 For this project I mean to not only explain
how each part of the criminal justice
programs works but also how it ties into
Case studies of Ted Bundy.
 International Association of Forensic
Criminologists (IACF)
 Academy of Criminal Justice Sciences: The
Politics of Crime and Criminal Justice
 What its about?
 Memberships
 Education
 Conferences
› The International Practices in Profiling,
Prevention & Counterterrorism
› The Politics of Capital Punishment in relation to
Serial Killers
 Tittle: Profiling of Serial Killers
 Summary
 Outline:
•What is Profiling
•Where do the Profilers come from?
•What does a Profiler do?
•How does Profiling tie in with investigation?
•What is Serial Killer?
•How are Serial Killers profiled?
•How do profilers help during the
investigation and courts process?
 Classical School Theories of Crime
-Rational Thought of a Criminal
 Biological Theories
-Nature vs Nurture
 Social Theories
-Formed by Society
 Psychological Theories
-Mental/ Psychology Problems
 What is SARA?
 In order to establish an effective long term solution, the
cause(s) of a problem and the underlying factors must be
accurately identified. The basic problem solving framework
for this is known as the S.A.R.A. Problem Solving Model.
 Though there are several different problem solving
methods SARA is the most effective and most common
problem solving technique used.
 By systematically applying the steps of SARA police can
combine resources to effectively reduce or eliminate
problems.
 S- scanning, A- analysis, R- response, and A- assessment
 Identifying the problem or recurring problems of
concern to the public and police .
 Identifying the consequences of problem for the
community and police.
 Prioritizing those problems.
 Developing broad goals.
 Confirming that the problems exist.
 Determining how frequently the problem occurs and
how long it has been taking place.
 Selecting problems for closer examination.
 Learning the problem’s causes, scopes, and effects.
 Identifying and understanding the events and conditions that
precedes and accompany the problem.
 Identifying the relevant data to be collected.
 Researching what is known about the problem type.
 Taking inventory of how the problem is currently addressed and
the strengths and limitations of the current response.
 Narrowing the scope of the problem as specifically as possible
 Identifying a variety of resources that may be of assistance in
developing a deeper understanding of the problem.
 Developing a working hypothesis about why the problem is
occurring.
 Acting to alleviate the problem
 Brainstorming for what other communities with
similar problems have done.
 Choosing among the alternative interventions .
 Outlining a response plan and identifying
responsible parties
 Stating the specific objectives for the response
plan.
 Carrying out the planned activities.
 Determining whether the response worked.
 Collecting pre- and post- response
qualitative and quantitative data.
 Determining whether broad goals and
specific objectives were attained.
 Identifying any new strategies needed to
augment the original plan.
 Conducting ongoing assessment to ensure
continued effectiveness.
 C = Client
 A =Acquire/Analysis Information
 P =Partnerships
 R =Response
 A =Assessment of Action taken
 The model emphasizes the importance of:
› developing and maintaining partnerships and trust within
communities/the workforce to establish priorities for service
delivery and preventive problem solving;
› understanding our clients' perspectives on work-related matters
for establishing priorities and potential partnerships in service
delivery; and
› encouraging ongoing feedback for continuous improvement.
 ASCLD-Certification
 ACA Accreditation
 CALEA
 The Case in question
 The case against Officers Naylon and Rehak
 During a burn mission stole $6,000
 Wrote faulty evidence locker paper work
 Were caught on camera committing the
crime.
 Evidence
 Interview
 Punishment (termination, leave of absence
etc.)
 Is it employee vs criminal case or employee
and criminal case
 Inmate Pamphlet
› Safety
› Sexual Harassment
› Protective Custody
› Family involvement
› Segregation Units
› Hotline/ call centers
 New Employees
› Safety
› Lessons/ Classes need to know
› Training and Development
› Sexual Harassment
› Volunteer work
› Work related issues
 Building a Crime Scene Vehicle
 The budget is $100,000
› For a vehicle
› Equipment and kits
› Refills or back ups for any faulty equipment.
Vehicle 2014 Chevrolet express
box truck
$32,252
Evidence collection kits
Blood Collection Kit Kit $15
Blood Stain pattern
documentation kit
Kit $200
Excavation kit Kit $35
Finger print kit Kit $42
Impression kit Kit $65
Pattern print lifter kit Kit $55
Trace evidence collection
kit
Kit $75
Trajectory kit Kit $55
Total: $36,387.50
*Does not include optional/singular items
 Crime Scene Technician Job
 Job Description
 Requirements
 Job Duties
 Salary
 Model Policy
› What an employee does.
› How an employee would use a computer at
work.
› Regulations for using a computer at work.
 Employee Policy
› Work environment
› Constitute department own equipment
› Fair use of department owned equipment (email,
cellular phone, social media)
› Internet usage (prohibited websites and
activities)
› Constitutes work related internet usage
 Application policy
› Search policy on new applicants
› Rejection criteria
› Constitutes free speech as future employees
› Protected behavior
 Evidence Tampering
› NRS 199.220 Destroying evidence. Every
person who, with intent to conceal the commission of
any felony, or to protect or conceal the identity of any
person committing the same, or with intent to delay
or hinder the administration of the law or to prevent
the production thereof at any time, in any court or
before any officer, tribunal, judge or magistrate, shall
willfully destroy, alter, erase, obliterate or conceal any
book, paper, record, writing, instrument or thing shall
be guilty of a gross misdemeanor.
 Witness tampering
› 18 U.S. Code § 1512 - Tampering with a witness,
victim, or an informant
› prevent the communication by any person to a law
enforcement officer or judge of the United States of
information relating to the commission or possible
commission of a Federal offense or a violation of
conditions of probation, parole, or release pending
judicial proceedings
› shall be fined under this title or imprisoned not more
than 20 years, or both.
 Rape/ Sexual Assault
 Top Three Criminal Defenses
› Innocence
› Consent
› Mental Instability
 Evidence Collection
› Tips for:
› Hair
› Blood
› Fibers
› Drugs
› Guns
 What is security?
› Perimeter control
› Access control
› Security control measures
 Types of security measure
› Security sensors
› Video and Audio Surveillance
› Card readers/ proxemics access
 Have Security for
 Interviews/ Interrogations
 Parking lot
 Access to building and personal
 Security of evidence
 Security of narcotics
 Boyd, L. M. (2013, March 19). Polictics of Crime and Criminal Justice.
Retrieved from Academy of Criminal Justice Sciences:
http://www.acjs.org/pubs/uploads/2013ACJSAnnualMeetingProgramFi
nalApril2013.pdf
 Det. John J. Baeza, W. J. (1999-2013). International Association of
Forensic Criminologists. Retrieved from Profiling:
http://www.profiling.org/index.html
 Morton, R. J. (2012, February 13). Serial Murder. Retrieved from FBI:
http://www.fbi.gov/stats-services/publications/serial-murder
 Unknown. (2013). Criminal Minds and Methods. Retrieved from Crime
Library:
http://www.crimelibrary.com/serial_killers/index.html?PHPSESSID=926
d850a17629c211e062beec450749e
 WINERMAN, L. (2004, August). Criminal profiling: the reality behind
the myth. Retrieved from American Psychological Association:
http://www.apa.org/monitor/julaug04/criminal.aspx
 Cherry, K. (2012, April). What is Nature vs Nurture. Retrieved from Psychology:
http://psychology.about.com/od/nindex/g/nature-nurture.htm
 CrimeUncovered. (2013, September 9). Bike Path Killer - Serial Killer Crime Documentary.
Retrieved from YouTube: https://www.youtube.com/watch?v=ww99T-1opuY
 FISHBEIN, D. H. (2011, December 21). The Positive School: . Retrieved from Criminology:
http://criminology.fsu.edu/crimtheory/week4.htm
 Noe, D. (2013, July 13). Bike Path Rapist — and Murderer — Altemio Sanchez. Retrieved from
Criminal Minds: http://www.crimelibrary.com/blog/article/bike-path-rapist-and-murderer-altemio-
sanchez/index.html
 Paolucci, H. (2010, April 23). Cesare Beccaria. Retrieved from Criminology:
http://www.criminology.fsu.edu/crimtheory/beccaria.htm
 Ronson, J. (2013, March 7). Ted Bundy: Nature vs. Nurture. Retrieved from Why Did He Do It :
http://whydidhedoit.com/132/
 Unknown. (2012, April 23). The Boston Strangler. Retrieved from Criminal Minds:
http://criminalminds.wikia.com/wiki/The_Boston_Strangler
 Unknown. (2013, March 21). Understanding Criminology Theories. Retrieved from Criminology:
http://www.criminology.com/resources/understanding-criminology-theories/
 Unknown. (2014, February 12). The History of Criminology. Retrieved from Criminology:
http://www.criminology.com/resources/the-history-of-criminology/
 Diamond, D. (2013, May 18). Advancing Community Policing. Retrieved from U.S. Department of
Justice : http://www.cops.usdoj.gov/Publications/e050919202-AdvCommunityPolicing_final.pdf
 SPD. (2012-2014). Problem Oriented Policing. Retrieved from San Diego Police Department:
http://www.sandiego.gov/police/about/problem.shtml
 Unknown. (2008, July 28). Community Policing Problem Solving Model. Retrieved from Royal
Canadian Mounted Police: http://www.rcmp-grc.gc.ca/ccaps-spcca/capra-eng.htm
 MCENROE, P. (2008, April 23). Two sheriffs plead not guilty to an FBI sting. Retrieved from Star
Tribune:
http://www.startribune.com/local/stpaul/16626396.html?page=all&prepage=1&c=y#continue
 unknown. (2013, May). Crime Lab Equipment. Retrieved from Spex Forensic Equipment:
spexforensc.com
 unknown. (2014, January 3). 2014 CHEVROLET EXPRESS BOX TRUCK - STRAIGHT
TRUCK,CUTAWAY-
CUBE VAN,PLUMBER SERVICE TRUCK,STEPVAN,VAN,DRY VAN in GRAPEVINE,
TEXAS. Retrieved from Comercial Truck Trader:
http://www.commercialtrucktrader.com/listing/2014-CHEVROLET-EXPRESS-111591574
 Daniels, W. (2013, March 23). Types of Security
Sys . Retrieved from Castra:
http://www.castras.org.uk/
 Hamdell, D. (2012, October 15). Access Control
Systems . Retrieved from Honeywell:
http://www.honeywellaccess.com/products/access-
control-systems/index.html
 Johnson, L. (2008, June 30). Facility Perimeter
Security Standard. Retrieved from NCDHHS:
http://www.ncdhhs.gov/pso/standards/physical/Facil
ity-Perimeter-Security-Standard.pdf

Serial Killers Presentation1

  • 2.
     For thisproject I mean to not only explain how each part of the criminal justice programs works but also how it ties into Case studies of Ted Bundy.
  • 3.
     International Associationof Forensic Criminologists (IACF)  Academy of Criminal Justice Sciences: The Politics of Crime and Criminal Justice
  • 4.
     What itsabout?  Memberships  Education
  • 5.
     Conferences › TheInternational Practices in Profiling, Prevention & Counterterrorism › The Politics of Capital Punishment in relation to Serial Killers
  • 6.
     Tittle: Profilingof Serial Killers  Summary  Outline: •What is Profiling •Where do the Profilers come from? •What does a Profiler do? •How does Profiling tie in with investigation? •What is Serial Killer? •How are Serial Killers profiled? •How do profilers help during the investigation and courts process?
  • 7.
     Classical SchoolTheories of Crime -Rational Thought of a Criminal  Biological Theories -Nature vs Nurture
  • 8.
     Social Theories -Formedby Society  Psychological Theories -Mental/ Psychology Problems
  • 9.
     What isSARA?  In order to establish an effective long term solution, the cause(s) of a problem and the underlying factors must be accurately identified. The basic problem solving framework for this is known as the S.A.R.A. Problem Solving Model.  Though there are several different problem solving methods SARA is the most effective and most common problem solving technique used.  By systematically applying the steps of SARA police can combine resources to effectively reduce or eliminate problems.  S- scanning, A- analysis, R- response, and A- assessment
  • 10.
     Identifying theproblem or recurring problems of concern to the public and police .  Identifying the consequences of problem for the community and police.  Prioritizing those problems.  Developing broad goals.  Confirming that the problems exist.  Determining how frequently the problem occurs and how long it has been taking place.  Selecting problems for closer examination.
  • 11.
     Learning theproblem’s causes, scopes, and effects.  Identifying and understanding the events and conditions that precedes and accompany the problem.  Identifying the relevant data to be collected.  Researching what is known about the problem type.  Taking inventory of how the problem is currently addressed and the strengths and limitations of the current response.  Narrowing the scope of the problem as specifically as possible  Identifying a variety of resources that may be of assistance in developing a deeper understanding of the problem.  Developing a working hypothesis about why the problem is occurring.
  • 12.
     Acting toalleviate the problem  Brainstorming for what other communities with similar problems have done.  Choosing among the alternative interventions .  Outlining a response plan and identifying responsible parties  Stating the specific objectives for the response plan.  Carrying out the planned activities.
  • 13.
     Determining whetherthe response worked.  Collecting pre- and post- response qualitative and quantitative data.  Determining whether broad goals and specific objectives were attained.  Identifying any new strategies needed to augment the original plan.  Conducting ongoing assessment to ensure continued effectiveness.
  • 14.
     C =Client  A =Acquire/Analysis Information  P =Partnerships  R =Response  A =Assessment of Action taken  The model emphasizes the importance of: › developing and maintaining partnerships and trust within communities/the workforce to establish priorities for service delivery and preventive problem solving; › understanding our clients' perspectives on work-related matters for establishing priorities and potential partnerships in service delivery; and › encouraging ongoing feedback for continuous improvement.
  • 15.
     ASCLD-Certification  ACAAccreditation  CALEA
  • 16.
     The Casein question  The case against Officers Naylon and Rehak  During a burn mission stole $6,000  Wrote faulty evidence locker paper work  Were caught on camera committing the crime.
  • 17.
     Evidence  Interview Punishment (termination, leave of absence etc.)  Is it employee vs criminal case or employee and criminal case
  • 18.
     Inmate Pamphlet ›Safety › Sexual Harassment › Protective Custody › Family involvement › Segregation Units › Hotline/ call centers
  • 19.
     New Employees ›Safety › Lessons/ Classes need to know › Training and Development › Sexual Harassment › Volunteer work › Work related issues
  • 20.
     Building aCrime Scene Vehicle  The budget is $100,000 › For a vehicle › Equipment and kits › Refills or back ups for any faulty equipment.
  • 21.
    Vehicle 2014 Chevroletexpress box truck $32,252 Evidence collection kits Blood Collection Kit Kit $15 Blood Stain pattern documentation kit Kit $200 Excavation kit Kit $35 Finger print kit Kit $42 Impression kit Kit $65 Pattern print lifter kit Kit $55 Trace evidence collection kit Kit $75 Trajectory kit Kit $55 Total: $36,387.50 *Does not include optional/singular items
  • 22.
     Crime SceneTechnician Job  Job Description  Requirements  Job Duties  Salary
  • 23.
     Model Policy ›What an employee does. › How an employee would use a computer at work. › Regulations for using a computer at work.
  • 24.
     Employee Policy ›Work environment › Constitute department own equipment › Fair use of department owned equipment (email, cellular phone, social media) › Internet usage (prohibited websites and activities) › Constitutes work related internet usage
  • 25.
     Application policy ›Search policy on new applicants › Rejection criteria › Constitutes free speech as future employees › Protected behavior
  • 26.
     Evidence Tampering ›NRS 199.220 Destroying evidence. Every person who, with intent to conceal the commission of any felony, or to protect or conceal the identity of any person committing the same, or with intent to delay or hinder the administration of the law or to prevent the production thereof at any time, in any court or before any officer, tribunal, judge or magistrate, shall willfully destroy, alter, erase, obliterate or conceal any book, paper, record, writing, instrument or thing shall be guilty of a gross misdemeanor.
  • 27.
     Witness tampering ›18 U.S. Code § 1512 - Tampering with a witness, victim, or an informant › prevent the communication by any person to a law enforcement officer or judge of the United States of information relating to the commission or possible commission of a Federal offense or a violation of conditions of probation, parole, or release pending judicial proceedings › shall be fined under this title or imprisoned not more than 20 years, or both.
  • 28.
     Rape/ SexualAssault  Top Three Criminal Defenses › Innocence › Consent › Mental Instability
  • 29.
     Evidence Collection ›Tips for: › Hair › Blood › Fibers › Drugs › Guns
  • 30.
     What issecurity? › Perimeter control › Access control › Security control measures
  • 32.
     Types ofsecurity measure › Security sensors › Video and Audio Surveillance › Card readers/ proxemics access  Have Security for  Interviews/ Interrogations  Parking lot  Access to building and personal  Security of evidence  Security of narcotics
  • 33.
     Boyd, L.M. (2013, March 19). Polictics of Crime and Criminal Justice. Retrieved from Academy of Criminal Justice Sciences: http://www.acjs.org/pubs/uploads/2013ACJSAnnualMeetingProgramFi nalApril2013.pdf  Det. John J. Baeza, W. J. (1999-2013). International Association of Forensic Criminologists. Retrieved from Profiling: http://www.profiling.org/index.html  Morton, R. J. (2012, February 13). Serial Murder. Retrieved from FBI: http://www.fbi.gov/stats-services/publications/serial-murder  Unknown. (2013). Criminal Minds and Methods. Retrieved from Crime Library: http://www.crimelibrary.com/serial_killers/index.html?PHPSESSID=926 d850a17629c211e062beec450749e  WINERMAN, L. (2004, August). Criminal profiling: the reality behind the myth. Retrieved from American Psychological Association: http://www.apa.org/monitor/julaug04/criminal.aspx
  • 34.
     Cherry, K.(2012, April). What is Nature vs Nurture. Retrieved from Psychology: http://psychology.about.com/od/nindex/g/nature-nurture.htm  CrimeUncovered. (2013, September 9). Bike Path Killer - Serial Killer Crime Documentary. Retrieved from YouTube: https://www.youtube.com/watch?v=ww99T-1opuY  FISHBEIN, D. H. (2011, December 21). The Positive School: . Retrieved from Criminology: http://criminology.fsu.edu/crimtheory/week4.htm  Noe, D. (2013, July 13). Bike Path Rapist — and Murderer — Altemio Sanchez. Retrieved from Criminal Minds: http://www.crimelibrary.com/blog/article/bike-path-rapist-and-murderer-altemio- sanchez/index.html  Paolucci, H. (2010, April 23). Cesare Beccaria. Retrieved from Criminology: http://www.criminology.fsu.edu/crimtheory/beccaria.htm  Ronson, J. (2013, March 7). Ted Bundy: Nature vs. Nurture. Retrieved from Why Did He Do It : http://whydidhedoit.com/132/  Unknown. (2012, April 23). The Boston Strangler. Retrieved from Criminal Minds: http://criminalminds.wikia.com/wiki/The_Boston_Strangler  Unknown. (2013, March 21). Understanding Criminology Theories. Retrieved from Criminology: http://www.criminology.com/resources/understanding-criminology-theories/  Unknown. (2014, February 12). The History of Criminology. Retrieved from Criminology: http://www.criminology.com/resources/the-history-of-criminology/
  • 35.
     Diamond, D.(2013, May 18). Advancing Community Policing. Retrieved from U.S. Department of Justice : http://www.cops.usdoj.gov/Publications/e050919202-AdvCommunityPolicing_final.pdf  SPD. (2012-2014). Problem Oriented Policing. Retrieved from San Diego Police Department: http://www.sandiego.gov/police/about/problem.shtml  Unknown. (2008, July 28). Community Policing Problem Solving Model. Retrieved from Royal Canadian Mounted Police: http://www.rcmp-grc.gc.ca/ccaps-spcca/capra-eng.htm  MCENROE, P. (2008, April 23). Two sheriffs plead not guilty to an FBI sting. Retrieved from Star Tribune: http://www.startribune.com/local/stpaul/16626396.html?page=all&prepage=1&c=y#continue  unknown. (2013, May). Crime Lab Equipment. Retrieved from Spex Forensic Equipment: spexforensc.com  unknown. (2014, January 3). 2014 CHEVROLET EXPRESS BOX TRUCK - STRAIGHT TRUCK,CUTAWAY- CUBE VAN,PLUMBER SERVICE TRUCK,STEPVAN,VAN,DRY VAN in GRAPEVINE, TEXAS. Retrieved from Comercial Truck Trader: http://www.commercialtrucktrader.com/listing/2014-CHEVROLET-EXPRESS-111591574
  • 36.
     Daniels, W.(2013, March 23). Types of Security Sys . Retrieved from Castra: http://www.castras.org.uk/  Hamdell, D. (2012, October 15). Access Control Systems . Retrieved from Honeywell: http://www.honeywellaccess.com/products/access- control-systems/index.html  Johnson, L. (2008, June 30). Facility Perimeter Security Standard. Retrieved from NCDHHS: http://www.ncdhhs.gov/pso/standards/physical/Facil ity-Perimeter-Security-Standard.pdf