SlideShare a Scribd company logo
1 of 27
Crime Investigation (9606)
Autumn 2023
Allam Iqbal Open University Islamabad
CRIME INVESTIGATION
INVESTIGATION PROCESS AND TECHNIQUE
Investigation process
The type of activity investigators engage in and the
material gathered varies depending on whether
investigations use the:
a) reactive, or
b) proactive method.
 However, they all go through similar stages
INVESTIGATION PROCESS
Stage 1: Instigation
A criminal investigation can be instigated using either a reactive or
proactive approach.
i) Reactive investigations can start with:
 reports from the general public
 referral by other agencies
 intelligence links to other crimes (linked series)
 re-investigation as a result of new information
 a consequence of other police actions.
INVEST PROCESS
b) Proactive investigations
can start from an intelligence package identifying groups or individuals who are
assessed as being involved in ongoing criminal activity. They are often generated
as a result of the tasking and coordination (T&C) process, and allocated for further
investigation. Intelligence packages may include:
 crime pattern analysis
 network analysis
 operational intelligence assessment
 problem profiles
 market profiles
 subject analysis
 tactical assessment
 criminal business analysis
 tactical profiles
INVESTI’ PROCESS
Stage 2: Initial investigation
 There may be limited opportunities to locate and gather material
and it is vital that those who conduct the initial investigation
ensure that material is not lost.
 Once a crime has been allocated to an investigator, it is important
that they gather material from whoever took the initial report.
 Investigations should be conducted thoroughly, and investigators
should not assume that a crime cannot be solved or that someone
else will carry out an investigation at a later stage.
PROCESS – STAGE 2
Challenges During initial stage
Officers initially deployed to an incident are likely to have a
number of competing demands placed on them. These
demands include:
dealing with a violent situation
providing first aid and calling for medical assistance
reassuring victims and witnesses
preventing public disorder.
PROCESS – STAGE 2
Factors to consider during Initial investigation stage
The following factors should be considered at the initial
investigation:
 scene management (identify and preserve)
 material (identify other potential evidence sources)
 who is the investigating officer?
 risk management
 what is the limit of the initial attending officer’s role?
 Communication
 record keeping
PROCESS – STAGE 2 (FACTORS CONTI)
 handover and briefing
 community impact
 initial fast track actions
 investigative interviewing (witness, victim and offender)
 initial search (access routes, exit routes, places where offenders
are likely to have been).
While officers wait for assistance their priorities should be to:
 preserve life
 preserve scenes
 secure evidence
 identify victims
 identify suspects.
PROCESS
STAGE 3: INVESTIGATION EVALUATION
PART A: Further investigation, or
PART B: No further investigation (case closed)
PROCESS
Stage 3 part A: Further investigation
The investigative plan should be based on a rigorous evaluation of
the material that has been gathered to date and should include the
following factors:
 specific objectives of the investigation – these depend on the
unique circumstances of the crime and the material that has been
gathered
 investigative strategies that are used to achieve those objectives
 resource requirements of the investigation which in many cases is
limited to the investigator, crime scene examination, and forensic
analysis of the material recovered from the scene or suspect. It is
part of an investigator’s responsibility to articulate their resource
requirement to managers.
STAGE 4: Suspect management
The identification of a suspect provides an opportunity to
use a range of investigative strategies that focus on that
individual
HOW DO YOU MANAGE SUSPECT?
STAGE 5 – EVIDENTIAL EVALUATION
Stage 5 – part A : Further investigation
Stage 5 – part B: No charge
STAGE 6 – CHARGE
In a criminal case, if there is sufficient evidence to
provide a realistic prospect of conviction against each
suspect on each charge, a decision to charge is made.
Depending on the type and seriousness of the offence
committed, this decision is made by the police service OR
Prosecution team
The police may charge:
 all summary offences irrespective of plea and any either
way offences anticipated as a guilty plea and suitable for
sentence.
HOW ABOUT CHARGING THE YOUTH AND
JUNIVENILE?
STAGE 7: Case management
Once the suspect has been charged, there are a number of matters
which investigators must manage before a case goes to court:
• statements
• documents
• reports
• physical exhibits
• fingerprints
• images
• audio or video recordings.
STAGE 8: COURT –
Do you recall what happened during your 1st semester
reflective tour to court?
Can you relate ….?
GOLDEN HOUR RULE
The golden hour is the term used for the period
immediately after an offence has been committed, when
material is readily available in high volumes to the police.
Positive action in the period immediately after the report
of a crime minimises the amount of material that could
be lost to the investigation, and maximises the chance of
securing the material that will be admissible in court.
INVESTIGATION TECHNIQUE
WHAT IS A TECHNIQUE ?
INVESTIGATION TECHNIQUES
SEVEN MAJOR INVESTIGATION TECHNIQUES
the development of informants,
use of undercover agents,
laboratory analysis of physical evidence,
physical and electronic surveillance,
interrogation,
Wiretapping,
Net-worth-expenditure principle.
Crime Investigation.ppt
Crime Investigation.ppt

More Related Content

Similar to Crime Investigation.ppt

1. Concepts of Investigation.ppt
1. Concepts of Investigation.ppt1. Concepts of Investigation.ppt
1. Concepts of Investigation.ppt
mathiasyusuph
 
BackgroundA significant criminal event may occur at any place an.docx
BackgroundA significant criminal event may occur at any place an.docxBackgroundA significant criminal event may occur at any place an.docx
BackgroundA significant criminal event may occur at any place an.docx
aman341480
 
'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012
SkylerWeisenburger
 
CRIM 4370 Research Methods in Criminology Ex.docx
CRIM 4370             Research Methods in Criminology      Ex.docxCRIM 4370             Research Methods in Criminology      Ex.docx
CRIM 4370 Research Methods in Criminology Ex.docx
vanesaburnand
 
2New Security Employee OutlineIntroductionInvestigativ.docx
2New Security Employee OutlineIntroductionInvestigativ.docx2New Security Employee OutlineIntroductionInvestigativ.docx
2New Security Employee OutlineIntroductionInvestigativ.docx
lorainedeserre
 
2New Security Employee OutlineIntroductionInvestigat.docx
2New Security Employee OutlineIntroductionInvestigat.docx2New Security Employee OutlineIntroductionInvestigat.docx
2New Security Employee OutlineIntroductionInvestigat.docx
lorainedeserre
 

Similar to Crime Investigation.ppt (20)

Steps of an outbreak investigation
Steps of an outbreak investigation Steps of an outbreak investigation
Steps of an outbreak investigation
 
1. Concepts of Investigation.ppt
1. Concepts of Investigation.ppt1. Concepts of Investigation.ppt
1. Concepts of Investigation.ppt
 
Cybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptxCybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptx
 
Workplace Investigation Guide
Workplace Investigation GuideWorkplace Investigation Guide
Workplace Investigation Guide
 
Forensic audit
Forensic auditForensic audit
Forensic audit
 
Cyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationCyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 Presentation
 
Chain of Custody - PPT(1)(1).pdf
Chain of Custody - PPT(1)(1).pdfChain of Custody - PPT(1)(1).pdf
Chain of Custody - PPT(1)(1).pdf
 
Forensic audit & procedure
Forensic audit & procedureForensic audit & procedure
Forensic audit & procedure
 
BackgroundA significant criminal event may occur at any place an.docx
BackgroundA significant criminal event may occur at any place an.docxBackgroundA significant criminal event may occur at any place an.docx
BackgroundA significant criminal event may occur at any place an.docx
 
Forensic ppt
Forensic pptForensic ppt
Forensic ppt
 
IRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic Crime
IRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic CrimeIRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic Crime
IRJET- A Survey Paper of Blood Spatter Trajectory Analysis for Forensic Crime
 
CRIM-INVEST-PROTOCOLS.pptx
CRIM-INVEST-PROTOCOLS.pptxCRIM-INVEST-PROTOCOLS.pptx
CRIM-INVEST-PROTOCOLS.pptx
 
Investigation and Crime Scene Preservation Seminar.pptx
Investigation and Crime Scene Preservation Seminar.pptxInvestigation and Crime Scene Preservation Seminar.pptx
Investigation and Crime Scene Preservation Seminar.pptx
 
'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012
 
CRIM 4370 Research Methods in Criminology Ex.docx
CRIM 4370             Research Methods in Criminology      Ex.docxCRIM 4370             Research Methods in Criminology      Ex.docx
CRIM 4370 Research Methods in Criminology Ex.docx
 
Persian Medium Psychic | Investigation Introduction
Persian Medium Psychic | Investigation IntroductionPersian Medium Psychic | Investigation Introduction
Persian Medium Psychic | Investigation Introduction
 
2New Security Employee OutlineIntroductionInvestigativ.docx
2New Security Employee OutlineIntroductionInvestigativ.docx2New Security Employee OutlineIntroductionInvestigativ.docx
2New Security Employee OutlineIntroductionInvestigativ.docx
 
2New Security Employee OutlineIntroductionInvestigat.docx
2New Security Employee OutlineIntroductionInvestigat.docx2New Security Employee OutlineIntroductionInvestigat.docx
2New Security Employee OutlineIntroductionInvestigat.docx
 
Chapter 06
Chapter 06Chapter 06
Chapter 06
 
An Evaluation of Remote Viewing, Research and Applications air1995.pdf
An Evaluation of Remote Viewing, Research and Applications air1995.pdfAn Evaluation of Remote Viewing, Research and Applications air1995.pdf
An Evaluation of Remote Viewing, Research and Applications air1995.pdf
 

Recently uploaded

SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 

Recently uploaded (20)

Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 

Crime Investigation.ppt

  • 1. Crime Investigation (9606) Autumn 2023 Allam Iqbal Open University Islamabad
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Investigation process The type of activity investigators engage in and the material gathered varies depending on whether investigations use the: a) reactive, or b) proactive method.  However, they all go through similar stages
  • 8.
  • 9. INVESTIGATION PROCESS Stage 1: Instigation A criminal investigation can be instigated using either a reactive or proactive approach. i) Reactive investigations can start with:  reports from the general public  referral by other agencies  intelligence links to other crimes (linked series)  re-investigation as a result of new information  a consequence of other police actions.
  • 10. INVEST PROCESS b) Proactive investigations can start from an intelligence package identifying groups or individuals who are assessed as being involved in ongoing criminal activity. They are often generated as a result of the tasking and coordination (T&C) process, and allocated for further investigation. Intelligence packages may include:  crime pattern analysis  network analysis  operational intelligence assessment  problem profiles  market profiles  subject analysis  tactical assessment  criminal business analysis  tactical profiles
  • 11. INVESTI’ PROCESS Stage 2: Initial investigation  There may be limited opportunities to locate and gather material and it is vital that those who conduct the initial investigation ensure that material is not lost.  Once a crime has been allocated to an investigator, it is important that they gather material from whoever took the initial report.  Investigations should be conducted thoroughly, and investigators should not assume that a crime cannot be solved or that someone else will carry out an investigation at a later stage.
  • 12. PROCESS – STAGE 2 Challenges During initial stage Officers initially deployed to an incident are likely to have a number of competing demands placed on them. These demands include: dealing with a violent situation providing first aid and calling for medical assistance reassuring victims and witnesses preventing public disorder.
  • 13. PROCESS – STAGE 2 Factors to consider during Initial investigation stage The following factors should be considered at the initial investigation:  scene management (identify and preserve)  material (identify other potential evidence sources)  who is the investigating officer?  risk management  what is the limit of the initial attending officer’s role?  Communication  record keeping
  • 14. PROCESS – STAGE 2 (FACTORS CONTI)  handover and briefing  community impact  initial fast track actions  investigative interviewing (witness, victim and offender)  initial search (access routes, exit routes, places where offenders are likely to have been). While officers wait for assistance their priorities should be to:  preserve life  preserve scenes  secure evidence  identify victims  identify suspects.
  • 15. PROCESS STAGE 3: INVESTIGATION EVALUATION PART A: Further investigation, or PART B: No further investigation (case closed)
  • 16. PROCESS Stage 3 part A: Further investigation The investigative plan should be based on a rigorous evaluation of the material that has been gathered to date and should include the following factors:  specific objectives of the investigation – these depend on the unique circumstances of the crime and the material that has been gathered  investigative strategies that are used to achieve those objectives  resource requirements of the investigation which in many cases is limited to the investigator, crime scene examination, and forensic analysis of the material recovered from the scene or suspect. It is part of an investigator’s responsibility to articulate their resource requirement to managers.
  • 17. STAGE 4: Suspect management The identification of a suspect provides an opportunity to use a range of investigative strategies that focus on that individual HOW DO YOU MANAGE SUSPECT?
  • 18. STAGE 5 – EVIDENTIAL EVALUATION Stage 5 – part A : Further investigation Stage 5 – part B: No charge
  • 19. STAGE 6 – CHARGE In a criminal case, if there is sufficient evidence to provide a realistic prospect of conviction against each suspect on each charge, a decision to charge is made. Depending on the type and seriousness of the offence committed, this decision is made by the police service OR Prosecution team
  • 20. The police may charge:  all summary offences irrespective of plea and any either way offences anticipated as a guilty plea and suitable for sentence. HOW ABOUT CHARGING THE YOUTH AND JUNIVENILE?
  • 21. STAGE 7: Case management Once the suspect has been charged, there are a number of matters which investigators must manage before a case goes to court: • statements • documents • reports • physical exhibits • fingerprints • images • audio or video recordings.
  • 22. STAGE 8: COURT – Do you recall what happened during your 1st semester reflective tour to court? Can you relate ….?
  • 23. GOLDEN HOUR RULE The golden hour is the term used for the period immediately after an offence has been committed, when material is readily available in high volumes to the police. Positive action in the period immediately after the report of a crime minimises the amount of material that could be lost to the investigation, and maximises the chance of securing the material that will be admissible in court.
  • 25. INVESTIGATION TECHNIQUES SEVEN MAJOR INVESTIGATION TECHNIQUES the development of informants, use of undercover agents, laboratory analysis of physical evidence, physical and electronic surveillance, interrogation, Wiretapping, Net-worth-expenditure principle.