SlideShare uma empresa Scribd logo
1 de 27
S. Puget Sound Community College
CRIME SCENE PROCESSING

Crime scene processing is a
 slow, methodical, systematic
 and orderly process that
 involves protocols and a
 processing methodology.
CRIME SCENE PROCESSING
 AVOID HUB!!!                              The main thing you can do in a
                                             scene is to remain aware.
 HUA=Head up Butt.
 Never assume a case is one thing or       Using the power of observation
    another.                                 is key.
   Treat every case like a homicide and    Don’t assume everyone has seen
    work backwards.
                                             an object-mention it.
   Do not let yourself be fooled or
                                            KEEP YOUR EYES OPEN AT
    talked into something.
                                             ALL TIMES!!!!
   Base your decisions on your
    exams/scene evidence.
   Good rule of thumb: Nothing is
    what it seems.
CRIME SCENE PROCESSING
                                  
    HAZARDS:                           -includes officer
                                  
    -personal safety #1 concern.       -Approach scene cautiously
    1st officer on scene-
                                      a. EMS holding short
                                  
    -Actions very important             b. suspect still on scene
                                  
    -crime scene starting point         c. obvious dead-let one medic in
                                  
    -physical evidence on scene        -injured take precedence
                                  
    -#1 task:prevent                   -mistakes cannot be corrected
    destruction/disturbance of        STEPS:
    evidence                          1. Record time/precise times
                                      -time of call/arrival
                                      -witnesses times
CRIME SCENE PROCESSING
                                 -who entered scene
 2. Protect scene
                                 a. name
 -close/post door
                                 b. agency
 -crime scene tape
                                 c. purpose/actions taken
 -1st PO stay at scene until
                                 d. time in/out
    properly relieved
                                 4. Isolate/hold witnesses
   3. Start log
                                 a. start on voluntaries
   -name/ID#
                                 b. keep separated until detectives
   -times                        can interview
   -exact location
CRIME SCENE PROCESSING
                                         Look/think before you:
 POSSIBLE EVIDENCE:
                                         -enter
 -look before you leap!
                                         -touch
 -never charge into a scene.
                                         -move
 -stand at periphery and look
                                         -step
  around.
                                         Physical evidence-can be seen with
 -let scene “talk” to you.
                                          naked eye ( shell casings, blood
 -be aware at all times for possible     spatter)
  evidence.                              Trace evidence-cannot be seen with
                                          naked eye (fibers, blood)
                                         DO NOT TOUCH WHAT YOU
                                          DON’T HAVE TO. IF YOU DO
                                          TOUCH SOMETHING OWN UP
                                          TO IT!!
CRIME SCENE PROCESSING
 EVIDENCE: 2 TYPES
 Testimonial
 Real:
 Physical
 Trace
CRIME SCENE PROCESSING
                           EXAM OF SCENE:
 Understand trace
                           Follow law/protocols
  evidence
                           Start when entire team
 Few absolute rules          assembled
 Remain calm, flexible      3 conditions for success
                          
  and adaptable               -organization
                             -thoroughness
                             -caution
CRIME SCENE PROCESSING
 Crime scene processing is a team      District Attorney (DA)
  effort                                   will present case in court
 -no one is an expert in all areas.       (grand jury/trial)
 -consults are done with many            Dentists/Odontologists
  disciplines:                            Entomologists
 Forensic pathologist
                                          Anthropologists
    MD specially trained to              Canines
    perform autopsies                    Firearms experts
    can respond to scene but             Forensic toxicologists
    usually do not
    determine cause/manner of
    death
CRIME SCENE PROCESSING
 EVIDENCE:                            Identification versus
                                        Individualization of evidence.
 Value of:
                                       IDENTIFICATION:
 Crime committed
                                       Items share common source-
 Suspect contact w/vics & scene
                                        classified /placed into groups with
 Exonerate innocent
                                        all other items w/similar properties.
 Corroborate stories
                                       INDIVIDUALIZATION:
 Suspect confronted w/evidence may
                                       Items come from unique source.
  confess
 Physical is more reliable than
  eyewitnesses
 Juries love the “smoking gun”
CRIME SCENE PROCESSING
 TRACE EVIDENCE:
 -not visible to the naked eye
 -sources:clothing, fibers, footwear, tools.
 -use alternate light sources


 PHYSICAL EVIDENCE:
 -can be seen with the naked eye.
 -blood/shell casings
 -documented with photos/notes
 collected properly
CRIME SCENE PROCESSING
 EDMOND LOCARD-father of Criminalistics
 LOCARD EXCHANGE PRINCIPLE:
 Whenever an individual comes into contact with another
  person/location certain small seemingly insignificant
  changes occur. Small items, such as hair, fibers and
  assorted microscopic debris may be left by one person or
  picked up by that person. In short it is impossible to come
  into contact with an environment without changing it in
  some small way
CRIME SCENE PROCESSING
 *RESPONSIBILITIES:             3.    owe duty to truth
 1.                             4.
       skill/knowledge in                outcome of
  investigation may establish     guilt/innocence not
  guilt/innocence                 important as long as
                                  collected evidence in good
 2.    professional
                                  faith.
  ethics/integrity are
                                 5.
  essential                             thorough, competent
                                  and unbiased
CRIMINALISTIC SCIENCE
                                     -establish appropriate scene
  1. Arrive on scene and get info:
                                       boundaries
 -start note taking
                                      -entire team discusses and
 -chronological order
                                       formulates plan of action
 -specific as possible
                                      -plan search patterns
 -Officer’s name/P#
                                      -once agreed on implement plan of
 -Time of call                        action.
 -Details of events                  3. Photograph/diagram scene
 -Who has entered/left scene         -search for evidence and mark as
 -Scene changed/items moved           found-letter or # w/each item
 -Primary detective/investigator     -leave in place during first search
 -Witnesses/suspect info             -take measurements for scene
 2. Review the scene/formulate        boundaries
  plan                                -take measurements of items using
 -stand at periphery and look at      perpendicular or triangulation
  whole scene
CRIMINALISTIC SCIENCE
                                         4. Collect evidence of fragile
 -draw diagram of scene to include
                                          nature first
  all items
                                         -blood
 -mark north on diagram
                                         -hair
 -use legend
                                         -fibers
 -photograph overalls of scene first
                                         -fingerprints
 -document photo w/# & description
                                         -powders
  in notebook
                                         5. Properly Recover remaining
 -if you don’t know what photo is of     evidence
  no one else will                       -Fingerprints-dusting, photo, lifting
 -document #/total #.                   -physical evidence-gun, casings
                                         -conduct secondary search to be
                                          sure nothing was overlooked
CRIMINALISTIC SCIENCE
 6. Properly package evidence & tag with appropriate
    information.
   -date/time
   -what evidence is
   -where collected from
   -who collected by (initial)
   -case #
 7. Complete inventory of impounded evidence/maintain chain of
  evidence.
 -evidence log to go to lab-describing each item
 -chain of custody-definition?
CRIME SCENE PROCESSING
 CHAIN OF CUSTODY: The written documentation of
 where the evidence has been and who has had
 custody/possession of it from it’s collection to the
 present time.
CRIMINALISTIC SCIENCE
 Photographs:
 -2 of every picture
 -1 with/1 without scale
 -number photo in corresponding photo log
 OVERVIEWS:
 -from farthest part of scene (outward working inward)
 MEDIUMS:
 -closer views
 UP-CLOSE:
 -close up of items/scene
CRIMINALISTIC SCIENCE
 PHOTOS


 Of body:
 All five angles:
 1. From above
 2. From feet
 3. From left side
 4. From right side
 5. From head
L IN E S E A R C H P A T T E R N
S P IR A L S E A R C H P A T T E R N
ZO N E SEA RCH PA TTERN
20’ 8”




17’ 8”




N orth
Light pole




                                                  S outh R ainbow B oulevard
             25’ 8”

                                                               P ow er B ox




                                                  18’ 6”




                   25’ 10”    W . C harleston B lvd.




5067 W . C harleston B lvd.
CRIME SCENE PROCESSING

Every crime scene should be evaluated
 on its own merits.
Do not take anything for granted.
Pay attention to every detail.
Things are not always what they seem.

Mais conteúdo relacionado

Mais procurados

Crime scene reconstruction
Crime scene reconstructionCrime scene reconstruction
Crime scene reconstructionnitin Pandey
 
Fingerprint patterns
Fingerprint patternsFingerprint patterns
Fingerprint patternsBlancoScience
 
restoration of toolmarks
restoration of toolmarksrestoration of toolmarks
restoration of toolmarksHemant Jain
 
Poroscopy and edgeoscopy
Poroscopy and edgeoscopyPoroscopy and edgeoscopy
Poroscopy and edgeoscopykiran malik
 
Searching the crime scene
Searching the crime sceneSearching the crime scene
Searching the crime sceneBlancoScience
 
Blood spatter analysis ppt
Blood spatter analysis pptBlood spatter analysis ppt
Blood spatter analysis pptMaria Donohue
 
Somatometric experiments
Somatometric experimentsSomatometric experiments
Somatometric experimentsShashank Parmar
 
Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)Alok Yadav
 
Videography in forensic science
Videography in forensic scienceVideography in forensic science
Videography in forensic scienceMehvishgcufgcuf
 
Semen Analysis Methods -Forensic Biology
Semen Analysis Methods -Forensic BiologySemen Analysis Methods -Forensic Biology
Semen Analysis Methods -Forensic BiologyArchana Mahakalkar
 
Comparison microscope
Comparison microscopeComparison microscope
Comparison microscopeKetan Patil
 
Infrared photography
Infrared photographyInfrared photography
Infrared photographyG.S Shaktawat
 
crime scene.pptx
crime scene.pptxcrime scene.pptx
crime scene.pptxkiran yadav
 
Forensic analysis of foot wear impression
Forensic analysis of foot wear impressionForensic analysis of foot wear impression
Forensic analysis of foot wear impressionSURYAKANT MISHRA
 
Chapter15 Firearms
Chapter15 FirearmsChapter15 Firearms
Chapter15 FirearmsBob Smullen
 

Mais procurados (20)

Crime scene reconstruction
Crime scene reconstructionCrime scene reconstruction
Crime scene reconstruction
 
Fingerprint patterns
Fingerprint patternsFingerprint patterns
Fingerprint patterns
 
Diatoms and its Forensic Significance.pptx
Diatoms and its Forensic Significance.pptxDiatoms and its Forensic Significance.pptx
Diatoms and its Forensic Significance.pptx
 
restoration of toolmarks
restoration of toolmarksrestoration of toolmarks
restoration of toolmarks
 
Poroscopy and edgeoscopy
Poroscopy and edgeoscopyPoroscopy and edgeoscopy
Poroscopy and edgeoscopy
 
Searching the crime scene
Searching the crime sceneSearching the crime scene
Searching the crime scene
 
Blood spatter analysis ppt
Blood spatter analysis pptBlood spatter analysis ppt
Blood spatter analysis ppt
 
Somatometric experiments
Somatometric experimentsSomatometric experiments
Somatometric experiments
 
Crime Scene DOCUMENTATION
Crime Scene DOCUMENTATION Crime Scene DOCUMENTATION
Crime Scene DOCUMENTATION
 
Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)
 
Videography in forensic science
Videography in forensic scienceVideography in forensic science
Videography in forensic science
 
Semen Analysis Methods -Forensic Biology
Semen Analysis Methods -Forensic BiologySemen Analysis Methods -Forensic Biology
Semen Analysis Methods -Forensic Biology
 
Comparison microscope
Comparison microscopeComparison microscope
Comparison microscope
 
Infrared photography
Infrared photographyInfrared photography
Infrared photography
 
Forensic analysis of tool marks
Forensic analysis of tool marksForensic analysis of tool marks
Forensic analysis of tool marks
 
crime scene.pptx
crime scene.pptxcrime scene.pptx
crime scene.pptx
 
Forensic analysis of foot wear impression
Forensic analysis of foot wear impressionForensic analysis of foot wear impression
Forensic analysis of foot wear impression
 
Forensic photography
Forensic photographyForensic photography
Forensic photography
 
EAR PRINT.pptx
EAR PRINT.pptxEAR PRINT.pptx
EAR PRINT.pptx
 
Chapter15 Firearms
Chapter15 FirearmsChapter15 Firearms
Chapter15 Firearms
 

Destaque

Chp1 Methods and Stats
Chp1 Methods and StatsChp1 Methods and Stats
Chp1 Methods and Statslorilynw
 
Erik Erikson's Psychosocial Crisis Theory
Erik Erikson's Psychosocial Crisis TheoryErik Erikson's Psychosocial Crisis Theory
Erik Erikson's Psychosocial Crisis TheoryPearl Narvacan
 
Systems theory ppt
Systems theory pptSystems theory ppt
Systems theory pptroxcine
 
Cognitive theory ppt
Cognitive theory pptCognitive theory ppt
Cognitive theory ppt05marisa
 
Jean Piaget's Theory of Cognitive Development
Jean Piaget's Theory of Cognitive DevelopmentJean Piaget's Theory of Cognitive Development
Jean Piaget's Theory of Cognitive DevelopmentKelly McGrail
 
Piaget’S Cognitive Development Theory
Piaget’S Cognitive Development TheoryPiaget’S Cognitive Development Theory
Piaget’S Cognitive Development Theorynewkirker
 

Destaque (9)

Crime scene investigation (suic
Crime scene investigation (suicCrime scene investigation (suic
Crime scene investigation (suic
 
Chp1 Methods and Stats
Chp1 Methods and StatsChp1 Methods and Stats
Chp1 Methods and Stats
 
Systems theory in a Summary
Systems theory in a SummarySystems theory in a Summary
Systems theory in a Summary
 
Erik Erikson's Psychosocial Crisis Theory
Erik Erikson's Psychosocial Crisis TheoryErik Erikson's Psychosocial Crisis Theory
Erik Erikson's Psychosocial Crisis Theory
 
Systems theory
Systems theorySystems theory
Systems theory
 
Systems theory ppt
Systems theory pptSystems theory ppt
Systems theory ppt
 
Cognitive theory ppt
Cognitive theory pptCognitive theory ppt
Cognitive theory ppt
 
Jean Piaget's Theory of Cognitive Development
Jean Piaget's Theory of Cognitive DevelopmentJean Piaget's Theory of Cognitive Development
Jean Piaget's Theory of Cognitive Development
 
Piaget’S Cognitive Development Theory
Piaget’S Cognitive Development TheoryPiaget’S Cognitive Development Theory
Piaget’S Cognitive Development Theory
 

Mais de warren142 (20)

Ch 8 fingerprints
Ch 8 fingerprintsCh 8 fingerprints
Ch 8 fingerprints
 
Chapter02
Chapter02Chapter02
Chapter02
 
Ch 7
Ch 7Ch 7
Ch 7
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Ch 6
Ch 6Ch 6
Ch 6
 
Ch 6
Ch 6Ch 6
Ch 6
 
Ch 5
Ch 5Ch 5
Ch 5
 
Cj 101 ch 4
Cj 101 ch 4Cj 101 ch 4
Cj 101 ch 4
 
Criminal justice 101 ch 3
Criminal justice 101 ch 3Criminal justice 101 ch 3
Criminal justice 101 ch 3
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 15
Ch 15Ch 15
Ch 15
 
Ch 15
Ch 15Ch 15
Ch 15
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 13
Ch 13Ch 13
Ch 13
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Crime Scene Processing Ol

  • 1. S. Puget Sound Community College
  • 2. CRIME SCENE PROCESSING Crime scene processing is a slow, methodical, systematic and orderly process that involves protocols and a processing methodology.
  • 3. CRIME SCENE PROCESSING  AVOID HUB!!!  The main thing you can do in a scene is to remain aware.  HUA=Head up Butt.  Never assume a case is one thing or  Using the power of observation another. is key.  Treat every case like a homicide and  Don’t assume everyone has seen work backwards. an object-mention it.  Do not let yourself be fooled or  KEEP YOUR EYES OPEN AT talked into something. ALL TIMES!!!!  Base your decisions on your exams/scene evidence.  Good rule of thumb: Nothing is what it seems.
  • 4. CRIME SCENE PROCESSING   HAZARDS: -includes officer   -personal safety #1 concern. -Approach scene cautiously 1st officer on scene-   a. EMS holding short   -Actions very important b. suspect still on scene   -crime scene starting point c. obvious dead-let one medic in   -physical evidence on scene -injured take precedence   -#1 task:prevent -mistakes cannot be corrected destruction/disturbance of  STEPS: evidence  1. Record time/precise times  -time of call/arrival  -witnesses times
  • 5. CRIME SCENE PROCESSING  -who entered scene  2. Protect scene  a. name  -close/post door  b. agency  -crime scene tape  c. purpose/actions taken  -1st PO stay at scene until  d. time in/out properly relieved  4. Isolate/hold witnesses  3. Start log  a. start on voluntaries  -name/ID#  b. keep separated until detectives  -times can interview  -exact location
  • 6. CRIME SCENE PROCESSING  Look/think before you:  POSSIBLE EVIDENCE:  -enter  -look before you leap!  -touch  -never charge into a scene.  -move  -stand at periphery and look  -step around.  Physical evidence-can be seen with  -let scene “talk” to you. naked eye ( shell casings, blood  -be aware at all times for possible spatter) evidence.  Trace evidence-cannot be seen with naked eye (fibers, blood)  DO NOT TOUCH WHAT YOU DON’T HAVE TO. IF YOU DO TOUCH SOMETHING OWN UP TO IT!!
  • 7. CRIME SCENE PROCESSING  EVIDENCE: 2 TYPES  Testimonial  Real: Physical Trace
  • 8. CRIME SCENE PROCESSING  EXAM OF SCENE:  Understand trace  Follow law/protocols evidence  Start when entire team  Few absolute rules assembled  Remain calm, flexible  3 conditions for success  and adaptable -organization  -thoroughness  -caution
  • 9. CRIME SCENE PROCESSING  Crime scene processing is a team  District Attorney (DA) effort  will present case in court  -no one is an expert in all areas.  (grand jury/trial)  -consults are done with many  Dentists/Odontologists disciplines:  Entomologists  Forensic pathologist  Anthropologists  MD specially trained to  Canines  perform autopsies  Firearms experts  can respond to scene but  Forensic toxicologists  usually do not  determine cause/manner of  death
  • 10. CRIME SCENE PROCESSING  EVIDENCE:  Identification versus Individualization of evidence.  Value of:  IDENTIFICATION:  Crime committed  Items share common source-  Suspect contact w/vics & scene classified /placed into groups with  Exonerate innocent all other items w/similar properties.  Corroborate stories  INDIVIDUALIZATION:  Suspect confronted w/evidence may  Items come from unique source. confess  Physical is more reliable than eyewitnesses  Juries love the “smoking gun”
  • 11. CRIME SCENE PROCESSING  TRACE EVIDENCE:  -not visible to the naked eye  -sources:clothing, fibers, footwear, tools.  -use alternate light sources  PHYSICAL EVIDENCE:  -can be seen with the naked eye.  -blood/shell casings  -documented with photos/notes  collected properly
  • 12. CRIME SCENE PROCESSING  EDMOND LOCARD-father of Criminalistics  LOCARD EXCHANGE PRINCIPLE:  Whenever an individual comes into contact with another person/location certain small seemingly insignificant changes occur. Small items, such as hair, fibers and assorted microscopic debris may be left by one person or picked up by that person. In short it is impossible to come into contact with an environment without changing it in some small way
  • 13. CRIME SCENE PROCESSING  *RESPONSIBILITIES:  3. owe duty to truth  1.  4. skill/knowledge in outcome of investigation may establish guilt/innocence not guilt/innocence important as long as collected evidence in good  2. professional faith. ethics/integrity are  5. essential thorough, competent and unbiased
  • 14.
  • 15. CRIMINALISTIC SCIENCE   -establish appropriate scene 1. Arrive on scene and get info: boundaries  -start note taking  -entire team discusses and  -chronological order formulates plan of action  -specific as possible  -plan search patterns  -Officer’s name/P#  -once agreed on implement plan of  -Time of call action.  -Details of events  3. Photograph/diagram scene  -Who has entered/left scene  -search for evidence and mark as  -Scene changed/items moved found-letter or # w/each item  -Primary detective/investigator  -leave in place during first search  -Witnesses/suspect info  -take measurements for scene  2. Review the scene/formulate boundaries plan  -take measurements of items using  -stand at periphery and look at perpendicular or triangulation whole scene
  • 16. CRIMINALISTIC SCIENCE  4. Collect evidence of fragile  -draw diagram of scene to include nature first all items  -blood  -mark north on diagram  -hair  -use legend  -fibers  -photograph overalls of scene first  -fingerprints  -document photo w/# & description  -powders in notebook  5. Properly Recover remaining  -if you don’t know what photo is of evidence no one else will  -Fingerprints-dusting, photo, lifting  -document #/total #.  -physical evidence-gun, casings  -conduct secondary search to be sure nothing was overlooked
  • 17. CRIMINALISTIC SCIENCE  6. Properly package evidence & tag with appropriate information.  -date/time  -what evidence is  -where collected from  -who collected by (initial)  -case #  7. Complete inventory of impounded evidence/maintain chain of evidence.  -evidence log to go to lab-describing each item  -chain of custody-definition?
  • 18. CRIME SCENE PROCESSING  CHAIN OF CUSTODY: The written documentation of where the evidence has been and who has had custody/possession of it from it’s collection to the present time.
  • 19.
  • 20. CRIMINALISTIC SCIENCE  Photographs:  -2 of every picture  -1 with/1 without scale  -number photo in corresponding photo log  OVERVIEWS:  -from farthest part of scene (outward working inward)  MEDIUMS:  -closer views  UP-CLOSE:  -close up of items/scene
  • 21. CRIMINALISTIC SCIENCE  PHOTOS  Of body:  All five angles:  1. From above  2. From feet  3. From left side  4. From right side  5. From head
  • 22. L IN E S E A R C H P A T T E R N
  • 23. S P IR A L S E A R C H P A T T E R N
  • 24. ZO N E SEA RCH PA TTERN
  • 26. Light pole S outh R ainbow B oulevard 25’ 8” P ow er B ox 18’ 6” 25’ 10” W . C harleston B lvd. 5067 W . C harleston B lvd.
  • 27. CRIME SCENE PROCESSING Every crime scene should be evaluated on its own merits. Do not take anything for granted. Pay attention to every detail. Things are not always what they seem.