BRIEFLY DISCUSS THE INVESTIGATOR’S TESTIMONY IN COURT.Per, Vecchi (2010), briefly discuss in your own words the investigator’s testimony in court. In doing so, list the actions that should be considered before testifying.

Per, Vecchi (2010), briefly discuss in your own words the investigator’s testimony in court. In doing so, list the actions that should be considered before testifying.

APA FORMAT, NO PLAIGIRISM, COLLEGE LEVEL, RESOURCE ATTACHED

Principles and Approaches to Criminal

Investigation, Part 4

By Gregory M. Vecchi, PhD, CFC, CHS-V, DABCIP, DABLEE

For the purposes of this series of articles, the term investigative processes will be used to de- scribe both criminal investigation and crime scene processing. Any distinctions between crim- inal investigation and crime scene processing will be designated as such. Although crime scene processing is part of criminal investigation, it is distinct; crime scene processing requires rigorous scientific methodologies (i.e., collection proce- dures, testing protocols, etc.), while criminal in- vestigation has less of a “hard science” character and relies more on the experience and skills of the investigator rather than rigid scientific pro- tocols and procedures. In this light, crime scene processing can be viewed as the “science” of in- vestigative processes, whereas criminal investi- gation can be viewed as the “art.” The format of this article series is to provide information on the entire spectrum of investigative processes that is useful for all individuals involved in investiga- tions: the responding officer, detectives/investi- gators, police supervisors, lawyers, judges, and other criminal justice professionals. This article examines special investigations such as white collar crime, drug trafficking, high-tech crime, and terrorism using the Enterprise Theory of Investigation; trial and testimony; and conflict and perspective.

Special Investigations Special investigations include white-collar crime, drug trafficking, organized crime, high tech- nology or cyber crime, cults, and terrorism (Criminology Today, 1995-2002a, 1995-2002b; Dyson, 2005). These crimes require special in- vestigative techniques, such as undercover op- erations and the use of the Enterprise Theory of Investigation. White-collar crime is often related to corporate crime, such as the Enron and WorldCom scandals; however, it is also as- sociated with health care, telemarketing, bank and securities, contract, and residential mov- ing. Organized crime is usually associated with centrally controlled organized criminal organi- zations, such as Italian, Italian-American, and Colombian criminal groups; however, lesser known decentralized criminal organizations are making inroads. For example, Russian and Israeli criminal groups are threatening to take control of rackets like drugs, money launder- ing, and many extortion-related schemes, which were once the exclusive realm of the centralized organized criminal groups.

The views expressed in

this article do not necessarily represent the

views of the FBI.

10 THE FORENSIC EXAMINER® Spring 2010 www.acfei.com

CASE STUDY

Drug trafficking still remains a very lucrative and corrupting influence in the United States (Criminology Today, 1995-2002a). Although there has been some success in curbing the influx of illegal drugs through enforcement and educa- tional programs, the amazing amount of wealth, resources, and cunning of drug traffickers is sometimes beyond the capability of the govern- ment to control. As a result, the government has begun to cut into the profits of the illegal drug trade through the aggressive application of assets forfeiture. For example, many law enforcement agencies assign officers to Drug Enforcement Administration (DEA) task forces for the pur- pose of obtaining forfeited assets and currency through drug investigations, which are used to supplement their operating budgets. High-technology crime affects significant as- sets and has the potential to be extremely costly and dangerous, especially with regards to infra- structural components such as air traffic con- trol, nuclear facilities, power grids, satellites, and banking systems (Criminology Today, 1995- 2002b). Over the past decade, computer hackers have become very sophisticated and many are being paid by other organized crime and terrorist groups to manipulate these assets for profit and control. Because these types of high-tech crime are fairly anonymous, they are very difficult and expensive to solve. Terrorism has eclipsed nearly all other in- vestigative priorities since the September 11, 2001, terrorist attacks in New York City and Washington, DC. These investigations are very complex, due in part to the secret nature of terror- ist activities, the fluidity of their operations, their ability to embed themselves among us, the lack of centralized control and stated national affilia- tions, their willingness to die for their “cause,” and their uncooperative nature when caught (Dyson, 2005).


 

PLACE THIS ORDER OR A SIMILAR ORDER WITH NURSING TERM PAPERS TODAY AND GET AN AMAZING DISCOUNT

get-your-custom-paper

For order inquiries     +1 (408) 800 3377

Open chat
You can now contact our live agent via Whatsapp! via +1 408 800-3377

You will get plagiarism free custom written paper ready for submission to your Blackboard.