Project Criminal Justice Summary 10 part project Taylor Leszczynski CJ2799 Spring Semester
ProjectCriminal Justice Summary
10 part projectTaylor Leszczynski
CJ2799Spring Semester
Goals For this project I mean to not only
explain how each part of the criminal justice programs works but also how it ties into Case studies of Ted Bundy.
Part one: Training and Professional Associations
International Association of Forensic Criminologists (IACF)
Academy of Criminal Justice Sciences: The Politics of Crime and Criminal Justice
International Association of Forensic Criminologists (IACF)
What its about? Memberships Education
Academy of Criminal Justice Sciences: The Politics of Crime and Criminal Justice
Conferences
› The International Practices in Profiling,
Prevention & Counterterrorism
› The Politics of Capital Punishment in
relation to Serial Killers
Create Your Own Conference
Tittle: Profiling of Serial Killers Summary Outline: •What is Profiling•Where do the Profilers come from?•What does a Profiler do?•How does Profiling tie in with investigation?•What is Serial Killer?•How are Serial Killers profiled?•How do profilers help during the investigation and courts process?
Part Two: Topic-Theory Classical School Theories of Crime
-Rational Thought of a Criminal
Biological Theories-Nature vs Nurture
Topic-Theory (cont.) Social Theories
-Formed by Society
Psychological Theories-Mental/ Psychology Problems
Part Three: S.A.R.A What is SARA? In order to establish an effective long term solution, the
cause(s) of a problem and the underlying factors must be accurately identified. The basic problem solving framework for this is known as the S.A.R.A. Problem Solving Model.
Though there are several different problem solving methods SARA is the most effective and most common problem solving technique used.
By systematically applying the steps of SARA police can combine resources to effectively reduce or eliminate problems.
S- scanning, A- analysis, R- response, and A- assessment
S-Scanning Identifying the problem or recurring
problems of concern to the public and police . Identifying the consequences of problem for
the community and police. Prioritizing those problems. Developing broad goals. Confirming that the problems exist. Determining how frequently the problem
occurs and how long it has been taking place. Selecting problems for closer examination.
A-Analysis Learning the problem’s causes, scopes, and effects. Identifying and understanding the events and conditions that
precedes and accompany the problem. Identifying the relevant data to be collected. Researching what is known about the problem type. Taking inventory of how the problem is currently addressed
and the strengths and limitations of the current response. Narrowing the scope of the problem as specifically as possible Identifying a variety of resources that may be of assistance in
developing a deeper understanding of the problem. Developing a working hypothesis about why the problem is
occurring.
R-Response Acting to alleviate the problem Brainstorming for what other communities
with similar problems have done. Choosing among the alternative
interventions . Outlining a response plan and identifying
responsible parties Stating the specific objectives for the
response plan. Carrying out the planned activities.
A-Assessment Determining whether the response worked. Collecting pre- and post- response
qualitative and quantitative data. Determining whether broad goals and
specific objectives were attained. Identifying any new strategies needed to
augment the original plan. Conducting ongoing assessment to ensure
continued effectiveness.
CARPA C = Client A =Acquire/Analysis Information P =Partnerships R =Response A =Assessment of Action taken The model emphasizes the importance of:
› developing and maintaining partnerships and trust within communities/the workforce to establish priorities for service delivery and preventive problem solving;
› understanding our clients' perspectives on work-related matters for establishing priorities and potential partnerships in service delivery; and
› encouraging ongoing feedback for continuous improvement.
Part Four: Memo’s/ Policies
ASCLD-Certification
ACA Accreditation
CALEA
Part Five: Case Plan The Case in question The case against Officers Naylon and
Rehak During a burn mission stole $6,000 Wrote faulty evidence locker paper
work Were caught on camera committing
the crime.
cont.
Evidence Interview Punishment (termination, leave of
absence etc.) Is it employee vs criminal case or
employee and criminal case
Part Six: Leadership Inmate Pamphlet
› Safety› Sexual Harassment› Protective Custody› Family involvement › Segregation Units› Hotline/ call centers
Cont. New Employees
› Safety› Lessons/ Classes need to know › Training and Development› Sexual Harassment› Volunteer work› Work related issues
Part 7: Crime Vehicle Building a Crime Scene Vehicle The budget is $100,000
› For a vehicle› Equipment and kits› Refills or back ups for any faulty
equipment.
Cont.Vehicle 2014 Chevrolet
express box truck
$32,252
Evidence collection kits
Blood Collection Kit Kit $15
Blood Stain pattern
documentation kit
Kit $200
Excavation kit Kit $35
Finger print kit Kit $42
Impression kit Kit $65
Pattern print lifter kit Kit $55
Trace evidence
collection kit
Kit $75
Trajectory kit Kit $55
Total: $36,387.50
*Does not include optional/singular items
Cont. Crime Scene Technician Job Job Description Requirements Job Duties Salary
Part 8: Policies Model Policy
› What an employee does.› How an employee would use a computer at
work.› Regulations for using a computer at work.
Cont. Employee Policy
› Work environment› Constitute department own equipment› Fair use of department owned equipment
(email, cellular phone, social media)› Internet usage (prohibited websites and
activities)› Constitutes work related internet usage
Cont. Application policy
› Search policy on new applicants› Rejection criteria› Constitutes free speech as future
employees› Protected behavior
Part 9: Evidence Evidence Tampering
› NRS 199.220 Destroying evidence. Every person who, with intent to conceal the commission of any felony, or to protect or conceal the identity of any person committing the same, or with intent to delay or hinder the administration of the law or to prevent the production thereof at any time, in any court or before any officer, tribunal, judge or magistrate, shall willfully destroy, alter, erase, obliterate or conceal any book, paper, record, writing, instrument or thing shall be guilty of a gross misdemeanor.
Cont. Witness tampering
› 18 U.S. Code § 1512 - Tampering with a witness, victim, or an informant
› prevent the communication by any person to a law enforcement officer or judge of the United States of information relating to the commission or possible commission of a Federal offense or a violation of conditions of probation, parole, or release pending judicial proceedings
› shall be fined under this title or imprisoned not more than 20 years, or both.
Cont. Rape/ Sexual Assault Top Three Criminal Defenses
› Innocence› Consent› Mental Instability
Cont. Evidence Collection
› Tips for:› Hair› Blood› Fibers› Drugs› Guns
Part 10: Security What is security?
› Perimeter control› Access control› Security control measures
Cont.
Cont. Types of security measure
› Security sensors› Video and Audio Surveillance› Card readers/ proxemics access
Have Security for Interviews/ Interrogations Parking lot Access to building and personal Security of evidence Security of narcotics
Resources
Boyd, L. M. (2013, March 19). Polictics of Crime and Criminal Justice. Retrieved from Academy of Criminal Justice Sciences: http://www.acjs.org/pubs/uploads/2013ACJSAnnualMeetingProgramFinalApril2013.pdf
Det. John J. Baeza, W. J. (1999-2013). International Association of Forensic Criminologists. Retrieved from Profiling: http://www.profiling.org/index.html
Morton, R. J. (2012, February 13). Serial Murder. Retrieved from FBI: http://www.fbi.gov/stats-services/publications/serial-murder
Unknown. (2013). Criminal Minds and Methods. Retrieved from Crime Library: http://www.crimelibrary.com/serial_killers/index.html?PHPSESSID=926d850a17629c211e062beec450749e
WINERMAN, L. (2004, August). Criminal profiling: the reality behind the myth. Retrieved from American Psychological Association: http://www.apa.org/monitor/julaug04/criminal.aspx
Cont. Cherry, K. (2012, April). What is Nature vs Nurture. Retrieved from Psychology: http://
psychology.about.com/od/nindex/g/nature-nurture.htm CrimeUncovered. (2013, September 9). Bike Path Killer - Serial Killer Crime Documentary.
Retrieved from YouTube: https://www.youtube.com/watch?v=ww99T-1opuY FISHBEIN, D. H. (2011, December 21). The Positive School: . Retrieved from Criminology:
http://criminology.fsu.edu/crimtheory/week4.htm Noe, D. (2013, July 13). Bike Path Rapist — and Murderer — Altemio Sanchez. Retrieved
from Criminal Minds: http://www.crimelibrary.com/blog/article/bike-path-rapist-and-murderer-altemio-sanchez/index.html
Paolucci, H. (2010, April 23). Cesare Beccaria. Retrieved from Criminology: http://www.criminology.fsu.edu/crimtheory/beccaria.htm
Ronson, J. (2013, March 7). Ted Bundy: Nature vs. Nurture. Retrieved from Why Did He Do It : http://whydidhedoit.com/132/
Unknown. (2012, April 23). The Boston Strangler. Retrieved from Criminal Minds: http://criminalminds.wikia.com/wiki/The_Boston_Strangler
Unknown. (2013, March 21). Understanding Criminology Theories. Retrieved from Criminology: http://www.criminology.com/resources/understanding-criminology-theories/
Unknown. (2014, February 12). The History of Criminology. Retrieved from Criminology: http://www.criminology.com/resources/the-history-of-criminology/
Cont. Diamond, D. (2013, May 18). Advancing Community Policing. Retrieved from U.S.
Department of Justice : http://www.cops.usdoj.gov/Publications/e050919202-AdvCommunityPolicing_final.pdf
SPD. (2012-2014). Problem Oriented Policing. Retrieved from San Diego Police Department: http://www.sandiego.gov/police/about/problem.shtml
Unknown. (2008, July 28). Community Policing Problem Solving Model. Retrieved from Royal Canadian Mounted Police: http://www.rcmp-grc.gc.ca/ccaps-spcca/capra-eng.htm
MCENROE, P. (2008, April 23). Two sheriffs plead not guilty to an FBI sting. Retrieved from Star Tribune: http://www.startribune.com/local/stpaul/16626396.html?page=all&prepage=1&c=y#continue
unknown. (2013, May). Crime Lab Equipment. Retrieved from Spex Forensic Equipment: spexforensc.com
unknown. (2014, January 3). 2014 CHEVROLET EXPRESS BOX TRUCK - STRAIGHT TRUCK,CUTAWAY-
CUBE VAN,PLUMBER SERVICE TRUCK,STEPVAN,VAN,DRY VAN in GRAPEVINE, TEXAS. Retrieved from Comercial Truck Trader: http://www.commercialtrucktrader.com/listing/2014-CHEVROLET-EXPRESS-111591574
Cont. Daniels, W. (2013, March 23). Types of
Security Sys . Retrieved from Castra: http://www.castras.org.uk/
Hamdell, D. (2012, October 15). Access Control Systems . Retrieved from Honeywell: http://www.honeywellaccess.com/products/access-control-systems/index.html
Johnson, L. (2008, June 30). Facility Perimeter Security Standard. Retrieved from NCDHHS: http://www.ncdhhs.gov/pso/standards/physical/Facility-Perimeter-Security-Standard.pdf