StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Criminal Justice Operations: Scenario Investigative Plan - Case Study Example

Cite this document
Summary
The recent trend on increased robbery and burglary-related criminal activities in City X not only warrants new strategies and policies on fighting crime but also requires an elaborate plan of investigative strategies and their implementation for robbery prevention, detection,…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Criminal Justice Operations: Scenario Investigative Plan
Read Text Preview

Extract of sample "Criminal Justice Operations: Scenario Investigative Plan"

Criminal Justice Operations: Scenario "Investigative Plan" [Investigation Plan] Introduction The recent trend on increased robbery and burglary-related criminal activities in City X not only warrants new strategies and policies on fighting crime but also requires an elaborate plan of investigative strategies and their implementation for robbery prevention, detection, arrest, and the trial of the suspects. The techniques essential for the law enforcing agency to investigate robbery in the city include eyewitness evidence, crime scene processing, facts evaluation, useful witness interviews, and case tracking (Giacalone, 2010).

This plan outlines the new and time-proven investigative techniques that would be effective in investigating City X’s current robbery trends. Robbery Investigation PlanAmong the vital steps in investigating a robbery are the identification of the objectives of the investigation, the features of a robbery, and the modes of operations of the suspected robbers. There are several critical steps that investigators should apply while investigating a robbery so that suspects are arrested and successful trials instituted.

The first step is to determine whether an investigation is necessary. Second, it is determined whether an interim relief is necessary. That is, does the situation call for an immediate action before investigation is complete? Third is to determine who should investigate a given crime. Fourth, all the relevant documents should be preserved, obtained, and reviewed. The fifth step entails the review of the legal issues regarding the case to be investigated. Sixth, the time and place to conduct the investigation should be determined so that it is done promptly.

The seventh step is the interviewing individuals with knowledge of facts about the robbery in question. Eighth, an investigation report should be prepared followed by the taking of appropriate actions based on the findings (Osborne & Wernicke, 2003). The tenth step is a follow up to asses whether the investigation was thorough and conclusive enough. Technologies and Crime AnalysisTo adequately manage investigations into the robberies in the city, it is important that the right technologies are applied so that the law enforcement agencies quickly adapt to the changing nature of criminals, crimes, and crime demographics.

Technologies should be used in investigation management, audit, analysis, accessibility, workflow, task and content management, hotline reporting, security architecture (access to sensitive data), and reporting (Giacalone, 2010). Among the technologies appropriate for investigation are access-control systems, vehicle tracking systems, computers, radio frequency transmitters, and floppy disks, which are rather useful in assembling data. In gathering data, investigators should consider data volatility, search warrant, consent, video surveillance, and chain of custody.

The access-control systems could be biometric machines that only detect authorized finger prints or voice into rooms and lockers in which confidential data is stored. On the other hand, radio frequency systems could be used for communication among investigators while vehicle tracking systems could help track the movements of suspects in investigations. Video surveillance equipment are useful in reviewing movements in and out of robbery scenes. Various units to deal with robbery and other crime investigation should be created to ensure smooth workflow.

These investigative units include armed robbery unit, aggravated robbery unit, highway robbery unit, and extortion unit. While armed robberies involve the use of weapons, aggravate robbery involves the use of a deadly weapon and highway robbery relates to robberies in open public places such as parking lot, street, and sidewalk. These units will specifically deal with robberies and burglaries falling under their jurisdictions. Crime analysis is the other core aspect of an investigation. It entails the systematic identification and examination of the trends of crime and other disorderly acts in a given area.

Computer technologies such as software for statistics should then be used to analyze robbery data, which should then be stored in devices such as floppy disks for reference. The information obtained from such analyses is then used by law enforcers to allocate the right amount and types of resources to prevent, detect, and deal with criminals and crimes in an effective manner (Osborne & Wernicke, 2003). Importantly, such analyses help investigators narrow down on, identify, and apprehend crime suspects.

Crime analysis should hence be done at the operational, tactical, and strategic levels of an investigation by assessing arrests reports, 911/police calls, and crime reports. These analyses should then be used by law enforcement agencies to predict occurrences thus allowing them to alert other officers and agencies (Osborne & Wernicke, 2003).ConclusionWith the right plan and its subsequent implementation, the escalating crime trends in City X could be reversed. It would however require the use of the right investigative units, technologies, and crime analysis techniques for the city’s investigators to prevent crimes and apprehend criminals.

Once a robbery or any crime occurs, the right investigative steps should be followed to ensure the suspects are apprehended and prosecuted. ReferencesGiacalone, J. L. (2010). The criminal investigative function: a guide for new investigators. Loose-leaf Law Publications, Inc.Osborne, D., and Wernicke, S. (2003). Introduction to crime analysis: basic resources for criminal justice practice. Haworth Press.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Criminal Justice Operations: Scenario Investigative Plan Case Study”, n.d.)
Criminal Justice Operations: Scenario Investigative Plan Case Study. Retrieved from https://studentshare.org/law/1601982-criminal-justice-operations-scenario-investigative-plan
(Criminal Justice Operations: Scenario Investigative Plan Case Study)
Criminal Justice Operations: Scenario Investigative Plan Case Study. https://studentshare.org/law/1601982-criminal-justice-operations-scenario-investigative-plan.
“Criminal Justice Operations: Scenario Investigative Plan Case Study”, n.d. https://studentshare.org/law/1601982-criminal-justice-operations-scenario-investigative-plan.
  • Cited: 0 times

CHECK THESE SAMPLES OF Criminal Justice Operations: Scenario Investigative Plan

Public Policing Versus Private Security

Public Policing Vs Private Security Public Policing Vs Private Security Introduction Although private security and public police basically carry out different errands, often the policing performed by them are mutually supportive.... hellip; The public police operate on behalf of the government and society to put laws in force to sustain peace....
7 Pages (1750 words) Essay

Background and Perspective into Account When Seeking Information

It is largely presumed that a sound criminal justice system is dependent on the formulation of stringent and appropriate laws that take into account all possible avenues of meting out justice (Davies, Francis and Greer, 2008).... This paper evaluates if the criminal justice system agents need to take into account the background and perspectives of the victims or the witnesses.... large amount of research and scholarly work has been undertaken on the subject of criminal justice system's sensitivity (or lack of it) toward the victims or the witnesses....
7 Pages (1750 words) Essay

Challenges Faced by Cyber Forensic Experts in Search of Digital Evidence

This paper "Challenges Faced by Cyber Forensic Experts in Search of Digital Evidence" examines cyber forensics, by looking at the process and its applicability in contemporary society.... nbsp;Computer forensics has turned out to be a progressively significant tool in the steady fight against cybercrime....
18 Pages (4500 words) Research Paper

The Use of Offender Profiles

This discussion examines the merits regarding the Inductive and Deductive criminal Profiling methodologies then give a detailed account of the intrinsic worth of racial profiling.... Essentially, there are two types of profiling that are performed by criminologists and criminal investigators in the U.... Inductive criminal Profiling is theoretically associated with the creation of a psychological pattern of symptoms and the subsequent evidence of symptoms....
25 Pages (6250 words) Essay

Plan for the Utility of the Forensic Sciences

As explained by Light and Schwartz ( 1993), though each “ forensic discipline demonstrated a high degree of utility in specific criminal offense categories.... According to Light and Schwartz ( 1993), “The forensic sciences have traditionally provided the criminal investigator with expert opinions to provide links between the suspect and the crime.... The forensic disciplines have been instrumental in resolving criminal investigations....
10 Pages (2500 words) Research Proposal

Accident Investigation for TURBINE Engines

Finally, there are many impediments that could hinder the investigative process.... ircrafts accidents are often attributable to engine failures, or malfunctioning, and thus, this area needs to be thoroughly investigated in order to be able to pinpoint the exact cause of the accidents, which may, or may not be due to engine attributed causes, thus removing any aspect of bias or discrimination on the part of the investigative authorities.... Nowadays, the state-of-the-art technology could be placed at the services of aircraft pilots to ensure a greater degree of safety, reliability, and efficiency in its operations....
7 Pages (1750 words) Research Paper

Crime Analysis and Investigation

hellip; The most vulnerable processes and departments are in relation or association with the accounting operations.... Of course, if a white collar or blue collar professional is indulging in criminal activities, she or he is risking her or his own career too.... In a generalized way, although we are prone to look into a criminal's backgrounds and crime history; an executive who indulges in crime exploits his reputation and socio-economic status....
11 Pages (2750 words) Research Paper

Public Policing Versus Private Security

The current global scenario requires rather collaborated efforts of both forces.... This essay "Public Policing Versus Private Security" compares private security and public police that basically carry out different errands but the essential policing performed by them are mutually supportive, making law enforcement easier and effective....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us