcement tail. A neutral vehicle
is a non-law enforcement vehicle. A take-away refers to the intended direction in which a
surveillance unit will follow the target.
Obviously, it is important that members of the surveillance team be in good physical
condition in order to be effective. Surveillance assignments can often be very stressful and
prolonged, extending over a long period of time. In addition, these assignments often occur
under difficult conditions and in dangerous environments.
Surveillance team members need to be alert and have quick reflexes, keen perception,
good judgment, and a good memory. Good driving skills are a must, along with keeping
detailed chronological surveillance notes. All of these attributes come into play in a sur-
veillance operation. It is very important for the team members to understand the signifi-
cance of the target’s actions and the relevancy of those actions in the context of the overall
investigation. In many cases, though, this is not discerned until later on in the investiga-
tion. This is why it is important to keep complete and accurate notes of all details and facts
during an ongoing surveillance operation.
282 ◾ Donald F. Vespa
The details and facts recorded by the surveillance officer become the basis for the con-
tent of the subsequent surveillance report, which is submitted as part of the overall inves-
tigative case file. A simple factual observance by a surveillance team member might not
seem to be significant at the time, but it can be a vital bit of key information later in the
investigation. It is futile to conduct a lengthy intense surveillance operation and not be able
to remember important details because you forgot to take notes.
The proper attitude toward surveillance is critical. All members of the surveillance team
should understand the reasons for and objectives of the surveillance assignment. This in
itself is often all that is required to establish the proper attitude or mindset within the sur-
veillance team. A surveillance operation can often be mentally and physically demanding
on all members of the team as a result of long hours and little sleep. A surveillance assign-
ment can last hours, days, weeks, or even months depending on the level and complexity
of the investigation. As a result, it is crucial that all members of the team be thoroughly
briefed by the supervisor and surveillance leader prior to conducting the surveillance.
All members of the team should be provided with relevant target information, including
physical descriptions, vehicle descriptions, aliases, criminal history, telephone numbers,
license numbers, girlfriend addresses, criminal associate addresses, and photographs of
the intended targets and associates. Intelligence information on a target’s daily routine,
individual habits, and interests should be addressed in the briefing. This information can
be invaluable during a surveillance operation, especially if the team loses the target dur-
ing the surveillance and needs to reestablish contact with the target. Generally speaking,
the more information the team has about the target, the better the chances of success. It is
important to remember that a moving surveillance can at times be compared to a fast and
furious roller coaster ride. Once the operation begins, you never know when and where
it will end. Members of the surveillance team are frequently confronted with unexpected
conditions in the field, and the situation can change instantly. The surveillance team should
always anticipate the unexpected and be prepared for the worst.
All members of the surveillance team should be equipped with the basic equipment
necessary to conduct the surveillance. Some of the items and basic equipment include bin-
oculars, maps, notepads, portable radio, extra batteries, cellular phone, GPS if available,
extra clothing, and an overnight bag. In addition, the surveillance team members should
all have their vehicle fuel tanks topped off. All of the vehicles should be in good working
order, and the surveillance team members should always try to plan for the unexpected in
any surveillance operation. Many times, the target has unexpectedly ended up driving a
long distance and the surveillance team was caught off guard, assuming the subject was
only running a short errand in the neighborhood. As a result, the surveillance team needs
to plan ahead to be prepared for any contingency. It should be noted that prior planning
can prevent or minimize many of the possible problems.
A reconnaissance of the intended area where the surveillance will begin is a vital first
step in initiating a successful surveillance. This could be the target’s residence, a stash
house, a girlfriend’s apartment, or the target’s place of business. The surveillance team
leader or designee should note the type of area, safety and security concerns, traffic pat-
terns, dead-end streets, road construction, location of street lights, street names and
Narcotics Investigation ◾ 283
directions, access highways, and, most importantly, good observation locations or vantage
points in the immediate area. Important vantage points could be parking lots, roofs of
parking garages, vacant apartments, offices, and houses. In addition, the surveillance team
leader should obtain photographs of the location and the subject’s vehicle, along with a
sketch of the location. After this information is obtained, surveillance personnel will be
better informed on how best to initiate the surveillance.
All enforcement personnel involved in the upcoming surveillance operation should be
briefed and provided with all of the relevant intelligence information on the target. All
equipment should be checked for proper functioning prior to departure of the team. A
primary and secondary communication channel should be established in the event that
a second target is developed during the surveillance, requiring dividing the surveillance
team into two groups. Designated surveillance team leaders should be established prior
to the surveillance operation. Some neighborhoods or locations are extremely difficult to
establish surveillance in without being burned by the bad guys; therefore, to establish a
covert eyeball on the target subject, it may be necessary to position a surveillance van or
undercover surveillance officer on foot some distance from the target. Other ways to avoid
detection would be to use various ruses; for example, a surveillance officer could feign
engine trouble or could pretend to be a service repairman or maintenance worker on a job
in the area. Ruse techniques are limited only by one’s imagination and ability, but they may
require some props to be convincing.
During night-time surveillance activities, it is important to wear dark clothing and stay
out of brightly lit areas. The surveillance member, who has the eyeball, is responsible for
notifying the other surveillance units when the target moves and the target’s direction of
travel. The surveillance member who establishes the initial eyeball in this case would not
immediately be involved in the moving surveillance. In some cases, a surveillance unit
will be assigned to maintain a fixed surveillance position on a given target area and will
not be part of the mobile surveillance. This technique can be utilized in a number of target
locations, depending on the manpower resources available. It is especially effective when
the target travels or returns to an area that is extremely difficult to follow, such as a dead-
end street or a long rural road leading to the target’s residence. Once the target is on the
move, the remaining surveillance units, which were originally pre-positioned in strategic
take-away locations, are free to engage in the surveillance operation. They should key off
of the surveillance leader’s instructions, but if no instructions are forthcoming in a timely
manner, the closest surveillance unit will take the point and the eyeball. The remaining
units will establish positions to the rear of the point vehicle appropriately spaced at varying
distances, depending on traffic conditions and the time of day or night.
Some surveillance units may also parallel the target vehicle on nearby streets. It is the
responsibility of the lead or point surveillance unit to call out the location, direction of
travel, lane of travel, and speed of the target vehicle. This information must be relayed to
the other units in the surveillance team on a fairly frequent basis. The other members of
the surveillance team should not have to ask the location of the target vehicle in a mobile
surveillance if the lead surveillance unit is properly calling out the target vehicle location.
Also, it is not necessary for the other surveillance team members to transmit their location
284 ◾ Donald F. Vespa
during the surveillance operation. The lead surveillance unit should have radio commu-
nications priority, and surveillance team members should keep radio communications to
a minimum. All members of the surveillance team should be aware of the approximate
location of the target at all times. To avoid detection, the lead surveillance unit must rotate
the lead or eyeball position periodically with other surveillance units, usually beginning
with the number two unit in the surveillance caravan. If the number two surveillance unit
is not able to immediately pick up the target vehicle and establish contact, then the lead or
point vehicle should never relinquish the eyeball and risk compromising the entire surveil-
lance operation by losing the target. For this reason, the change in the lead vehicle must be
delayed until the number two vehicle or a substitute surveillance vehicle can come up and
assume the point position. A good example of this would be when the target vehicle makes
it through an intersection but the second vehicle is too far away to do so.
Timing is everything in this process, and when to change the eyeball is based on common
sense, experience, and the immediate circumstances. The important thing to remember is
that the eyeball or point position must be changed frequently in any successful surveillance
operation; otherwise, the surveillance-conscious target will burn the surveillance opera-
tion. Visual contact must be maintained with the target vehicle until the number two sur-
veillance vehicle is in a position to assume the number one position and take the point.
During a mobile surveillance, the target vehicle may turn either left or right or make a
U-turn in the middle of the street. Some of these turns may be legal, others not. The illegal
turns may be used for the specific reason of detecting or losing a surveillance tail. If the
corresponding surveillance units follow the target and make such a turn, there is a good
chance the target will realize that he or she is under surveillance. A wise rule of thumb
in these types of cases is that, when the target vehicle turns, the lead vehicle continues
straight ahead. This practice should be followed whenever possible. The number two vehi-
cle or another surveillance vehicle would be responsible for establishing the eyeball. If the
target makes a U-turn, the lead vehicle needs to continue straight ahead and immediately
notify the other units of the target’s evasive actions. The rear surveillance units could pull
off the road, out of sight of the target vehicle, and be set up to intercept the target in the
opposite direction. If the target vehicle stops beyond a hill or curve in the road, the point
vehicle should notify the number two vehicle of the target’s status and simply drive past the
stationary target vehicle. If possible, the number two vehicle should stop before arriving at
that location and the observer from the number two vehicle should exit the vehicle to get
a visual on the target. Additionally, the point vehicle should also stop out of view of the
target vehicle and have the observer exit the vehicle to determine what the target is doing.
In a moving surveillance, it is also important to have at least one neutral cover vehicle
between the target vehicle and the closest surveillance vehicle. In many cases, the number
of cover vehicles may vary considerably due, for example, to changing traffic conditions.
The more cover vehicles, the less chance the bad guy is going to burn the surveillance.
If there are too many cover vehicles between the target vehicle and the lead vehicle, the
chance of losing the target increases. This is always a concern of surveillance team mem-
bers. Generally speaking, one or two cover vehicles in heavy traffic would suffice, but more
would be suitable on an open highway. This is where experience comes into play.
Narcotics Investigation ◾ 285
The distance between the vehicles may change frequently due to visibility, weather, and
traffic conditions. The most likely times the target vehicle will attempt an evasive burn
maneuver is upon leaving the initial location with contraband or upon arriving at the
intended destination with an illegal substance. Surveillance activity is most crucial at these
times. Be aware, though, that this does not preclude the suspect from randomly pulling
off the highway onto the shoulder to determine if anyone is tailing him or her. This is not
uncommon for experienced drug traffickers; it is simply a matter of habit.
One other important factor to always consider in any field surveillance operation is
countersurveillance measures taken by the bad guys against law enforcement. Suspects
involved in illegal drug trafficking have become more aggressive and violent over the
years. As a result, these drug traffickers and drug trafficking organizations use some of
the same surveillance methods and techniques against law enforcement officers that are
being utilized against them. All surveillance personnel should be advised of the possibility
of countersurveillance measures by the target and take the necessary precautions for their
safety and the safety of the surveillance team. This is especially crucial after the surveil-
lance is terminated and the surveillance team is returning to their offsite office or resi-
dence. Subsequent to the surveillance operation, the surveillance team leader or supervisor
should conduct a surveillance team meeting to compare notes and discuss various aspects
of the surveillance with fellow surveillance team participants in order to get a comprehen-
sive overview of the target’s activities for the final surveillance report. It is also important
for the surveillance team to objectively critique their operation and make the appropriate
and necessary changes in the future. There is always room for improvement in the surveil-
lance process.
It is important to understand that there are many things to remember when conducting
a moving vehicular surveillance. First and foremost, all of the surveillance vehicles should
be in good mechanical condition and suited for the surveillance assignment. Brightly col-
ored vehicles tend to stand out and are more likely to be noticed by the target than neu-
tral-colored vehicles. The vehicles should fit the area and be as inconspicuous as possible.
None of the contents of the vehicles, such as emergency lights, handcuffs, official papers,
or police-related equipment, should be in view. If the vehicle is parked in a residential area,
it is important to keep the police radio volume turned down low and the windows in the
upright position. Many good surveillance operations have been burned by neglecting to
do so.
A surveillance vehicle occupied by two officers has a number of advantages over a one-
officer surveillance unit. In a two-officer unit, the observer checks locations on the map,
takes detailed surveillance notes, and operates the radio. It is best if the driver can concen-
trate fully on operating the vehicle. The observer also has the option of exiting the surveil-
lance vehicle for foot surveillance or to seek a better vantage point to observe the activities
of the target. It is vital that the second officer maintain communications with the driver
and surveillance units during this period and to keep a low profile. Additionally, if the sur-
veillance is prolonged over an extended period of time or distance, the second officer can
relieve the driver for some needed rest. Remember, it is very important to maintain surveil-
lance eyes on the bad guy from start to finish; otherwise, key information may be missed.
286 ◾ Donald F. Vespa
Many unexpected problems and situations can develop during a foot and vehicle sur-
veillance. Many of these problems and situations require a quick decision to be made by the
surveillance team. Following are some common problems encountered and possible solu-
tions: If the subject enters a restaurant for a meal or meeting, one or preferably two surveil-
lance officers should enter the restaurant and take a seat near the subject, depending on the
number of customers in the establishment. The surveillance officers should position them-
selves to the rear of the subject so the subject is not facing them directly and should try to
overhear the target’s conversation. If the subject meets with a second individual, it is very
important to later identify that person and obtain a surveillance photograph. Particular
attention should be given to any exchange of items such as a key, package, envelope, paper
sack, cell phone, or briefcase. In addition, the surveillance team needs to try to identify the
second subject’s vehicle. The remaining surveillance units should be positioned to cover
the exits of the restaurant and all routes of departure from the location. Depending on the
developing circumstances at the time and the significance of the second subject, the sur-
veillance team may have to divide into two teams to cover both subjects upon their depar-
ture from the location. This, of course, would only be necessary if they depart the meeting
location in different directions.
In another scenario, the target subject might enter a movie theater, sporting event,
casino, race track, or other public place. In this case, surveillance should be maintained on
the subject’s vehicle, and a number of surveillance officers should enter the public place to
determine if the subject meets with anyone to make an exchange. As previously mentioned,
the surveillance officers should try to identify the second subject and determine if any type
of exchange occurred. It is important to have adequate surveillance units on the subject’s
parked vehicle in case the subject suddenly returns to his vehicle and quickly departs. Some
very sophisticated criminals like to use decoys during the critical phases of their drug-deal-
ing activities. This usually involves a criminal associate or unwitting subject driving the
main target vehicle or a similar decoy vehicle prior to the drug transaction. As a result, the
surveillance units mistakenly follow the wrong vehicle from the surveillance area, and the
correct target drives off in another direction free of surveillance to do a drug transaction.
The surveillance team needs to be alert at all times and take nothing for granted during
an active surveillance. If there is any doubt about the correct target vehicle and occupants,
the surveillance team should visually verify that they are following the correct vehicle.
Additionally, these drug criminals have been known to utilize surveillance detection meth-
ods or evasive tactics such as driving the wrong way down a one-way street, driving down
a dead-end street or alley, suddenly stopping in the street, conducting erratic U-turns, or
simply pulling over on the shoulder of the highway at night and turning their lights out.
The surveillance team members should be aware of all of the detection and evasive meth-
ods used by the drug violators and plan accordingly; however, they must not automatically
assume that all detection and evasive actions by the bad guys are indications that the sur-
veillance has been compromised or burned. Some seasoned drug dealers routinely, almost
out of habit, drive erratically and evasively due to their constant state of paranoia. If the
covert surveillance team is certain that they have been compromised, though, then the
surveillance operation must be terminated and continued at a later time.
Narcotics Investigation ◾ 287
INFORMANTS
There is an old adage in the world of narcotics investigation that informants can be your
greatest investigative asset as well as your greatest liability nightmare. This adage should
be remembered and not forgotten when working with informants. The term informant can
be construed as a derogatory term when used in the presence of an informant. It is recom-
mended to avoid using such derogatory terms when in the presence of an informant, as
doing so could be a sign of disrespect and could hamper the ability of the controlling law
enforcement personnel to maintain a professional relationship. For these reasons, an infor-
mant is often referred to as a confidential informant (CI) or a confidential source (CS). A CI
or CS is an individual operating under the specific direction of law enforcement authority
with or without the expectation of compensation.
Narcotics Investigation ◾ 289
first and foremost always try to determine the motivation, reliability, and intelligence level
of an informant; the informant’s source of knowledge about the criminal activity; and any
personal interests. In addition, drug investigators should try to determine if the informant
has direct or indirect knowledge of the illegal activity, has a personal vendetta involving
the drug violator, was ever previously an informant, or previously falsified information.
This is not an all-inclusive list, but it does cover some of the major points that investigators
must address with potential informants. The past reliability of the informant or prospec-
tive informant is very important for the controlling investigator to determine. If the person
has a poor track record with another department or agency and has provided false or mis-
leading information, it might be advisable not to establish the person as an informant. The
controlling officer or agent needs to try to verify all of the important drug-related infor-
mation that the potential informant provides and carefully document the facts. In dealing
with informants, the drug investigator should be truthful, fair, tactful, and confident, and
most importantly he must maintain control. The documented informant needs to be aware
of the fact that he may be required to testify in court, although all lawful means will be
used to protect the informant’s confidentiality. If the controlling investigator cannot con-
trol the actions of the informant, serious problems can arise and the entire investigation
could be compromised. Control is very important, and the controlling investigator must
establish control early on in the relationship. A rogue informant can be the investigator’s
worst nightmare. This is where experience dealing with informants becomes important in
avoiding some of the problem areas.
When interviewing or dealing with a prospective informant, it is advisable to always
have at least two law enforcement agents or officers present. Once the informant is estab-
lished, he should always be able to contact at least two controlling officers. The controlling
agent or officer should never meet an informant alone. All contact with the informant
involving establishment, debriefing, and use should be conducted in strict confidential-
ity. All the information concerning the informant should be on a need-to-know basis,
and all documents and reports concerning the informant’s identity should be kept in a
secured, limited-access location. Failure to provide confidentiality regarding the infor-
mant’s identity and status might result in death, injury, or intimidation of the informant
and the informant’s family. The informant should be advised not to violate any criminal
law in furtherance of gathering intelligence information or providing services to the law
enforcement agency. In addition, informants should have no official status, implied or oth-
erwise, as law enforcement officers or employees. Meetings with the informant outside the
office should be in neutral or low-profile locations. The duration of relationships between
controlling law enforcement officials and informants can be a matter of weeks, months,
or even years. This process can create a bonding relationship that may lead to the loss of
objectivity if a number of safeguards are not followed. It is a good practice to document
all procedures and agreements involving informants or confidential sources with a law
enforcement witness and supervisory concurrence.
Prior to establishment of a confidential source, a detailed CS debriefing report, crimi-
nal history checks, CS statement, fingerprints, photographs, and CS agreement should be
completed. It is always important to verify the true identity of your prospective CS before
Narcotics Investigation ◾ 291
about drug violators or their close criminal associates. These subjects can provide the nar-
cotics investigator with vital inside information on a drug organization by detailing and
describing the clandestine smuggling/transportation methods, load vehicles, storage facil-
ities, distribution locations, and command/control structure.
The element of trust with the informant is very important and must be established prior
to any field operational activity. Trust is usually developed over a period of time in small
incremental steps; therefore, the investigator must convince the informant of the impor-
tance of trust and the benefits of cooperation. Once the CS is convinced to cooperate, the
investigator needs to establish the ground rules for the informant’s cooperation. The confi-
dentiality of informants is always a main concern for the informant as well as the control-
ling agent or officer. The ability to protect the identity and safety of the informant is a major
determining factor in the informant’s cooperation.
In summary, the investigator needs to identify the potential informant, obtain the infor-
mant’s cooperation, establish the informant, develop the informant for maximum perfor-
mance, maintain the confidentiality of the informant, utilize the informant to maintain
credibility, and, most importantly, control the informant. The controlling agent or officer
should always be honest, respectful, and ethical when dealing with informants.
UNDERCOVER
Most successful narcotics investigations rely on undercover (U/C) operations to obtain vital
intelligence, conduct seizures involving drug-related assets, and arrest drug violators. The
undercover process is an investigative technique that has been extremely successful over the
years in narcotics law enforcement operations. Undercover work is a complicated form of
drug investigation in which the investigator assumes the role of another person to obtain
information on the drug-related activities of the drug traffickers. As a result, the U/C agent
or officer can glean considerable intelligence information, not only about the individual drug
trafficker but also about the entire drug distribution organization. Such information includes
sources of supply, locations of major stash houses, distribution methods, key distributors,
quantities and quality of drugs, drug-related assets, smuggling routes, load vehicles, and
security measures utilized by the drug traffickers. There is no limit to the amount of vital
intelligence information an experienced U/C agent or officer can develop, once accepted by
the criminal element. Being accepted by the criminal element, though, is the hard part, and
it requires skill and knowledge of the inner workings of the criminal element.
The extent of the U/C process in part is related to the scope and magnitude of the crimi-
nal element under investigation. Obviously, it would make no sense to conduct a massive
extended U/C drug investigation on a small street dealer unless intelligence information
connected the street dealer to a much larger scale drug distributor or organization. Thus,
the scope of a particular U/C assignment often depends on how significant and connected
the drug violator is. The U/C process is often used when all other traditional investigative
avenues have failed to produce results. If done correctly, the U/C investigative process can
reduce investigative manhours and expenses during a drug investigation. The U/C pro-
cess should be well thought out in advance by all of the law enforcement participants. The
Narcotics Investigation ◾ 293
length of time involved in the U/C operation, the potential end results, the complexity of
the criminal organization, the propensity for violence of the drug violators, and the dif-
ficulty of introducing an undercover agent or officer to the criminal targets should all be
considered in the initial planning phases of the investigation.
The prospective U/C agent or officer should first and foremost want to do the U/C
assignment. It is not advisable to pressure anyone into an U/C role. The success rate in
an U/C assignment in part depends on the desire and motivation of the individual agent
or officer. Undercover personnel must have self-confidence, adaptability, patience, good
temperament, fortitude, and courage. In many cases, all of these qualities will be needed to
successfully accomplish the U/C assignment. The U/C agent or officer needs to be a quick
study at times and should be able to think quickly in potentially dangerous situations.
The ability to remain cool, calm, and collected is essential in any U/C assignment. There
is a degree of excitement and adventure in undercover work, but it can also be very stress-
ful and dangerous; therefore, the undercover agent’s supervisor should first evaluate the
strengths and weaknesses of any potential U/C investigator to determine if the individual
is suited for the U/C assignment. When assessing the suitability for an U/C assignment,
the stability and overall maturity of the agent or officer must be considered, along with any
special skills and talents. It would be dangerous and foolish for any supervisor to do other-
wise. In reality, a successful U/C investigator should have a high degree of dramatic profi-
ciency and a good working knowledge of the criminal world of drug dealers to successfully
play the role of a criminal drug trafficker. In essence, the U/C investigator is an actor in
a real life drama, on the dangerous and deadly stage of reality in the often violent world
of drug dealers. The U/C investigator needs to carefully study the script (the assignment),
determine the background story, assume an identity, obtain intelligence information on
the violator, and establish a method to contact the target. All of this should be completed
prior to any contact with the intended target.
Criminals involved in drug dealing are by nature extremely secretive, suspicious, and
paranoid. As a result, it may be extremely difficult for the U/C investigator to make con-
tact with the intended criminal target. Many times, law enforcement authorities utilize
an informant to set up an U/C introduction. The informant does not have to know that
the individual to be introduced to the target is a U/C operative. The other option is to use
a documented informant. Obviously, the utilization of a previously reliable documented
informant would be a better approach, because of the control and reliability factors. In
most cases, if the informant has a trusting relationship with the target and vouches for the
U/C investigator, the target will accept and be willing to do business with that person. If no
informants are available, another possible approach would be for the U/C investigator to
frequent places the target is known to visit in an attempt to contact the target under a ruse.
This procedure requires considerable experience, a little luck, and a lot of careful planning.
It is known as a cold hit and is more difficult to execute. It is usually done as a last-ditch
effort when all previous attempts have failed.
The higher the level of drug violator, the more preparation and effort should be exer-
cised. The propensity for violence should always be a critical factor in evaluating the under-
cover initiative, regardless of the amount of drugs being distributed. First and foremost,
294 ◾ Donald F. Vespa
the safety of the U/C operative should be paramount in any U/C operation. The U/C inves-
tigator should try to learn as much about the target suspect as possible, including character,
criminal history, history of violence, business assets, hobbies, likes and dislikes, girlfriends,
favorite hangouts, and criminal associates. The more knowledge the U/C investigator has
about the target, the better the agent will be equipped to deal with unexpected develop-
ments that may pop up. The other major concern is to establish a fictitious background
and corresponding personal history for the U/C investigator that will pass scrutiny from
a canny drug violator. The cover story and fictitious identity should have some element of
truth to make them believable. If the cover story indicates that the U/C investigator is from
Chicago, then it would be advisable for the agent to be familiar with that particular city
and able to discuss various aspects of the area with the target. If the U/C investigator is
going undercover as a laborer, it would be advisable for the agent to have some direct expe-
rience in that field of employment in case the target questions the agent about his skills.
The role should fit the investigator’s personality, physical characteristics, and background
experience. Race, sex, language, dialect, mannerism, type of clothing, and drug knowledge
can all be important factors contributing to whether or not the U/C investigator will be
accepted and successful in the assignment.
Normally, the cover story does not need to be too lengthy or elaborate. In fact, it is bet-
ter to keep the cover story short and simple. The less information the U/C investigator has
to remember, the less chance of making a mistake in a stressful situation. In some shorter
investigations, the background story may involve only a few simple facts. In other cases,
if the assignment could potentially develop into a long-term investigation that requires
close association with the criminal target, the cover story should be carefully planned and
include specific detailed information, methods of verification, and documentary support
evidence. In addition, if the U/C investigator utilizes a documented informant, the agent
and the informant need to carefully rehearse the cover story prior to contact with the
intended target (e.g., when and where they met, how long they have known each other).
Often, the criminal target will subtly interrogate the informant and U/C investigator to
check for any discrepancies in the cover story; therefore, it is very critical for the investiga-
tor and informant to be on the same page when meeting with the target. The informant
literally holds the life of the U/C investigator in his or her hands.
A good informant can save time, money, and effort in making a solid contact with the
target drug violator; yet, a simple mistake made by an informant can also endanger the
entire operation. In order not to compromise the cover story, U/C investigators should
remove all evidence of their law enforcement status prior to contacting criminal targets.
This includes removing all traces of law enforcement equipment from the investigator’s
vehicle. A search of the investigator’s vehicle should always be made prior to the under-
cover meet. This also applies to any alternative meet locations, such as motel rooms, apart-
ments, or residences. A criminal target or associate may actually do a cursory search of a
motel room, apartment, or residence before discussing business.
If the U/C investigator is planning on contacting the target through the use of a docu-
mented informant (CS), it would be advisable to understand the informant’s motivation
and prior reliability. The cover story is only as strong as its weakest link, and in many cases
Narcotics Investigation ◾ 295
the weakest link is the informant. All bases must be covered with the informant prior to
the U/C meeting. Informants must be advised on legal entrapment issues and made aware
of the fact that they may be required to testify in a court of law in the case. Any U/C inves-
tigator who feels uncomfortable or uncertain about the motivation or sincerity of an infor-
mant should make those concerns known to their supervisors prior to the operation. All
concerns involving the safety and security of the entire U/C operation need to be addressed
prior to initiation of the field operation. Once all of the preliminary target intelligence
information, cover story, and U/C background history are developed, it is time to make
plans for an undercover meeting with the intended target.
UNDERCOVER PURCHASE
The undercover purchase of narcotics is one of the most complex and dangerous activities
encountered by law enforcement authorities in today’s violent world of drug trafficking;
therefore, it is very important for law enforcement authorities to take all the necessary
precautions and safety measures into consideration when planning and implementing an
operational safety plan involving an undercover meeting or purchase. The U/C meeting is
between the U/C investigator and the suspect for the purposes of negotiating the future
sale of an illegal substance.
At the meeting, the quantity of narcotics, purchase price, and location of the narcotics
transaction are usually discussed. The U/C investigator must try to establish some control
over the terms of the future U/C purchase. The investigator must play the role of a criminal,
and in essence think like a criminal when negotiating with the target. If the investigator
is too easy and agrees to the initial sale price without a little haggling, a wise drug dealer
will become suspicious. The price, amount, and location of the drug transaction are always
negotiable. In the initial undercover meeting, much can be learned about the suspect from
surveillance such as additional addresses, vehicles, potential stash houses, and criminal
associates. In an undercover purchase, illegal narcotics are purchased from a known sus-
pect or target by either an undercover agent or officer or a documented informant (CS). For
prosecution purposes it is always better to have an undercover investigator purchasing the
drugs than a CS. The credibility of the CS is always a concern in court; however, in many
cases this is not possible so a CS is utilized to make the controlled undercover purchase. In
essence, purchases made by a CS and those made by an undercover investigator are similar,
but with a few exceptions. First and foremost, the CS must always be thoroughly searched
along with his vehicle prior to the U/C purchase and subsequent to the U/C purchase. In
addition, surveillance should always be maintained on the CS from the beginning to the
completion of the transaction. This should all be documented in the relevant case reports.
Regardless of who makes the undercover purchase, all of the necessary security and safety
precautions need to be taken.
The two basic scenarios in an undercover purchase are the buy–walk and the buy–bust.
In a buy–walk, the suspect or target is arrested at a later date after selling illegal drugs to
the undercover. One obvious advantage of this is the fact that the identity of the under-
cover investigator or CS is not compromised at the time of arrest, and surveillance is
296 ◾ Donald F. Vespa
maintained on the target to obtain additional information about the target. Several small
undercover buy–walk purchases may be made before the target is arrested. This process
usually helps build a stronger criminal case and results in a larger quantity of drugs being
seized.
In a buy–bust, the target is arrested at the time of the narcotics sale. The location and
manner in which the target is arrested should be carefully planned. Crossfire issues, offi-
cer safety, and public safety should all be addressed in the operational safety plan. One
advantage in this scenario is the fact that the undercover investigator does not have to
give up the buy money. There are several other advantages and disadvantages, depend-
ing on the particular case and the law enforcement resources available. A small police
department that has a limited budget for the U/C purchases of narcotics is limited in
the amount, type, and quantity of illegal drugs it can purchase. In addition, the limited
resources may hamper the drug investigator’s use of a flash roll, which is money shown to
the drug dealer to convince the dealer to make the drug sale. Whenever a flash roll is to be
used, extreme caution should be exercised to prevent theft of the money by the criminal
element. The flash-roll should always be a surprise to the drug trafficker to reduce the risk
of such rip-offs. Once the money is shown, it should be removed quickly to an undisclosed
secure location.
There are some basic guidelines in narcotics work that are not set in concrete but would
be wise to follow. One of these is never front the buy money to the drug dealer; in other
words, do not give the drug dealer your money before you receive the drugs. This is a
bad idea for many reasons; for example, you may lose the money and you may never see
the drug dealer again. It is important to make a list or to photocopy the buy money and
include it in the case file. This provides a way to identify the money at a later date. It is also
a wise practice not to travel with the drug dealer to get the drugs. This raises major safety
concerns for the surveillance cover team and should be avoided whenever possible. It is
also a good practice not to do the drug deal in a location that is difficult for the surveil-
lance cover team to observe or reach in case there is a safety problem; for example, inside
a heavily fortified crack house with burglar bars and reinforced steel doors would not be
a good choice.
The safety and security of the U/C investigator should always be the highest priority in
an undercover operation. It is no secret that law enforcement personnel have been killed
during robberies or rip-offs by violent drug dealers. This is the reason why the undercover
investigator should carefully scrutinize the suspect’s criminal background and potential
for violence, such as robbery, assault, or murder. The drug dealer’s level of drug distribution
is also very important to analyze before an undercover transaction occurs to minimize the
chance of the undercover investigator purchasing sham or “turkey dope.” If the intelligence
information and criminal history indicate that the targeted suspect only deals in ounces of
cocaine and the informant indicates the suspect wants to sell several kilograms of cocaine
for a great price, the warning signs should be flashing in big red letters for a potential
rip-off. It is very important to do your investigative homework on the background of the
suspected drug trafficker and establish whether or not the individual is a bona fide drug
dealer or simply someone trying to pull a rip-off.
Narcotics Investigation ◾ 297
corresponding radio call signs, cell phone numbers, vehicle descriptions, and assignment
should also be included in the plan. It is also a good practice to include the name, address,
and phone number of the closest hospital or trauma unit in case there is a medical emer-
gency. Also, the police jurisdictions involved should be indicated in the plan; because a
drug deal can overlap various police jurisdictions, it is a good practice to coordinate your
law enforcement activities.
Finally, a checklist at the end of the operational safety plan should include the following
items: operational plan provided to communication center, communications check, cross-
check, portable radios, body wire receiver check, surveillance assignments, entry tools,
raid jackets/protective gear, and operational safety briefing. It is good practice to perform
a cross-check with other law enforcement departments and agencies to determine if they
are running any U/C operations in the area. It would be very embarrassing and dangerous
for all parties if the U/C buy unknowingly involved two law enforcement departments or
agencies.
Subsequent to the U/C purchase at a predetermined location, the U/C investigator should
meet with other members of the surveillance team and the field supervisor to secure the
drug evidence, perform a field test on the drug evidence, and obtain a quick briefing from
the U/C investigator on pertinent details of the transaction. This is always a good idea,
especially if the body-wire transmitter was malfunctioning and time-sensitive informa-
tion must be acted on. It is also advisable for surveillance to be maintained on the suspect
target after the U/C drug transaction in order to determine where the suspect travels. It is
not unusual for the suspect to “trip” with the buy money to the drug supplier or a “stash”
house where money and drugs are kept. It is always a good practice in drug-related investi-
gations to follow the money. This will ultimately lead to the next level in the drug distribu-
tion hierarchy.
A thorough debriefing of all the participants involved in the U/C operation should be
conducted after the operation has been completed. This can be a very productive time in
the investigative process, because many of the pieces of the puzzle involving the prior U/C
purchase can be gathered from all of the participating members. As a result, a complete
picture of the transpired U/C event emerges. The documented times of individual observa-
tions and what was observed are crucial in preparing an accurate and detailed surveillance
report to corroborate the U/C purchase. Descriptions of people, vehicles, and events con-
nected to the U/C deal are also very important, along with any surveillance photographs or
video evidence. Any U/C tape recording of the drug transaction is a key piece of evidence
and should be properly labeled, dated, and marked as evidence with an exhibit number.
All evidence obtained should be clearly marked, labeled, and witnessed prior to submis-
sion to the evidence custodian. The evidence should always be documented in an acquisition
report to indicate who acquired the evidence, where it was acquired, and who witnessed
the acquisition. There should always be a paper trail or chain of custody for the evidence,
and all the necessary documentation should be included in the investigative case file. The
U/C report should also document the U/C purchase and provide the necessary facts sur-
rounding the drug purchase. This should reflect the type and quantity of drug purchased,
the location, and total price paid for the drug, along with the identity of the seller. It is also
Narcotics Investigation ◾ 299
advisable to document the fact that a presumptive drug field test was conducted on the
illicit drug and indicate the results in the relevant investigative report. Accurate and con-
cise documentation is very important in any narcotics investigation. All of the hard work
and long hours in the field can be worthless unless proper documentation is generated to
memorialize the events, activities, and enforcement actions in the field.
Cybercrime
Mark R. McCoy
University of Central Oklahoma
CHAPTER OBJECTIVES
After reading this chapter, you should be able to do the following:
1. Describe the nature of cybercrime and the various types of offenses committed
in cyberspace.
2. Define cybercrime.
3. Explain the various roles digital devices play in cybercrimes.
4. Understand the different profiles of cybercrime offenders.
5. Comprehend the unique legal aspects of cybercrime investigations.
6. Explain how to collect evidence and preserve digital evidence.
7. Describe the key aspects of a cybercrime investigation.
Chapter Outline
• Introduction to Cybercrime
• Cybercrime Classifications
• Cybercrime Offenders
• The Digital Crime Scene
INTRODUCTION TO CYBERCRIME
Changes in technology have resulted in corresponding changes in the way crime is com-
mitted. Computer crime was rare 30 years ago, but rapid advances in technology, the advent
of the personal computer, and easy access to the Internet have changed the way crimes are
committed and thus the way they are investigated. People use computers and handheld
digital devices every day to read e-mail, access the news, prepare reports, communicate with
each other, analyze data, or prepare graphic information. Access to the Internet is becoming
more accessible due to open Wi-Fi hotspots and easy access to broadband services. The U.S.
301
302 ◾ Mark R. McCoy
Census Bureau reported that in 2007 61.7% of households had Internet access, and of those
50.8% of the access was by means of high-speed broadband connections. The development
and growing popularity of affordable personal computers, netbooks, smart phones, and
tablet computers are presenting law enforcement with the growing challenge of computer
crime and abuse. The use of computer systems for all types of activities, both business and
personal, continues to grow, and the intricacy of these systems and our growing reliance on
them are increasing the risk of organizations having their systems compromised by both
intentional and unintentional acts (Haugen and Selin, 1999). Computer crime is a global law
enforcement problem. Domestic attempts to address the problem are insufficient because
cyberspace itself has no geographic or political boundaries. Countless computer systems
can be simply and surreptitiously accessed through the global telecommunications network
from anywhere in the world (Power, 2000). Today, terrorists and everyday criminals have
the aptitude to detonate explosives in another country by means of computers, to bounce
radio signals off satellites, and to disrupt computer systems controlling a country’s infra-
structure. Because the emerging information superhighway is without borders, computer
malware and other destructive programs can be targeted at businesses or government orga-
nizations from anywhere in the world (Gene, 1995). No state possesses defensible borders
when the threat is related to high technology, telecommunications, and cyberspace. The 21st
century will bring greater technological innovation, as well as a legal and law enforcement
community desperately battling to stay ahead of the cyberspace criminal (Krauss, 1997).
DEFINITION OF CYBERCRIME
It is difficult, at best, to come to an agreement about the definition of cybercrime. State and
federal criminal statutes differ in how computer crime is defined. Britz (2004) provided
some guidance: “Computer crime has been traditionally defined as any criminal act com-
mitted via computer. Cybercrime has traditionally encompassed abuses and misuses of
computer systems which result in direct and/or concomitant losses” (p. 4). For the purposes
of this chapter, we will define cybercrime as encompassing both of these definitions.
track traditional computer crimes or those involving the Internet and computer networks.
Law enforcement officials indicate that, from their experience, recorded computer crime
statistics do not represent the actual number of offenses. Experience shows that the use of
sophisticated technology can actually be used to conceal a computer crime. The massive
but compact storage potential of computers and the speed at which computers function
ensure that computer crime is very difficult to detect, thus making it equally difficult to
investigate. Investigators often do not have sufficient training to deal with crimes commit-
ted using computers or computer networks even if they involve a traditional offense such as
fraud or threats. Many victims do not have a contingency plan for responding to incidents
of computer crime, and they may even fail to acknowledge that a security problem exists,
thus causing an underreporting of offenses.
CYBERCRIME CLASSIFICATIONS
COMPUTER AS TARGET OF CRIME
When the computer is the target, the intent of the offender is either to take information from
the computer or to intentionally damage hardware, programs, or data files. Either way the
offender must obtain unauthorized access to stored data using a network intrusion (hacking
or cracking), social engineering, or unauthorized direct access to the computer. According
to Carter and Katz (1997), these types of offenses may include the theft of intellectual prop-
erty, the destruction of data, or the unlawful access to or tampering with personal, business,
or government records. A national study of corporate security directors was conducted to
discover the degree to which they were affected by computer crime and to identify some
of the critical issues that will most likely be facing policymakers in the future. The survey
found that theft was the fastest growing computer-related crime. Respondents reported that
thieves most frequently targeted intellectual property, including such things as new product
plans, new product descriptions, research, marketing plans, prospective customer lists, and
similar information. When unauthorized access to computer networks and computers has
been discovered, it is sometimes difficult to ascertain whether a law was broken, a company
policy violated, or an ethical standard breached, or if the behavior simply stemmed from
poor judgment (Carter and Katz, 1997). Techno vandalism is another form of computer
crime that targets computers. It occurs when the unauthorized access of a computer results
in damage to files or programs. Much of the techno vandalism is performed for the challenge
and bragging rights rather than for profit. In these cases, the damage or loss may be either
intentional or accidental (Parker, 1998). Another area involving computers as the target of
crime is “hactivism.” This is the practice of hacking into the website of a person, group, gov-
ernment, organization, or business to advocate some particular cause or political agenda.
On February 7, 2000, the website of Yahoo!® was subjected to a hactivist attack that removed
the site from the Internet for several hours. It was a wakeup call for everyone to discover
that a website as prominent as Yahoo! could be breached and taken offline. Investigators
are going to face many new and highly technical challenges when called upon to investigate
crimes in which a computer or computer network is the target of the criminal activity.
304 ◾ Mark R. McCoy
Some of the most common types of investigations involving cybercrime are those in which
the computer or some other digital device is used as an instrument to commit a crime.
In these cases, the digital device can be used as either an extremely sophisticated tool or
as a potentially devastating weapon. Crimes in this category include the fraudulent use
of automated teller machine (ATM) cards and accounts, conversion or transfer of bank
accounts, credit card fraud, fraud via computer transactions, and telecommunications
fraud. Computer-instrumental crimes depend on computers or digital devices. The Salami
technique, one of the most well-known types of such crimes, allows computer criminals
to take advantage of the small sums that are gained when thousands of transactions are
rounded up or down and then diverting fractions of a cent on each transaction. Over
time and many transactions, a large amount of money can be diverted to other accounts.
An example of this technique appeared in the Superman III (1983) movie when Richard
Pryor’s character, Gus Gorman, diverted small amounts of money so he could purchase an
expensive car.
Theft of service is another example of this type of computer crime. Violators commonly
justify theft of service by asserting that they do no harm because they use only the available
capacity and do not deprive legitimate users. Kevin Mitnick is a criminal hacker who was
able to obtain access to computer and telephone systems, using services and stealing data
at will. His history of computer fraud began when he was a high-school student and broke
into his school district’s computers. His actions eventually escalated to systematic software
theft, attacks on Internet service providers, hacks into business and educational institution
computers, and the theft of 20,000 credit card numbers over a 2-year period. Eventually,
with the help of a computer expert from Stanford University, Mitnick was caught and pled
guilty to computer and wire fraud. He was sentenced to 5 years in federal prison; upon his
release, he was prohibited from using a computer for the final 6 months of his probation
(Brenner, 2010).
The anonymity of the Internet has given rise to the need to investigate online fraud.
Cases include online auction fraud, credit card fraud, and securities fraud. Professional
thieves obtain credit cards via fake applications or by electronic theft and pass them around
among their peers for profit. These types of investigations are commonplace due to the
growing number of people conducting business on the Internet.
Stalking and the sexual exploitation of children have also been on the increase since
the advent of personal computers. Possibly the most disturbing of these criminals are
pedophiles who surf computer bulletin boards and chat rooms in search of children.
Using chat and e-mail, they develop a cyberspace relationship and then seek to meet the
child in person to pursue their sexual intentions. Already recognized as a serious prob-
lem, cyberstalking has produced a number of high-profile cases, such as the Megan Meir
case in 2006. Megan, a 13-year-old from Missouri, met who she assumed to be a 16-year-
old boy online. Megan and this boy became close online friends; he flattered Megan and
showered her with compliments. The boy was actually the creation of the mother of one
Cybercrime ◾ 305
of Megan’s friends and another adult. The flattery turned to taunts and insults, leading
to Megan hanging herself in her bedroom closet. Megan’s story is become all too com-
mon, and law enforcement is being tasked with investigating all types of harassment and
threats in cyberspace.
CYBERCRIME OFFENDERS
The advent of cybercrime has created a new type of criminal offender. In the 1970s, perpe-
trators generally were computer specialists: programmers, computer operators, data entry
personnel, system analysts, and computer managers or insiders. They were the only ones
who knew how to operate and use the technology, and they were the only ones able to gain
physical access to computer systems. In the 1980s, the type and frequency of high-technology
crime changed due to advancements in personal computers and telecommunication and the
advent of the Internet. External threats grew. Most information system security professionals
placed the threats to computer systems at approximately 80% internal and 20% external. Into
the 21st century, international crime and fraud developed and will continue to do so because
of increased international networking. Threats to computer systems will come increasingly
from the outside, committed by offenders across the country or around the world (Kovacich
and Boni, 2000). Parker (1998) described two types of computer criminals: outside hack-
ers, who attack others’ computers for pleasure, challenge, curiosity, or educational experi-
ence; and computer technology insiders, who are presumably motivated by greed. Threats to
information systems range from juvenile delinquents playing pranks to cruel hackers, white-
collar criminals, career criminals, members of organized gangs, and terrorists. Successful
computer criminals in many ways do not resemble the stereotype of criminals.
Cybercrime ◾ 307
INSIDERS
Insiders still represent the most serious threat, and the highest risks are from the employ-
ees of a business or a government agency. These individuals have access to the physical
and intellectual property of their employers. Furthermore, they are trusted and have the
authority to gain access to many sensitive areas and sensitive information. When conduct-
ing a criminal investigation involving a computer-related crime, the investigation should
look closely at those inside the organization who have access to the computer systems. The
Computer Security Institute (CSI, 2009) reported that as much as 25% of the losses suf-
fered by businesses were due to insiders. Investigators should look to those on the inside
who have motive and opportunity to commit crimes against their employers. Security per-
sonnel are on the defensive frontline against high-technology crime, so they know where
security may be weakest and they know the security controls in place in all areas of the
business. Accountants and financial personnel have access to automated financial accounts
and financial analyses of the business that could be used for financial gain. Management
personnel generally have more access authority and can sometimes cover their crimes
from their position of power in the organization. Some possible motives for insider crime
could be financial gain, revenge, the challenge of getting away with it, or curiosity. Insiders
rationalize committing these crimes because they feel underpaid, they have been denied
a deserved promotion, or their work has gone unrecognized. In many cases, the victim
organization provides the opportunity to commit the crime because they lack audit trails,
access control systems, separation of duties, or methods of accountability.
OUTSIDERS
Following are six profiles of outsiders who commit computer-related crime (Parker, 1998):
1. Pranksters exploit others’ computer systems to gain the use of a more powerful
computer, gain respect from fellow hackers, build a reputation, or gain acceptance
as an expert without a formal education.
2. Malicious hackers, also called crackers, exploit computers systems with the intent
of causing loss or destruction to satisfy some antisocial motive.
3. Personal problem solvers often cause serious loss in their pursuit of a solution to
their own personal problems. They believe that the victim is rich enough to afford
the loss and would not miss what is taken or used.
4. Career criminals earn part or all of their income from crime; they use computers
and exploit computer systems for financial gain.
5. Extreme advocates are known to have strong social, political, and religious views,
and they intend to change a world situation by engaging in crime. Terrorist activ-
ity on the Internet fits into this category.
6. Malcontents, addicts, and irrational and incompetent people run the gamut from
the mentally ill, to drug or alcohol addicts, to those wishing to gain the attention
of others, to the criminally negligent.
308 ◾ Mark R. McCoy
External criminal hackers are one of the biggest challenges facing security personnel,
computer crime investigators, and law enforcement professionals today. Initially, hackers
were simply considered to be intelligent kids who experimented with computers, but even-
tually the term began to be used, incorrectly, to refer to those who illegally accessed com-
puters for their personal pleasure, vandalism, or criminal purposes (Steven, 1984).
Hackers can be categorized as the curious, the meddlers, and the criminals (Kovacich,
1994). The curious break into computers to learn more about them and do not mean to
cause harm to the computer system, although they sometimes do. They are the computer
trespassers. The meddlers break into computers because they are interested in the chal-
lenge of breaking in and looking for weaknesses in the system. They will brag about their
accomplishments to others in online chat rooms. These criminals break into computers to
commit a crime for personal gain, to destroy or steal information, or to damage system files.
Computer crackers choose their victims for different reasons, use a variety of methods of
approach and attack, and exhibit different needs and intents. Former employees break into
computers to damage them in retaliation for some perceived wrong. Technically proficient
individuals break into opportune targets to feel more powerful. Thieves and spies break
into computers to obtain valuable information. Malicious individuals break into medical
databases to, for example, change prescriptions such that an intended victim will overdose.
These types of criminals are becoming more prevalent and are creating a need for skilled
investigators equipped with procedures and tools to help them collect, process, and inter-
pret digital evidence (Casey et al., 1994).
1. Many types of crime involve digital evidence. Computers, cell phones, personal
digital assistants, and other digital devices play a part in all types of crimes, from
violent crimes against persons to the traditional cybercrimes.
2. Every crime scene is a digital evidence crimes scene. Crime scene investigators
should always be alert to the possibility of digital evidence being present at a crime
scene.
3. Digital evidence can be fragile. This type of evidence must be handled with great
care to avoid altering or destroying evidence inadvertently. If not handled properly,
heat, cold, and magnetic fields can destroy evidence, as can dropping a device.
Cybercrime ◾ 309
LEGAL CONSIDERATIONS
Like other traditional crime scenes, the investigator must have the legal authority to con-
duct a search and seize evidence at a cybercrime scene; however, there are other legal con-
siderations when planning a cybercrime scene search. The Electronic Communications
Privacy Act (ECPA) of 1986 provides statutory procedures for intercepting wire, oral, and
electronic communications. It provides protection to stored communications, such as
e-mail stored on Internet service provider servers. Law enforcement conducting investiga-
tions in which there may be a need to intercept electronic communications or read e-mail
that has not been delivered to its intended recipient must obtain additional legal authority.
Also, the earlier Privacy Protection Act of 1980 (PPA) made it unlawful for local, state, or
310 ◾ Mark R. McCoy
federal law enforcement to search or seize materials that may be publishable. The Act pro-
tects the work product of individual author’s manuscripts, written conclusions, opinions,
and theories of the creating author. Law enforcement should carefully consider if the PPA
applies in cases where they may be searching and seizing documents of authors, publish-
ers, newspapers, or other individuals who may be involved in the publication of these types
of materials. The PPA does not apply to items considered to be contraband, such as child
pornography (Britz, 2004).
BIBLIOGRAPHY
Brenner, S.W. (2010). Cybercrime: Criminal Threats from Cyberspace. Santa Barbara, CA: Praeger.
Britz, M.T. (2004). Computer Forensics and Cyber Crime: An Introduction. Piscataway, NJ: Pearson
Education.
Carter, L. and Katz, J. (1997). Computer Crime: An Emerging Challenge for Law Enforcement. FBI
Law Enforcement Bulletin, 65(12):1–8.
Casey, E., Brandl, S.G., and Frank, J. (1994). The Relationship Between Evidence, Detective Effort,
and the Disposition of Burglary and Robbery Investigations. American Journal of Police,
8(3):149–168.
CSI. (2009). CSI Computer Crime and Security Survey 2009. New York: Computer Security Institute
(http://gocsi.com/survey_2009).
FBI. (2007). Digital Evidence Field Guide: What Every Peace Officer Must Know, Continuing Education
Series 1.1. Washington, D.C.: Federal Bureau of Investigation (http://www.rcfl.gov/downloads/
documents/FieldGuide_sc.pdf).
Gene, S. (1995). Crime in Cyberspace: The Digital Underworld. The Futurist, 29(5):24–28.
Haugen S. and Selin J.R. (1999). Identifying and Controlling Computer Crime and Employee Fraud.
Industrial Management & Data Systems, 8:340–344.
Kovacich, G.L. (1994). Hackers: From Curiosity to Criminal. Austin, TX: Association of Certified
Fraud Examiners.
Kovacich, G.L. and Boni, W.C. (2000). High-Technology Crime Investigator’s Handbook: Working in
the Global Information Environment. Boston: Butterworth-Heineman.
Krauss, C. (1997). 8 Countries Join in an Effort to Catch Computer Criminals. The New York Times,
December, 11, p. A12.
Lange, L. (1996). Trust a Hacker Under 30? You’d Better. Electronic Engineering Times, August 19.
Parker, D.B. (1998). Fighting Computer Crime. New York: Wiley.
Power, R. (2000). Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace. Indianapolis,
IN: Que.
Shelley, L.I. (1998). Crime and Corruption in the Digital Age. Journal of International Affairs,
51(2):607–620.
Steven, L. (1984). Hackers: Heroes of the Computer Revolution. New York: Anchor Press.
Chapter 18
Gang Investigation
Gregg W. Etter
University of Central Missouri
CHAPTER OBJECTIVES
After reading this chapter, you should be able to do the following:
1. Identify cultural characteristics of gangs.
2. Identify the primary and secondary crimes that gangs commit.
3. Explain motivations for gang crimes.
4. List and describe effective gang investigation techniques.
5. Identify some effective anti-gang programs and explain how they work.
Chapter Outline
• Nature of the Gang Problem
• Common Cultural Characteristics of Gangs
• Los Angeles-Based Street Gangs
• Chicago-Based Street Gangs
• Changing Nature of Hispanic Street Gangs
• Skinheads and Other White Gangs
• Asian Gangs
• Outlaw Motorcycle Gangs
• Female Gangs
• Gang Investigation Techniques
• Anti-Gang Tactics
• Anti-Gang Legislation
in the Five Points district of New York City. The Forty Thieves gang even had a pee-wee
gang of youngsters called the Little Forty Thieves (Asbury, 1927). Gangs are a function
of urban criminality. The street and motorcycle gangs of today have developed many of
their customs and traditions from the street gangs of yesteryear. Many of the gangs still in
operation today have existed for several decades, including outlaw motorcycle clubs, which
date back to 1946; the Folk Nation and People Nation alliances; and the Crips and Bloods.
These gangs have evolved into an almost tribal type of society. The director of the National
Gang Crime Research Center in Chicago defined a gang as (Knox, 2006):
A group is a gang when it exists for or benefits substantially from the continuing
criminal activity of its members. Some element of crime must exist as a definitive
feature of the organization for it to be classified as a gang. That need not be income-
producing crime because it could also be crime of violence.
The National Youth Gang Center estimates that there were approximately 778,000
gang members and 27,000 gangs active in more than 3,500 jurisdictions served by
city and county law enforcement agencies in 2007.
Modern street gangs can be described as the new urban tribes. Holmes (1971) observed
that a tribe consists of a group of people who possess a common language, culture, or ter-
ritory. He also noted that bonds that hold the group together revolve around the attitudes
that the members of the tribe hold toward each other and the behavior patterns of coopera-
tion and mutual assistance that act as a tangible demonstration of those attitudes. Thus,
tribes work toward a common self-interest.
Criminals combine themselves into self-affiliated tribal structures to help them conduct
their criminal enterprises and to avoid the police (Etter, 1998). These groups exhibit all
of the characteristics of tribalism when reacting to their environment and governmen-
tal control of the territory that they occupy (Fried, 1975). Thus, in their effort to further
their criminal enterprises and to avoid capture by the police, some criminals have banded
together into gangs. These gangs have developed over the years into the sociological phe-
nomenon that Fried (1975) described as secondary tribes.
Gangs have adopted a pseudo-warrior culture to facilitate their criminal society. In this
pseudo-warrior culture, gang members view themselves as street warriors, race warriors,
or road warriors. Violence is seen as a legitimate tactic to achieve ends, and gang members
will use violence to achieve their desired ends or goals (Elder, 1997). Objectives of violence
include: warnings, intimidation, control of turf, control of trade, control of personnel,
revenge, etc. In addition, the use of violence increases the member’s warrior status within
the gang (Etter, 1998).
Gang members can gain status for themselves by exhibiting antisocial traits. They pick
street names for themselves that enhance this violent image. Jackson and McBride (1986)
observed that
Gang Investigation ◾ 315
… a lack of self-discipline and a violent temper are unacceptable traits in the non-
gang society, but in the gang system he can turn these “liabilities” to his advantage
by letting go completely and building a reputation as a vato loco (“crazy guy”).
They further suggested that the pseudo-warrior culture practiced by gangs promotes vio-
lence and bravery by its members in support of the goals of the gang:
Similarly, the gang member knows that if he is killed by a rival gang during a fight,
he will be viewed as a fallen hero by his home boys. His name will appear for years
to come painted in gang graffiti throughout the barrio, and his exploits will be told
again until reality is forgotten and a legend created.
SELECTIVE MEMBERSHIP
One of the ways that gang members protect themselves from law enforcement is by selec-
tive membership. You can’t just run out and join an urban street gang. The fact that the
Mafia is not an equal-opportunity employer is well known (Gage, 1971). Prospective gang
members are often screened by race, sex, religion, language, ethnicity, and other cultural
factors (Asbury, 1927; Etter, 1998; Knox, 2006; Thrasher, 1936; Yablonsky, 1962). Racial and
ethnic homogeneity has become the norm among gang members (Nadel, 1996), although
this is changing somewhat in the center of the country (e.g., Omaha, NE; Davenport, IA;
Little Rock, AR; Memphis, TN), where whites and females are likely to be incorporated
into more traditional Los Angeles- or Chicago-based street gangs than they would be in
Chicago or on the coast. One of the simplest and most effective tools in this screening pro-
cess is vouching. This means that someone has to nominate someone for membership in a
gang. That member is then responsible for that person’s conduct within the gang. If that
conduct is unsatisfactory, the gang may impose negative sanctions on both the offender
and the person who proposed the offender. Language has been another screening tool, as
it offers a means of protection and a means of communication. How many police officers
speak Sicilian, Vietnamese, Chinese, Japanese, Russian, or Spanish fluently enough to con-
duct a legal interrogation under Miranda v. Arizona, much less infiltrate and be able to pass
316 ◾ Gregg W. Etter
as a member of the group? Even when officers do speak the language, gang members often
use a subdialect (e.g., Spanish speakers will use Calo or Spanglish) or street language to
confuse the issue (Jackson and McBride, 1986). The average age of gang members is tradi-
tionally believed to be 12 to 25, but some groups have admitted members as young as 7 or
8, and some older members tend to hang on.
In a gang, absolute and unquestioned loyalty to the group is demanded above all else.
This loyalty supersedes any family ties, religious beliefs, friendship ties, or other loyalties.
The gang becomes the gang member’s family and tribe. The gang members, as a group,
often have no respect for the law or fear of going to jail. Going to jail is often considered as
just the cost of doing business. Sometimes incarceration can build a member’s status in a
gang, making them a loyal veteran of the group. Jail is a good place to train gang members
in how to commit new criminal acts. Jail is also a good place to recruit new members into
the gang.
318 ◾ Gregg W. Etter
Gangs rely on oral histories to pass on the history, traditions, rules, and folklore of the gang.
This is a secure way to pass information as documents can be seized and used as evidence
of gang membership in court. Thus, the exploits of Folk Nation Disciple leader “King Larry
Hoover” are passed on mostly by word of mouth to new members of the Black Gangster
Disciples, and knowing the meaning of each point of the Folk Nation’s six-pointed star
(love, life, loyalty, wisdom, knowledge, understanding) is required of new members. The
culture of the gang is passed in this way from generation to generation.
In gangs, the use of graffiti or tagging is a time-honored tradition. Often called the news-
paper of the streets, graffiti marks turf, declares war, mourns the dead, shows disrespect for
rival gangs, sings the praises of gang members, and is used to issue challenges. Crossing out
or putting upside down another gang’s symbols or graffiti shows disrespect. Hispanic gangs
call their gang graffiti plaqueso (“places”). The slang term plaquesos is derived from the
Spanish placa, meaning a “sign” or “plaque.” When Hispanic gang members talk of writing
graffiti on a wall they refer to it as throwing a placa on the wall. It is not just graffiti. It pro-
claims to the world the status of the gang and offers a challenge to rivals. Moreover, graffiti
writing is a skill, an acquired skill, that requires a great deal of time and practice to perfect
(Jackson and McBride, 1986).
Hand signs are used by gang members for identification, intimidation, challenges, and
general communication. Whenever a gang member flashes a hand sign at a person, he
in effect is saying, “Here’s who I am. Who are you?” Los Angeles-based gang members
talk of throwing a sign, while Chicago-based gang members speak of representing. Hand
signs provide a definite statement as to the identity and often intentions of gang members;
for example, when a witness is testifying in court during the trial of a gang member, a
gang member flashing a hand sign could be considered an act of intimidation toward that
witness.
Language is used to exclude non-members of the group. Most police do not speak
Spanish, Sicilian, or Vietnamese, for example, fluently enough to understand what is going
on. Slang or street language is liberally inserted into conversations to exclude those who
would not understand. The use of street names or aliases is common, as is the use of code
in communications, drug tallies, and other communications.
Gang members are Internet savvy, and many of the gangs now have websites. These
websites are used as a means of communication and require password access to some areas
of the website. They are also used as a means of recruitment, and interested parties can
inquire about gang activities. They are graffiti in an electronic format. Gang members
also make extensive usage of cellular communications. Texting is prevalent. Prepaid cell
phones are popular because they are almost untraceable and are thrown away after a par-
ticular time period.
320 ◾ Gregg W. Etter
Thus, the crimes of drug trafficking, prostitution, weapons dealing, gambling, theft/fenc-
ing, extortion/loan sharking, and arson are committed by gang members to make money.
Related crimes, such as pornography, homicide/assaults, rape, robbery, burglary, and polit-
ical corruption, often are committed to support the primary crimes.
The sale of illegal drugs is a primary source of income for most gangs. Most gangs only
deal in one or two drugs. They view this as a business and often refer to drugs as the “prod-
uct.” Drugs are also used as an alternative currency. Gang employees such as prostitutes
and street-level drug dealers are often paid in drugs. A few gangs do not sell drugs at all,
but most do because it is the quickest and most efficient way to raise money for the gang.
Not only is prostitution the world’s oldest profession but it has also been a very reliable
money maker for gangs. Prostitutes may be either male or female; both female and male
prostitutes service male clients. Generally, gang members are not prostitutes themselves.
The prostitutes are often drug addicts and become de facto employees of the gang due to
their addiction. The gang members act as their pimps and pay them off in drugs.
Gangs by their very nature have weapons because of the violent nature of the business
that they are in. They also often deal in weapons illegally. Weapons are acquired through
legal purchases, smuggling, theft, or fencing operations. They are sometimes sold to raise
cash. In the gang pseudo-warrior culture, the possession of a weapon raises the gang mem-
ber’s warrior status in the gang.
Gambling operations such as running the numbers and off-track betting have been
traditional mainstays of gangs. Floating crap games are also common. Asian gangs favor
high-stakes card games such as Pai Gow. Legalization of gambling, lotto, parimutuel bet-
ting, etc., has shifted revenues from the gangs to the state in many areas.
Gang members are not above stealing something; in fact, it may be required as a part of
initiation rites. But, where you have dope, you have junkies, so why take the risk? Have the
junkies steal for their daily fix, then act as the fence and pay the junkie off in drugs. “Steal-
to-order” burglary rings are formed when gangs use junkies to steal merchandise that will
be sold to raise money for the gang. Weapons are often acquired in this way.
322 ◾ Gregg W. Etter
One of the most traditional ways for a gang to exercise control over a region is to collect
“tributes” from the residents or businessmen in the neighborhood. The protection racket
is one of the oldest scams used by the gangs that is still in operation. Tributes are paid to
gangs for permission to do business in their territories. Businessmen are approached by
gang members who offer to help them keep their businesses “safe” in this high-crime area.
Businesses that pay come under the protection of the gang that controls that turf. Any
other criminal who attacks that business or patrons of that business has to answer to the
local gang. If a business owner refuses, gang members will break windows, knees, etc.,
until the owner relents. This is sometimes called a street tax. Also, other drug dealers have
to pay a fee to the gang to sell dope on their corner.
Extortion is common when a gang discovers a secret (e.g., embezzlement, adultery,
pedophilia) and uses that knowledge to blackmail the victim into payment or cooperation;
for example, a high school principal who visits a gang-controlled prostitute for an evening
of pleasure may get more than he bargained for. He might be blackmailed into allowing
that gang to either deal or recruit in his school.
One way that gangs acquire merchandise, cars, and businesses is through the practice
of loan sharking. Loan sharking is popular among gangs dealing with a population of poor
people who do not use banks; desperate and poor people have little access to the formal
banking system. Gangs loan them money at outrageous interest rates that sometimes are
compounded hourly. Failure to repay such loans can be fatal. Gangs often acquire an inter-
est in a legitimate business in this way.
Arson to collect insurance is another time-honored way to make money. In fact, many
Asian gangs and outlaw motorcycle gangs specialize in arson; however, arsonists don’t stay
bought (see discussion on extortion). Arson is sometimes used by a gang for retaliation or
intimidation.
Any retail business that accepts cash can be used as a money laundering operation.
According to John R. Kingston, special supervisory agent with the FBI’s Economic
Crimes Unit, a crook can buy the business and take it over, and all he has to do is
increase his profits by ten or twenty percent by adding cash to it.
CRIPS
The Crips were formed around 1968 in the Compton/Los Angeles area by combining sev-
eral smaller local street gangs. One of the original gangsters was Raymond Lee Washington
(1953–1979). He was one of the founders of the Baby Avenues gang, which morphed into
the Crips, and was killed by a rival gang member. Another of the early founders of the
Crips was Stanley “Tookie” Williams (1953–2005). Williams helped to expand the Crips in
Los Angeles during the early 1970s. He was arrested for a quadruple murder in 1979 and
convicted. He attempted to reform in prison and was the author of a children’s book, but
he was executed for his crimes.
The Crips membership originally consisted largely of blacks and Hispanic males. The
Crips began expanding across the United States in the 1980s as a result of drug wars. As
this expansion occurred, in some areas (e.g., Omaha, Davenport, Little Rock, Memphis)
whites, Native Americans, and Asians began to be admitted, as well as females. Crips have
a loose organization that does not openly acknowledge a single leader. They do recognize
OGs in some sets. An individual Crips set usually ranges in membership from 10 to 40.
Sometimes the Crips sets are allies, but sometimes they fight among themselves. The Crips
are loosely allied with the Folk Nation in Chicago. In some areas of the country, they com-
pete for drug trade turf.
The Crips’ primary color is blue, which can be traced to the Washington High School
colors in South Los Angeles; however, the Grape Street Crips favor purple, the Spooktown
Crips use brown, and the Asian Boy Crips wear yellow. Crips often wear blue bandannas
and do-rags or other articles of blue clothing. They use the letter “C” in place of “B” in
324 ◾ Gregg W. Etter
writing to disrespect the Bloods. Crips are fond of calling each other “Cuzz” and calling
themselves “Blood Killas” (BKs). A sign of disrespect toward Crips is use of the word
“Crabs.”
BLOODS
The Bloods were formed around 1968 in the Compton/Los Angeles area. It is believed that
the Bloods arose as a reaction to formation of the Crips. Drug trafficking led to their quick
expansion across the United States in the 1980s. Originally, membership was restricted to
blacks and Hispanics, but others are allowed to join today. Bloods favor the color red; they
wear red bandannas or do-rags and other articles of red clothing when they “flame up.” The
Bloods often require that initiates receive a dog-paw mark, often burned in with a cigarette,
on their right shoulder. Bloods members may also sport a tattoo of a dog (usually Mack
truck logo) or a tattoo or burn scar of MOB (Member of Blood or Money over Bitches).
Bloods will often refer to the Pirus, who were one of the original Blood gangs. Bloods use a
crossed-out “c” in words in a show of disrespect for Crips. A term of disrespect for Blood is
“Slobs.” Blood sets, typically 10 to 40 members each, initially had a loose organization with
no defined leader. Today, the Bloods are allied with the People Nation, and they recognize
OGs. Blood sets may not like each other, but they seldom fight among each other. In 1993,
the United Blood Nation was formed in the New York City jail system. It has rapidly spread
down the East Coast of the United States. It has breathed new life into the Bloods across
the United States as the reformation spread back to the west coast. As a result, the Bloods
nationwide have begun to adopt a more formal organizational structure.
FOLK NATION
The Folk Nation is a loose alliance of 28 gangs that originated in Chicago-area jails in the
late 1950s and early 1960s. They now operate from east of the Rocky Mountains to the East
Coast. The gangs in the Folk Nation generally have a paramilitary structure and organiza-
tion. They favor formal constitutions and oaths. Early founders include the three “kings,”
David Barksdale, Jerome “Shorty” Freeman, and Larry Hoover.
Folk Nation gang members generally align to the right in dress and symbols. They pre-
fer to use two or more colors to represent their gang, and the way in which the colors are
worn denotes the particular set. The Gangster Disciples like to wear blue and black as their
colors, and their preferred symbol is the six-pointed star representing “King David” (David
Barksdale, 1947–1974), who was one of the founders of the group (Petrone, 1994).
Gang Investigation ◾ 325
The Folk Nation is involved in political movements as well as criminal acts. Their politi-
cal organization in the Chicago area is called 21st Century VOTE. The Folk are very ter-
ritorial and have been known to engage in turf wars. Membership is largely black and
Hispanic in the Chicago area, but it varies elsewhere. Some Folk sets are highly mobile,
while others have been on the same few blocks for 50 years. Although originating in the
Chicago area, the Folk Nation has spread into over 35 states. They are even beginning to
move to the West Coast in small numbers. They are loose allies with the Los Angeles-based
Crips. Their criminal and political empire is also attempting to expand (Knox, 2006).
PEOPLE NATION
The People Nation is a loose alliance of 28 gangs that originated in Chicago-area jails in
the late 1950s and early 1960s. The People Nation now operates from east of the Rocky
Mountains to the East Coast, although smaller groups are beginning to migrate to the
west coast. The gangs of the People Nation have a paramilitary structure and organization.
Several of the gangs are affiliated with the Nation of Islam religious movement. The People
Nation favors formal constitutions and oaths.
Founder Jeff Fort is credited with uniting the members of 50 Chicago street gangs into
the Black P Stone Nation, which evolved into the People Nation (Knox, 2006). The original
group was ruled by 21 person commission called the Main 21. The largest of these People
Nation gangs are the Black P Stones, Cobra Stone, El Rukn, Gaylords, Latin Counts, Latin
Kings, and Vice Lords. These groups have a multistate presence. Other smaller People
Nation gangs may not have an area of operation that is very far outside of their neighbor-
hood, but they have managed to exist for over 50 years.
A People Nation gang member generally aligns to the left in dress and symbols. Many
of the People Nation gangs use a five-pointed star as a symbol to honor one of the origi-
nal founders, Jeff Fort, who is Muslim. People Nation gangs are identified by the two or
more colors they wear and their arrangement. The El Rukn usually wear black, red, and
green, but sometimes blue and red. The Vice Lords favor black and gold or black and yellow
(Petrone, 1994).
The People Nation is involved in political movements as well as criminal acts. Their
political organization in the Chicago area is known as PUSH. They are very territorial
and engage in turf wars. People Nation members represent a variety of Muslims, black,
Hispanics, and whites. Although originating in the Chicago area, the People Nation has
spread into over 35 states. They are loose allies with the Los Angeles-based bloods. Their
criminal and political empire is also attempting to expand (Knox, 2006).
traditionally view themselves as street warriors. The changing nature of the drug wars in
the 1980s and transnationalization of the modern drug trade after the 1990s have caused
massive changes in the traditional local Hispanic gang cultures.
The drug wars of the 1980s brought about a change in the overall patterns of gang
involvement in most communities. Chicago- and Los Angeles-based street gangs began to
expand across the United States. Local gangs were swept up into national gang affiliations
either by choice or by force; thus, many Hispanic gangs became Folk or People, Crips or, to
a lesser extent, Bloods. These gangs became more mobile than their predecessors, leading
to conflict between the Folk Nation and People Nation. It was fueled by immigration issues
when newcomers joined the national affiliates because they might not have been as readily
accepted into local Hispanic gangs.
Bucking this trend are the two rival transnational gangs: the 18th Street gang and the
Mara Salvatrucha 13 (MS-13). Both gangs started in the Rampart District of Los Angeles.
The 18th Street gang was formed in the late 1960s as an outgrowth of the Clanton 14
gang. The subunits of Diesiocho (XV3) are cliques whose membership varies from 50
to 100. The 18th Street gang is estimated to have 15,000 members in the Los Angeles
area alone and 65,000 worldwide. Beginning as a traditional street gang, the 18th Street
gang quickly developed a reputation for being aggressive and violent. The membership
was originally people of Mexican decent; however, as the gang has expanded across the
United States and into Central and South America, other Hispanics, Middle Easterners,
Asians, and Caucasians have been allowed to join in some areas. The 18th Street gang has
an organized hierarchy within each clique, but they have no overall recognized national
or international leadership. Groups do communicate or coordinate with each other. The
18th Street gang has forged alliances with Mexican drug trafficking organizations and
Colombian cartels. They are highly mobile and very adaptive to law enforcement counter-
measures (Walker, 2010).
Their chief rivals are the Mara Salvatrucha 13. The MS-13 gang was started by Salvadorian
refugees in the Rampart section of Los Angeles during the late 1980s as a defense against
established Los Angeles street gangs. MS-13 is active in 42 states and Washington D.C.,
Mexico, Honduras, El Salvador, and Guatemala. The FBI estimates that there are 6000
to 10,000 members in the United States and even more overseas. The MS-13 has adopted
the colors of blue and white, taken from the colors of the national flag of El Salvador.
Membership in the MS-13 was originally restricted to people from El Salvador, Ecuador,
Mexico, Honduras, and Guatemala, but now other Latinos are permitted to join. Spanish is
the primary language used. Ethnicity rather than race is a factor. Ages range from 11 to 40.
Females are permitted to join the MS-13 on the East Coast but not on the West Coast. The
MS-13 has rapidly spread across the United States. When they move into a new area they
are very flashy and wear their colors openly. When police respond, they tone down colors
or use more subtle markings. MS-13 members are very open about the types of crimes they
commit. They adapt quickly and change tactics to meet local needs.
Many of the MS-13 members have had paramilitary training or experience. Machete
attacks by MS-13 members along the East Coast and in Central America have decapitated
many victims. Notes are often left with the bodies of the victims, and fingers are chopped
Gang Investigation ◾ 327
off the hands of gang rivals. Permission to kill is called a “green light.” MS-13 assassina-
tions have strict rules that call for at least one head shot to the victim. The murder weapon
(usually a gun) is often sent to other cities to be used in another murder.
The MS-13 is organized into cliques that have regular business meetings with agendas,
goals, and reports. Originally, these cliques operated totally independently of one another,
but recent attempts have been made by MS-13 members from the West Coast to become
more formally organized through misas janeras (“conferences”). Their goal is to be the
leading Hispanic gang (Etter, 2010).
ASIAN GANGS
Asian street gangs have existed in the United States since the first rush of Chinese immi-
gration during the gold rush of the 1840s in California (Asbury, 1933). The Asian gangs
have either operated independently (e.g., Oriental Lazy Boys in Wichita) or sought gangs
with a national affiliation (e.g., Asian Boyz Crips). More often they are affiliated or con-
trolled by more traditional Asian organization such as the Triads or Tongs. They have a
formal organizational structure within their groups and are highly mobile. Asian gangs
maintain extensive communications with other Asian gang members and often coordinate
or cooperate in criminal ventures; however, there is no overall leadership structure in the
United States for Asian gangs. Asian street gangs favor bright colors, but they tend to emu-
late their Hispanic or African American counterparts in the neighborhoods they occupy.
One difference is that they will often display a streak of color through their hair when they
are about to engage in some gang activity. This is a custom that has been borrowed from
the Yakuza, a Japanese organized crime group. Specialized crimes of Asian gangs include
arson, auto theft, and home invasions.
328 ◾ Gregg W. Etter
FEMALE GANGS
Females are the minority in gang life in the United States. Most gangs traditionally only
admit males to full membership; thus, most female gang members in the United States fall
into one of three basic groups:
Gang Investigation ◾ 329
• Ladies’ auxiliary—Girls hang with male gang members and adopt the identity of
the gang without becoming actual voting members. They may wear the colors of
the gang. This is the traditional role that has often been imposed on females when
male gang members do not let them join the gang as full voting members. This is
changing, especially in the Midwest.
• Hardcore—Girls actually join a specific gang as full voting members with the
approval of male members of the gang. This is becoming more prevalent in some
areas of the Midwest.
• Girl gangs—Girls form their own gangs and engage in criminal activities indepen-
dent of male-dominated gangs.
The most significant difference between male and female gang members is adult gang
membership. Very few of the women continue their membership in the gang when they
become adults. The most common reasons are that they grow out of it, most become moth-
ers, and many realize it is too crazy (Moore and Hagedorn, 2001).
In her research studying female gangs for the Chicago Crime Commission, Lindberg
(1999), found two trends in female gangs. First, it is not as easy now for female gang mem-
bers to go undercover as it used to be. In the past, females were shielded from the high-
profile activities of the gang, such as drive-by shootings or other hits; therefore, rival gang
members did not recognize them when they came into their neighborhood. Because they
are more active in gang activities, the girls are more likely to be recognized by opposing
gang members. Second, because girls are joining gangs at a younger age, many male gang
members fear that the actions of young and undisciplined females may upset the stability
of the street operations or put the gang in imminent danger. These females have a reputa-
tion for overreacting, often violently, to petty or delicate matters without considering the
consequences.
How do you identify a gang member? More importantly, how can you prove it in a court
of law? To investigate gang-related crimes it is necessary to identify gang members and
to develop the knowledge base required to understand the complex relationships in an
organized crime or gang crime case in order to develop probable cause in conspiracy and
Racketeer Influenced and Corrupt Organization (RICO) types of investigations. Specific
criteria have been adopted by most law enforcement agencies to document individuals who
are gang members. An example of these criteria is those adopted by the Wichita Police and
the Sedgwick County Sheriff’s Department, which must apply before a suspect can be clas-
sified as a gang member (Etter and Swymeler, 2008):
Note: An individual must meet two (2) of the following criteria to be documented as
a gang member. Same applies to other hate groups.
1. When an individual admits membership to a gang/hate group and displays knowl-
edge of gang activities consistent with such membership
2. When reliable informant identifies an individual as a gang member
3. When an informant of previously untested reliability identifies an individual as a
gang member and it’s corroborated by independent information
4. When an individual resides in or frequents a particular gang’s area and affects
their style or dress, use of jewelry, symbols, or tattoos
5. When an individual who has not been previously identified as a gang member or
hate group member has been arrested several times in the company of identified
gang or hate group members for offenses that are consistent with gang activity
6. When there are strong indications that an individual has a close relationship with
a gang but does not exactly fit the above criteria, in which case he or she shall be
identified as “gang/hate group associate”
• Were multiple weapons involved? Indications would include different caliber bul-
let casings or projectiles found at the crime scene, different types of weapons left at
the crime scene, or multiple wounds on the victim.
• Does the physical evidence, such as fingerprints, blood, or DNA, indicate that
more than one person was involved?
• Was anything left behind at the crime scene that might indicate group behavior
(e.g., clothing, notes, multiple vehicles)?
• Is any security video available at or near the crime scene that might have captured
the suspects?
• Did fresh graffiti appear in the area either before or after the crime?
• Was the victim a gang member? On what do you base your findings (see above
sample gang criteria)?
When developing their criminal case, the investigator should look for signs of gang
behavior, such as other gang members being present and either backing up the assailant or
apparently witnessing the crime. These other gang members might have prevented others
from interfering while the crime was being committed. Members of the gang often say or
yell the gang’s name during the commission of the crime or throw hand signs that repre-
sent the gang. Gang members often position a lookout to watch for the police or other rival
gangs and alert the others when these dangers present themselves. Cars are an important
part of gang crimes. Stealing a car and driving that car to commit a crime such as a drive-
by is an important element of the crime. Identification of the driver can lead to arrests
of the rest of the group. Another important piece of solving the crime puzzle is finding
out who obtained or was holding the weapon. Weapons are often acquired for the pur-
pose of committing a crime, and finding out where the gun came from or went is crucial
(Anderson et al., 2009).
When interviewing witnesses, the investigator should determine the number of sus-
pects, their descriptions, and the specific actions of each suspect. Did the suspects arrive
or leave together? Were the suspects wearing the same types or colors of clothing? Were
gang signs thrown or a gang name mentioned? How did the suspects interact together (e.g.,
were directions or orders being given, was there a lookout)? Did multiple people participate
in the crime? Witnesses should be separated and witness statements should be gathered
immediately before the witnesses can be contaminated by group discussion of the events
or be forced to recant their statements by gang members or their associates (Anderson et
al., 2009).
ANTI-GANG TACTICS
Anti-gang tactics that have proven effective in some jurisdictions include warrant round-
ups, which can take large numbers of gang members off of the streets. Coordination with
parole and probation authorities provides good intelligence, and association with a known
gang member can be a cause of a parole violation for a parolee or probationer. Intensive
patrol in open-air drug markets or high crime areas does not totally stop all gang crime,
332 ◾ Gregg W. Etter
but it suppresses it and makes it difficult for the drug dealers to do business. Closing off
streets by means of simple barricades has worked to restrict access to certain areas and
reduce drive-bys or getaways in high crime areas.
ANTI-GANG LEGISLATION
Most states have statues defining what is a gang. A typical gang definition statute is that of
the Commonwealth of Virginia:
§18.2-46.1. Definitions.
As used in this article unless the context requires otherwise or it is otherwise
provided:
“Act of violence” means those felony offenses described in subsection A of
§19.2‑297.1.
“Criminal street gang” means any ongoing organization, association, or group of
three or more persons, whether formal or informal, (i) which has as one of its pri-
mary objectives or activities the commission of one or more criminal activities;
(ii) which has an identifiable name or identifying sign or symbol; and (iii) whose
members individually or collectively have engaged in the commission of, attempt
to commit, conspiracy to commit, or solicitation of two or more predicate criminal
acts, at least one of which is an act of violence, provided such acts were not part of a
common act or transaction.
Many states prohibit membership in a gang, but statutes such as this can face constitutional
challenges (Anderson et al., 2009). Many states allow gang crime or gang membership to
be used as a sentence enhancer when gang membership is a factor in the crime. Some cit-
ies have passed municipal ordinances against gangs or gang activities. These criminal laws
have had mixed results. Research has shown that the statutes are not used uniformly, and
many have faced legal challenges (VA DCJS, 2008)
In order to combat street gang members standing around on street corners and creating
open-air drug markets, the City of Chicago passed an anti-loitering ordinance that defined
loitering as “remaining in one place without any apparent purpose.” It allowed Chicago
police officers to order individuals to move or be arrested. From 1992 to 1995, 43,000 peo-
ple were arrested based on this ordinance; however, the Supreme Court found that the
ordinance was unconstitutionally vague and struck it down in 1999 (City of Chicago v.
Jesus Morales, 1999).
The state of California has adopted the unique tactic of suing the various gangs and
obtaining civil court injunctions to prohibit the gang or members of the gang to be at a
certain street corner or other specific location. Gang members who show up at the pro-
hibited site may by cited for contempt of court. This legal tactic has met with some limited
success.
Gang Investigation ◾ 333
BIBLIOGRAPHY
Anderson, J., Nye, M., Freitas, R., and Wolf, J. (2009). Gang Prosecution Manual. Washington, D.C.:
Office of Juvenile Justice and Delinquency Prevention, U.S. Department of Justice.
Arlacchi, P. (1987). Mafia Business: The Mafia Ethnic and the Spirit of Capitalism. London: Verso.
Asbury, H. (1927). The Gangs of New York: An Informal History of the New York Underworld. New
York: Old Town Books.
Asbury, H. (1933). The Barbary Coast: An Informal History of the San Francisco Underworld. New
York: Garden City Publishing.
Barker, T. (2007). Biker Gangs and Organized Crime. Newark, NJ: Lexis Nexis.
City of Chicago v. Jesus Morales, 527 U.S. 41 (1999).
Cloward, R. and Ohlin, L. (1960). Delinquency and Opportunity: A Theory of Delinquent Gangs. New
York: The Free Press.
Elder, A. (1997). Inside Gang Society: How Gang Members Imitate Legitimate Social Forms. Journal
of Gang Crime Research, 3(4):1–12.
Etter, G. (1998). Common Characteristics of Gangs: Examining the Cultures of the New Urban
Tribes. Journal of Gang Research, 5(2):19–33.
Etter, G. (1999). Skinheads: Manifestations of the Warrior Culture of the New Urban Tribes. Journal
of Gang Research, 6(3):9–23.
Etter, G. (2010). Mara Salvatrucha 13: A Transnational Threat. Journal of Gang Research. 17(2):1–17.
Etter, G. and Swymeler, W. (2008). Examining the Demographics of Street Gangs in Wichita, Kansas.
Journal of Gang Research, 16(1):1–12.
FBI. (2008). The MS-13 Threat: A National Assessment. Washington, D.C.: Federal Bureau of
Investigation (http://www.fbi.gov/page2/jan08/ms13_011408.html).
Fried, M. (1975). The Notion of Tribe. Menlo Park, CA: Cummings.
Gage, N. (1971). The Mafia Is Not an Equal Opportunity Employer. New York: McGraw-Hill.
Holmes, L. (1971). Anthropology: An Introduction, 2nd ed. New York: Ronald Press.
IOMGIA. (2003). Proceedings of the 29th Annual International Outlaw Motorcycle Gang Investigators
Association Conference, Scottsdale, AZ, September.
Jackson, R. and McBride, W. (1986). Understanding Street Gangs. Placerville, CA: Custom
Publishing.
334 ◾ Gregg W. Etter
Knox, G. (2006). An Introduction to Gangs, 6th ed. Peotone, IL: New Chicago School Press.
Lindberg, K. (1999). Girls in Gangs: The Girls Behind the Boys. Chicago, IL: Chicago Crime
Commission.
Miranda v. Arizona, 384 U.S. 436 (1966).
Moore, J. and Hagedorn, J. (2001). Female Gangs: A Focus on Research. Juvenile Justice Bulletin,
March, pp. 1–11.
Nadel, B. (1996). NYC DOC Slashes Gang Violence. Corrections Forum, 5(9).
Padilla, F. (1993). The Gang as an American Enterprise. New Brunswick, NJ: Rutgers University
Press.
Petrone, F. (1994). The Street Gang Identification Manual. Elgin, IL: Gang Prevention, Inc.
Strandberg, K. (1997). Money Laundering. Law Enforcement Technology, 24(7):28–33.
Thrasher, F. (1936). The Gang: A Study of 1,313 Gangs in Chicago, 2nd ed. Chicago, IL: University of
Chicago Press.
VA DCJS. (2008). Use of Anti-Gang Statutes Contained in the Code of Virginia. Richmond, VA:
Department of Criminal Justice Services.
Walker, R. (2010). 18th Street Gang: An Aggressive and Violent Criminal Street Gang, Robert Walker’s
Gangs OR Us, http://www.gangsorus.com/18th_street.htm.
Yablonsky, L. (1962). The Violent Gang. New York: Macmillan.
6
Putting It All Together
335
Chapter 19
Legal Issues in
Criminal Investigations
Frank DiMarino
Kaplan University
CHAPTER OBJECTIVES
After reading this chapter, you should be able to understand the following:
1. Criminal laws are part of broad penal codes enacted by state legislatures or
the U.S. Congress.
2. Because states enact comprehensive penal codes that define crimes and estab-
lish penalties, different behaviors may be treated as crimes in one state but
not in another.
3. Public perception about criminal behavior changes over time, so what con-
duct is considered to be a crime may also change.
4. Criminal statutes define what constitutes a crime by defining the crime
through the use of elements or components of a criminal offense.
5. Criminal statutes must be sufficiently specific so persons of ordinary intel-
ligence have fair notice that the contemplated conduct is forbidden by the
statute.
6. The punishment for felony offenses includes possible sentences of more than
a year in confinement.
7. A grand jury must determine whether probable cause exists that a crime was
committed and that the defendant committed the crime before a defendant
can be charged with a felony.
8. Misdemeanors are lesser offenses that include a possible sentence of no more
than a year or less of incarceration.
9. Police officers are entitled to arrest individuals for misdemeanors, even for
seat belt violations, committed in their presence.
337
338 ◾ Frank DiMarino
10. First responders to a crime scene must be aware that the initial crime scene
investigation can be pivotal to discovering the identity of the perpetrator and
gathering crucial evidence.
11. Processing a crime scene includes marking the location of the evidence,
sketching and photographing the scene, measuring relevant distances, tak-
ing investigative notes, and collecting the evidence.
12. The collection of fungible evidence, such as drugs, money, certain weapons,
and contraband, must be marked and accounted for with a chain-of-custody
document to protect the integrity of the evidence.
13. An arrest warrant protects an individual from an unreasonable seizure and
may only be issued upon a showing of probable cause to believe a suspect is
committing or has committed an offense.
14. The exclusionary rule renders evidence that has been unlawfully obtained
inadmissible at trial.
15. The judge decides whether any of the evidence that the parties want to use is
illegal or improper.
16. Probable cause may be based upon information shared among law enforce-
ment agencies, crime databases, and observations made by investigators.
17. A police officer may arrest without a warrant provided that a felony or a mis-
demeanor is committed in the officer’s presence.
18. During an investigatory stop, police officers are permitted to frisk the person
for weapons provided that the officers have an articulable, reasonable suspi-
cion and that the officers are acting to protect their safety.
19. Criminal profiles may be used as the basis to conduct an investigatory stop.
20. Probable cause to search is a finding that there is a fair probability that evi-
dence of a crime or fruits of a crime will be found in a particular location.
21. Facts within an affidavit that are considered “stale” cannot be used to sup-
port a probable cause determination.
22. Before entering a private residence, police officers must abide by their state’s
“knock and announce” statutes.
23. Exigent circumstances, such as the hot pursuit of a suspect, may justify a
warrantless search.
24. A prosecutor has special ethical obligations in criminal cases.
25. If contraband or evidence of a crime is found during an inventory search,
that evidence may be seized.
26. A prosecutor must disclose to the defense any exculpatory evidence and evi-
dence that may be used to attack the credibility of a witness.
27. A prosecutor must seek justice in each case, which may include dismissing
charges when the evidence is insufficient to convict.
28. A defendant who is unable to afford a lawyer to represent him at trial may
have a court-appointed lawyer.
Legal Issues in Criminal Investigations ◾ 339
Chapter Outline
• Introduction
• Criminal Law
• Felonies
• Misdemeanors
• Legal Considerations and the Crime Scene
• Arrest
• Search and Seizure
• Criminal Procedure
INTRODUCTION
This chapter describes the substantive and procedural laws that govern criminal prosecu-
tions from the crime scene investigation through to the verdict rendered by a jury. The
formation of substantive criminal law—the standards that apply to behavior and conduct
within a society and the punishments attached to violations of those standards—is con-
trolled by statutes enacted by the U.S. Congress and state legislatures. Criminal offenses
are divided into two major classifications: felonies and misdemeanors. Felonies are offenses
where the punishment exceeds one year of incarceration and misdemeanors are lesser
offenses where the defendant can be sentenced to a year or less in jail.
Knowledge of legal requirements and standards that apply to the collection and pres-
ervation of evidence is necessary so the integrity of the crime scene is preserved and evi-
dence can be admissible as exhibits during a trial. The protection of a crime scene and
the comprehensive documentation of investigative activity and observations are crucial
to apprehending suspects and bringing them to justice. An accurate chain of custody that
documents the transporting and handling of evidence ensures that evidence is properly
stored and analyzed so it can be relied upon during a criminal prosecution.
The arrest of an individual represents one of the most controlling interactions between
the police and society. The Fourth Amendment to the U.S. Constitution requires that all
arrests be made in accordance with a warrant supported by probable cause. Probable cause
to arrest can be based on numerous factors, especially in light of technological improve-
ments in the sharing of criminal information among law enforcement agencies. Exceptions
to the warrant requirement include when it is impractical to get a warrant because of poten-
tial harm to society or in cases where the defendant may flee. Less intrusive than an arrest
are police encounters where persons are stopped based on the reasonable suspicion by the
police that criminal activity is afoot. Such a stop is of limited duration, and police are
allowed to question the suspect, frisk the suspect to avoid harm to the police, and detain
the suspect until the suspicion is dispelled.
Searches for evidence often provide productive opportunities to further the criminal
investigation and to gather information to support a criminal prosecution. The Fourth
Amendment also mandates that a search be conducted only with a warrant that is supported
340 ◾ Frank DiMarino
by probable cause. Although there are exceptions to this warrant requirement based on
exigent circumstances, such exceptions are narrowly interpreted, and they must not be the
result of police conduct that has contributed to creating the exigent circumstances.
Rules of criminal procedure govern the conduct of criminal prosecutions and affect the
manner of criminal investigations; for example, custodial interrogations require that spe-
cific constitutional warnings be provided to a suspect or incriminating statements could be
excluded from trial. Likewise, a criminal defendant is afforded representation by counsel
at all critical stages of a prosecution. The criminal investigator must diligently follow the
rules of criminal procedure to ensure that evidence is gathered lawfully and that its later
use and effectiveness at trial are not compromised.
CRIMINAL LAW
The body of law that sets forth offenses and penalties for violations is known as crimi-
nal law. As lawmakers, legislators consider societal customs and behaviors and enact laws
that prohibit certain activities, such as theft, or mandate that certain activities take place
under penalty of law, such as paying taxes. Common law principles that emanated from
18th-century English law form the foundation of many criminal laws such as addressing
theft, murder, and burglary. Currently, many criminal laws are part of broad penal codes
enacted by state legislatures or the U.S. Congress. Generally, criminal behavior can be
divided into two categories. First, malum in se crimes are those offenses that are inherently
bad; these crimes include, for example, murder, rape, assault, and robbery. Second, malum
prohibitum crimes are those crimes that are not inherently wrong but instead are made a
crime because of legislative action. Such crimes are against public policy and include, for
example, failure to file income tax returns, false reports of crimes, drinking in a public
place, and speeding.
Most states enact a comprehensive penal code that defines crimes and establishes maxi-
mum penalties for violations. The Texas Penal Code, for example, was written to establish a
complete “system of prohibitions, penalties, and correctional measures to deal with conduct
that unjustifiably and inexcusably causes or threatens harm to those individual or public
interests for which state protection is appropriate.” The Texas code defines such crimes as
assault, murder, robbery, arson, money laundering, theft, sexual assault, and fraud.
Because states are able to enact their own criminal laws, different behaviors may be
treated as crimes in one state but not in another; for example, the sale of alcoholic bever-
ages is not permitted on Sundays in some states, but other states place few or no restric-
tions on the sale of alcohol. State legislators, as the representatives of citizens within a state,
are empowered to enact laws that reflect what they believe society deems is acceptable and
unacceptable conduct. Although legislatures take into account the public perception of
crime, it is important to note that public perception tends to change over time and among
regions, so what is considered a crime may also similarly change over time.
The Federal Criminal Code as enacted by Congress is contained in several titles or major
sections. Title 18 defines many crimes that are often used by prosecutors and investigators
in bringing federal charges, including the interstate transportation of stolen property, wire
Legal Issues in Criminal Investigations ◾ 341
fraud, bank fraud, and embezzlement of funds from a federally insured bank. Title 26
defines most crimes related to tax violations, such as income tax evasion and failures to
pay tax.
The criminal justice system in America relies upon the enforcement of criminal laws
and following procedural rules relating to the investigation and prosecution of a crimi-
nal case. Substantive criminal laws generally define what acts constitute crimes. Statutes
specify the elements of each crime. The elements of the offenses are the component parts of
the criminal act that must be proven beyond a reasonable doubt by the government during
a prosecution.
Wisconsin Statute 943.10 specifies that a burglary occurs when any person intentionally
enters any room within or any structure used as a building or dwelling, an enclosed railroad
car, an enclosed portion of any ship or vessel, a locked enclosed cargo portion of a truck or
trailer, a motor home or other motorized type of home, or a trailer home, whether or not any
person is living in any such home, with intent to steal or commit a felony therein and with-
out consent of the person in lawful possession. The elements of burglary are (1) intentional
entry; (2) of any building, dwelling, or other specified area; (3) with intent to steal or commit
felony; and (4) without permission.
Criminal statutes must be sufficiently specific such that prosecutors and investigators will
not broadly interpret them and prosecute individuals for criminal acts not contemplated
by the legislatures. In 1972, the Supreme Court decided the significant case Papachristou
v. City of Jacksonville, which concerned the interpretation of criminal statutes. The Court
considered a vagrancy statute that provided criminal penalties for “common night walkers,
… persons wandering or strolling around from place to place without any lawful purpose
or object, habitual loafers, … persons … frequenting … places where alcoholic beverages
are sold or served, persons able to work but habitually living upon the earnings of their
wives or minor children.” Upon the arrest of eight defendants for what was argued to be
seemingly innocent conduct, the Court determined that this vagrancy statute was void
for vagueness. In other words, the statute on its face, “fail[ed] to give a person of ordi-
nary intelligence fair notice that his contemplated conduct is forbidden by the statute.” The
Court concluded that the statute encouraged arbitrary and erratic arrests and convictions
by giving almost unfettered discretion to the police. Without specific standards governing
the exercise of police discretion, the statute became a convenient tool for “harsh and dis-
criminatory enforcement by local prosecuting officials, against particular groups deemed
to merit their displeasure.”
FELONIES
A felony offense is defined as a crime that carries a punishment of more than a year of
incarceration. The investigation of felony offenses is treated as a priority for most investiga-
tive agencies, and more resources are devoted to the investigation of felony crimes. Felonies
include such crimes as robbery, rape, murder, identity theft, bank fraud, bribery, insurance
fraud, and money laundering. The investigation of felonies generally involves more inves-
tigative resources than minor offenses because of the more complex nature of the crime,
342 ◾ Frank DiMarino
the greater harm to the victim, and the deleterious impact upon society. Consequently, the
punishment that a judge imposes on an offender who has committed a felony may also be
more severe.
The Fifth Amendment to the U.S. Constitution requires that all felony cases be indicted
by a grand jury. This means that a prosecutor must establish that it is more probable than
not that a felony has been committed and that the defendant committed the felony. The
standards that a grand jury employs to decide the cases before them are not as stringent as
at trial; for example, the grand jury may consider hearsay evidence, but a trial jury may not
unless the evidence is covered by an exception provided for in the rules of evidence. Also,
the trial jury must use the standard of beyond a reasonable doubt to determine guilt, but
the grand jury uses the probable cause standard to indict.
Generally speaking, in about 90% of the felony cases, the defendant pleads guilty rather
than exercising his or her right to a trial before a jury. Often, a guilty plea is the result of
dropping a charge or otherwise limiting the amount of incarceration or other punishment
that a defendant would have to endure. Such plea bargaining has its critics, as defendants
usually do not have the same bargaining influence as the government. On the other hand,
plea bargaining does result in efficiently disposing of the charges through a conviction and
frees up limited criminal justice resources to try other cases. The conviction of a felony car-
ries the loss of certain civil rights, such as the right to vote, serve on juries, obtain certain
professional licenses, or receive specified governmental benefits.
MISDEMEANORS
A misdemeanor is a crime less serious than a felony and carries a maximum penalty of one
year or less in confinement. Misdemeanors include such crimes as shoplifting, disorderly
conduct, vandalism, trespass, and public intoxication. A misdemeanor is charged by a for-
mal accusation made in a charging document by a prosecutor. A grand jury does not con-
sider the charging of misdemeanors. Misdemeanors committed in the presence of a police
officer may justify an arrest without securing a warrant. In Atwater v. City of Lago Vista
(2001), the Supreme Court held that a police officer could arrest the driver of a vehicle for a
seat belt violation, even though the arrestee was a mother with a child in the back seat of the
car, because officers may arrest for misdemeanors committed in their presence. Similarly,
in Virginia v. Moore (2008), the Court upheld a warrantless arrest for driving with a sus-
pended license despite a state law requiring that the defendant appear pursuant to a sum-
mons because police officers may arrest for misdemeanors committed in their presence. An
offense occurs in the “presence” of an officer when the arresting officer, with the aid of all his
senses, such as sight, smell, and hearing, determines that an offense is being committed.
The priority of these actions depends on the nature of the crime scene and circumstances
of the offense.
344 ◾ Frank DiMarino
ARREST
The Fourth Amendment of the U.S. Constitution sets forth the controlling standard for
arrests made by law enforcement officers. The Fourth Amendment states: “The right of
the people to be secure in their persons, houses, papers, and effects, against unreasonable
searches and seizures, shall not be violated, and no Warrants shall issue, but upon prob-
able cause, supported by Oath or affirmation, and particularly describing the place to be
searched, and the persons or things to be seized.” An arrest warrant protects an individual
from an unreasonable seizure and may only be issued by a judicial officer with probable
cause, based on an affidavit, to believe the arrestee is committing or has committed an
offense. In Johnson v. United States (1948), the Supreme Court stated:
The point of the Fourth Amendment … is not that it denies law enforcement the sup-
port of the usual inferences which reasonable men draw from evidence. Its protec-
tion consists in requiring that those inferences be drawn by a neutral and detached
magistrate instead of being judged by the officer engaged in the often competitive
enterprise of ferreting out crime.
For violations of the Fourth Amendment, a criminal procedure doctrine known as the
exclusionary rule renders evidence gathered during an “unreasonable” search or arrest
inadmissible at trial. The Fourth Amendment thus guarantees both a substantive right and
procedural protection for criminal defendants.
The standard of probable cause may be satisfied by relying upon numerous facts and cir-
cumstances learned through a criminal investigation. First, probable cause may be based
on the direct observations of the officer; for example, the officer may observe a criminal
offense or suspicious activity and report the events observed in an affidavit to support a
warrant. Police may also draw conclusions about criminal activity based on their experi-
ence and special training regarding suspicious behaviors that are not, at first take, appar-
ently criminal.
Second, probable cause may be based on information or evidence obtained during an
investigative detention or a “Terry stop.” The Terry stop is described in more detail in the
section on investigatory stops and reasonable suspicion. The purpose of this type of police
encounter is to resolve a reasonable suspicion that a law enforcement officer may have
about criminal activity that may be occurring or is about to occur. During a Terry stop, the
officer may conduct a pat-down or a frisk to protect his safety or public safety. This limited
pat-down may result in the officer discovering contraband that could be used to establish
probable cause to arrest; for example, during a Terry stop, a police officer may frisk a sus-
pect because a bulge in the suspect’s pants pocket could be a concealed pistol. During such
a pat-down, the officer may find illegal drugs in the suspect’s pocket that could be used to
establish probable cause for a drug arrest. Evidence that is in plain view or obtained from
a consensual search may also establish probable cause to arrest.
Third, probable cause may be based on information provided by an informant who has
a proven track record of reliability. (Of course, reliable information from an informant
may also create reasonable suspicion and justify an investigatory stop.) The reliability of an
informant’s tip is evaluated on a sliding scale. Increased corroboration will be necessary
before acting on a tip from an informant who is of uncertain or unknown trustworthiness.
On the other hand, less corroboration may suffice if the information is from a known pre-
viously reliable source. To properly assess the reliability of an informant’s knowledge, an
investigating officer should obtain as much detailed information concerning two specific
areas. First, how did the informant obtain the information about the specific criminal
activity? Did the informant learn of the information through personal observation, hear-
say from acquaintances, direct conversation with the suspects, or some combination of
these? Second, why should the police officer believe the informant? Has the informant been
reliable in the past so the informant has a proven track record or are there independent cir-
cumstances that corroborate the informant’s knowledge that render the informant’s state-
ments trustworthy?
Fourth, probable cause may exist based on information provided by other law enforce-
ment sources. Law enforcement agencies may share information that cumulatively may
amount to probable cause to identify the perpetrator and the offense. Federal, state, and
local agencies are sharing more information regarding criminal activities by participat-
ing in joint task forces, regional fusion centers, and special crime prevention initiatives.
Additionally, crime databases such as the U.S. Department of Treasury’s Financial Crimes
Enforcement Network (FinCEN) stores and evaluates financial transaction information to
aid law enforcement in the investigation of money laundering, bank fraud, terrorist financ-
ing, and other financial crimes. These sources, taken together with other investigative
346 ◾ Frank DiMarino
activity, may aid in establishing probable cause. Notably, probable cause cannot be estab-
lished through information based on mere suspicion received from an anonymous source.
The Supreme Court decided in Florida v. J.L. (2000) that an anonymous tip that a person
carrying a gun, without more, does not give rise to probable cause that a crime was com-
mitted or even reasonable suspicion to justify an investigatory stop and frisk. For a tip to be
considered sufficient to amount to a reasonable suspicion or probable cause, it must come
from a source with demonstrated reliability.
WARRANTLESS ARRESTS
For an arrest to occur legitimately, it must be pursuant to a warrant or based on an autho-
rized exception to the warrant requirement of the Fourth Amendment; for example, under
common law, a law enforcement officer may arrest without a warrant a person for any
felony committed in the officer’s presence. Some states have codified this common law
principle to give statutory authority to officers (and, in some cases, other persons) to make
an arrest for felonies committed in their presence. Section 2935.04 of the Ohio Revised
Code on Criminal Procedure, a statute effective for over a half a century, provides that,
“When a felony has been committed, or there is reasonable ground to believe that a felony
has been committed, any person without a warrant may arrest another whom he has rea-
sonable cause to believe is guilty of the offense, and detain him until a warrant can be
obtained.” After making a warrantless arrest, an officer must promptly secure a judicial
determination of probable cause. Obviously, a considerable amount of risk to the officer
and to third parties accompanies an arrest. To promote officer safety, an officer should
restrain the arrestee as soon as possible so the arrestee cannot flee or inflict harm. Second,
the officer should search the arrestee for weapons and any contraband. The search should
include the arrestee’s clothing, bags, containers, and other items within the arrestee’s reach
and control. Third, the officer should conduct a protective sweep of the immediate area of
the arrest to ensure that weapons or other armed persons are not present; for example, if an
arrest occurs in a two bedroom apartment, an officer is justified to look in each bedroom
and other rooms, including the closets, to ensure that an armed person is not present in the
apartment that may harm the officers.
Legal Issues in Criminal Investigations ◾ 347
CUSTODIAL INTERROGATION
After a person is apprehended and before any questioning occurs, the arrestee should
receive his Miranda warnings. In Miranda v. Arizona (1966), the Supreme Court held that
no confession is admissible that is obtained through custodial interrogation unless the sus-
pect is first advised of his Fifth Amendment rights. To comply with the Miranda decision,
a suspect needs to be informed of the following: (1) He or she has the right to remain silent,
(2) anything that is said may be used against him or her in court, (3) he or she has the right
to consult with an attorney and to have an attorney present during questioning, and (4) if
he or she cannot afford an attorney, one will be appointed. Providing an oral and written
advisement of these rights, along with a signed waiver from the suspect, significantly con-
tributes to the admissibility of any confession that a suspect may provide and rebuts any
claim of compelled self-incrimination.
an arrest. Instead, on a case-by-case basis, courts consider the diligence of police in speed-
ily resolving their reasonable suspicion, the nature of any physical restraints or commands
placed on a suspect’s liberty, and whether the police removed the individual to another
location. Courts use a balancing test between the limitations placed on a person’s liberty
and the need to protect the safety of the police officer and the public.
As mentioned, under Terry v. Ohio, during an investigatory stop, if the officer reason-
ably believes his safety or public safety is at risk, he may pat-down or frisk a suspect’s outer
clothing. The frisk should be limited to a search for weapons and may not be used as a
subterfuge to search for evidence of criminal activity.
CRIMINAL PROFILES
Law enforcement officers frequently use drug courier profiles as a means to halt drug
trafficking and possession. These profiles are based on an accumulation of law enforce-
ment experience regarding traits and characteristics that generally would be noticeable
for someone in possession of drug contraband. Such profiles serve as a valuable means for
officers to be more alert to likely criminal activity, although such profiles may vary among
locations and regions and become outdated over time. Although courts have differed in
rulings regarding law enforcement use of drug profiles, some general rules emanate from
the cases. First, the drug courier profile itself cannot justify an arrest but it may justify an
investigatory stop. In other words, the fact that a suspect meets a profile does not create
probable cause to arrest; at most, it may create a reasonable suspicion on the part of the offi-
cer that criminal activity is afoot that would prompt a Terry stop. Second, to justify such
a stop, the officer will need to provide a reasonable, objective, articulable suspicion based
on the officer’s observations and experiences. As Chief Justice Rehnquist stated in United
States v. Sokolow (1989): “A court sitting to determine the existence of reasonable suspicion
must require the [law enforcement officer] to articulate the factors leading to that conclu-
sion, but the fact that these factors may be set forth in a ‘profile’ does not … detract from
their evidentiary significance.” The key is that the law enforcement officer must provide
sufficient information to justify the stop. Third, and crucial to a successful prosecution,
unless the underlying investigative stop is valid, any later search, arrest, or seizure of con-
traband will be invalid.
privacy in such items. Whether governmental action constitutes a search depends on how
intrusive the action is. An example of a minimal intrusion that does not constitute a search
is the use of a drug canine to perform a sniff test to determine the presence of drugs. The
sniff test may be conducted without infringing upon the Fourth Amendment rights.
SEARCH WARRANTS
As mentioned, the Fourth Amendment requires that a warrant describe with “particular[ity]
… the place to be searched and the persons or things to be seized.” This clause has been
interpreted to protect against wide-ranging exploratory searches, so an individual’s privacy
is safeguarded from unfettered police intrusions. Many search warrant applications will
include a photograph of the place to be searched, with the house number clearly marked
so the agents executing the warrant will not make a mistake. It is also good practice to
incorporate by reference into the warrant the affidavit so the attachments to the warrant
may cure a warrant lacking sufficient particularity or that contains such mistakes as trans-
posed house numbers or wrong addresses. An example of a catch-all phrase included in
some warrants is “evidence of crime at this date unknown.” Such a phrase, when coupled
with the affidavit incorporated by reference into the warrant and the warrant itself, may
be deemed to sufficiently limit police discretion in executing the warrant. In Andresen v.
Maryland (1976), the Supreme Court determined that a similar catch-all phrase did not
render the warrant insufficiently particular. Thus, a warrant authorizing seizure of “fruits,
instrumentalities and evidence of crime at this [time] unknown,” when read in context
with the rest of the warrant application, properly authorizes a search for evidence relevant
to the warrant’s specified offense of false pretenses.
350 ◾ Frank DiMarino
WARRANTLESS SEARCHES
Warrantless searches, according to the Supreme Court “are per se unreasonable under the
Fourth Amendment—subject only to a few specifically established and well-delineated
exceptions.” Likewise, a search that is unsupported by probable cause is also generally
unlawful. There are, however, some exceptions to the general rule that probable cause and
a warrant are required to conduct a search; for example, recall the earlier discussion about
Terry stops, where police are permitted to stop someone based on articulable suspicion.
Once a person is stopped, the police are able to conduct a pat-down and frisk in order to
protect officer safety.
PROTECTIVE SWEEPS
Similarly, if police officers enter a residence to make an arrest or conduct a search, accord-
ing to Maryland v. Buie (1990), they are permitted to conduct a protective sweep to ensure
that no one is hiding who may cause injury. Officers may conduct a limited protective sweep
that consists of a cursory inspection of “closets and other spaces immediately adjoining the
place of arrest from which an attack could be immediately launched.” Such a protective
sweep may extend to a nonadjoining area only if officers have a “reasonable belief based on
specific and articulable facts that the area to be swept harbors an individual posing a dan-
ger to those on the arrest scene.” If during the protective sweep officers find contraband,
that contraband could be seized and used as evidence.
Legal Issues in Criminal Investigations ◾ 351
PLAIN VIEW
Police may also seize evidence that is in plain view without a warrant, provided that: (1)
officers have not violated the Fourth Amendment in arriving at the place from which the
evidence could be plainly viewed; (2) the incriminating character of the evidence is imme-
diately apparent; and (3) items are not disturbed to discern the evidentiary value of an
item in plain view. This means that police may lawfully seize evidence in plain view when
executing either a search warrant or an arrest warrant. Notably, the plain view doctrine has
been extended to include “plain touch,” “plain smell,” and “plain hearing.”
EXIGENT CIRCUMSTANCES
Officers may also conduct a warrantless search under exigent circumstances, which include,
for example, such circumstances where evidence is subject to destruction, the safety of
the officers or the public is threatened, the suspect may flee before a warrant is able to be
obtained, or the police are in a “hot pursuit” of a suspect. The “hot pursuit” exception
includes those circumstances only when the police have made an immediate and continu-
ous pursuit of a suspect from the original crime scene. In drug cases, police may secure a
residence in such a way as to guard against the destruction or removal of evidence until a
warrant is obtained; for example, securing the perimeter and all inhabitants may safeguard
against the destruction of evidence. In addition, if authorities have a reasonable belief that
police safety or the safety of the general public is at risk, officers may enter a dwelling and
conduct a complete search without a warrant. Police may inspect any place where they
have a reasonable belief that dangerous items may be found. Courts examine the totality
of circumstances to determine whether exigent circumstances exist. Specifically, courts
will consider the gravity of the offense that underlies the need for the search and the rea-
sonableness attached to the manner in which the search was conducted. The prosecution
may need to show that a telephone warrant from a magistrate was not available and that
the conduct of the police did not improperly create the exigent circumstances such that the
circumstances were contrived.
CONSENT SEARCHES
A search may also be based on the permission that has been granted by a person who is
authorized to grant permission. Such consent searches, conducted without a warrant, are
lawful provided that consent was given voluntarily by someone who had the authority over
352 ◾ Frank DiMarino
the location to give consent. Consent may be express (e.g., in writing) or implied through
actions. To determine whether consent was voluntarily given, courts will weigh such fac-
tors as age, intelligence, education, ability to communicate in a particular language, and
length of time that the person was subject to questioning or detention.
VEHICLE SEARCHES
Concerning the search of vehicles, when police arrest an occupant of a motor vehicle they
can only search the passenger compartment of the vehicle incident to the arrest if: (1) the
arrestee is unsecured and within reaching distance of the vehicle, or (2) it is reasonable to
believe that evidence relevant to the crime of arrest will be found in the vehicle.
INVENTORY SEARCHES
After a lawful seizure of property, police may conduct a warrantless search of the property
to satisfy three purposes: (1) to protect the owner’s property while it is in police custody, (2)
to properly account for the property and protect the police against claims of lost or stolen
property, and (3) to protect the police from potential harm. Inventory searches must be
conducted according to standardized operating procedures. If contraband or evidence of a
crime is found during an inventory search, that evidence may be seized.
Finally, it is worth emphasizing that courts have repeatedly recognized the sanctity of a
home under the Fourth Amendment and required, except in rare circumstances, a warrant
to enter. As the Supreme Court has stated: “At the very core of [the Fourth Amendment]
stands the right of a man to retreat into his own home and there be free from unreasonable
governmental intrusion.” In the case of Kyllo v. United States (2001), Justice Antonin Scalia
described the protection afforded a home and said that any physical invasion of the struc-
ture of the home, “by even a fraction of an inch, was too much … and there is certainly no
exception to the warrant requirement for the officer who barely cracks open the front door
… In the home, our cases show, all details are intimate details, because the entire area is
held safe from prying government eyes.”
CRIMINAL PROCEDURE
Criminal procedure is governed by constitutional doctrine, statutory requirements, case
law, and court rules. If criminal procedural rules are violated, a successful prosecution is at
risk depending on the harm to a defendant’s constitutional rights to a fair trial. Procedural
rights are meant to ensure that a level playing field is afforded to a defendant so the defen-
dant, for example, is not compelled to incriminate himself, is able to discover the evidence
that the government intends to use at trial, and is allowed to challenge the credibility of
witnesses through cross-examination.
Legal Issues in Criminal Investigations ◾ 353
INDICTMENT
At the beginning of a criminal prosecution, rules of procedure afford the defendant the
opportunity to be made aware of the charges and to ensure that probable cause exists to
support the charges. For felony charges, a prosecutor prepares an indictment, which is the
charging document that alleges specific violations of criminal statutes by stating dates,
places, the manner in which the statute was violated, and other pertinent facts regarding
the commission of an offense. The indictment is presented to a grand jury, which, after
hearing evidence about the charges, determines whether probable cause exists to provide a
“true bill.” Generally, once an indictment is issued by the grand jury, the defendant may be
arrested or ordered to appear in court pursuant to a summons. In federal cases where there
is significant risk of harm to the public or where the defendant may flee, the defendant may
be arrested upon a criminal complaint and warrant for his arrest. In such cases, an indict-
ment may be presented to the grand jury within 30 days of the arrest.
INITIAL APPEARANCE
The first appearance of the defendant in court is known as the initial appearance. At this
hearing, the defendant is advised of his rights to remain silent and to have counsel repre-
sent him at trial. The magistrate also makes a determination as to the conditions of pretrial
release or bail that should be set for the defendant by assessing the gravity of the offenses,
the strength of the evidence, and the likelihood that the defendant may flee or cause harm
to society while awaiting trial.
ARRAIGNMENT
The second hearing in which the defendant appears in court is the arraignment. During
the arraignment, the judge may read the indictment, or the defendant may waive its read-
ing and ask the defendant how he pleads to the charges. In federal court, the presiding judi-
cial officer at an arraignment is usually a magistrate judge, who is not authorized to take
a guilty plea to a felony offense; therefore, at all felony arraignments in federal court con-
ducted by a magistrate judge, defendants plead not guilty. At the arraignment, the judge
also establishes obligations on the part of the government to provide to the defendant dis-
covery of the evidence and reciprocal discovery obligations on the part of the defendant
pertaining to expert witnesses and alibi witnesses.
pursuant to the exclusionary rule, which mandates that evidence obtained unlawfully not
be considered by a jury so as to deter police conduct that violated the defendant’s consti-
tutional rights.
TRIAL
During the trial itself, the jury is admonished that the defendant is presumed to be inno-
cent of the charges and can only be found guilty if the government is able to prove the
defendant’s guilt beyond a reasonable doubt. At trial, the defendant is entitled to zealous
representation by a defense counsel and may confront the witnesses through cross-exami-
nation. Additionally, the defendant cannot be compelled to testify. To reach a decision, the
jury must return a unanimous verdict. If convicted of the charges, the defendant is entitled
to have his case heard on appeal if he complies with the time requirements of filing an
appeal after his conviction.
PROSECUTORS
The prosecutor plays a significant role in the criminal trial and provides legal advice to law
enforcement while the criminal investigation is proceeding. Should the prosecutor only
be an advocate for the government in seeking a conviction? What ethical obligations are
imposed upon a prosecutor? The Supreme Court has commented on these questions and
has set forth the law regarding the role of the prosecutor in the American criminal justice
system; for example, the prosecutor must disclose to the defendant all evidence that is
exculpatory in nature or reflects payments or rewards to criminal informants, as well as
the prior convictions of prosecution witnesses. The ethical obligations of a prosecutor were
emphasized in Berger v. United States (1935), where the Supreme Court said:
4. How should an investigator record where evidence was found at a crime scene?
5. What is a chain of custody and why is it important?
6. How can an investigator establish probable cause to justify seeking an arrest
warrant?
7. What should an officer do if the person to be arrested will be found in someone’s
private home?
8. What are the exceptions to the general rule that an arrest must be conducted only
with a warrant?
9. What are the circumstances to consider when determining the reliability of an
informant’s tip?
10. What can an officer do during an investigatory stop?
11. What are the considerations to determine whether a protective sweep has legiti-
mately uncovered evidence of a crime?
12. What is the purpose of the exclusionary rule?
BIBLIOGRAPHY
CONSTITUTION AND STATUTES
Texas Penal Code, Title 1. Introductory Provisions. Chapter 1. General Provisions. Section 1.02.
Objectives of Code (http://www.statutes.legis.state.tx.us/docs/pe/htm/pe.1.htm).
U.S. Constitution, Amendment IV.
CASES
Andresen v. Maryland, 427 U.S. 468 (1976).
Arizona v. Gant, 556 U.S. ___, 129 S.Ct. 1710 (2009).
Atwater v. City of Lago Vista, 532 U.S. 318 (2001).
Brady v. Maryland, 373 U.S. 83 (1963).
Coolidge v. Hampshire, 403 U.S. 443 (1971).
Gideon v. Wainwright, 372 U.S. 335 (1963).
Florida v. J.L., 529 U.S. 266 (2000)
Johnson v. United States, 333 U.S. 10 (1948).
Katz v. United States, 389 U.S. 347 (1967).
Kyllo v. United States, 533 U.S. 27 (2001).
Mapp v. Ohio, 367 U.S. 643 (1961).
Maryland v. Buie, 494 U.S. 325 (1990).
Miranda v. Arizona, 384 U.S. 436 (1966).
Papachristou v. City of Jacksonville, 405 U.S. 156 (1972).
Roviaro v. United States, 353 U.S. 53 (1957).
Silverman v. United States, 365 U.S. 505, 511 (1961).
Strickland v. Washington, 466 U.S. 668 (1984).
Terry v. Ohio, 392 U.S. 1 (1968).
Thornhill v. Alabama, 310 U.S. 88 (1940).
United States v. Sokolow, 490 U.S. 1 (1989).
Virginia v. Moore, 128 S. Ct. 1598, 1607 (2008).
Wilson v. Arkansas, 514 U.S. 927 (1995).
356 ◾ Frank DiMarino
CHAPTER OBJECTIVES
After reading this chapter, you should be able to do the following:
Chapter Outline
• Introduction
• Preparation
• Testimony in Court
• Accuracy of Police Reports
• Chain of Custody of Evidence
• Personal Credibility
INTRODUCTION
This chapter discusses preparing a case for court from the lead investigator’s viewpoint.
Although both authors are attorneys, the chapter is not directed toward counsel prepara-
tion for trial, but toward the steps that the lead investigator needs to take to prepare for
trial. As former police officer Carole Moore noted (Birzer and Roberson, 2011):
357
358 ◾ Cliff Roberson and Gwynne Birzer
Students who want to make good grades hit the books prior to taking a test. Witnesses
who expect to be called to present evidence in court should take their cues from col-
lege kids and study the material that’s likely to be a part of the course.
PREPARATION
Effective witnesses do not simply arrive in court the day of the trial, do battle with the
defense attorney or attorney for the opposing party, and convince the jury that they are
telling the truth and that the defendant or witness for the other party is not being entirely
truthful. Effective witnesses prepare for court. Preparing for and testifying in court are
everyday experiences for some witnesses. Even when it becomes a common occurrence,
the witness must understand that, unless the information can be conveyed to the jury in
the proper manner, all the work done during the arrest, questioning, and charging of the
defendant may be wasted.
As is discussed later in this chapter, an average witness is almost always a prepared
witness. A superior witness is always a prepared witness. Chapter 4 discussed preparing
field notes and report writing. In this chapter, we look at preparing to use those notes and
reports in court. Successful court testimony begins with accurate preparation of notes and
reports. One of the most important steps in preparing for court is to proofread again those
notes and reports. If any errors or mistakes are discovered, it is important not to make any
changes but to report the problems to the counsel who is calling you as a witness. Reports
should always be prepared as if they will be used in court.
On receiving the summons to appear in court, the witness should attempt to contact the
prosecutor or attorney for the party that is calling him or her as a witness. In most large cit-
ies and counties, prosecutors—like the police—are overworked and understaffed and may
not return telephone calls before meeting the witness in the court hallway. The witness
should not depend on the prosecutor or counsel to make the job of testifying easy. The attor-
ney may not have carefully examined the file before appearing in court and may rely on the
reporting witness to carry the day. If a critical aspect of the case is not evident from reading
previous reports or statements, the witness should ensure that the attorney is informed of
this fact before the start of the trial—not just before taking the witness stand. The reason is
this: The attorney may be engaged in last-minute plea bargaining or settlement discussions
or may make an opening statement to the judge or jury that will later prove to be false if he
or she is not made aware of all the important facts surrounding the case.
After discussing the case with the attorney, the witness will await his or her turn to
testify. Depending on the nature of the case and the attorney’s preference, the witness may
testify first or last. Although jurors are told not to consider anything that is not admitted
into evidence, they will sometimes form unofficial opinions of persons on the basis of their
observations. If the witness is required to remain outside the courtroom, he or she should
also remain attentive and professional. In addition, the witness should be cordial but avoid
joking with other witnesses—and especially avoid laughing with the opposing counsel.
Jurors who observe these antics may believe that the witness is not serious about what is
occurring in the courtroom and therefore may discount his or her testimony.
Preparing the Case for Court ◾ 359
Having reviewed any previous reports or statements, refreshed the memory, and talked
with the attorney, the witness is ready to take the stand and testify. Dress regulations for
court appearances vary according to the jurisdiction. An effective witness strives for a
professional, conservative look. In reality, jurors should pay attention to the testimony and
not what the witness is wearing, but flashy clothes, rings, gold chains, or other out-of-the-
ordinary dress may cause a juror to concentrate on the witness’s clothing at a critical part
of the testimony instead of listening. The witness does not have to wear a three-piece suit
with a white shirt but should dress in a manner acceptable for court. Not suitable for court
are cowboy boots, jeans, or a leather miniskirt.
TESTIMONY IN COURT
Some individuals are uncomfortable standing or sitting in front of a group and talking.
Being an uncomfortable witness is different than being an unprepared witness. Being
uncomfortable may prove to make an effective witness, while being unprepared will never
make an effective witness. Occasionally, a witness may be required to testify in a deserted
courtroom with only the court personnel present, such as in a closed hearing; however,
the majority of a person’s testimony will occur in public. Moreover, the witness will be
subjected to cross-examination by the opposing attorney, who will attempt to destroy the
witness’s credibility.
Even if you were not a member of the debating team in high school or college or you
avoided taking public speaking classes, you may, with proper training, learn to communi-
cate in a professional manner while testifying. This oral skill can be mastered with practice,
but only if you are familiar with the purposes of both direct examination and cross-exami-
nation. In the following subsections, we briefly discuss this aspect of the judicial process.
To testify in court effectively, it is helpful for witnesses to understand the aims or goals
of direct examination. Most attorneys who call witnesses attempt to satisfy two generally
accepted objectives during direct examinations:
1. To present all legally sufficient evidence to support the charges or claims filed
against the opposing party or defendant
2. To convince the fact finder of the integrity of the evidence and, ultimately, the
truth of the charge or claim
OATH OR AFFIRMATION
Before a witness is allowed to testify, the witness is required to declare that he or she will
testify truthfully, by oath or affirmation administered in a form calculated to awaken the
witness’s conscience and impress the witness’s mind with the duty to do so. The requirement
of an oath is designed to ensure that every witness gives accurate and honest testimony.
The oath requirement is intended to preserve the integrity of the judicial process by awak-
ening the witness’s conscience and making the witness amenable to perjury prosecution if
he or she lies (United States v. Zizzo, 1997). Federal Rule 603 states that a witness need not
360 ◾ Cliff Roberson and Gwynne Birzer
swear an oath but may merely affirm that he or she will testify truthfully. An affirmation
can be given in any form calculated to awaken the conscience of the witness and impress
on the witness the duty to tell the truth. Permitting the witness to testify under an affirma-
tion as well as oath is designed to remove many of the objections that certain members of
some religious groups have. As a practical matter, if a witness prefers to affirm rather than
take the oath, court personnel should be notified prior to the witness taking the stand.
If the witness’s memory has been refreshed before trial, this fact may be addressed by
opposing counsel during cross-examination, and generally the opposing counsel will be
allowed to review the document and introduce relevant parts of it into evidence.
1. Counsel establishes that the witness’s memory is exhausted and that the witness
cannot testify fully and accurately from memory.
2. There is a document or other item that will refresh the witness’s memory.
3. Counsel shows the document to the witness and allows the witness to read or
examine it silently.
4. Counsel then asks the witness if he now recalls the matter independent of the
document; that is, the witness’s memory is refreshed.
5. If the witness states that he now recalls the matter independent of the document
(i.e., his memory is refreshed), the opposing counsel is permitted to question the
witness about the issue of whether the memory has been refreshed.
6. The witness is then allowed to testify.
7. If the witness testifies that he cannot recall the matter even after reviewing the
document, counsel may then try to have the document entered as evidence of past
recollection recorded.
It is, of course, hornbook law that when a party seeks to introduce a record of past
recollection, he must establish:
1) that the record was made by or adopted by the witness at a time when the witness
did have a recollection of the event, and
2) that the witness can presently vouch for the fact that when the record was made
or adopted by him, he knew that it was accurate.
Court decision: Judgment convicting appellant was reversed because appellant was
entitled to refresh the recollection of police officer by using the report written by a
fellow police officer.
STAGES OF EXAMINATION
• Direct examination—This is comprised of the initial questions put to the witness
by the counsel or party that called the witness.
• Cross-examination—After conclusion of direct examination, the opposing party
may examine the witness. During cross-examination, the counsel generally may
asking leading questions. On cross-examination, the witness may be questioned
as to his honesty, any bias the witness may have, the witness’s opportunity to
observe the incident, the witness’s memory, and subjects discussed during direct
examination.
• Redirect and recross-examination—After cross-examination, the calling party may
conduct a redirect examination over matters covered during cross-examination
followed by recross-examination. Often during redirect and recross the court will
restrict the introduction of new subjects because new subjects are generally outside
of the scope of the testimony.
OBJECTIONS TO QUESTIONS
Often when a witness is testifying, the opposite party will object to the form of the ques-
tion. Some of the more common objections include the following:
• The question is open ended and calls for undirected narrative. This restriction is
designed to keep the witness from answering with irrelevant or otherwise inad-
missible evidence.
• The question is leading. It is a question that suggests an answer. (Note: Leading
questions may be asked on cross-examination.)
• The question was an argumentative question designed to make or emphasize some
point or to argue to the jury rather than elicit information.
• Relevance objections arise when the question either asks a questions or calls for an
answer that is not relevant to the proceedings
Preparing the Case for Court ◾ 363
IMPEACHMENT OF A WITNESS
Impeachment refers to the process of attacking the credibility of a witness. The rules of
evidence in most states provide that the credibility of any witness may be attacked by any
party, including the party calling the witness. Under common law, a party who called a
witness could not impeach that witness unless the court declared the witness a “hostile wit-
ness.” This is no longer the rule. The rationale for the common law rule rested on assump-
tions concerning a party’s presumptive support of a witness called by that party and the
need to protect the witness from harassment. The federal rules of evidence recognize that
a party does not necessarily vouch for a witness; in fact, a party may have no choice but to
call an adverse witness in order to prove a case. Prior to the court declaring a witness to be
hostile, the party calling the witness must first establish that the witness is uncooperative.
1. Tell the truth. In a trial, as in all other matters, honesty comes first.
2. Do not guess. If you do not know, say so.
3. Be sure you understand the question. You cannot possibly give a truthful and
accurate answer unless you understand the question.
4. Take your time and answer the question asked. Give the question as much thought
as is required to understand it, formulate your answer, and then give the answer.
5. Give a loud, audible answer. Everything you say is being recorded. Do not nod
your head yes or no.
6. Do not look for assistance when you are on the stand. If you think you need help,
request it from the judge.
7. Beware of questions involving distance and time. If you make an estimate, make
sure everyone understands that you are making an estimate.
8. Be courteous. Answer yes or no, and address the judge as Your Honor.
9. If asked if you have talked to the prosecutor, admit it freely if you have done so.
10. Avoid joking and making wisecracks. A lawsuit is a serious matter.
These commandments are as valid for a seasoned witness as they are for a first-time wit-
ness. Each rule is based on both common sense and years of court experience by attorneys.
The first and most basic rule of testimony requires that the witness tell the truth. Although
the idea that witnesses should always tell the truth seems obvious, reality and emotions
can sometimes cause individuals to slant their testimony to assist an attorney or to ensure
that the defendant is portrayed in a bad light. Failure to testify truthfully has several con-
sequences. The most obvious issue is that the witness is sworn to tell the truth. Violation
of this oath can lead to criminal charges or the destruction of the person’s reputation. In
addition, the witness’s credibility may be destroyed in front of the court or jury, with the
364 ◾ Cliff Roberson and Gwynne Birzer
result that they disbelieve all of the witness’s testimony and find for the other party. This
result is the exact opposite of what was intended by slanting or stretching the truth to help
out the attorney or place the defendant in an unfavorable light. Who can forget the prob-
lems caused in the O.J. Simpson case when everyone learned that Detective Mark Fuhrman
of the Los Angeles Police Department had “forgotten” using racial slurs in the past?
Close to the first rule is the second, which requires that the witness not try to help the
case by guessing. If the witness is unsure, a simple statement to this effect is sufficient. Such
a statement shows the jury that the witness is human and may not have all the answers to
every question.
The third rule simply requires that the witness understand the exact question that is
asked. At first glance, this rule appears simple to follow; however, many times attorneys
will ask several questions in one sentence. If the witness is unsure of the exact question, a
request should be made to repeat or clarify the question.
The fourth rule requires the witness to think through both the question and the answer
instead of blurting out a response. Taking a few seconds to form the answer in your mind
before responding to the question is a good practice.
The fifth requirement mandates that the witness answer in a loud and clear voice.
Remember, appellate courts have only the written transcript of what occurred when they
review a case on appeal. The court reporter will not transcribe a nod of the head or esti-
mate the distance between the witness’s hands when he or she is demonstrating a gesture
or an action of the witness. If the witness uses motions during the testimony, they should
be accompanied by an accurate oral description.
The sixth commandment may seem harsh, but it exists for the witness’s benefit. The
witness must understand that no one but the judge can intervene during direct examina-
tion or cross-examination. The attorneys may raise objections, but the court must decide
whether the objections are valid. When objections are made, the witness should refrain
from speaking until the objection is ruled upon by the court.
The seventh rule is one that most witnesses will violate at least once. Typically, the wit-
ness states a distance during direct examination. For example, in response to the pros-
ecutor’s question about the distance between the witness and the defendant, the witness
may state, “The defendant was 20 feet from me when I observed the weapon.” On cross-
examination, the defense attorney may ask the witness to point out an object in court that
is 20 feet from the witness stand. If the witness is mistaken about this distance, the defense
attorney will clearly point out this mistake and will then ask how the witness could be
certain about the distance between the witness and the defendant on the night in question
when the witness cannot even make an accurate estimate in the calm and secure setting
of a courtroom.
The eighth commandment is also basically common sense, but it can also build an wit-
ness’s credibility. The witness should be seen as a professional and not as someone who
does not respect authority.
The ninth rule ties in with the first rule because it requires the witness to answer a ques-
tion truthfully. Discussing the case with the attorney who called before you testify is not
improper.
Preparing the Case for Court ◾ 365
The last commandment also pertains to the witness’s credibility. The defendant’s liberty
is at stake during the trial. The witness should be professional and calm when answering
every question. Once called to testify, the witness should approach the witness chair or, as it
is sometimes called, the witness box and turn to the court personnel to be sworn in. The wit-
ness will be asked to swear or affirm to tell the truth, the whole truth, and nothing but the
truth. Once the witness is sworn in, the court personnel will tell the witness to be seated.
The witness should wait for this invitation because doing so shows respect for the court
and allows the attorney to appear to be in control of the courtroom. Once the witness is
seated, the attorney calling the witness will ask a series of questions about the witness’s
knowledge of the crime, one of the individuals involved in the case, or the incident. This
questioning is direct examination. Following is a series of preliminary questions most
attorneys use to start the questioning:
1. Would you please state your full name for the record?
2. What is your occupation?
3. How long have you been employed by [employer]?
4. Do you, on this day, feel you are properly trained to perform the duties for which
you are employed?
5. On [the date and time in question], what was your assignment?
6. On that date and time, what, if anything, unusual did you observe while on this
assignment?
7. At what location did you observe this unusual occurrence?
8. Is that location in the [city, county, state] of [city, county, state]?
9. Please tell the jury what you observed.
The purpose of these questions is to allow the witness to become comfortable on the
stand and to give the jury some background information about the witness. Such questions
also set the stage for the more critical testimony about the witness’s observations and reac-
tions. In some jurisdictions, these questions are known as foundational questions because
they establish the witness’s jurisdiction and authority to act.
When a party calls a witness, the party is allowed to ask only direct questions (with
some minor exceptions that are not relevant to this text). Such questioning is accomplished
through direct examination. A direct question is open ended and does not suggest the
answer to the person being questioned. Once the attorney finishes with direct examina-
tion, the attorney for the other side has a right to cross-examine. Cross-examination allows
asking either direct or leading questions. A leading question is phrased in a way that sug-
gests an answer to the person being questioned.
After establishing the jurisdiction for the witness to act, the attorney will question the
witness about his or her knowledge of the case. The witness should listen to each question
and ensure that he understands what is being asked. If not clear what the exact question
is, the witness should state this fact and ask the prosecutor to restate the question. “I’m
not certain I understand your question; would you please restate it?” is one way to ask for
clarification. If the question is understood, the witness should pause for a second and then
366 ◾ Cliff Roberson and Gwynne Birzer
answer. This pause should follow every question; as is discussed subsequently, it becomes
extremely important during cross-examination. When answering a question, the witness
should answer only what was asked. Following is an example of a witness answering more
than was asked:
Not only is the witness’s response defective on several grounds, but it also creates more ques-
tions than it answers. Furthermore, without clarifying some of the issues in the witness’s
answer, the attorney may have opened the door for the other attorney to question whether
a certain individual was the same person who fled from the service station. Following is a
specific series of questions dealing with the issues the witness raised.
The difference between the two sets of questions and answers is apparent. The second set
gives the jury more complete facts about the incident and establishes why the witness could
recognize the defendant even though he lost sight of the defendant for several minutes.
Preparing the Case for Court ◾ 367
CROSS-EXAMINATION
Once the witness has answered the questions posed by the attorney who called the wit-
ness, the attorney for the other party has the right to ask questions on cross-examination.
Unlike trials in the movies, cross-examination seldom results in witnesses breaking down
and recanting their previous testimony; rather, it is a series of questions designed to attack
the credibility of witnesses by showing weaknesses in their original testimony or by estab-
lishing a motive or bias on their part.
Cross-examination is an art that has several purposes. It takes substantial preparation
to master effective cross-examination of a witness. Most attorneys will not ask a question
they don’t already know the answer to. All witnesses should be aware of these objectives
so they can better understand the questions being asked of them by defense attorneys.
Depending on the jurisdiction, some questions or issues may not be raised on cross-exam-
ination; however, the general objectives of cross-examination include, but are not limited
to, the following ten points:
Just as with direct examination, the witness should pause before answering any ques-
tion. This pause is critical because it allows the other attorney to object to the question and
prevent its answer from coming before the jury. Attorneys, during cross-examination, can
and will use numerous tactics or techniques to discredit the witness’s testimony.
The witness should know the facts surrounding the case. An unprofessional and embar-
rassing response by the witness is to say, “I don’t recall, but I put it in my report.” Rest
assured, the attorney for the other party will know the facts—and will have the oppor-
tunity to read the report again while the witness is testifying. In addition, the opposing
attorney has the other party’s version to draw on. Even though parties do not always tell
their attorneys the complete truth, the defense is provided with another perspective on the
facts that can be used to attack the witness.
Furthermore, the witness should always maintain a professional, courteous attitude.
Some attorneys will argue with witnesses, others will be condescending, and some may even
sneer. No matter what tactic is used, the witness should always maintain professionalism.
368 ◾ Cliff Roberson and Gwynne Birzer
Biggs (2001, p. 11) distinguished between an average investigator and a superior one:
• The average investigator looks at a group of people near a crime scene and thinks,
“There is a group of people standing around my crime scene.”
• The superior investigator looks at the same situation and thinks, “There is a group
of people standing around my crime scene and each of them knows something
about this case. It’s my job to get them to tell me what they know and then figure
out how to get the ones who do not want to talk to me to do so anyway.”
Preparing the Case for Court ◾ 369
The morning of the trial is not the day to discover errors in the reports. When you first
receive notice of a court appearance, immediately review the notes and reports associated
with your investigation of that case. This will generally occur several months or even years
after the crime. Review the reports and question each fact or word. Consider the following
court testimony (Birzer and Roberson, 2011):
Defense counsel (DC): Now, sir, you attacked the victim after she was already injured.
Isn’t that correct?
Witness (investigator): No.
DC: Your name is [name], correct?
Witness: Yes.
DC: You were the investigator on this case, correct?
Witness: Yes.
DC: You reported the events as they occurred, correct?
Witness: Yes.
DC: And you reported the events as accurately as you could recall them, correct?
Witness: Yes.
DC: You reviewed and signed the report we are referring to today, correct?
Witness: Yes.
DC: Now, sir, your report reads: “I raped her in a blanket and called for an ambu-
lance.” Correct?
Witness: But, sir, I meant “wrapped.”
DC: Not my question, sir. My question was whether or not your report reads, and I
quote, “I raped her in a blanket and called for an ambulance.” Correct?
Witness: Yes.
DC: How many other errors are in your report?
Because police reports are used as an official record in a DWI case, this is especially
troubling for a DWI suspect. Using pre-written police reports creates a false account
of the drunk-driving arrest. A skilled defense attorney may be able to obtain copies of
the officer’s other DWI reports within a certain time frame to determine whether or
not the he or she is using pre-written reports. If the defense attorney can prove that the
officer’s reports were pre-written, it will definitely diminish the officer’s testimony.
370 ◾ Cliff Roberson and Gwynne Birzer
PERSONAL CREDIBILITY
Consider this except from the Los Angeles Times (Gold and Gottlieb, 2005):
Compare that excerpt to this one the same day (Gold, 2005):
The capital murder convictions of Andrea Yates were thrown out by an appeals court
Thursday, three and a half years after she told investigators that she had methodi-
cally drowned her five children in the bathtub to spare them from eternal damna-
tion and to punish herself for being a bad mother. The court overturned the verdicts
because an expert witness for the prosecution, Dr. Park Dietz, mistakenly told the
jury that an episode of the television drama “Law & Order”—in which a woman
drowned her children in a bathtub—aired shortly before the Yates killings. In the
purported episode, the mother was acquitted of murder because she was judged
insane, according to the witness.
Prior to this mistake, Dr. Dietz was considered by many to be a professional witness on
matters involving mental issues in criminal cases. After his mistake in the Yates case, his
creditability as a witness was seriously diminished, and his value as an expert witness was
greatly reduced because of this mistake, even though this was probably an innocent mis-
take. Whenever he testifies in the future, he will be subject to be cross-examination by the
opposing party because of this mistake. The Dietz situation is an excellent example as to
why witnesses should be careful when testifying to make sure that their testimony is cor-
rect. Any misstatement or untruth will subject the witness to continuing harassment in the
future. The golden rule is do not testify as to a certain fact unless you are certain you are
correct. If you are uncertain, express those concerns in court while on the stand.
BIBLIOGRAPHY
Biggs, M. (2001). Just the Facts: Investigate Report Writing. Upper Saddle River, NJ: Prentice Hall.
Birzer, M. and Roberson, C. (2011). Introduction to Criminal Investigation. Boca Raton, FL: CRC
Press.
Clark, K. (2006). How to Really, Really Write Those Boring Police Reports. Flushing, NY: Looseleaf
Law Publishing.
County of San Diego, CA, District Attorney’s Office. (1995). Ten Commandments for Witnesses. San
Diego, CA: District Attorney’s Office.
Gold, S. (2005). Yates Case Turns on Trial Error. Los Angeles Times, January 7, p. A-1.
Gold, S. and Gottlieb, J. (2005). Defense Derides Psychiatrist as a Witness-for-Hire: Forensic Specialist
Park Dietz Was Paid $50,000 by the Prosecution to Testify Whether Andrea Yates Could
Distinguish Right from Wrong. Los Angeles Times, January 7, p. A-1.
Roberson, C. and Birzer, M.L. (2010). Introduction to Private Security. Upper Saddle River, NJ:
Prentice Hall, p. 246.
United States v. Casamento, 887 F.2d 1141 (2d Cir. 1989).
United States v. Miller, 994 F.2d 441 (8th Cir. 1993).
United States v. Zizzo, 120 f.3d 1338 (7th Cir. 1997).
S & CRIMINAL
FORENSICS
JUSTICE
& CRIMINAL JUSTICE
Birzer
•
Roberson
Introduction
Introduction
to to
CRIMINAL
CRIMINAL
INVESTIGATION
INVESTIGATION
Introduction to CRIMINAL
ner in
Thewhich
manner
criminal
in which
investigators
criminal investigators
are trained isare
neither
trained
uniform
is neither
nor consistent,
uniform norranging
consistent,
fromranging from
atedsophisticated
training protocols
trainingin protocols
some departments
in some departments
to on-the-jobtoexperience
on-the-job alongside
experiencesenior
alongside senior
ors investigators
in others. Idealin others.
for students
Idealtaking
for students
a first taking
course ainfirst
the course
subjectinasthe
well
subject
as professionals
as well as professionals
in in
a refresher,
need of Introduction
a refresher, Introduction
to Criminal to Investigation uses an accessible
Criminal Investigation uses anformat
accessible
to convey
format to convey
in practical,
conceptsconcrete
in practical,
terms.
concrete terms.
scussed
Topics
include
discussed include
ory of
•The
criminal
history
investigation
of criminal in
investigation
Western society
in Western society
cations
•Qualifications
for becomingfor
an becoming
investigator,
an the
investigator,
selection process,
the selection
and process,
ideal training
and ideal
requirements
training requirements
cene•Crime
search scene
techniques,
searchincluding
techniques,
planning
including
andplanning
post-search
anddebriefing
post-search debriefing
ng effective
•Preparing
fieldeffective
notes andfield
investigative
notes and reports
investigative reports
wing•Interviewing
and interrogating
and interrogating
INVESTIGATION
f evidence
•Typesfound
of evidence
at the crime
foundscene
at theand
crime
how
scene
to collect,
and how package,
to collect,
andpackage,
preserveand
it preserve it
utions
•Contributions
of forensic science
of forensic
to criminal
science
investigations
to criminal investigations
and the equipment
and the
used
equipment
in crimeused
labs in crime labs
ative•Investigative
protocol for aprotocol
range offor
crimes,
a range
including
of crimes,
property
including
crimes,
property
auto theft,
crimes,
arson,
auto theft, arson,
al crimes,
financial
homicide,
crimes,
assault,
homicide,
sex crimes,
assault,and
sexrobbery
crimes, and robbery
ized•Specialized
investigations,investigations,
including drugincluding
trafficking,
drugcybercrime,
trafficking,and
cybercrime,
gang-related
and gang-related
crime crime
sues•Legal
involved
issues
in criminal
involved
investigations
in criminal investigations
and preparing and
a case
preparing
for trial
a case for trial
together
Bringing
contributions
together contributions
from law enforcement
from law enforcement
personnel, academics,
personnel,and
academics,
attorneys,and
theattorneys,
book the book
practical
combinesand practical
theoretical
andelements
theoretical
to provide
elements
a comprehensive
to provide a comprehensive
examination ofexamination
today’s criminal
of today’s criminal
ive process.
investigative
The process.
accessible The
manner
accessible
in which
manner
the information
in which theisinformation
conveyed makes
is conveyed
this anmakes
ideal this an ideal
wide-ranging
text for a wide-ranging
audience. audience.
K11795 K11795