By:
Latanya Reed, Tanequa Taylor, Ranell Stone,
Charles Traylor, Jennifer Taylor, and Nicole Norfleet
On November 10, 2014, in Everest City AZ., Police received a call from a local computer repair shop. The store owner, Michael Jackson, reported that while working on a customer’s computer he stumbled upon photos of very young girls, nude, in various sexual positions. Mr. Jackson stated that he viewed three photos, and then called police. Mr. Jackson also stated that the customer brought in a laptop and a desktop computer that he wanted to be restored to new condition. Mr. Jackson had done some work on the laptop, but the desktop was untouched. Mr. Jackson retrieved the customer’s information for investigators. Investigators got the customer’s name, John Doe, as well as his address and phone number. After a quick criminal background check, investigators uncovered that John Doe is a registered sex offender. His previous crime included possession and distribution of child pornography.
The photographs, along with statements from Mr. Jackson and surveillance video inside and outside of the store, gave investigators probable cause to obtain search and seizure warrants. The warrants included the computer equipment at the repair shop, as well as Mr. Doe’s home. Group C crime scene investigators were called to the scene to process the physical evidence. Upon arrival to the computer repair shop, Group C investigators began by taking overall photographs, notes, and sketches of Mr. Doe’s computer equipment. The laptop computer was on and opened with a photograph on the screen of a young girl who appeared to be around eight years old. The young girl was nude and in a sexual position. Photos were taken of the computer screen before investigators shut down the laptop. Medium-range and close up photographs were also taken of Mr. Doe’s computer equipment. Wearing gloves, investigators dusted the laptop for latent fingerprints. Three finger prints were located, lifted, packaged, sealed with evidence tape (with collecting investigators initials, time, and date recorded), and marked for identification. The laptop was then securely packaged, labeled, and sealed with evidence tape (initialed, time, and date recorded) to maintain the chain of custody. The untouched desktop computer was in a box brought in by Mr. Doe. It is documented in the video surveillance that Mr. Jackson never touched the desktop computer or the box. Investigators securely package the box and desktop computer separately. The box was placed in a large plastic bag, labeled, and sealed with evidence tape (initialed, time, and date recorded). The desktop computer was securely packaged in a box, labeled, and sealed with evidence tape (initialed, time, and date recorded).
Group C crime scene investigators proceeded to the home of John Doe to recover any possible physical evidence. Mr. Doe was arrested and taken in for questioning. Investigators began by conducting a room by room search, taking overall photographs, notes, and sketches. Physical evidence was found
Technology and Crime Analysis Kimberly Reynolds Unit 6 Assignment CJ216 Prof. Pyle Technology and Crime Analysis Today accurate crime analysis is very important. If someone makes a mistake, it could cost Thousands of dollars to fix, or even the difference of a guilty or innocent verdict. Technology that is used For accurate crime analysis today can be a number of things, from computer systems, digital finger prints, Radio control, even data collection and…
approach the crime scene in your patrol vehicle, you notice the body lying in the middle of the road. Around the body are numerous large rocks and bushes. You also notice the following in and around the crime scene: Footprints Tire tracks Personal belongings of the victim strewn about A beer bottle in the road Dried blood on the sand and on several rocks Considering the above, what steps would you take to secure this crime scene? As I pull up to the crime scene as the…
that establishes a crime had happened, and anything that links to the crime or criminal – it could be something as simple as a bloody knife, or something nearly as invisible as a mere fingerprint, and fibers. Describe three ways that a crime scene can be recorded. What is a benefit of each? Photography - before anything is moved the crime scene is photographed, they are taken in a variety of angles and levels. For one, we have the overview photographs which shows the crime scene in wide angles. Next…
Criminal Investigations Ch. 1 Notes Goals of Criminal Investigation -Determine whether a crime has been committed. -Legally obtain info and evidence to identify the responsible person. -Arrest the suspect. -Recover stolen property. -Present the best possible case to the prosecutor. Basic Functions of Investigators -Provide emergency assistance -Secure the crime scene -Photograph, Videotape and Sketch -Take notes and Write reports -Search for, obtain…
Obtaining and Identifying Physical Evidence. A large part of an investigator’s role centers around obtaining information and evidence—proof that a crime has been committed as well as proof that a particular person (suspect) committed the crime. Locard’s Principle of Exchange, developed in 1928, states that when any two objects come into contact, a transfer of material from each object to the other always occurs. Investigators use such material to build connections between objects, people and locations…
Imaginary Crime Scene/Mass Disaster Lawanda Holloman Kaplan University Crime Scene Investigation II CJ370 In this paper, I am going to describe each specialized personnel that will be needed at the scene of a crime or mass disaster. I will inform you of what duties each of these specialized individuals will possess. You will be able to know and understand each of these responsibilities. At midnight on January 1 a call comes in of multiple gunshots fired at 123 ABC Blvd. Officer Black responds…
September 13, 2013 Criminal Justice/ Crime Scene Investigation Crime in the United States has actually decreased over the last few decades even though most think that it has gotten worse. The field of Crime scene investigation is a very detail oriented career. There are a numerous amounts of procedures that you have to follow on a daily basis. Being alert and organized is a major part of being a part of this career. Although Crime scene investigation is becoming increasingly popular though…
Computer Crime CRJ 105- Crime and Criminal Behavior 08 September 2014 Computer Crime Computer crime corresponds with what is known as Digital Crime and Digital Terrorism. Computer crime is often times defined as one where the computer is the victim (Stephenson & Gilbert, 2013). According to the text there are four main categories of computer crime which are, the computer as a target, the computer being an instrument of a crime, the computer being incidental to a crime, and crimes associated…
Notes Name _______________ 1. Testimonial evidence would be any witnessed accounts of an incident or crime. 2. Physical evidence refers to any material items that would be present on the crime scene or the victims. These items would be presented in a crime investigation to prove or disprove the facts of the issue. 3. Trace Evidence refers physical evidence that is found at a crime scene in small but measurable amounts and can be anything from strands of hair or skin cells to tool marks and…
(Surrey, 2013). In his stories he shows that big innovations always go bad due to the humans and not because of the technical or computer errors. The Minority Report is a science fiction written by Philip K. Dick. The story was published in the year 1956 in Fantastic Universe. The story starts in the future society where, there are three mutants who can predict all the future crimes before they occur. These precogs are plugged into the machines. They facilitate the Precrime division to arrest the suspects…