SlideShare a Scribd company logo
1 of 36
 For this project I mean to not only explain
how each part of the criminal justice
programs works but also how it ties into
Case studies of Ted Bundy.
 International Association of Forensic
Criminologists (IACF)
 Academy of Criminal Justice Sciences: The
Politics of Crime and Criminal Justice
 What its about?
 Memberships
 Education
 Conferences
› The International Practices in Profiling,
Prevention & Counterterrorism
› The Politics of Capital Punishment in relation to
Serial Killers
 Tittle: Profiling of Serial Killers
 Summary
 Outline:
•What is Profiling
•Where do the Profilers come from?
•What does a Profiler do?
•How does Profiling tie in with investigation?
•What is Serial Killer?
•How are Serial Killers profiled?
•How do profilers help during the
investigation and courts process?
 Classical School Theories of Crime
-Rational Thought of a Criminal
 Biological Theories
-Nature vs Nurture
 Social Theories
-Formed by Society
 Psychological Theories
-Mental/ Psychology Problems
 What is SARA?
 In order to establish an effective long term solution, the
cause(s) of a problem and the underlying factors must be
accurately identified. The basic problem solving framework
for this is known as the S.A.R.A. Problem Solving Model.
 Though there are several different problem solving
methods SARA is the most effective and most common
problem solving technique used.
 By systematically applying the steps of SARA police can
combine resources to effectively reduce or eliminate
problems.
 S- scanning, A- analysis, R- response, and A- assessment
 Identifying the problem or recurring problems of
concern to the public and police .
 Identifying the consequences of problem for the
community and police.
 Prioritizing those problems.
 Developing broad goals.
 Confirming that the problems exist.
 Determining how frequently the problem occurs and
how long it has been taking place.
 Selecting problems for closer examination.
 Learning the problem’s causes, scopes, and effects.
 Identifying and understanding the events and conditions that
precedes and accompany the problem.
 Identifying the relevant data to be collected.
 Researching what is known about the problem type.
 Taking inventory of how the problem is currently addressed and
the strengths and limitations of the current response.
 Narrowing the scope of the problem as specifically as possible
 Identifying a variety of resources that may be of assistance in
developing a deeper understanding of the problem.
 Developing a working hypothesis about why the problem is
occurring.
 Acting to alleviate the problem
 Brainstorming for what other communities with
similar problems have done.
 Choosing among the alternative interventions .
 Outlining a response plan and identifying
responsible parties
 Stating the specific objectives for the response
plan.
 Carrying out the planned activities.
 Determining whether the response worked.
 Collecting pre- and post- response
qualitative and quantitative data.
 Determining whether broad goals and
specific objectives were attained.
 Identifying any new strategies needed to
augment the original plan.
 Conducting ongoing assessment to ensure
continued effectiveness.
 C = Client
 A =Acquire/Analysis Information
 P =Partnerships
 R =Response
 A =Assessment of Action taken
 The model emphasizes the importance of:
› developing and maintaining partnerships and trust within
communities/the workforce to establish priorities for service
delivery and preventive problem solving;
› understanding our clients' perspectives on work-related matters
for establishing priorities and potential partnerships in service
delivery; and
› encouraging ongoing feedback for continuous improvement.
 ASCLD-Certification
 ACA Accreditation
 CALEA
 The Case in question
 The case against Officers Naylon and Rehak
 During a burn mission stole $6,000
 Wrote faulty evidence locker paper work
 Were caught on camera committing the
crime.
 Evidence
 Interview
 Punishment (termination, leave of absence
etc.)
 Is it employee vs criminal case or employee
and criminal case
 Inmate Pamphlet
› Safety
› Sexual Harassment
› Protective Custody
› Family involvement
› Segregation Units
› Hotline/ call centers
 New Employees
› Safety
› Lessons/ Classes need to know
› Training and Development
› Sexual Harassment
› Volunteer work
› Work related issues
 Building a Crime Scene Vehicle
 The budget is $100,000
› For a vehicle
› Equipment and kits
› Refills or back ups for any faulty equipment.
Vehicle 2014 Chevrolet express
box truck
$32,252
Evidence collection kits
Blood Collection Kit Kit $15
Blood Stain pattern
documentation kit
Kit $200
Excavation kit Kit $35
Finger print kit Kit $42
Impression kit Kit $65
Pattern print lifter kit Kit $55
Trace evidence collection
kit
Kit $75
Trajectory kit Kit $55
Total: $36,387.50
*Does not include optional/singular items
 Crime Scene Technician Job
 Job Description
 Requirements
 Job Duties
 Salary
 Model Policy
› What an employee does.
› How an employee would use a computer at
work.
› Regulations for using a computer at work.
 Employee Policy
› Work environment
› Constitute department own equipment
› Fair use of department owned equipment (email,
cellular phone, social media)
› Internet usage (prohibited websites and
activities)
› Constitutes work related internet usage
 Application policy
› Search policy on new applicants
› Rejection criteria
› Constitutes free speech as future employees
› Protected behavior
 Evidence Tampering
› NRS 199.220 Destroying evidence. Every
person who, with intent to conceal the commission of
any felony, or to protect or conceal the identity of any
person committing the same, or with intent to delay
or hinder the administration of the law or to prevent
the production thereof at any time, in any court or
before any officer, tribunal, judge or magistrate, shall
willfully destroy, alter, erase, obliterate or conceal any
book, paper, record, writing, instrument or thing shall
be guilty of a gross misdemeanor.
 Witness tampering
› 18 U.S. Code § 1512 - Tampering with a witness,
victim, or an informant
› prevent the communication by any person to a law
enforcement officer or judge of the United States of
information relating to the commission or possible
commission of a Federal offense or a violation of
conditions of probation, parole, or release pending
judicial proceedings
› shall be fined under this title or imprisoned not more
than 20 years, or both.
 Rape/ Sexual Assault
 Top Three Criminal Defenses
› Innocence
› Consent
› Mental Instability
 Evidence Collection
› Tips for:
› Hair
› Blood
› Fibers
› Drugs
› Guns
 What is security?
› Perimeter control
› Access control
› Security control measures
 Types of security measure
› Security sensors
› Video and Audio Surveillance
› Card readers/ proxemics access
 Have Security for
 Interviews/ Interrogations
 Parking lot
 Access to building and personal
 Security of evidence
 Security of narcotics
 Boyd, L. M. (2013, March 19). Polictics of Crime and Criminal Justice.
Retrieved from Academy of Criminal Justice Sciences:
http://www.acjs.org/pubs/uploads/2013ACJSAnnualMeetingProgramFi
nalApril2013.pdf
 Det. John J. Baeza, W. J. (1999-2013). International Association of
Forensic Criminologists. Retrieved from Profiling:
http://www.profiling.org/index.html
 Morton, R. J. (2012, February 13). Serial Murder. Retrieved from FBI:
http://www.fbi.gov/stats-services/publications/serial-murder
 Unknown. (2013). Criminal Minds and Methods. Retrieved from Crime
Library:
http://www.crimelibrary.com/serial_killers/index.html?PHPSESSID=926
d850a17629c211e062beec450749e
 WINERMAN, L. (2004, August). Criminal profiling: the reality behind
the myth. Retrieved from American Psychological Association:
http://www.apa.org/monitor/julaug04/criminal.aspx
 Cherry, K. (2012, April). What is Nature vs Nurture. Retrieved from Psychology:
http://psychology.about.com/od/nindex/g/nature-nurture.htm
 CrimeUncovered. (2013, September 9). Bike Path Killer - Serial Killer Crime Documentary.
Retrieved from YouTube: https://www.youtube.com/watch?v=ww99T-1opuY
 FISHBEIN, D. H. (2011, December 21). The Positive School: . Retrieved from Criminology:
http://criminology.fsu.edu/crimtheory/week4.htm
 Noe, D. (2013, July 13). Bike Path Rapist — and Murderer — Altemio Sanchez. Retrieved from
Criminal Minds: http://www.crimelibrary.com/blog/article/bike-path-rapist-and-murderer-altemio-
sanchez/index.html
 Paolucci, H. (2010, April 23). Cesare Beccaria. Retrieved from Criminology:
http://www.criminology.fsu.edu/crimtheory/beccaria.htm
 Ronson, J. (2013, March 7). Ted Bundy: Nature vs. Nurture. Retrieved from Why Did He Do It :
http://whydidhedoit.com/132/
 Unknown. (2012, April 23). The Boston Strangler. Retrieved from Criminal Minds:
http://criminalminds.wikia.com/wiki/The_Boston_Strangler
 Unknown. (2013, March 21). Understanding Criminology Theories. Retrieved from Criminology:
http://www.criminology.com/resources/understanding-criminology-theories/
 Unknown. (2014, February 12). The History of Criminology. Retrieved from Criminology:
http://www.criminology.com/resources/the-history-of-criminology/
 Diamond, D. (2013, May 18). Advancing Community Policing. Retrieved from U.S. Department of
Justice : http://www.cops.usdoj.gov/Publications/e050919202-AdvCommunityPolicing_final.pdf
 SPD. (2012-2014). Problem Oriented Policing. Retrieved from San Diego Police Department:
http://www.sandiego.gov/police/about/problem.shtml
 Unknown. (2008, July 28). Community Policing Problem Solving Model. Retrieved from Royal
Canadian Mounted Police: http://www.rcmp-grc.gc.ca/ccaps-spcca/capra-eng.htm
 MCENROE, P. (2008, April 23). Two sheriffs plead not guilty to an FBI sting. Retrieved from Star
Tribune:
http://www.startribune.com/local/stpaul/16626396.html?page=all&prepage=1&c=y#continue
 unknown. (2013, May). Crime Lab Equipment. Retrieved from Spex Forensic Equipment:
spexforensc.com
 unknown. (2014, January 3). 2014 CHEVROLET EXPRESS BOX TRUCK - STRAIGHT
TRUCK,CUTAWAY-
CUBE VAN,PLUMBER SERVICE TRUCK,STEPVAN,VAN,DRY VAN in GRAPEVINE,
TEXAS. Retrieved from Comercial Truck Trader:
http://www.commercialtrucktrader.com/listing/2014-CHEVROLET-EXPRESS-111591574
 Daniels, W. (2013, March 23). Types of Security
Sys . Retrieved from Castra:
http://www.castras.org.uk/
 Hamdell, D. (2012, October 15). Access Control
Systems . Retrieved from Honeywell:
http://www.honeywellaccess.com/products/access-
control-systems/index.html
 Johnson, L. (2008, June 30). Facility Perimeter
Security Standard. Retrieved from NCDHHS:
http://www.ncdhhs.gov/pso/standards/physical/Facil
ity-Perimeter-Security-Standard.pdf

More Related Content

Viewers also liked

ICCV2009: MAP Inference in Discrete Models: Part 5
ICCV2009: MAP Inference in Discrete Models: Part 5ICCV2009: MAP Inference in Discrete Models: Part 5
ICCV2009: MAP Inference in Discrete Models: Part 5zukun
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Functional programming with python
Functional programming with pythonFunctional programming with python
Functional programming with pythonMarcelo Cure
 
CITY OF SPIES BY SORAYYA KHAN
CITY OF SPIES BY SORAYYA KHANCITY OF SPIES BY SORAYYA KHAN
CITY OF SPIES BY SORAYYA KHANSheikh Hasnain
 
Scalable Internet Servers and Load Balancing
Scalable Internet Servers and Load BalancingScalable Internet Servers and Load Balancing
Scalable Internet Servers and Load BalancingInformation Technology
 
Android Application: Introduction
Android Application: IntroductionAndroid Application: Introduction
Android Application: IntroductionJollen Chen
 
Intelligence, spies & espionage
Intelligence, spies & espionageIntelligence, spies & espionage
Intelligence, spies & espionagedgnadt
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1koolkampus
 
The double lives of spies in the civil war power point
The double lives of spies in the civil war power pointThe double lives of spies in the civil war power point
The double lives of spies in the civil war power pointAlyssa Fabia
 

Viewers also liked (20)

Lec 03 set
Lec 03   setLec 03   set
Lec 03 set
 
Trends in spies
Trends in spiesTrends in spies
Trends in spies
 
Carrick - Introduction to Physics & Electronics - Spring Review 2012
Carrick - Introduction to Physics & Electronics - Spring Review 2012Carrick - Introduction to Physics & Electronics - Spring Review 2012
Carrick - Introduction to Physics & Electronics - Spring Review 2012
 
ICCV2009: MAP Inference in Discrete Models: Part 5
ICCV2009: MAP Inference in Discrete Models: Part 5ICCV2009: MAP Inference in Discrete Models: Part 5
ICCV2009: MAP Inference in Discrete Models: Part 5
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
SAN Review
SAN ReviewSAN Review
SAN Review
 
Functional programming with python
Functional programming with pythonFunctional programming with python
Functional programming with python
 
CITY OF SPIES BY SORAYYA KHAN
CITY OF SPIES BY SORAYYA KHANCITY OF SPIES BY SORAYYA KHAN
CITY OF SPIES BY SORAYYA KHAN
 
Android UI
Android UIAndroid UI
Android UI
 
Scalable Internet Servers and Load Balancing
Scalable Internet Servers and Load BalancingScalable Internet Servers and Load Balancing
Scalable Internet Servers and Load Balancing
 
Android Application: Introduction
Android Application: IntroductionAndroid Application: Introduction
Android Application: Introduction
 
Intelligence, spies & espionage
Intelligence, spies & espionageIntelligence, spies & espionage
Intelligence, spies & espionage
 
Functional style programming
Functional style programmingFunctional style programming
Functional style programming
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1
 
SAN
SANSAN
SAN
 
Securing Windows web servers
Securing Windows web serversSecuring Windows web servers
Securing Windows web servers
 
Noah Z - Spies
Noah Z - SpiesNoah Z - Spies
Noah Z - Spies
 
Xml Publisher
Xml PublisherXml Publisher
Xml Publisher
 
The double lives of spies in the civil war power point
The double lives of spies in the civil war power pointThe double lives of spies in the civil war power point
The double lives of spies in the civil war power point
 
Lecture#01
Lecture#01Lecture#01
Lecture#01
 

Similar to Serial Killers Presentation1

Screening children and young people for risk of re-offending: A Discussion of...
Screening children and young people for risk of re-offending: A Discussion of...Screening children and young people for risk of re-offending: A Discussion of...
Screening children and young people for risk of re-offending: A Discussion of...robine
 
Paper#1 Lineups, Show-ups, and Photographic Arrays    Before.docx
Paper#1 Lineups, Show-ups, and Photographic Arrays    Before.docxPaper#1 Lineups, Show-ups, and Photographic Arrays    Before.docx
Paper#1 Lineups, Show-ups, and Photographic Arrays    Before.docxMARRY7
 
The Power Of Collaboration.Webinar.081111
The Power Of Collaboration.Webinar.081111The Power Of Collaboration.Webinar.081111
The Power Of Collaboration.Webinar.081111casey0034
 
Preventing Child Sexual Abuse A
Preventing Child Sexual Abuse APreventing Child Sexual Abuse A
Preventing Child Sexual Abuse ACoach_Jared
 
An Introduction to the Safety and Justice Challenge
An Introduction to the Safety and Justice ChallengeAn Introduction to the Safety and Justice Challenge
An Introduction to the Safety and Justice ChallengeJeanette Marshall, MBA
 
Psychology Of Interrogations
Psychology Of InterrogationsPsychology Of Interrogations
Psychology Of InterrogationsJan Champagne
 
Vol 1_Issue 3_Version 2
Vol 1_Issue 3_Version 2Vol 1_Issue 3_Version 2
Vol 1_Issue 3_Version 2Casey Coleman
 
This is a 2 part assignmentPART 1Deliverable Length  3-4 page.docx
This is a 2 part assignmentPART 1Deliverable Length  3-4 page.docxThis is a 2 part assignmentPART 1Deliverable Length  3-4 page.docx
This is a 2 part assignmentPART 1Deliverable Length  3-4 page.docxcandycemidgley
 
4 forum responses 2 300 words 2 250 words w.docx
4 forum responses 2 300 words 2 250 words w.docx4 forum responses 2 300 words 2 250 words w.docx
4 forum responses 2 300 words 2 250 words w.docxwrite12
 
Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014Thermo Fisher Scientific
 
Background Checks
Background ChecksBackground Checks
Background ChecksLou Mengsol
 
Book Reference Peak, K. J. (2015). Policing America C.docx
Book Reference Peak, K. J. (2015). Policing America C.docxBook Reference Peak, K. J. (2015). Policing America C.docx
Book Reference Peak, K. J. (2015). Policing America C.docxAASTHA76
 
My Internship With Battle Born Progress
My Internship With Battle Born ProgressMy Internship With Battle Born Progress
My Internship With Battle Born ProgressHolly Vega
 
Defense Team Paper 4Defense Team PaperLearning Team C b.docx
Defense Team Paper  4Defense Team PaperLearning Team C b.docxDefense Team Paper  4Defense Team PaperLearning Team C b.docx
Defense Team Paper 4Defense Team PaperLearning Team C b.docxsimonithomas47935
 
IACP COPS Combating Child Sex Trafficking A Guide for LE Leaders- FINAL
IACP COPS Combating Child Sex Trafficking A Guide for LE Leaders- FINALIACP COPS Combating Child Sex Trafficking A Guide for LE Leaders- FINAL
IACP COPS Combating Child Sex Trafficking A Guide for LE Leaders- FINALKelly Burke
 
2-2AssignmentAssignment Criminal Profiling Methods in A.docx
2-2AssignmentAssignment Criminal Profiling Methods in A.docx2-2AssignmentAssignment Criminal Profiling Methods in A.docx
2-2AssignmentAssignment Criminal Profiling Methods in A.docxjesusamckone
 

Similar to Serial Killers Presentation1 (20)

Screening children and young people for risk of re-offending: A Discussion of...
Screening children and young people for risk of re-offending: A Discussion of...Screening children and young people for risk of re-offending: A Discussion of...
Screening children and young people for risk of re-offending: A Discussion of...
 
Counterrorism
CounterrorismCounterrorism
Counterrorism
 
Paper#1 Lineups, Show-ups, and Photographic Arrays    Before.docx
Paper#1 Lineups, Show-ups, and Photographic Arrays    Before.docxPaper#1 Lineups, Show-ups, and Photographic Arrays    Before.docx
Paper#1 Lineups, Show-ups, and Photographic Arrays    Before.docx
 
ACP Digging Deeper
ACP Digging DeeperACP Digging Deeper
ACP Digging Deeper
 
The Power Of Collaboration.Webinar.081111
The Power Of Collaboration.Webinar.081111The Power Of Collaboration.Webinar.081111
The Power Of Collaboration.Webinar.081111
 
Preventing Child Sexual Abuse A
Preventing Child Sexual Abuse APreventing Child Sexual Abuse A
Preventing Child Sexual Abuse A
 
An Introduction to the Safety and Justice Challenge
An Introduction to the Safety and Justice ChallengeAn Introduction to the Safety and Justice Challenge
An Introduction to the Safety and Justice Challenge
 
Psychology Of Interrogations
Psychology Of InterrogationsPsychology Of Interrogations
Psychology Of Interrogations
 
Vol 1_Issue 3_Version 2
Vol 1_Issue 3_Version 2Vol 1_Issue 3_Version 2
Vol 1_Issue 3_Version 2
 
This is a 2 part assignmentPART 1Deliverable Length  3-4 page.docx
This is a 2 part assignmentPART 1Deliverable Length  3-4 page.docxThis is a 2 part assignmentPART 1Deliverable Length  3-4 page.docx
This is a 2 part assignmentPART 1Deliverable Length  3-4 page.docx
 
CJ NEWS FEBRUARY 2017
CJ NEWS FEBRUARY 2017CJ NEWS FEBRUARY 2017
CJ NEWS FEBRUARY 2017
 
4 forum responses 2 300 words 2 250 words w.docx
4 forum responses 2 300 words 2 250 words w.docx4 forum responses 2 300 words 2 250 words w.docx
4 forum responses 2 300 words 2 250 words w.docx
 
Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014
 
Background Checks
Background ChecksBackground Checks
Background Checks
 
Book Reference Peak, K. J. (2015). Policing America C.docx
Book Reference Peak, K. J. (2015). Policing America C.docxBook Reference Peak, K. J. (2015). Policing America C.docx
Book Reference Peak, K. J. (2015). Policing America C.docx
 
My Internship With Battle Born Progress
My Internship With Battle Born ProgressMy Internship With Battle Born Progress
My Internship With Battle Born Progress
 
Defense Team Paper 4Defense Team PaperLearning Team C b.docx
Defense Team Paper  4Defense Team PaperLearning Team C b.docxDefense Team Paper  4Defense Team PaperLearning Team C b.docx
Defense Team Paper 4Defense Team PaperLearning Team C b.docx
 
IACP COPS Combating Child Sex Trafficking A Guide for LE Leaders- FINAL
IACP COPS Combating Child Sex Trafficking A Guide for LE Leaders- FINALIACP COPS Combating Child Sex Trafficking A Guide for LE Leaders- FINAL
IACP COPS Combating Child Sex Trafficking A Guide for LE Leaders- FINAL
 
Evidence-Based Sentencing
Evidence-Based SentencingEvidence-Based Sentencing
Evidence-Based Sentencing
 
2-2AssignmentAssignment Criminal Profiling Methods in A.docx
2-2AssignmentAssignment Criminal Profiling Methods in A.docx2-2AssignmentAssignment Criminal Profiling Methods in A.docx
2-2AssignmentAssignment Criminal Profiling Methods in A.docx
 

More from Taylor Leszczynski

More from Taylor Leszczynski (9)

Unit 1 Presentation PlayStation 4
Unit 1 Presentation PlayStation 4Unit 1 Presentation PlayStation 4
Unit 1 Presentation PlayStation 4
 
Tacoma Narrows Bridge Presentation
Tacoma Narrows Bridge PresentationTacoma Narrows Bridge Presentation
Tacoma Narrows Bridge Presentation
 
Star Wars The Phenomenon
Star Wars The PhenomenonStar Wars The Phenomenon
Star Wars The Phenomenon
 
Ivanpah Solar power plant
Ivanpah Solar power plantIvanpah Solar power plant
Ivanpah Solar power plant
 
Tokyo Bay Mega- Float
Tokyo Bay Mega- FloatTokyo Bay Mega- Float
Tokyo Bay Mega- Float
 
United Health Care
United Health CareUnited Health Care
United Health Care
 
United Airlines
United AirlinesUnited Airlines
United Airlines
 
Ford TQM
Ford TQMFord TQM
Ford TQM
 
research paper
research paperresearch paper
research paper
 

Serial Killers Presentation1

  • 1.
  • 2.  For this project I mean to not only explain how each part of the criminal justice programs works but also how it ties into Case studies of Ted Bundy.
  • 3.  International Association of Forensic Criminologists (IACF)  Academy of Criminal Justice Sciences: The Politics of Crime and Criminal Justice
  • 4.  What its about?  Memberships  Education
  • 5.  Conferences › The International Practices in Profiling, Prevention & Counterterrorism › The Politics of Capital Punishment in relation to Serial Killers
  • 6.  Tittle: Profiling of Serial Killers  Summary  Outline: •What is Profiling •Where do the Profilers come from? •What does a Profiler do? •How does Profiling tie in with investigation? •What is Serial Killer? •How are Serial Killers profiled? •How do profilers help during the investigation and courts process?
  • 7.  Classical School Theories of Crime -Rational Thought of a Criminal  Biological Theories -Nature vs Nurture
  • 8.  Social Theories -Formed by Society  Psychological Theories -Mental/ Psychology Problems
  • 9.  What is SARA?  In order to establish an effective long term solution, the cause(s) of a problem and the underlying factors must be accurately identified. The basic problem solving framework for this is known as the S.A.R.A. Problem Solving Model.  Though there are several different problem solving methods SARA is the most effective and most common problem solving technique used.  By systematically applying the steps of SARA police can combine resources to effectively reduce or eliminate problems.  S- scanning, A- analysis, R- response, and A- assessment
  • 10.  Identifying the problem or recurring problems of concern to the public and police .  Identifying the consequences of problem for the community and police.  Prioritizing those problems.  Developing broad goals.  Confirming that the problems exist.  Determining how frequently the problem occurs and how long it has been taking place.  Selecting problems for closer examination.
  • 11.  Learning the problem’s causes, scopes, and effects.  Identifying and understanding the events and conditions that precedes and accompany the problem.  Identifying the relevant data to be collected.  Researching what is known about the problem type.  Taking inventory of how the problem is currently addressed and the strengths and limitations of the current response.  Narrowing the scope of the problem as specifically as possible  Identifying a variety of resources that may be of assistance in developing a deeper understanding of the problem.  Developing a working hypothesis about why the problem is occurring.
  • 12.  Acting to alleviate the problem  Brainstorming for what other communities with similar problems have done.  Choosing among the alternative interventions .  Outlining a response plan and identifying responsible parties  Stating the specific objectives for the response plan.  Carrying out the planned activities.
  • 13.  Determining whether the response worked.  Collecting pre- and post- response qualitative and quantitative data.  Determining whether broad goals and specific objectives were attained.  Identifying any new strategies needed to augment the original plan.  Conducting ongoing assessment to ensure continued effectiveness.
  • 14.  C = Client  A =Acquire/Analysis Information  P =Partnerships  R =Response  A =Assessment of Action taken  The model emphasizes the importance of: › developing and maintaining partnerships and trust within communities/the workforce to establish priorities for service delivery and preventive problem solving; › understanding our clients' perspectives on work-related matters for establishing priorities and potential partnerships in service delivery; and › encouraging ongoing feedback for continuous improvement.
  • 15.  ASCLD-Certification  ACA Accreditation  CALEA
  • 16.  The Case in question  The case against Officers Naylon and Rehak  During a burn mission stole $6,000  Wrote faulty evidence locker paper work  Were caught on camera committing the crime.
  • 17.  Evidence  Interview  Punishment (termination, leave of absence etc.)  Is it employee vs criminal case or employee and criminal case
  • 18.  Inmate Pamphlet › Safety › Sexual Harassment › Protective Custody › Family involvement › Segregation Units › Hotline/ call centers
  • 19.  New Employees › Safety › Lessons/ Classes need to know › Training and Development › Sexual Harassment › Volunteer work › Work related issues
  • 20.  Building a Crime Scene Vehicle  The budget is $100,000 › For a vehicle › Equipment and kits › Refills or back ups for any faulty equipment.
  • 21. Vehicle 2014 Chevrolet express box truck $32,252 Evidence collection kits Blood Collection Kit Kit $15 Blood Stain pattern documentation kit Kit $200 Excavation kit Kit $35 Finger print kit Kit $42 Impression kit Kit $65 Pattern print lifter kit Kit $55 Trace evidence collection kit Kit $75 Trajectory kit Kit $55 Total: $36,387.50 *Does not include optional/singular items
  • 22.  Crime Scene Technician Job  Job Description  Requirements  Job Duties  Salary
  • 23.  Model Policy › What an employee does. › How an employee would use a computer at work. › Regulations for using a computer at work.
  • 24.  Employee Policy › Work environment › Constitute department own equipment › Fair use of department owned equipment (email, cellular phone, social media) › Internet usage (prohibited websites and activities) › Constitutes work related internet usage
  • 25.  Application policy › Search policy on new applicants › Rejection criteria › Constitutes free speech as future employees › Protected behavior
  • 26.  Evidence Tampering › NRS 199.220 Destroying evidence. Every person who, with intent to conceal the commission of any felony, or to protect or conceal the identity of any person committing the same, or with intent to delay or hinder the administration of the law or to prevent the production thereof at any time, in any court or before any officer, tribunal, judge or magistrate, shall willfully destroy, alter, erase, obliterate or conceal any book, paper, record, writing, instrument or thing shall be guilty of a gross misdemeanor.
  • 27.  Witness tampering › 18 U.S. Code § 1512 - Tampering with a witness, victim, or an informant › prevent the communication by any person to a law enforcement officer or judge of the United States of information relating to the commission or possible commission of a Federal offense or a violation of conditions of probation, parole, or release pending judicial proceedings › shall be fined under this title or imprisoned not more than 20 years, or both.
  • 28.  Rape/ Sexual Assault  Top Three Criminal Defenses › Innocence › Consent › Mental Instability
  • 29.  Evidence Collection › Tips for: › Hair › Blood › Fibers › Drugs › Guns
  • 30.  What is security? › Perimeter control › Access control › Security control measures
  • 31.
  • 32.  Types of security measure › Security sensors › Video and Audio Surveillance › Card readers/ proxemics access  Have Security for  Interviews/ Interrogations  Parking lot  Access to building and personal  Security of evidence  Security of narcotics
  • 33.  Boyd, L. M. (2013, March 19). Polictics of Crime and Criminal Justice. Retrieved from Academy of Criminal Justice Sciences: http://www.acjs.org/pubs/uploads/2013ACJSAnnualMeetingProgramFi nalApril2013.pdf  Det. John J. Baeza, W. J. (1999-2013). International Association of Forensic Criminologists. Retrieved from Profiling: http://www.profiling.org/index.html  Morton, R. J. (2012, February 13). Serial Murder. Retrieved from FBI: http://www.fbi.gov/stats-services/publications/serial-murder  Unknown. (2013). Criminal Minds and Methods. Retrieved from Crime Library: http://www.crimelibrary.com/serial_killers/index.html?PHPSESSID=926 d850a17629c211e062beec450749e  WINERMAN, L. (2004, August). Criminal profiling: the reality behind the myth. Retrieved from American Psychological Association: http://www.apa.org/monitor/julaug04/criminal.aspx
  • 34.  Cherry, K. (2012, April). What is Nature vs Nurture. Retrieved from Psychology: http://psychology.about.com/od/nindex/g/nature-nurture.htm  CrimeUncovered. (2013, September 9). Bike Path Killer - Serial Killer Crime Documentary. Retrieved from YouTube: https://www.youtube.com/watch?v=ww99T-1opuY  FISHBEIN, D. H. (2011, December 21). The Positive School: . Retrieved from Criminology: http://criminology.fsu.edu/crimtheory/week4.htm  Noe, D. (2013, July 13). Bike Path Rapist — and Murderer — Altemio Sanchez. Retrieved from Criminal Minds: http://www.crimelibrary.com/blog/article/bike-path-rapist-and-murderer-altemio- sanchez/index.html  Paolucci, H. (2010, April 23). Cesare Beccaria. Retrieved from Criminology: http://www.criminology.fsu.edu/crimtheory/beccaria.htm  Ronson, J. (2013, March 7). Ted Bundy: Nature vs. Nurture. Retrieved from Why Did He Do It : http://whydidhedoit.com/132/  Unknown. (2012, April 23). The Boston Strangler. Retrieved from Criminal Minds: http://criminalminds.wikia.com/wiki/The_Boston_Strangler  Unknown. (2013, March 21). Understanding Criminology Theories. Retrieved from Criminology: http://www.criminology.com/resources/understanding-criminology-theories/  Unknown. (2014, February 12). The History of Criminology. Retrieved from Criminology: http://www.criminology.com/resources/the-history-of-criminology/
  • 35.  Diamond, D. (2013, May 18). Advancing Community Policing. Retrieved from U.S. Department of Justice : http://www.cops.usdoj.gov/Publications/e050919202-AdvCommunityPolicing_final.pdf  SPD. (2012-2014). Problem Oriented Policing. Retrieved from San Diego Police Department: http://www.sandiego.gov/police/about/problem.shtml  Unknown. (2008, July 28). Community Policing Problem Solving Model. Retrieved from Royal Canadian Mounted Police: http://www.rcmp-grc.gc.ca/ccaps-spcca/capra-eng.htm  MCENROE, P. (2008, April 23). Two sheriffs plead not guilty to an FBI sting. Retrieved from Star Tribune: http://www.startribune.com/local/stpaul/16626396.html?page=all&prepage=1&c=y#continue  unknown. (2013, May). Crime Lab Equipment. Retrieved from Spex Forensic Equipment: spexforensc.com  unknown. (2014, January 3). 2014 CHEVROLET EXPRESS BOX TRUCK - STRAIGHT TRUCK,CUTAWAY- CUBE VAN,PLUMBER SERVICE TRUCK,STEPVAN,VAN,DRY VAN in GRAPEVINE, TEXAS. Retrieved from Comercial Truck Trader: http://www.commercialtrucktrader.com/listing/2014-CHEVROLET-EXPRESS-111591574
  • 36.  Daniels, W. (2013, March 23). Types of Security Sys . Retrieved from Castra: http://www.castras.org.uk/  Hamdell, D. (2012, October 15). Access Control Systems . Retrieved from Honeywell: http://www.honeywellaccess.com/products/access- control-systems/index.html  Johnson, L. (2008, June 30). Facility Perimeter Security Standard. Retrieved from NCDHHS: http://www.ncdhhs.gov/pso/standards/physical/Facil ity-Perimeter-Security-Standard.pdf