Professional Documents
Culture Documents
Criminal Investigation Ebook
Criminal Investigation Ebook
8
The Evolution of the Investigative Task: American Developments
The First American Police Departments and Detectives
Myths and Misconceptions 2.1: The Original CSI
Sheriffs, State Police, U.S. Marshals, and the Bureau of Investigation
Private Detectives
The Reform Era
The Community Problem-Solving Era
Myths and Misconceptions 2.2: The Mythology of the Federal Bureau of Investigation
Main Points
Important Terms
Questions for Discussion and Review
Chapter 3: The Role and Documentation of Evidence in Criminal Investigations
Objectives
From the Case File: The Murder of Stanley Van Wagner
Case Considerations and Points for Discussion
The Basics of Criminal Evidence
Judicial and Extrajudicial Evidence
Exculpatory and Inculpatory Evidence
Standards of Proof
The Meaning and Nature of Probable Cause
Types of Evidence
Direct versus Indirect Evidence
Case in Point 3.1: “All This Was Planned When the First Shot Was Fired”
Myths and Misconceptions 3.1: Circumstantial Evidence Is Not Very Useful
Testimonial, Real, Demonstrative, and Documentary Evidence
Case in Point 3.2: Evidence or Coincidence?
Testimonial Evidence
Real Evidence
Demonstrative Evidence
Case in Point 3.3: A Homicide Victim’s Letter to the Police
Documentary Evidence
The Functions of Evidence
Corpus Delicti Evidence
Corroborative Evidence
Cumulative Evidence
Associative Evidence
Identification Evidence
Behavioral Evidence
Documenting Evidence: The Value and Importance of Investigative Reports
Main Points
9
Important Terms
Questions for Discussion and Review
Chapter 4: The Law and Criminal Investigations
Objectives
From the Case File: Ernesto Miranda’s Confession
Case Considerations and Points for Discussion
Basic Legal Terminology
The Bottom Line: When Is an Arrest Warrant Necessary?
The Bottom Line: When Is a Search Warrant Necessary?
The Rules and Admissibility of Evidence
Constitutional Requirements for the Collection of Evidence
A Question of Ethics: Fudging a Chain of Custody
The Law of Search and Seizure: The Fourth Amendment
Reasonable Expectation of Privacy
The Search Warrant Requirement and Its Exceptions
The Bottom Line: When Does the Exigent Circumstances Exception Apply?
The Bottom Line: When Does the Vehicle Exception Apply?
Exhibit 4.1: Guidelines for Stopping and Searching Vehicles
The Bottom Line: What Places and Things Are Not Afforded a Reasonable Expectation of
Privacy?
The Bottom Line: When Does the Hot Pursuit Exception Apply?
The Bottom Line: When Does the Search Incident to Arrest Exception Apply?
The Bottom Line: When Does the Stop and Frisk Exception Apply?
The Bottom Line: When Does the Plain View Exception Apply?
The Bottom Line: When Does the Consent Exception Apply?
The Exclusionary Rule and Its Exceptions
The Bottom Line: What Is the Exclusionary Rule, and When Does It Apply?
A Question of Ethics: Do the Ends Justify the Means?
The Law of Self-Incrimination: The Fifth and Sixth Amendments
The Content and Waiver of Miranda Warnings
Exhibit 4.2: Example of a Miranda Waiver Form
Myths & Misconceptions 4.1: Miranda Is Not Like Houdini
What Constitutes an Interrogation?
The Implications of Silence
The Bottom Line: When Must the Police Tell Suspects of Their Miranda Rights?
Juveniles and the Miranda Requirement
Exceptions to the Miranda Requirement
The Impact of Miranda Warnings on Criminal Investigations
Myths & Misconceptions 4.2: Miranda Warnings Cause Suspects to Keep Quiet
Main Points
10
Important Terms
Questions for Discussion and Review
Chapter 5: Physical Evidence and the Crime Scene
Objectives
From the Case File: The Murders of Nicole Brown Simpson and Ronald Goldman
Case Considerations and Points for Discussion
The Role of Physical Evidence in Criminal Investigations
The Crime Scene and Its Management
Arriving at the Scene: Initial Response/Prioritization of Efforts
Preliminary Documentation and Evaluation of the Scene
Processing the Scene
Exhibit 5.1: Crime Scene Sketch and Diagram
Completing and Recording the Crime Scene Investigation
Case in Point 5.1: Crime Scene Photographs Should Tell a Story
Types of Physical Evidence
Exhibit 5.2: Crime Scene Search Patterns
Biological Evidence
Blood
Exhibit 5.3: Locating DNA Evidence
Semen
Case in Point 5.3: An Improbable Discovery of Semen
Saliva
Hair
Case in Point 5.4: Saliva on a Cigarette Butt
Case in Point 5.5: Saliva on Duct Tape
Other Bodily Fluids and Substances
Fingernail Scrapings, Skin Cells, and Touch DNA
DNA Analysis and Its Impact on the Usefulness of Biological Evidence
Case in Point 5.6: DNA Under the Victim’s Fingernails
Exhibit 5.4: Precautions When Collecting and Handling Biological Evidence
The Science of DNA
Case in Point 5.7: A Fool’s Attempt to Fool DNA
Other Types of Physical Evidence
Fingerprints
Case in Point 5.8: A Textbook DNA Case
Exhibit 5.5: Types of Fingerprint Patterns
Exhibit 5.6: Example of Completed Ten-Print Fingerprint Card
Shoeprints, Impressions, and Tire Tracks
Exhibit 5.7: Unusual Shoeprints
Toolmarks
11
Bite Marks and Dental Evidence
Ballistics
Fibers
Soil
Paint
Glass
Blood Pattern Analysis
Digital Evidence
Video Evidence
Questioned Documents/Handwriting Analysis
Drugs
The Role of Crime Laboratories in Criminal Investigations
Forensic Science Specialty Areas
Exhibit 5.8: Characteristics of Drugs Most Commonly Encountered on the Street
Exhibit 5.9: Job Announcement for a Forensic Criminalist Position
Main Points
Important Terms
Questions for Discussion and Review
Chapter 6: Interviews and Eyewitness Identifications
Objectives
From the Case File: BP Gas Station Robbery
Case Considerations and Points for Discussion
Interviews Defined
Types of Witnesses
Types of Information Obtained From Witnesses
Methods of Eyewitness Identification
Development of a Composite Picture of the Perpetrator
Exhibit 6.1: Example of a Composite Picture Developed With FACES Software
Exhibit 6.2: Example of Artist Composite Picture
Confirmatory Photograph
Mug Books and Yearbooks
Exhibit 6.3: Four Sketches of the Same Perpetrator
Show-Up Identifications
Photo Lineups
Exhibit 6.4: Example of a Six-Person Photo Lineup
Live Lineups
Value of Eyewitness Identifications in Establishing Proof
Exhibit 6.5: Example of a Live Lineup Photo
The Memory Process and the Identification Task
Myths and Misconceptions 6.1: You Never Forget a Face
12
Factors That Influence the Accuracy of Eyewitness Evidence
Case in Point 6.1: A Shoot-Out or Something Else?
Guidelines for the Collection of Eyewitness Evidence
Case in Point 6.2: How Did That Happen?
Case in Point 6.3: The Case of Ronald Cotton
Case in Point 6.4: Variations in Eyewitness Descriptions
Investigative Tools in Interviewing
Hypnosis
Exhibit 6.6: Photo Array Identification Instruction Form
Cognitive Interview
Cognitive Interview in Contrast With the Standard Police Interview
Other Guidelines for Conducting Police Interviews
Case in Point 6.5: Witness Security versus Witness Compassion
Main Points
Important Terms
Questions for Discussion and Review
Chapter 7: Interrogations and Confessions
Objectives
From the Case File: The “Secret” Interrogation of O. J. Simpson
Case Considerations and Points for Discussion
Interrogations Defined
The Controversy of Interrogation Methods
Prerequisites for a Productive Interrogation
Case in Point 7.1: “Every Time We Do Something Illegal, I’m the One Who Has to Do It”
Exhibit 7.1: Truisms About Confessions
Approaches to Investigative Interrogations
The Reid Technique: The “Convince to Confess” Approach
The PEACE Model: The “Respect for the Truth” Approach
Myths and Misconceptions 7.1: Interrogations Involve Bright Lights and Hot Rooms
Case in Point 7.2: Treating a Killer Kindly
The Potential Problems With Police Deception in Interrogations
Case in Point 7.3: “We’re Going to Work Through This Together. Okay?”
A Question of Ethics 7.1: Should the Police Lie to Get Suspects to Tell the Truth?
Why Do Suspects Confess?
The Issue of False Confessions
Investigative Tools in Recognizing Deception
Verbal and Nonverbal Detection of Deception
Exhibit 7.2: “The Best Way to Unsettle a Suspect”
Mechanical Methods of Detecting Deception
Main Points
13
Important Terms
Questions for Discussion and Review
Chapter 8: Behavioral Evidence and Crime Analysis
Objectives
From the Case File: A Mutilation Murder
The Crime
Key Crime Scene Characteristics
The Resulting Crime Scene Profile
The Outcome
Case Considerations and Points for Discussion
Behavioral Analysis Defined
Crime Scene Profiling
Myths and Misconceptions 8.1: Criminal Minds
Assumptions of the Profiling Process
Exhibit 8.1: What Does Your Car Say About You?
The History of Crime Scene/Psychological Profiling
The Construction of Psychological Profiles
The Meaning of Perpetrator Actions and Crime Characteristics
The Effectiveness of Crime Scene Profiling
Geographical Profiling
Exhibit 8.2: Where Do You Go Grocery Shopping?
Psycholinguistics
Case in Point 8.1: The Murder of JonBenet Ramsey
Crime Analysis
The Impact of Geospatial Crime Analysis
Myths and Misconceptions 8.2: Crime Is a Random Phenomenon
Violent Criminal Apprehension Program (ViCAP)
The Impact of ViCAP
Empirical Crime Analysis
Main Points
Important Terms
Questions for Discussion and Review
Chapter 9: Information From the Public, Social Media, Information Networks, Digital Devices, and
Other Sources
Objectives
From the Case File: “Ain’t No Love in the Heart of the City”
Case Considerations and Points for Discussion
Information From the Public in Criminal Investigations
Tip Lines
Television Shows
14
AMBER Alerts
Case in Point 9.1: An AMBER Alert Success Story
Case in Point 9.2: Another AMBER Alert Success Story
Case in Point 9.3: The Murder of Carlie Brucia
Code Adam
Other Methods of Soliciting Information From the Public
Limitations
Information From Social Media in Criminal Investigations
Case in Point 9.4: A Robber Recognized on Facebook
Exhibit 9.1: Examples of Incriminating Statements Made on Facebook
Confidential Informants
Gang Intelligence
What Is a Gang?
Exhibit 9.2: Tips for Handling Informants
Street Gangs
Exhibit 9.3: The Basics of Gang Graffiti
Outlaw Motorcycle Gangs
Investigative Response to Gangs
Information Networks
Intradepartmental and Regional Databases
Interdepartmental Databases
Limitations
Information From Electronic Devices and Digital Evidence
Case in Point 9.5: “She Is So Raped”
Case in Point 9.6: A Killer Identified via an IP Address
Seizing Electronic Devices and Computer Data Extraction
Case in Point 9.7: Find the Phone, Find the Girl and More
Psychics
Main Points
Important Terms
Questions for Discussion and Review
Chapter 10: Death Investigation
Objectives
From the Case File: He Hit Her Until She Fell . . . and That Was Just the Beginning
Case Considerations and Points for Discussion
Issues in the Investigation of Death: Manner of Death
Exhibit 10.1: Quick Facts About Death
Exhibit 10.2: Location of Gunshot Wounds in Homicides and Suicides
Patterns and Characteristics of Homicide
Myths and Misconceptions 10.1: The Methods of Murder
15
Investigative Considerations With Death and Homicide
Exhibit 10.3: Declining Homicide Clearance Rates
Who Is the Decedent?
What Was the Cause of Death?
Exhibit 10.4: Types and Indicators of Gunshot Wounds by Muzzle to Skin Distance
The Value of an Autopsy in Establishing Cause and Manner of Death
Who Committed the Murder?
Case in Point 10.1: Autopsy Protocol of Anthony Porter, Homicide Victim
Case in Point 10.2: Things Are Not Always as They Seem
Major Challenges in Homicide Investigations: Serial Homicide
Major Challenges in Homicide Investigations: Cold Cases
Case in Point 10.3: Cold Case Cleared
Main Points
Important Terms
Questions for Discussion and Review
Chapter 11: The Investigation of Sex Crimes, Assault, Child Abuse, and Related Offenses
Objectives
From the Case File: “Since You Don’t Have Any Money . . .”
Case Considerations and Points for Discussion
Varieties and Characteristics of Rape and Other Sexual Assaults
Investigative Considerations With Rape and Other Sexual Assaults
The Perspective of the Victim
Myths and Misconceptions 11.1: The Circumstances of Rape
The Police Response and Interview of the Victim
Case in Point 11.1: “My Stepbrother Assaulted Me”
Case in Point 11.2: One Thing Leads to Another and a Rape Is Solved
Physical Evidence
Drug-Facilitated Sexual Assaults
Information From Perpetrators: Physical Evidence and Confessions
Other Sources of Evidence and Information in Sexual Assault Investigations
False Allegations
Varieties and Characteristics of Other Assaults
Exhibit 11.1: What Is a Gang-Related Crime?
Investigative Considerations With Other Assaults
Anti-Snitching Norms and Reluctant Witnesses
Exhibit 11.2: The Problem of Witness Intimidation
Domestic Violence and Child Abuse
Domestic (and Intimate Partner) Violence
Child Abuse
Main Points
16
Important Terms
Questions for Discussion and Review
Chapter 12: The Investigation of Robbery
Objectives
From the Case File: The Robber Who Lost His Tool
Case Considerations and Points for Discussion
Varieties and Characteristics of Robbery
Investigative Considerations With Robbery
Myths and Misconceptions 12.1: Only the Best and Brightest Rob Banks
Holdup Alarms and a Fast Police Response
Eyewitness Identifications and CCTV
Modus Operandi
The Meaning of Target Selection
Case in Point 12.1: A Robbery Investigation Begins With the MO
The Robber’s Approach and Departure
Verbal Activity of the Robber
The Weapon and Disguise Used
Physical Evidence
Case in Point 12.2: The Thief Who “Blew It”
The Property Taken in the Robbery
Interrogation Considerations
Other Strategies and Sources of Information
Main Points
Important Terms
Questions for Discussion and Review
Chapter 13: The Investigation of Burglary, Vehicle Theft, Arson, and Other Property Crimes
Objectives
From the Case File: Dad and Daughter Go to Work
Case Considerations and Points for Discussion
Varieties and Characteristics of Burglaries
Investigative Considerations With Burglary
Burglar Alarms and the Initial Police Response
Modus Operandi
Method of Target Selection
Method of Entry
Amount of Pre-Offense Planning
Method of Search for Property
Choice of Property Taken
Investigative Value of the Stolen Property
Physical Evidence
17
Informants
Other Considerations
Varieties and Characteristics of Vehicle Theft
Investigative Considerations With Vehicle Theft
Myths and Misconceptions 13.1: Expensive Cars Are the Most Frequently Stolen
Police Officers on the Lookout, VINs, and License Plate Reader (LPR) Technology
Physical Evidence
Modus Operandi: Motive and Method
Eyewitnesses and CCTV Surveillance Cameras
The Use of Bait Cars
Investigative Task Forces
Varieties and Characteristics of Arson
Investigative Considerations With Arson
Responding to the Fire Scene: Initial Investigative Activities
Evidence to Determine the Cause of the Fire
Exhibit 13.1: Indicators of Arson as a Fire Cause
Point of Origin
Evidence to Determine Who Committed the Arson
Case in Point 13.1: A Suspicious Fire
Varieties and Characteristics of Larceny
Investigative Considerations With Larceny
Exhibit 13.2: Crime Solvers Press Release
Interrogation Considerations With Burglars, Arsonists, and Other Thieves
Main Points
Important Terms
Questions for Discussion and Review
Chapter 14: The Investigation of Fraud and Other Computer-Related Crimes
Objectives
From the Case File: An Internet Chat With an Undercover Officer
Case Considerations and Points for Discussion
Fraud and Its Investigation
Identity Theft
Case in Point 14.1: “Visit Me!”
Exhibit 14.1: “Your Account Has Won 1,000,000.00”
Exhibit 14.2: What Does the FACT Act Do?
Check and Credit/Debit Card Fraud
Exhibit 14.3: Steps to Take When Your Identity Has Been Stolen
Exhibit 14.4: The FTC Consumer Sentinel
Prescription Fraud
Case in Point 14.2: Theft, Purchase, and Arrest
18
Varieties of Computer-Facilitated Crime and Their Investigation
Cyberattacks
Exhibit 14.5: One of the FBI’s Most Wanted Cyber Criminals
Cyberbullying and Harassment
Exhibit 14.6: Common Forms of Cyberattacks
Case in Point 14.3: “You Are a Bad Person and Everybody Hates You”
Case in Point 14.4: “I’m Going to Send out the Photos Unless . . .”
Child Pornography
Case in Point 14.5: A Big Arrest From Little Clues
Main Points
Important Terms
Questions for Discussion and Review
Chapter 15: The Presentation of Evidence
Objectives
From the Case File: A Tragedy and Then More
Case Considerations and Points for Discussion
The Adversarial Process
Errors in Justice Outcomes
The Seriousness of Errors in Justice Outcomes
Reasons for Errors in Justice Outcomes
Case in Point 15.1: The Case of Eddie Joe Lloyd
A Question of Ethics: Why Is It Okay to Lie Sometimes but Not Other Times?
The Value and Importance of Investigative Testimony
Expert Testimony
Testimony of Investigators
Testimony at the Deposition, Preliminary Hearing, and Trial
The Cross-Examination
A Question of Ethics: Why So Many Legal Rules?
Main Points
Important Terms
Questions for Discussion and Review
Chapter 16: Terrorism, Technology, and the Future of Criminal Investigation
Objectives
From the Case File: The Day the World Changed
Case Considerations and Points for Discussion
A Question of Ethics: Information at Any Cost?
The Future of Criminal Investigation
Varieties and Characteristics of Terrorism
Technology
Exhibit 16.1: Variations in Terrorism
19
Case in Point 16.1: A 35,000-Word Clue From a Lone Wolf
Exhibit 16.2: Terrorists’ Tools and Targets
Myths and Misconceptions 16.1: Falsities About Terrorism in the United States
A New Approach to Criminal Investigations
Exhibit 16.3: Common Types of Cybercrimes
Intelligence-Led Policing
Exhibit 16.4: Terrorist Group Structure
Case in Point 16.2: Information Discovery After the Fact
Exhibit 16.5: Seven Signs of Terrorist Activity
Limitations of the Intelligence-Led Approach
The New Technology of Crime Detection
The Technology of Identification and Forensic Science
A Question of Ethics: Why Are Some Biometric Technologies So Controversial?
The Technology of “Seeing”
Technologies for Computer and Internet Applications
Technologies for Information Management and Access
The Implications of Technology
Main Points
Important Terms
Questions for Discussion and Review
Appendix: Capstone Case
Glossary
Notes
Index
20
Preface
Criminal investigation is arguably the most important stage in the entire criminal justice process. Only when a
perpetrator is identified and apprehended can the process continue—can courts adjudicate and corrections
reform. And it is only when the process continues that there is even a chance potential offenders will be
deterred and actual offenders incapacitated. As discussed in this book, there are many factors that determine
whether offenders are identified and apprehended, and well-executed criminal investigations are at the top of
this list. As such, if we desire a criminal justice process that functions well, it is necessary that criminal
investigators have the requisite knowledge, education, and training to conduct competent investigations.
Although it is not realistic to expect this knowledge can be obtained in a single course (or from a single
textbook) on criminal investigations, such a course (and textbook) can play an extremely important role in
developing it. Criminal Investigation provides a basis for competent investigations.
To achieve this, the text focuses on many different aspects of criminal investigation and evidence. Criminal
investigation and criminal evidence go hand in hand; they are inseparable. Criminal investigations are
conducted to collect criminal evidence, and it is evidence that is used to establish proof in an investigation.
Investigators must understand the role and function of evidence, the strengths and weaknesses of various
forms of evidence, how different types of evidence can be used to establish proof, the legal issues that relate to
the collection of evidence, and best practices for the collection of evidence. Criminal Investigation provides this
knowledge.
Criminal Investigation also emphasizes the real world of investigations. A common and important method of
learning and instruction in criminal investigation is the review and analysis of actual cases. Case examples are
used as teaching tools in investigative seminars and in training. Investigators learn things from every
investigation, and this text emphasizes this approach. Many case examples are provided in the text to illustrate
key points and to provide a basis for discussion about the proper conduct of criminal investigations. These
detailed cases bring the discussion to life and make it relevant and interesting.
This text emphasizes research findings that relate to criminal investigations. Such findings are used to identify
and recommend best practices (procedures) to follow in criminal investigations. Familiarity with research
findings also allows one to develop a solid understanding of the issues under examination. One example of this
can be found in the discussion on eyewitness identifications. This book devotes the better part of a chapter to
eyewitness identifications. However, instead of just providing instructions on how to conduct these
21
identifications, Criminal Investigation also provides a discussion of the research supporting the recommended
procedures. To accomplish this, the discussion draws upon research on human memory as well as on
eyewitness identifications. As such, Criminal Investigation not only provides details regarding the collection of
eyewitness evidence; it also explains why these procedures are important. Issues such as this receive minimal, if
any, coverage in other criminal investigation texts. These deeper, more probing questions are what lead to a
greater understanding of criminal investigation procedures. By incorporating research findings into the
discussion, this book provides an education about criminal investigations.
Just because Criminal Investigation emphasizes research findings and evidence, however, this does not mean
the text is complicated or difficult to read. To the contrary; the text is very accessible to students and is written
in a straightforward manner.
Criminal Investigation is of reasonable length for a one-semester course. Many instructors, including myself,
have had difficulties teaching from ever-expanding criminal investigation books, and students often have
difficulties in learning from them. This text includes the most important material for students; I made
informed decisions about what topics were most important to address and where those topics were most
appropriately incorporated in the text. Even though this fourth edition includes many new discussions and
cases, it is about the same length as the third edition.
Criminal Investigation offers several features to help establish an understanding of the complexities of criminal
investigations:
Detailed case studies (“From the Case File”) at the beginning of each chapter describe actual investigations as
they were conducted. These case studies can be used to analyze how evidence is (or could be) used to establish
proof and to evaluate how criminal investigations were conducted—what was done correctly and/or what
mistakes were made in the investigation. After each case study is a section titled “Case Considerations and
Points for Discussion.”
Numerous other real-life investigative case examples (including “Case in Point” features) illustrate key points.
Sections titled “Myths and Misconceptions” address some of the false information that is provided by the
media and through other representations of criminal investigations.
“A Question of Ethics” features are strategically placed throughout the book and require students to think
about the importance of ethical conduct in criminal investigations.
Detailed discussions are provided about the role, strengths, and limitations of all major forms of evidence:
DNA and biological evidence, other forms of forensic evidence, eyewitness identifications, geospatial crime
analysis, evidence from digital devices and social media, behavioral evidence, psychological profiling, the
detection of deception, and confessions, among others.
Information on and evaluations of proper evidence collection procedures for all types of evidence is also
included.
22
23
Changes in the Fourth Edition
The fourth edition of Criminal Investigation has been substantially revised. As the result of careful attention to
detail and writing style, the fourth edition is about the same length as the third edition but contains more
information.
Standard revisions to the fourth edition include updates to statistical information, research findings,
investigative procedures, and legal cases.
Among the most notable other changes to the fourth edition are the following:
Several new “From the Case File” chapter introductions and approximately twenty-five new in-chapter
“Case in Point” investigative case examples
More than seventy-five new photos, most of which are case photos from actual investigations
An in-text glossary to highlight and define important terms
Major reorganization of many chapters; for example,
Chapter 3 now includes a discussion of the role of evidence in investigations as well as new
material on documenting evidence via report writing.
Chapter 8 now includes a significant discussion of crime analysis as a source of information in
investigations.
Chapter 9 now includes expanded discussions on social media as a source of information in
investigations and on evidence that can be obtained from electronic digital devices.
Chapter 14 now focuses exclusively on the investigation of fraud and computer-related crimes and
features an expanded discussion of the various forms of these crimes.
Chapter 15 focuses on the court process and related outcomes as well as the presentation of
evidence in court through testimony.
Chapter 16 is more focused on the future of criminal investigations, specifically on terrorism and
the use of technology in investigations.
Many new and/or revised discussions are provided in the chapters. For instance,
Chapter 1 includes new sections titled “Mental Mistakes in Criminal Investigations,”
“Perspectives on the Criminal Investigation Process,” and “Qualities and Characteristics of
Investigators.”
“Juveniles and the Miranda Requirement” has been added to Chapter 4.
New material on touch DNA and the limitations of scientific evidence has been added to Chapter
5.
A revised discussion of the memory process and the identification task is offered in Chapter 6.
The controversies involving the traditional approach to interrogations are discussed in Chapter 7,
and the PEACE model is discussed as an alternative to the traditional approach.
The investigation of drug-facilitated sexual assaults is discussed in Chapter 11.
Pharmacy robberies and carjacking are examined in Chapter 12.
The discussion of fire investigations has been significantly revised in Chapter 13.
24
Intelligence-led policing is discussed as an emerging approach to criminal investigations in
Chapter 16.
25
Overview of the Organization
With regard to the organization of the text, the first two chapters provide a discussion of the basic issues of
criminal investigation (e.g., organization, design, history). Chapters 3 and 4 discuss the role of evidence in
criminal investigations and the law as it relates to the collection of evidence. Chapters 5, 6, and 7 are the most
important chapters of the book. These chapters discuss the “big three” types of evidence in criminal
investigations: physical evidence, witness statements and eyewitness identifications, and confessions. The next
two chapters examine other sources of information in investigations: Chapter 8 looks at behavioral evidence
and crime analysis, and Chapter 9 examines the role of the public, social media, digital devices, and electronic
databases in investigations. Chapters 10, 11, 12, 13, and 14 focus on issues that are unique to the investigation
of particular types of crimes. The book concludes with a discussion of the presentation of evidence (Chapter
15) and the future of criminal investigations (Chapter 16). Some important topics, such as issues associated
with drug investigations and gang involvement in crime, do not have their own chapters but are discussed
throughout the text. The appendix provides a detailed case study of a serial homicide investigation that
occurred in the 1960s. The case involved the sexually motivated murders of seven mostly college-aged women
in Michigan. This case can serve as a capstone discussion of many of the issues covered in Criminal
Investigation, such as the basic problems of criminal investigation, the value of eyewitness identifications, the
value of other evidence, the potential value of DNA evidence, how investigations may change due to advances
in technology, and how proof can be established.
Criminal Investigation provides the reader with a substantial and necessary foundation on which to build an
understanding of criminal investigation.
26
Resources for Instructors and Students
27
edge.sagepub.com/brandl4e
SAGE edge for Instructors supports your teaching by making it easy to integrate quality content and create a
rich learning environment for students.
A Microsoft¯ Word¯ test bank is available containing multiple choice, true/false, short answer, and essay
questions for each chapter. The test bank provides you with a diverse range of pre-written options as
well as the opportunity for editing any question and/or inserting your own personalized questions to
effectively assess students’ progress and understanding.
Editable, chapter-specific PowerPoint¯ slides offer complete flexibility for easily creating a multimedia
presentation for your course.
Lecture notes summarize key concepts by chapter to help you prepare for lectures and class discussions.
Sample course syllabi for semester and quarter courses provide suggested models for structuring your
courses.
Lively and stimulating ideas for class activities that can be used in class to reinforce active learning. The
activities apply to individual or group project.
An in-depth capstone case from the book that can serve as a discussion of many issues covered in the
text.
EXCLUSIVE! Access to full-text SAGE journal articles that have been carefully selected to support
and expand on the concepts presented in each chapter is included.
Video and web resources provide further research and insights that bring concepts to life and make
learning easier.
Access to all tables, figures, learning objectives, and chapter outlines from the text.
28
29
Acknowledgments
Many people assisted me in writing this book and I am grateful for their contributions. The fourth edition of
this book would not have been possible without Jessica Miller and Jerry Westby (now retired) at SAGE. The
entire team at Sage was a delight to work with. Shannon Kelly, wordsmith extraordinaire, made the copy
editing stage of the book painless and productive. I am also grateful to the many others who worked backstage
at SAGE, including content development editor Neda Dallal, editorial assistants Rebecca Lee and Jennifer
Rubio, marketing manager Jillian Ragusa, and production editor Veronica Stapleton Hooper.
Many law enforcement professionals also made important contributions to this book. I thank Chief of Police
Ed Flynn, Assistant Chief William Jessup, Inspector Thomas Stigler, Captain Steve Caballero, Lieutenant
Christopher Moews, and Lieutenant Tom Casper of the Milwaukee Police Department; Chief of Police
Thomas Czarnyszka, Captain Daniel Herlache, and Detective Scott Purtell of the Glendale (WI) Police
Department; Chief of Police Kenneth Meuler, Captain Timothy Dehring, and Officer Kelly Scannell of the
West Bend (WI) Police Department; Chief of Police Peter Hoell and Detective Penny Schmitt of the
Germantown (WI) Police Department; Chief of Police Peter Nimmer of the Shorewood (WI) Police
Department; and Forensic Investigator Crystal Williams and Operations Manager Karen Domagalski of the
Milwaukee County Medical Examiner’s Office. These people enthusiastically provided information and their
expertise to improve the quality of the book.
I would also like to thank graduate student Nadine Marion Mueller from the University of Wisconsin–
Milwaukee. She stepped in at the perfect time and was like an army of ten when it came to doing research for
this edition of the book.
I would also like to acknowledge the support of several colleagues on this project and others over the years:
Professor Meghan Stroshine of Marquette University, Professor Robert Worden of the University at Albany,
Professor James Frank at the University of Cincinnati, Professor Emeritus Gary Cordner of Kutztown
University, and Professor Emeritus Frank Horvath of Michigan State University.
Finally, on a personal note, I thank the three people who are most important in my life. My deepest
appreciation to goes to Katy, David, and Laurie. Laurie was with me every step of the way and was a constant
source of support. Thank you.
30
Publisher’s Acknowledgments
SAGE wishes to acknowledge the valuable contributions of the following reviewers.
31
About the Author
Steven G. Brandl
(Ph.D., Michigan State University, 1991) is a professor in the Department of Criminal Justice at the
University of Wisconsin–Milwaukee. Professor Brandl teaches numerous graduate and undergraduate
courses, including Criminal Investigation, Police Management, and Issues in Police Practice and Policy,
among others. His research interests include police use of force, the hazards of police work, and criminal
investigation.
Brandl has conducted research projects and consulted with numerous major metropolitan police
departments, including the Milwaukee Police Department and the Chicago Police Department, as well
as with many suburban police departments. In addition to this textbook, he is the author of Police in
America (Sage, 2018) and numerous articles in professional journals. He is co-editor of The Police in
America: Classic and Contemporary Readings and Voices from the Field. He is also a frequent presenter at
professional conferences.
32
1 The Investigation of Crime
©iStockphoto.com/DenisTangneyJr
33
Objectives
After reading this chapter you will be able to:
Discuss the evidence in the Beltway sniper investigation and explain how the perpetrators were identified.
Identify the goals of the criminal investigation process.
Discuss the three major problems with evidence in criminal investigations.
Identify two different types of criminal investigations (reactive, proactive).
Define the four stages of the reactive criminal investigation process.
Identify the major undercover strategies (stings, decoys, undercover fencing operations).
Discuss a criminal investigation as a battle, as a puzzle, and as a game.
Explain the role of luck, logic, and inference in criminal investigations and identify the associated pitfalls of each.
Describe the extent to which various crimes are solved by the police and explain the reasons why more crimes are not solved.
34
From the Case File The Investigation of the Washington, D.C., Beltway
Snipers
The manhunt began the night of October 2, 2002, when James Martin was shot dead in the parking lot of a store in Wheaton, Maryland.
It ended twenty-one days and twelve more victims later with the arrest of John Allen Muhammad and Lee Boyd Malvo at a highway rest
stop outside of Washington, D.C.
For the first seven shootings, which occurred October 2 through October 4, the police had few clues. No one actually saw the shooter, but
witnesses reported seeing a white van or white box truck in the area after several of the shootings. In one of the incidents, a witness told
the police he saw a dark-colored Chevrolet Caprice driving away from the scene with its lights off. The importance of the Caprice,
however, was drowned out by the continued sightings of the white van and white truck. By October 12 the police and Federal Bureau of
Investigation (FBI) had obtained enough information from witnesses to produce pictures of the van and truck believed to be involved in
the shootings, which they released to the media. The police checked and searched hundreds of white vans and trucks, looking for
anything suspicious they could link to the shootings. They found nothing.
Although the hunt for the vehicle was hitting a dead-end, the sniper’s modus operandi (MO) had become clear: All the victims were shot
with the same ammunition—a .223-caliber bullet, popular with hunters, competitive shooters, and the military. Given the distance from
which many of the victims were shot, the police also suspected the sniper had some skill and training as a marksman. Most of the
shootings were concentrated in the Montgomery County area of Maryland, suggesting that the killer lived in that area. There was also a
strong possibility the killer was watching developments in the investigation on television and altering his activities based on this. For
example, when Montgomery County police chief Charles Moose reassured parents that their children were safe, the sniper’s next victim
was a thirteen-year-old boy shot and critically wounded while arriving at school. After this shooting the police found a tarot “death” card
and a spent shell casing in some matted grass near the school. On the back of the card was a message that read, “Dear Policeman, I am
God.” Along with the card was a note stating the police should not reveal the message to the media. Nevertheless, the media found out
and publicized the message. The deadly drama was intensifying.
On October 14 a woman in the parking lot of a store in Falls Church, Virginia, was shot. Once again several witnesses told the police
they had seen a white van driving away after the gunshots. One witness stated the shooter was driving a cream-colored Chevrolet Astro
van with a burned-out left taillight and a chrome ladder rack on its roof. Better yet, the witness also told the police he had seen the
shooter and his gun. The gun was described as an AK-47, and the witness said the shooter had dark skin. As in a previous incident,
another witness reported seeing a dark-colored Chevy or Chrysler leaving the store parking lot after the shooting. Once again, the police
focused on the more specific white van. The police immediately shut down the nearby interstate and set up roadblocks and checkpoints in
an attempt to catch the fleeing killer. Traffic around the Washington, D.C., area was backed up for miles as the police searched dozens
upon dozens of white vans as they moved through the roadblocks. Again, the police found nothing. The roadblock tactic was used twice
more, after two more shootings. None of these roadblocks were helpful in the investigation, and at the time the police reasoned the
shooter was familiar enough with the area to evade them by using side roads. After additional questioning of the witness who provided the
detailed information about the van, the shooter, and his gun, the police recovered security surveillance video that showed the witness was
actually inside the store when the shooting occurred. He had just made up the information, and he was subsequently charged with
providing false information to the police. More frustration for the police, and they were still not even close to identifying the killer.
On October 17 an operator at the police tip line created for the investigation received a telephone call from an individual who stated he
was the sniper. He spoke broken English and had an unidentifiable accent. The caller was angry because he had been unable to get
through to the police earlier and was hung up on even though he said he was God. The police tip line had received hundreds of apparently
bogus calls during which the caller claimed to be God—a reference to the message on the tarot card found after the shooting at the
school.
Now, in an effort to get the police to take him seriously, the sniper provided a clue, a big one, to the tip line operator. The caller told the
operator that the police should “look to Montgomery” and they would then realize he was not joking. The operator reported the phone
call to her supervisors. The police were initially unsure as to what the message meant, or even if it was valid.
The next day in Ashland, Virginia, at 8:00 p.m., a man was fatally shot in a restaurant parking lot. When searching the area after the
shooting, the police found a handwritten note tacked to a tree in the nearby woods. In the letter the sniper railed about his previous
attempts to communicate unsuccessfully with the police. It identified the phone numbers he had called and the names of the persons he
35
Another random document with
no related content on Scribd:
DANCE ON STILTS AT THE GIRLS’ UNYAGO, NIUCHI
I see increasing reason to believe that the view formed some time
back as to the origin of the Makonde bush is the correct one. I have
no doubt that it is not a natural product, but the result of human
occupation. Those parts of the high country where man—as a very
slight amount of practice enables the eye to perceive at once—has not
yet penetrated with axe and hoe, are still occupied by a splendid
timber forest quite able to sustain a comparison with our mixed
forests in Germany. But wherever man has once built his hut or tilled
his field, this horrible bush springs up. Every phase of this process
may be seen in the course of a couple of hours’ walk along the main
road. From the bush to right or left, one hears the sound of the axe—
not from one spot only, but from several directions at once. A few
steps further on, we can see what is taking place. The brush has been
cut down and piled up in heaps to the height of a yard or more,
between which the trunks of the large trees stand up like the last
pillars of a magnificent ruined building. These, too, present a
melancholy spectacle: the destructive Makonde have ringed them—
cut a broad strip of bark all round to ensure their dying off—and also
piled up pyramids of brush round them. Father and son, mother and
son-in-law, are chopping away perseveringly in the background—too
busy, almost, to look round at the white stranger, who usually excites
so much interest. If you pass by the same place a week later, the piles
of brushwood have disappeared and a thick layer of ashes has taken
the place of the green forest. The large trees stretch their
smouldering trunks and branches in dumb accusation to heaven—if
they have not already fallen and been more or less reduced to ashes,
perhaps only showing as a white stripe on the dark ground.
This work of destruction is carried out by the Makonde alike on the
virgin forest and on the bush which has sprung up on sites already
cultivated and deserted. In the second case they are saved the trouble
of burning the large trees, these being entirely absent in the
secondary bush.
After burning this piece of forest ground and loosening it with the
hoe, the native sows his corn and plants his vegetables. All over the
country, he goes in for bed-culture, which requires, and, in fact,
receives, the most careful attention. Weeds are nowhere tolerated in
the south of German East Africa. The crops may fail on the plains,
where droughts are frequent, but never on the plateau with its
abundant rains and heavy dews. Its fortunate inhabitants even have
the satisfaction of seeing the proud Wayao and Wamakua working
for them as labourers, driven by hunger to serve where they were
accustomed to rule.
But the light, sandy soil is soon exhausted, and would yield no
harvest the second year if cultivated twice running. This fact has
been familiar to the native for ages; consequently he provides in
time, and, while his crop is growing, prepares the next plot with axe
and firebrand. Next year he plants this with his various crops and
lets the first piece lie fallow. For a short time it remains waste and
desolate; then nature steps in to repair the destruction wrought by
man; a thousand new growths spring out of the exhausted soil, and
even the old stumps put forth fresh shoots. Next year the new growth
is up to one’s knees, and in a few years more it is that terrible,
impenetrable bush, which maintains its position till the black
occupier of the land has made the round of all the available sites and
come back to his starting point.
The Makonde are, body and soul, so to speak, one with this bush.
According to my Yao informants, indeed, their name means nothing
else but “bush people.” Their own tradition says that they have been
settled up here for a very long time, but to my surprise they laid great
stress on an original immigration. Their old homes were in the
south-east, near Mikindani and the mouth of the Rovuma, whence
their peaceful forefathers were driven by the continual raids of the
Sakalavas from Madagascar and the warlike Shirazis[47] of the coast,
to take refuge on the almost inaccessible plateau. I have studied
African ethnology for twenty years, but the fact that changes of
population in this apparently quiet and peaceable corner of the earth
could have been occasioned by outside enterprises taking place on
the high seas, was completely new to me. It is, no doubt, however,
correct.
The charming tribal legend of the Makonde—besides informing us
of other interesting matters—explains why they have to live in the
thickest of the bush and a long way from the edge of the plateau,
instead of making their permanent homes beside the purling brooks
and springs of the low country.
“The place where the tribe originated is Mahuta, on the southern
side of the plateau towards the Rovuma, where of old time there was
nothing but thick bush. Out of this bush came a man who never
washed himself or shaved his head, and who ate and drank but little.
He went out and made a human figure from the wood of a tree
growing in the open country, which he took home to his abode in the
bush and there set it upright. In the night this image came to life and
was a woman. The man and woman went down together to the
Rovuma to wash themselves. Here the woman gave birth to a still-
born child. They left that place and passed over the high land into the
valley of the Mbemkuru, where the woman had another child, which
was also born dead. Then they returned to the high bush country of
Mahuta, where the third child was born, which lived and grew up. In
course of time, the couple had many more children, and called
themselves Wamatanda. These were the ancestral stock of the
Makonde, also called Wamakonde,[48] i.e., aborigines. Their
forefather, the man from the bush, gave his children the command to
bury their dead upright, in memory of the mother of their race who
was cut out of wood and awoke to life when standing upright. He also
warned them against settling in the valleys and near large streams,
for sickness and death dwelt there. They were to make it a rule to
have their huts at least an hour’s walk from the nearest watering-
place; then their children would thrive and escape illness.”
The explanation of the name Makonde given by my informants is
somewhat different from that contained in the above legend, which I
extract from a little book (small, but packed with information), by
Pater Adams, entitled Lindi und sein Hinterland. Otherwise, my
results agree exactly with the statements of the legend. Washing?
Hapana—there is no such thing. Why should they do so? As it is, the
supply of water scarcely suffices for cooking and drinking; other
people do not wash, so why should the Makonde distinguish himself
by such needless eccentricity? As for shaving the head, the short,
woolly crop scarcely needs it,[49] so the second ancestral precept is
likewise easy enough to follow. Beyond this, however, there is
nothing ridiculous in the ancestor’s advice. I have obtained from
various local artists a fairly large number of figures carved in wood,
ranging from fifteen to twenty-three inches in height, and
representing women belonging to the great group of the Mavia,
Makonde, and Matambwe tribes. The carving is remarkably well
done and renders the female type with great accuracy, especially the
keloid ornamentation, to be described later on. As to the object and
meaning of their works the sculptors either could or (more probably)
would tell me nothing, and I was forced to content myself with the
scanty information vouchsafed by one man, who said that the figures
were merely intended to represent the nembo—the artificial
deformations of pelele, ear-discs, and keloids. The legend recorded
by Pater Adams places these figures in a new light. They must surely
be more than mere dolls; and we may even venture to assume that
they are—though the majority of present-day Makonde are probably
unaware of the fact—representations of the tribal ancestress.
The references in the legend to the descent from Mahuta to the
Rovuma, and to a journey across the highlands into the Mbekuru
valley, undoubtedly indicate the previous history of the tribe, the
travels of the ancestral pair typifying the migrations of their
descendants. The descent to the neighbouring Rovuma valley, with
its extraordinary fertility and great abundance of game, is intelligible
at a glance—but the crossing of the Lukuledi depression, the ascent
to the Rondo Plateau and the descent to the Mbemkuru, also lie
within the bounds of probability, for all these districts have exactly
the same character as the extreme south. Now, however, comes a
point of especial interest for our bacteriological age. The primitive
Makonde did not enjoy their lives in the marshy river-valleys.
Disease raged among them, and many died. It was only after they
had returned to their original home near Mahuta, that the health
conditions of these people improved. We are very apt to think of the
African as a stupid person whose ignorance of nature is only equalled
by his fear of it, and who looks on all mishaps as caused by evil
spirits and malignant natural powers. It is much more correct to
assume in this case that the people very early learnt to distinguish
districts infested with malaria from those where it is absent.
This knowledge is crystallized in the
ancestral warning against settling in the
valleys and near the great waters, the
dwelling-places of disease and death. At the
same time, for security against the hostile
Mavia south of the Rovuma, it was enacted
that every settlement must be not less than a
certain distance from the southern edge of the
plateau. Such in fact is their mode of life at the
present day. It is not such a bad one, and
certainly they are both safer and more
comfortable than the Makua, the recent
intruders from the south, who have made USUAL METHOD OF
good their footing on the western edge of the CLOSING HUT-DOOR
plateau, extending over a fairly wide belt of
country. Neither Makua nor Makonde show in their dwellings
anything of the size and comeliness of the Yao houses in the plain,
especially at Masasi, Chingulungulu and Zuza’s. Jumbe Chauro, a
Makonde hamlet not far from Newala, on the road to Mahuta, is the
most important settlement of the tribe I have yet seen, and has fairly
spacious huts. But how slovenly is their construction compared with
the palatial residences of the elephant-hunters living in the plain.
The roofs are still more untidy than in the general run of huts during
the dry season, the walls show here and there the scanty beginnings
or the lamentable remains of the mud plastering, and the interior is a
veritable dog-kennel; dirt, dust and disorder everywhere. A few huts
only show any attempt at division into rooms, and this consists
merely of very roughly-made bamboo partitions. In one point alone
have I noticed any indication of progress—in the method of fastening
the door. Houses all over the south are secured in a simple but
ingenious manner. The door consists of a set of stout pieces of wood
or bamboo, tied with bark-string to two cross-pieces, and moving in
two grooves round one of the door-posts, so as to open inwards. If
the owner wishes to leave home, he takes two logs as thick as a man’s
upper arm and about a yard long. One of these is placed obliquely
against the middle of the door from the inside, so as to form an angle
of from 60° to 75° with the ground. He then places the second piece
horizontally across the first, pressing it downward with all his might.
It is kept in place by two strong posts planted in the ground a few
inches inside the door. This fastening is absolutely safe, but of course
cannot be applied to both doors at once, otherwise how could the
owner leave or enter his house? I have not yet succeeded in finding
out how the back door is fastened.