Retrieved de https://studentshare.org/miscellaneous/1551574-use-of-informants-in-criminal-investigation
https://studentshare.org/miscellaneous/1551574-use-of-informants-in-criminal-investigation.
Identifying motivators, insuring the informant has access to the information that is desired, and maintaining control over the informant are the essential components for successful use of an informant in an investigation. The basis for American law enforcement in using informants is the concept of probable cause. In Aguilar v. Texas, the Supreme court designed a test that was divided into two aspects of determination under which to establish probable cause on hearsay evidence. The two things that must be accomplished are 1).
the credibility of the informant be established, and 2). the reliability of the informant’s information also be established (Greene, 2007, pp 353). An informant’s credibility could be established by checking to see if the statements that have been made were able to lead to prosecution. An informant who has been used more than once has established a record of success or has been shown to be without value. The second aspect of determining probable cause requires that the reliability of the information be established, which is accomplished by checking to see if the informant has direct knowledge of the information that is being A variety of sources can be cultivated by law enforcement officers A cultivated source is one who is engaged in a legal business that allows for access to a person of interest.
These individuals are can be hair stylists, hotel employees, doormen, legitimate gun dealers, bartenders, or anyone who does business with someone who has the potential to commit a crime and then allows some evidence of that crime to be discovered by the informant. This kind of network of individuals who watch the world as it functions within their job parameters allows for law enforcement to create a source of information that is more widespread, and sometimes very unexpected. Service workers, especially, aren’t necessarily identified as a threat and can sometimes allow for a
...Download file to see next pages Read More