2. For this project I mean to not only explain
how each part of the criminal justice
programs works but also how it ties into
Case studies of Ted Bundy.
3. International Association of Forensic
Criminologists (IACF)
Academy of Criminal Justice Sciences: The
Politics of Crime and Criminal Justice
5. Conferences
› The International Practices in Profiling,
Prevention & Counterterrorism
› The Politics of Capital Punishment in relation to
Serial Killers
6. Tittle: Profiling of Serial Killers
Summary
Outline:
•What is Profiling
•Where do the Profilers come from?
•What does a Profiler do?
•How does Profiling tie in with investigation?
•What is Serial Killer?
•How are Serial Killers profiled?
•How do profilers help during the
investigation and courts process?
7. Classical School Theories of Crime
-Rational Thought of a Criminal
Biological Theories
-Nature vs Nurture
9. What is SARA?
In order to establish an effective long term solution, the
cause(s) of a problem and the underlying factors must be
accurately identified. The basic problem solving framework
for this is known as the S.A.R.A. Problem Solving Model.
Though there are several different problem solving
methods SARA is the most effective and most common
problem solving technique used.
By systematically applying the steps of SARA police can
combine resources to effectively reduce or eliminate
problems.
S- scanning, A- analysis, R- response, and A- assessment
10. Identifying the problem or recurring problems of
concern to the public and police .
Identifying the consequences of problem for the
community and police.
Prioritizing those problems.
Developing broad goals.
Confirming that the problems exist.
Determining how frequently the problem occurs and
how long it has been taking place.
Selecting problems for closer examination.
11. Learning the problem’s causes, scopes, and effects.
Identifying and understanding the events and conditions that
precedes and accompany the problem.
Identifying the relevant data to be collected.
Researching what is known about the problem type.
Taking inventory of how the problem is currently addressed and
the strengths and limitations of the current response.
Narrowing the scope of the problem as specifically as possible
Identifying a variety of resources that may be of assistance in
developing a deeper understanding of the problem.
Developing a working hypothesis about why the problem is
occurring.
12. Acting to alleviate the problem
Brainstorming for what other communities with
similar problems have done.
Choosing among the alternative interventions .
Outlining a response plan and identifying
responsible parties
Stating the specific objectives for the response
plan.
Carrying out the planned activities.
13. Determining whether the response worked.
Collecting pre- and post- response
qualitative and quantitative data.
Determining whether broad goals and
specific objectives were attained.
Identifying any new strategies needed to
augment the original plan.
Conducting ongoing assessment to ensure
continued effectiveness.
14. C = Client
A =Acquire/Analysis Information
P =Partnerships
R =Response
A =Assessment of Action taken
The model emphasizes the importance of:
› developing and maintaining partnerships and trust within
communities/the workforce to establish priorities for service
delivery and preventive problem solving;
› understanding our clients' perspectives on work-related matters
for establishing priorities and potential partnerships in service
delivery; and
› encouraging ongoing feedback for continuous improvement.
16. The Case in question
The case against Officers Naylon and Rehak
During a burn mission stole $6,000
Wrote faulty evidence locker paper work
Were caught on camera committing the
crime.
17. Evidence
Interview
Punishment (termination, leave of absence
etc.)
Is it employee vs criminal case or employee
and criminal case
18. Inmate Pamphlet
› Safety
› Sexual Harassment
› Protective Custody
› Family involvement
› Segregation Units
› Hotline/ call centers
19. New Employees
› Safety
› Lessons/ Classes need to know
› Training and Development
› Sexual Harassment
› Volunteer work
› Work related issues
20. Building a Crime Scene Vehicle
The budget is $100,000
› For a vehicle
› Equipment and kits
› Refills or back ups for any faulty equipment.
23. Model Policy
› What an employee does.
› How an employee would use a computer at
work.
› Regulations for using a computer at work.
24. Employee Policy
› Work environment
› Constitute department own equipment
› Fair use of department owned equipment (email,
cellular phone, social media)
› Internet usage (prohibited websites and
activities)
› Constitutes work related internet usage
25. Application policy
› Search policy on new applicants
› Rejection criteria
› Constitutes free speech as future employees
› Protected behavior
26. Evidence Tampering
› NRS 199.220 Destroying evidence. Every
person who, with intent to conceal the commission of
any felony, or to protect or conceal the identity of any
person committing the same, or with intent to delay
or hinder the administration of the law or to prevent
the production thereof at any time, in any court or
before any officer, tribunal, judge or magistrate, shall
willfully destroy, alter, erase, obliterate or conceal any
book, paper, record, writing, instrument or thing shall
be guilty of a gross misdemeanor.
27. Witness tampering
› 18 U.S. Code § 1512 - Tampering with a witness,
victim, or an informant
› prevent the communication by any person to a law
enforcement officer or judge of the United States of
information relating to the commission or possible
commission of a Federal offense or a violation of
conditions of probation, parole, or release pending
judicial proceedings
› shall be fined under this title or imprisoned not more
than 20 years, or both.
28. Rape/ Sexual Assault
Top Three Criminal Defenses
› Innocence
› Consent
› Mental Instability
30. What is security?
› Perimeter control
› Access control
› Security control measures
31.
32. Types of security measure
› Security sensors
› Video and Audio Surveillance
› Card readers/ proxemics access
Have Security for
Interviews/ Interrogations
Parking lot
Access to building and personal
Security of evidence
Security of narcotics
33. Boyd, L. M. (2013, March 19). Polictics of Crime and Criminal Justice.
Retrieved from Academy of Criminal Justice Sciences:
http://www.acjs.org/pubs/uploads/2013ACJSAnnualMeetingProgramFi
nalApril2013.pdf
Det. John J. Baeza, W. J. (1999-2013). International Association of
Forensic Criminologists. Retrieved from Profiling:
http://www.profiling.org/index.html
Morton, R. J. (2012, February 13). Serial Murder. Retrieved from FBI:
http://www.fbi.gov/stats-services/publications/serial-murder
Unknown. (2013). Criminal Minds and Methods. Retrieved from Crime
Library:
http://www.crimelibrary.com/serial_killers/index.html?PHPSESSID=926
d850a17629c211e062beec450749e
WINERMAN, L. (2004, August). Criminal profiling: the reality behind
the myth. Retrieved from American Psychological Association:
http://www.apa.org/monitor/julaug04/criminal.aspx
34. Cherry, K. (2012, April). What is Nature vs Nurture. Retrieved from Psychology:
http://psychology.about.com/od/nindex/g/nature-nurture.htm
CrimeUncovered. (2013, September 9). Bike Path Killer - Serial Killer Crime Documentary.
Retrieved from YouTube: https://www.youtube.com/watch?v=ww99T-1opuY
FISHBEIN, D. H. (2011, December 21). The Positive School: . Retrieved from Criminology:
http://criminology.fsu.edu/crimtheory/week4.htm
Noe, D. (2013, July 13). Bike Path Rapist — and Murderer — Altemio Sanchez. Retrieved from
Criminal Minds: http://www.crimelibrary.com/blog/article/bike-path-rapist-and-murderer-altemio-
sanchez/index.html
Paolucci, H. (2010, April 23). Cesare Beccaria. Retrieved from Criminology:
http://www.criminology.fsu.edu/crimtheory/beccaria.htm
Ronson, J. (2013, March 7). Ted Bundy: Nature vs. Nurture. Retrieved from Why Did He Do It :
http://whydidhedoit.com/132/
Unknown. (2012, April 23). The Boston Strangler. Retrieved from Criminal Minds:
http://criminalminds.wikia.com/wiki/The_Boston_Strangler
Unknown. (2013, March 21). Understanding Criminology Theories. Retrieved from Criminology:
http://www.criminology.com/resources/understanding-criminology-theories/
Unknown. (2014, February 12). The History of Criminology. Retrieved from Criminology:
http://www.criminology.com/resources/the-history-of-criminology/
35. Diamond, D. (2013, May 18). Advancing Community Policing. Retrieved from U.S. Department of
Justice : http://www.cops.usdoj.gov/Publications/e050919202-AdvCommunityPolicing_final.pdf
SPD. (2012-2014). Problem Oriented Policing. Retrieved from San Diego Police Department:
http://www.sandiego.gov/police/about/problem.shtml
Unknown. (2008, July 28). Community Policing Problem Solving Model. Retrieved from Royal
Canadian Mounted Police: http://www.rcmp-grc.gc.ca/ccaps-spcca/capra-eng.htm
MCENROE, P. (2008, April 23). Two sheriffs plead not guilty to an FBI sting. Retrieved from Star
Tribune:
http://www.startribune.com/local/stpaul/16626396.html?page=all&prepage=1&c=y#continue
unknown. (2013, May). Crime Lab Equipment. Retrieved from Spex Forensic Equipment:
spexforensc.com
unknown. (2014, January 3). 2014 CHEVROLET EXPRESS BOX TRUCK - STRAIGHT
TRUCK,CUTAWAY-
CUBE VAN,PLUMBER SERVICE TRUCK,STEPVAN,VAN,DRY VAN in GRAPEVINE,
TEXAS. Retrieved from Comercial Truck Trader:
http://www.commercialtrucktrader.com/listing/2014-CHEVROLET-EXPRESS-111591574
36. Daniels, W. (2013, March 23). Types of Security
Sys . Retrieved from Castra:
http://www.castras.org.uk/
Hamdell, D. (2012, October 15). Access Control
Systems . Retrieved from Honeywell:
http://www.honeywellaccess.com/products/access-
control-systems/index.html
Johnson, L. (2008, June 30). Facility Perimeter
Security Standard. Retrieved from NCDHHS:
http://www.ncdhhs.gov/pso/standards/physical/Facil
ity-Perimeter-Security-Standard.pdf