SlideShare a Scribd company logo
1 of 9
Identifying and Arresting Suspects
Name: Patrice Smith
Introduction
During the process of arresting of a suspect the police have to
use the required procedure to maintain a person right of
freedom (Hess, Orthmann & Cho, 2016).There are several
requirement which a police must meet before making an
arrest.When an illegal arrest is made it can affect the
prosecution case in criminal trial (Hess, Orthmann & Cho,
2016).There are some extra procedures which are added in some
state to protect the physical safety of the police and help the
police making a mistake (Hess, Orthmann & Cho, 2016).
An arrest involves the actins of the police officer where the
deprive a person right to freedom. Most criminal cases lacks
suspect and even witness and factors which are vital in solving
a criminal investigation must be employed. All the elements of
crime must be proven and a connection established between a
criminal act and the suspect.
*
The Circumstances of Making an ArrestThe police office has
observed a crime.There is a probable cause a person has
committed a crime.Presence of an arrest warrant (Hess,
Orthmann & Cho, 2016).
Taking a personal fundamental right is serious case and
therefore undoubtable evidence must be available. For the rights
of the suspect to be ensured during the time of an arrest the
police are required the specified procedure. Therefore, during
making an arrest the police office has to be there physically and
observe the crime. Secondly, there should satisfactory evidence
that a person has committed a crime. The police office can also
acquire a warrant which will certify searching of property for
evidence and making an arrest.
*
Procedure of Making an ArrestThe rules of making an arrest
varies with jurisdiction.The arrest occurs when a person being
suspected is required not to leave.The police has to use the
handcuffs or place the suspect in the police cruiser (Hess,
Orthmann & Cho, 2016). The police officer has to read the
Miranda Right during making an arrest. Finally the police are
prohibited from using excessive force during an arrest (Hess,
Orthmann & Cho, 2016). However, police use excessive force
when an arrestee seems to resist an arrest.
The police office adheres to specific procedures during making
of an arrest. The rules can change depending on the
jurisdiction. The police use handcuff so as to protect
themselves . Importantly, the have to read the Miranda Right
during an arrest. The Miranda right enables the questioning of
the suspect and using the information they say against them.
Nonetheless , the police is required not use cruelty or excessive
during making an arrest. The excessive use of force can
interfere with the criminal trial.
*
Identification of the suspect Use of drivers license or drivers
license guide (Hess, Orthmann & Cho, 2016). Through the use
of a witness or a victim to a crime.
First, the suspect is identified through the use driver license as
according to the REAL ID Act of 2005 and also the driver
license guide.
*
Development of Suspects The information provided by victims
and witness.Presence of physical evidence at the crime scene
(Hess, Orthmann & Cho, 2016). Criminal Profiling Utilizing the
information in the police files (Hess, Orthmann & Cho, 2016).
Informant Using information from other agencies
Before a suspect can be arrest there are some information which
must be available to warrant an arrest. A connection has to be
established between the crime and the suspect. The first source
of information is from the witness or a victim who can identify
the suspect as they observed them committing a criminal act.
There can also be available evidence which trace back to the
evidence. The evidence can be either material which use the
suspect finger print or DNA.
Profiling on the other hand, uses psychological characteristics ,
emotional and mental identity of a person in the identification
of a suspect. The police officers also have files which can
related a person with certain criminal activity. The private
agency can also provide necessary information which will aid in
the identification of a suspect. Lastly, an informant may provide
the information. Notably, this is a person who is not a witness
or a victim but an interested citizen or a criminal wanting to
make a deal.
*
Obtaining Information about a Suspect Asking specific
information Utilizing drawing and sketches (Hess, Orthmann &
Cho, 2016). Using of mug shots of possible suspects
During the process of obtaining the information the police are
required to ask specific information about a suspect. The
information from a witness or victim can be employed in
making a sketches to identify the suspect. The mug are also
utilized but they are very time consuming.
*
The procedure of information from agencies and
policeObtaining information the communityGetting information
at the county levelAttaining information from the state
levelSoliciting information at the federal levelGetting
information fro INTERPOL (Hess, Orthmann & Cho,
2016).Obtaining information from private agencies
The information is obtained procedurally from the lowest rank
at the community level up to the highest rank. The procedure is
vital so that nothing is missed out. Also, the due to increased
efficiency and reduction of the cost.
*
Using force during an arrestThe police are required to only use
the necessary forceThe excessive force is used when someone
resist arrest (Hess, Orthmann & Cho, 2016).
The police office has to use reasonable force during making an
arrest. The reasonable force is determined as the amount of
force used by a police office and the amount of force a person
can use on themselves on the same situation. The excessive
force is when a police office uses a force which is more than
what is required in controlling a situation.
*
Evaluating excessive use of forceHow severe the crime
was.Suspecting posing an immediate threat Tensed
circumstances (Hess, Orthmann & Cho, 2016).An attempt to
evade an arrest Resist an arrest (Hess, Orthmann & Cho, 2016).
*
Case of Deadly Use ForceTennessee v. Gardner, 1985 (Hess,
Orthmann & Cho, 2016).
During the Tennessee v. Gardner, 1985 there was the ruling by
the US supreme court that there should be no use of excessive
use of force for the non-dangerous and unarmed felons. Doing
so is illegal and violation of the Fourth Amendment.
*
Conclusion Conclusively, the police are required to respect the
procedure of making an arrest.The advancement in technology
has ease the process of identifying the suspect.The rights of the
suspect are vital and should be maintained during an arrest.The
use of excessive force is prohibited unless the circumstances
warrant it.All people are required to understand their right so as
to reduce the high cases which occur during an arrest.
References Hess, K. M., Orthmann, C. H., & Cho, H. L.
(2016). Criminal investigation. Cengage Learning.
POINTS
20
15
10
5
0
CONTENT
Content is accurate and information is presented in a logical
order
Content is accurate but some information is not presented in a
logical order, but is still generally easy to follow
Content is accurate but information is not presented in a logical
order, making it difficult to follow
Content is questionable and information is not presented in a
logical order making it difficult to follow
Content is inaccurate and information is not presented in a
logical order, making it difficult to follow
SLIDE CREATION
Presentation flows well and logically. Presentation reflects
extensive use of tools in a creative way. Correct number of
slides
Presentation flows well. Tools used correctly. Correct number
of slides. Overall presentation is interesting
Presentation flows well. Some tools used to show acceptable
understanding. Correct number of slides.
Presentation is unorganized. Tools are not used in a relevant
manner. Lacking in number of slides
Presentation has no flow. No tools used. Insufficient number of
slides
SLIDE TRANSITIONS
Transitions are smooth and interesting. Transitions enhance the
presentation
Smooth transitions are used on most slides
Smooth transitions are used on some slides
Very few transitions are used and/or they distract from the
presentation
No transitions used
PICTURES, CLIP ART, BACKGROUND AND TECHNOLOGY
Images are appropriate. Layout of images is pleasing to the sys
Images are appropriate. Layout is cluttered
Most images are appropriate
Images are inappropriate
No images
MECHANICS
No spelling errors. No grammar errors. Text is in authors own
words
Few spelling errors. Few grammar errors. Text is in authors own
words
Some spelling errors. Some grammar errors. Text is in authors’
own words
Some spell errors. Some grammar errors. Most of text in authors
own words
Many spelling errors and/or text is copies
1. Society and Self (Power Point Presentation)
1. Each member will prepare at least 10 slides for their
presentation
1. Each slide should have a minimum of 3 references
1. The 11th, 12th, and 13th, and any additional slides necessary
will contain all the references used for your power point
presentation.
1. Refer to the rubric for grading criteria
1. Textbook is Introduction to Criminal Justice, 15th Edition,
2014, 2012 Larry J Siegal, Cengage Publishing.
1. Choose from chapters 3, 4, 6, 7 or 8
 Identifying and Arresting SuspectsName Patrice Smith.docx

More Related Content

Similar to Identifying and Arresting SuspectsName Patrice Smith.docx

Running Head CRIMINAL JUSTICE SYSTEM .docx
Running Head CRIMINAL JUSTICE SYSTEM                             .docxRunning Head CRIMINAL JUSTICE SYSTEM                             .docx
Running Head CRIMINAL JUSTICE SYSTEM .docxtodd271
 
A Policy Review of Operation Fast & Furious Applying Lesson.docx
A Policy Review of Operation Fast & Furious Applying Lesson.docxA Policy Review of Operation Fast & Furious Applying Lesson.docx
A Policy Review of Operation Fast & Furious Applying Lesson.docxevonnehoggarth79783
 
3 days ago Doris Tucker Informants and warrants Coll
3 days ago Doris Tucker Informants and warrants Coll3 days ago Doris Tucker Informants and warrants Coll
3 days ago Doris Tucker Informants and warrants Collmitziesmith74
 
Private and Public Private and Public.docx
Private and Public      Private and Public.docxPrivate and Public      Private and Public.docx
Private and Public Private and Public.docxChantellPantoja184
 
Forensic Evidence
Forensic EvidenceForensic Evidence
Forensic EvidenceTara Smith
 
Some General Ideas About Criminal Profiling
Some General Ideas About Criminal ProfilingSome General Ideas About Criminal Profiling
Some General Ideas About Criminal ProfilingMjosu
 

Similar to Identifying and Arresting SuspectsName Patrice Smith.docx (8)

Running Head CRIMINAL JUSTICE SYSTEM .docx
Running Head CRIMINAL JUSTICE SYSTEM                             .docxRunning Head CRIMINAL JUSTICE SYSTEM                             .docx
Running Head CRIMINAL JUSTICE SYSTEM .docx
 
A Policy Review of Operation Fast & Furious Applying Lesson.docx
A Policy Review of Operation Fast & Furious Applying Lesson.docxA Policy Review of Operation Fast & Furious Applying Lesson.docx
A Policy Review of Operation Fast & Furious Applying Lesson.docx
 
3 days ago Doris Tucker Informants and warrants Coll
3 days ago Doris Tucker Informants and warrants Coll3 days ago Doris Tucker Informants and warrants Coll
3 days ago Doris Tucker Informants and warrants Coll
 
Private and Public Private and Public.docx
Private and Public      Private and Public.docxPrivate and Public      Private and Public.docx
Private and Public Private and Public.docx
 
Forensic Evidence
Forensic EvidenceForensic Evidence
Forensic Evidence
 
CDI105 notes.docx
CDI105 notes.docxCDI105 notes.docx
CDI105 notes.docx
 
WHY ARREST.pdf
WHY ARREST.pdfWHY ARREST.pdf
WHY ARREST.pdf
 
Some General Ideas About Criminal Profiling
Some General Ideas About Criminal ProfilingSome General Ideas About Criminal Profiling
Some General Ideas About Criminal Profiling
 

More from aryan532920

According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxAccording to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxaryan532920
 
According to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docxAccording to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docxaryan532920
 
According to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docxAccording to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docxaryan532920
 
According to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docxAccording to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docxaryan532920
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxaryan532920
 
According to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docxAccording to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docxaryan532920
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxaryan532920
 
According to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docxAccording to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docxaryan532920
 
According to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxAccording to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxaryan532920
 
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxAccording to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxaryan532920
 
According to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docxAccording to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docxaryan532920
 
According to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docxAccording to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docxaryan532920
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxaryan532920
 
According to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docxAccording to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docxaryan532920
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxaryan532920
 
According to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docxAccording to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docxaryan532920
 
According to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docxAccording to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docxaryan532920
 
According to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docxAccording to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docxaryan532920
 
According to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docxAccording to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docxaryan532920
 
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxAccording to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxaryan532920
 

More from aryan532920 (20)

According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxAccording to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
 
According to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docxAccording to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docx
 
According to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docxAccording to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docx
 
According to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docxAccording to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docx
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docx
 
According to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docxAccording to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docx
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docx
 
According to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docxAccording to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docx
 
According to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxAccording to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docx
 
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxAccording to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
 
According to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docxAccording to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docx
 
According to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docxAccording to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docx
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docx
 
According to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docxAccording to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docx
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docx
 
According to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docxAccording to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docx
 
According to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docxAccording to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docx
 
According to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docxAccording to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docx
 
According to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docxAccording to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docx
 
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxAccording to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 

Identifying and Arresting SuspectsName Patrice Smith.docx

  • 1. Identifying and Arresting Suspects Name: Patrice Smith Introduction During the process of arresting of a suspect the police have to use the required procedure to maintain a person right of freedom (Hess, Orthmann & Cho, 2016).There are several requirement which a police must meet before making an arrest.When an illegal arrest is made it can affect the prosecution case in criminal trial (Hess, Orthmann & Cho, 2016).There are some extra procedures which are added in some state to protect the physical safety of the police and help the police making a mistake (Hess, Orthmann & Cho, 2016). An arrest involves the actins of the police officer where the deprive a person right to freedom. Most criminal cases lacks suspect and even witness and factors which are vital in solving a criminal investigation must be employed. All the elements of crime must be proven and a connection established between a criminal act and the suspect. * The Circumstances of Making an ArrestThe police office has
  • 2. observed a crime.There is a probable cause a person has committed a crime.Presence of an arrest warrant (Hess, Orthmann & Cho, 2016). Taking a personal fundamental right is serious case and therefore undoubtable evidence must be available. For the rights of the suspect to be ensured during the time of an arrest the police are required the specified procedure. Therefore, during making an arrest the police office has to be there physically and observe the crime. Secondly, there should satisfactory evidence that a person has committed a crime. The police office can also acquire a warrant which will certify searching of property for evidence and making an arrest. * Procedure of Making an ArrestThe rules of making an arrest varies with jurisdiction.The arrest occurs when a person being suspected is required not to leave.The police has to use the handcuffs or place the suspect in the police cruiser (Hess, Orthmann & Cho, 2016). The police officer has to read the Miranda Right during making an arrest. Finally the police are prohibited from using excessive force during an arrest (Hess, Orthmann & Cho, 2016). However, police use excessive force when an arrestee seems to resist an arrest. The police office adheres to specific procedures during making of an arrest. The rules can change depending on the jurisdiction. The police use handcuff so as to protect
  • 3. themselves . Importantly, the have to read the Miranda Right during an arrest. The Miranda right enables the questioning of the suspect and using the information they say against them. Nonetheless , the police is required not use cruelty or excessive during making an arrest. The excessive use of force can interfere with the criminal trial. * Identification of the suspect Use of drivers license or drivers license guide (Hess, Orthmann & Cho, 2016). Through the use of a witness or a victim to a crime. First, the suspect is identified through the use driver license as according to the REAL ID Act of 2005 and also the driver license guide. * Development of Suspects The information provided by victims and witness.Presence of physical evidence at the crime scene (Hess, Orthmann & Cho, 2016). Criminal Profiling Utilizing the information in the police files (Hess, Orthmann & Cho, 2016). Informant Using information from other agencies Before a suspect can be arrest there are some information which must be available to warrant an arrest. A connection has to be established between the crime and the suspect. The first source of information is from the witness or a victim who can identify the suspect as they observed them committing a criminal act. There can also be available evidence which trace back to the evidence. The evidence can be either material which use the
  • 4. suspect finger print or DNA. Profiling on the other hand, uses psychological characteristics , emotional and mental identity of a person in the identification of a suspect. The police officers also have files which can related a person with certain criminal activity. The private agency can also provide necessary information which will aid in the identification of a suspect. Lastly, an informant may provide the information. Notably, this is a person who is not a witness or a victim but an interested citizen or a criminal wanting to make a deal. * Obtaining Information about a Suspect Asking specific information Utilizing drawing and sketches (Hess, Orthmann & Cho, 2016). Using of mug shots of possible suspects During the process of obtaining the information the police are required to ask specific information about a suspect. The information from a witness or victim can be employed in making a sketches to identify the suspect. The mug are also utilized but they are very time consuming. * The procedure of information from agencies and policeObtaining information the communityGetting information at the county levelAttaining information from the state levelSoliciting information at the federal levelGetting information fro INTERPOL (Hess, Orthmann & Cho, 2016).Obtaining information from private agencies
  • 5. The information is obtained procedurally from the lowest rank at the community level up to the highest rank. The procedure is vital so that nothing is missed out. Also, the due to increased efficiency and reduction of the cost. * Using force during an arrestThe police are required to only use the necessary forceThe excessive force is used when someone resist arrest (Hess, Orthmann & Cho, 2016). The police office has to use reasonable force during making an arrest. The reasonable force is determined as the amount of force used by a police office and the amount of force a person can use on themselves on the same situation. The excessive force is when a police office uses a force which is more than what is required in controlling a situation. * Evaluating excessive use of forceHow severe the crime was.Suspecting posing an immediate threat Tensed circumstances (Hess, Orthmann & Cho, 2016).An attempt to evade an arrest Resist an arrest (Hess, Orthmann & Cho, 2016).
  • 6. * Case of Deadly Use ForceTennessee v. Gardner, 1985 (Hess, Orthmann & Cho, 2016). During the Tennessee v. Gardner, 1985 there was the ruling by the US supreme court that there should be no use of excessive use of force for the non-dangerous and unarmed felons. Doing so is illegal and violation of the Fourth Amendment. * Conclusion Conclusively, the police are required to respect the procedure of making an arrest.The advancement in technology has ease the process of identifying the suspect.The rights of the suspect are vital and should be maintained during an arrest.The use of excessive force is prohibited unless the circumstances warrant it.All people are required to understand their right so as to reduce the high cases which occur during an arrest. References Hess, K. M., Orthmann, C. H., & Cho, H. L. (2016). Criminal investigation. Cengage Learning.
  • 7. POINTS 20 15 10 5 0 CONTENT Content is accurate and information is presented in a logical order Content is accurate but some information is not presented in a logical order, but is still generally easy to follow Content is accurate but information is not presented in a logical order, making it difficult to follow Content is questionable and information is not presented in a logical order making it difficult to follow Content is inaccurate and information is not presented in a logical order, making it difficult to follow SLIDE CREATION Presentation flows well and logically. Presentation reflects extensive use of tools in a creative way. Correct number of slides Presentation flows well. Tools used correctly. Correct number of slides. Overall presentation is interesting Presentation flows well. Some tools used to show acceptable understanding. Correct number of slides. Presentation is unorganized. Tools are not used in a relevant manner. Lacking in number of slides Presentation has no flow. No tools used. Insufficient number of slides SLIDE TRANSITIONS Transitions are smooth and interesting. Transitions enhance the presentation Smooth transitions are used on most slides Smooth transitions are used on some slides Very few transitions are used and/or they distract from the presentation
  • 8. No transitions used PICTURES, CLIP ART, BACKGROUND AND TECHNOLOGY Images are appropriate. Layout of images is pleasing to the sys Images are appropriate. Layout is cluttered Most images are appropriate Images are inappropriate No images MECHANICS No spelling errors. No grammar errors. Text is in authors own words Few spelling errors. Few grammar errors. Text is in authors own words Some spelling errors. Some grammar errors. Text is in authors’ own words Some spell errors. Some grammar errors. Most of text in authors own words Many spelling errors and/or text is copies 1. Society and Self (Power Point Presentation) 1. Each member will prepare at least 10 slides for their presentation 1. Each slide should have a minimum of 3 references 1. The 11th, 12th, and 13th, and any additional slides necessary will contain all the references used for your power point presentation. 1. Refer to the rubric for grading criteria 1. Textbook is Introduction to Criminal Justice, 15th Edition, 2014, 2012 Larry J Siegal, Cengage Publishing. 1. Choose from chapters 3, 4, 6, 7 or 8