SlideShare ist ein Scribd-Unternehmen logo
1 von 46
Practical Crime Scene Processing
        and Investigation
              Greg Dagnan
    Chapter 5 - Assessing the Scene
Learning Objectives
 Identify the purpose of assessment.

 Describe the function of barriers in maintaining
 scene integrity and contamination control.

 Identify and explain three factors when managing
 scene access.

 Identify the two approaches to team formation.
Learning Objectives .. continued
 Identify and explain the five basic search patterns
 used in crime scene examination.

 Identify basic personal protective measures for
 crime scene team members.

 Explain the relationship of the media and police as
 it pertains to crime scenes.
Crime Scene Processing Activities
 The six crime scene activities and their basic
order are:
–   Assessing
–   Observing
–   Documenting
–   Searching
–   Collecting
–   Analyzing
Assessing
  Assessment of the scene assists the investigator in
 making a decision on what to do, when to do it,
 and what resources may be required.

  Assessment must be accomplished before taking
 any action, but assessment is an on-going activity
 as well.

  The investigator is constantly assessing the scene
 throughout processing.
Five Issues of Assessment
 Assessment involves five basic issues, these are:
 –   Scope and complexity of the scene.
 –   Scene integrity and contamination control.
 –   Team approach and composition.
 –   Search methods to be used.
 –   Personal protective measures.


  Assessment by the crime scene team always
 involves a debriefing of the initial responders.
Debriefing of Initial Responders
  Debriefing of the initial responders seeks to
 answer the following questions:
  – What is the scope and nature of the scene?
  – What actions or alterations have been taken or noted by
    first responders (including EMS)?
  – What is the status of involved parties?
  – What level of security has been established and what
    further security actions are required?


  Their observations may not always be accurate,
 but they give the team a point to start from.
Scene Scope
  Investigators should re-access the scene boundary
 after debriefing.


 They use the same criteria as the initial officer:
 – Primary focal points.
 – Avenues of entry or exit.
 – Secondary scenes.


  Based on experience they may recognize minor
 nuances that require expanding the perimeter.
Contamination Control
  Once the crime scene team is confident of the
 scene scope, the team should act to further isolate
 the crime scene.

  Initial perimeters are often a single barrier,
 leaving little if any buffer between the crime scene
 and the on-lookers.
A Single Barrier Perimeter
       Initial Scene Perimeter               A single barrier is
                                            fine for initial
                                            purposes.

                                             It does not provide
                                            a sufficient buffer
                                            for long term scene
  Area entailing the actual crime scene.
                                            effort.

  Area outside controlled perimeter where
     on-lookers and media may gather.
Multi-level Containment
 Multi-level containment involves two barriers
 which creates three areas of access:
 – Inner Scene: This is the actual crime scene, where only
   authorized investigators and crime scene technicians
   operate.
 – Working Area: This is an area surrounding the inner
   scene, where other support police may enter, equipment
   is staged and evidence is brought to.
 – Outer Area: This is everything on the outside of the
   second barrier, where on-lookers, media and others
   may gather.
Multi-level Containment
             Outer Scene Perimeter
                                                             Two perimeters
              Inner Scene Perimeter                         provide for three
                                                            areas of access.

                                                             This keeps support
                                                            police out of the
               Area entailing the actual
                     crime scene.                           actual scene and
 Working area, evidence holding area and staging point
                                                            others at a safe
for equipment, it also provides a physical buffer between
     the actual scene and unauthorized individuals.
                                                            distance.
        Area outside the controlled perimeters.
Managing Access to the Scene
  Once the perimeter is established, a decision must
 be made on how the team will manage access to
 the scene.

  This involves identifying actual access points for
 the team and establishing entry control points.

  Determining how to access the scene isn’t always
 difficult, but it isn’t always simple either.
Access Points to the Scene
  Determining how to access the scene is a function
 of three factors:
 – What avenues of approach are available?
 – Will these points expose operations to media scrutiny?
 – What avenues of approach or exit did the offender use?


  With these three factors in mind the crime scene
 team decides what points they will use to access
 the scene for processing purposes.
Access Points Issues
 What avenues of approach are available?
 – There may only be one point of access.
 – Look for others.
  Will these points expose operations to media
 scrutiny?
 – Is there a way to shield the access point from the media
   and their prying eyes?
 What avenue of entry or exit did the offender use?
 – These are areas rich in evidence, so the team can’t
   simply tromp through them.
Entry Control Logs
 The scene often requires multi-level containment,
 with several perimeters.

  Entry control logs can certainly be used at any
 perimeter, but they become a hindrance to
 operations.

  The inner perimeter (the true crime scene)
 requires an entry control log.
Crime Scene Entry Control Log
Time In           Name/Unit            Reason at Scene   Time Out


1750      SA Brown – Homicide     Scene Processing

1759      Smith/ME Investigator   Scene exam             1823

1800      H. Jones – CS Unit      Scene Processing

1800      L. Marshall- CS Unit    Scene Processing

1817      Chief Kyle              Scene visit            1833

1817      Maj. Darren – PIO       Update by Homicide     1833

The entry control log keeps track of who entered the scene, when,
why and when they left. It’s serves to validate scene integrity.
Crime Scene Team Approach
  There are two approaches for creating crime
 scene teams:
 – By Area - single group of investigators is responsible
   for all activity in the scene.

 – By Function - specific groups are formed to handle
   different scene processing aspects (e.g. photo team,
   sketch team, latent team)


  In normal scenes, custom and size of the
 organization will often determine the approach.
Team Approach                 … continued

 In complex scenes, issues of size or resources
 may require the organization to alter its approach.
 – Lack of equipment resources to handle multiple scenes,
   may force a functional approach.

 – If equipment resources are not an issue, but size is; area
   teams may be necessary to handle small zones with in a
   larger scene.

 – The need for specialty examinations on scene may
   force a functional approach.
Crime Scene Team Composition
  Crime scene teams have to be manned
 appropriately.

  It is difficult to manage crime scene activity if the
 teams are under staffed.

  Different stages of the processing methodology
 demand different levels of minimum manning.
Team Composition                   … continued

 Photography teams require two individuals.
 – One operates the camera.
 – Second maintains the photo log and assists.


 Sketch teams require three individuals.
 – Two take measurements.
 – One annotates the sketch and takes notes.
 – In a pinch, two can do the job, but be careful as notes
   and measurements get mixed up.
Team Composition                  … continued

  Evidence Collection teams require two
 individuals.
 – One containerizes and physically collects the items.
 – A second maintains the evidence log.


  Search teams are a matter of circumstance, but
 always require a minimum of two individuals.
 – No two people survey or perceive the same way, so two
   sets of eyes prevents items from being overlooked.
Search Considerations
  Ultimately, some form of search must be
 conducted at the scene to locate evidence.

  The particular search pattern chosen is a function
 of the situation.

  No matter what search pattern is chosen the crime
 scene team must decide on a search swathe size.
Search Swathe Size
  The search swathe is the area that any given
 searcher is viewing at any given moment in the
 search.

  How tight or how broad this search swathe will be
 is a product of several considerations:
 –   Nature of the ground being searched.
 –   Lighting considerations.
 –   On-scene environmental conditions.
 –   Size of the item being searched for.
Terrain and Search Swathe Size
 Terrain at Width 1                                     Terrain at Width 2

                        Terrain has a significant
                          affect on the size of
                            a search swathe.



                                    Search    Search
                                    Width 1   Width 2




                  Area to be searched
Lighting and Search Swathe Size

               Available lighting has a
                 significant affect on
             the size of a search swathe.




  Have alternate lighting systems available,
 including: work lights and Alternate Light Sources
 (ALS).
Environmental Conditions
  Extreme heat or cold can affect the ability of the
 searcher.

  Wind, rain, fog and other factors may also impede
 the searchers ability.

  Any of these conditions may demand narrowing
 the search swathe to preclude missing items.
Size of the Item Being Sought
                In focused searches the size
                of the item being sought can
                 affect the size of a search
                           swathe.




  Sometimes we do directed searches, looking for a
 specific object, which impacts our decisions.
  It is one thing to look for a gun in the grass, its another to
 look for a shell casing.
Search Patterns
 There are five basic crime scene search patterns:
 –   Circle search.
 –   Strip or line search.
 –   Grid search.
 –   Zone search.
 –   Point to point search.


  Each pattern works in a variety of circumstances,
 but no single pattern works in every situation.
Circle (a.k.a. Spiral) Search
  Excellent pattern in most interior or confined
 exterior scenes.

  Not effective in large exterior scenes or cluttered
 areas that impact on the circular movement.

  Searcher moves inward or outward from a starting
 point.
Circle Search
                      End




                            End




                      Start



Narrowing Circle                  Widening Circle
Strip Search
 Excellent in exterior scenes where a large area
 must be examined.

  Visual alignment to the strip is good for most
 situations, but as the area to be searched grows, it
 becomes more difficult to maintain a visual
 reference of the lanes.

  Physically laying out the strips with string or tape
 can help maintain the order.
Strip Search




Start                  End
Line Search
  Variation of the strip search, where multiple
 searchers follow a single strip in one direction,
 while on-line with each other.

 Excellent for exterior scenes over rough terrain.

  Usually requires supervisor(s) to maintain the
 direction and alignment of the involved searchers.
Line Search


End Line




Start Line
Grid Search
  The grid search is another variation on the strip
 search.

  Searchers follows strips in one direction, then
 cuts across the scene in another set of strips,
 oriented 90 degrees to the first.

  Provides for multiple views of the same ground
 by the same searcher from different perspectives.
Grid Search




End




      Start
Zone Search
 The zone search is used in several variations:

 – To deal with small confined spaces where no patterned
   search will work.

 – To break a larger scene up into functional areas, that
   are then searched using some other patterned technique.
Zone Search - Small Confined Areas

                                  Zone G




                                Zone B     Zone C

Zone J            Zone F                            Zone E        Zone H

                                Zone A     Zone D




                                  Zone I

    An example is the car. No pattern search will work, so zones are
   created that are searched individually.
Zone Search - Breaking Up a Larger Scene



           Zone 6              Zone 5               Zone 4




          Zone 7               Zone 9                  Zone 3




        Zone 8               Zone 1                      Zone 2



 An example is a home and the grounds. To keep perspective, the grounds
are broken up into zones, which are then searched individually using a
standard pattern technique.
Point to Point Search
  Not widely used in the United States.

  Searchers move from one focal point to the next,
 creating cleared pathways to and from each.

 They do not stray from these pathways.

  Each focal point is dealt with before moving on to
 the next.
Assessing Crime Scene Hazards
  A variety of hazards to the crime scene
 technician exist in the scene. These include:
 – Bio-hazards from blood or body fluids.
 – Structural hazards in fire and explosion scenes.
 – Chemical and inhalation hazards in fire scenes.
 – Inhalation and chemical hazards from on-scene
   processing techniques.
 – Inhalation and explosion hazards associated to drug
   labs.
 – Bio-chemical hazards associated with terrorism.
Crime Scene Hazards              ... continued

  Each scene must be assessed for any obvious
 hazards.

 Any risks associated to the hazard should be
 mitigated, if possible, before exposing team
 members to the hazard.

  The use of personal protective equipment (PPE)
 will mitigate or reduce exposure to many common
 hazards (e.g. bio-hazards, chemical hazards)
Personal Protective Equipment

1. Goggles/eye protection - splash and
mucous membrane tissue protection.                   1
                                                         2
2. Face/particle mask - inhalation
protection.
                                                 3
3. Tyvek suit - impervious to liquid
contaminants.
                                             4
4. Rubber gloves - impervious to liquid
contaminants.
5. Booties - splash and contact protection
for footwear.
                                                 5
Media Issues
  Assessment involves aspects of dealing with the
 media (e.g. what information will be held back,
 how much photo or video access will they get).

  The media are often viewed in an antagonistic
 fashion by the crime scene investigator.

  Use caution when dealing with the media, but
 treat them as professionals.
Media Issues         … continued

  Police are the gate-keepers. We decide how
 much access to allow and what information to
 release.

  Don’t speculate, don’t lie and if you’re not
 prepared to release information, then say so.

  Assign experienced officers as the Public
 Information Officer and then work as a team to
 decide what information to release.

Weitere ähnliche Inhalte

Was ist angesagt?

Crime Scene Investigation
Crime Scene InvestigationCrime Scene Investigation
Crime Scene Investigationnicollins
 
Physical evidence & CSI ppt
Physical evidence & CSI pptPhysical evidence & CSI ppt
Physical evidence & CSI pptAnkitaSikoria
 
Forensic photography
Forensic photographyForensic photography
Forensic photographyVaibhav Laur
 
Crime scene management
Crime scene managementCrime scene management
Crime scene managementShreyas Patel
 
Fingerprint Classification- slide 1
Fingerprint Classification- slide 1Fingerprint Classification- slide 1
Fingerprint Classification- slide 1Jury Rocamora
 
Technique and strategies on Criminology Board Exam
Technique and strategies on Criminology Board ExamTechnique and strategies on Criminology Board Exam
Technique and strategies on Criminology Board Exammonde24836
 
CRIME MANAGEMENT - 2.pptx
CRIME MANAGEMENT - 2.pptxCRIME MANAGEMENT - 2.pptx
CRIME MANAGEMENT - 2.pptxDR AISWARYA GR
 
Processing the crime scene
Processing the crime sceneProcessing the crime scene
Processing the crime sceneBruno Mmassy
 
Crime scene management
Crime scene managementCrime scene management
Crime scene managementHafeez Bhutta
 
Crime scene preservation
Crime scene preservationCrime scene preservation
Crime scene preservationgillyann
 
Crime scene reconstruction
Crime scene reconstructionCrime scene reconstruction
Crime scene reconstructionnitin Pandey
 
Police report writing
Police report writingPolice report writing
Police report writingkapitanpinoy
 
EVIDENCE COLLECTION AND ANALYSIS
EVIDENCE COLLECTION AND ANALYSISEVIDENCE COLLECTION AND ANALYSIS
EVIDENCE COLLECTION AND ANALYSISsana I . Souliman
 
Fundamentals of investigation
Fundamentals of investigationFundamentals of investigation
Fundamentals of investigationjaredplata
 
Tools used in crime scene investigations
Tools used in crime scene investigationsTools used in crime scene investigations
Tools used in crime scene investigationsDr Yakita Singh
 
Technical English 1
Technical English 1Technical English 1
Technical English 1EdselOplas1
 
Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015monde24836
 

Was ist angesagt? (20)

Crime Scene Investigation
Crime Scene InvestigationCrime Scene Investigation
Crime Scene Investigation
 
Crime investigation
Crime investigationCrime investigation
Crime investigation
 
Physical evidence & CSI ppt
Physical evidence & CSI pptPhysical evidence & CSI ppt
Physical evidence & CSI ppt
 
Forensic photography
Forensic photographyForensic photography
Forensic photography
 
Crime scene management
Crime scene managementCrime scene management
Crime scene management
 
Fingerprint Classification- slide 1
Fingerprint Classification- slide 1Fingerprint Classification- slide 1
Fingerprint Classification- slide 1
 
Technique and strategies on Criminology Board Exam
Technique and strategies on Criminology Board ExamTechnique and strategies on Criminology Board Exam
Technique and strategies on Criminology Board Exam
 
CRIME MANAGEMENT - 2.pptx
CRIME MANAGEMENT - 2.pptxCRIME MANAGEMENT - 2.pptx
CRIME MANAGEMENT - 2.pptx
 
Processing the crime scene
Processing the crime sceneProcessing the crime scene
Processing the crime scene
 
Crime scene management
Crime scene managementCrime scene management
Crime scene management
 
Crime scene preservation
Crime scene preservationCrime scene preservation
Crime scene preservation
 
Crime scene reconstruction
Crime scene reconstructionCrime scene reconstruction
Crime scene reconstruction
 
Police report writing
Police report writingPolice report writing
Police report writing
 
Crime Scene Reconstruction.
Crime Scene Reconstruction.Crime Scene Reconstruction.
Crime Scene Reconstruction.
 
EVIDENCE COLLECTION AND ANALYSIS
EVIDENCE COLLECTION AND ANALYSISEVIDENCE COLLECTION AND ANALYSIS
EVIDENCE COLLECTION AND ANALYSIS
 
Fundamentals of investigation
Fundamentals of investigationFundamentals of investigation
Fundamentals of investigation
 
Tools used in crime scene investigations
Tools used in crime scene investigationsTools used in crime scene investigations
Tools used in crime scene investigations
 
Technical English 1
Technical English 1Technical English 1
Technical English 1
 
Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015
 
Justifyingcircumstance
JustifyingcircumstanceJustifyingcircumstance
Justifyingcircumstance
 

Andere mochten auch

Alkylation
AlkylationAlkylation
Alkylationadeeba2
 
Physical chemistry formulary - the laws of thermodynamics hold
Physical chemistry formulary - the laws of thermodynamics holdPhysical chemistry formulary - the laws of thermodynamics hold
Physical chemistry formulary - the laws of thermodynamics holdDrLauth
 
Buffers in chemical analysis, types of buffers
Buffers in chemical analysis, types of buffersBuffers in chemical analysis, types of buffers
Buffers in chemical analysis, types of buffersChirag Patel
 
Post-Translational Modifications
Post-Translational ModificationsPost-Translational Modifications
Post-Translational ModificationsAisha Kalsoom
 
Chemistry - Chp 20 - Oxidation Reduction Reactions - PowerPoint
Chemistry - Chp 20 - Oxidation Reduction Reactions - PowerPointChemistry - Chp 20 - Oxidation Reduction Reactions - PowerPoint
Chemistry - Chp 20 - Oxidation Reduction Reactions - PowerPointMr. Walajtys
 
Histone Modification: Acetylation n Methylation
Histone Modification: Acetylation n MethylationHistone Modification: Acetylation n Methylation
Histone Modification: Acetylation n MethylationSomanna AN
 

Andere mochten auch (14)

Aem Lect9
Aem Lect9Aem Lect9
Aem Lect9
 
Alkylation
AlkylationAlkylation
Alkylation
 
Alkylation
AlkylationAlkylation
Alkylation
 
Debye huckel
Debye huckelDebye huckel
Debye huckel
 
Modes of Drug administration
Modes of Drug administrationModes of Drug administration
Modes of Drug administration
 
Physical chemistry formulary - the laws of thermodynamics hold
Physical chemistry formulary - the laws of thermodynamics holdPhysical chemistry formulary - the laws of thermodynamics hold
Physical chemistry formulary - the laws of thermodynamics hold
 
Buffers in chemical analysis, types of buffers
Buffers in chemical analysis, types of buffersBuffers in chemical analysis, types of buffers
Buffers in chemical analysis, types of buffers
 
Furan presentation
Furan presentationFuran presentation
Furan presentation
 
Ph and buffer
Ph and bufferPh and buffer
Ph and buffer
 
Post-Translational Modifications
Post-Translational ModificationsPost-Translational Modifications
Post-Translational Modifications
 
Chemistry - Chp 20 - Oxidation Reduction Reactions - PowerPoint
Chemistry - Chp 20 - Oxidation Reduction Reactions - PowerPointChemistry - Chp 20 - Oxidation Reduction Reactions - PowerPoint
Chemistry - Chp 20 - Oxidation Reduction Reactions - PowerPoint
 
Buffer system
Buffer systemBuffer system
Buffer system
 
Histone Modification: Acetylation n Methylation
Histone Modification: Acetylation n MethylationHistone Modification: Acetylation n Methylation
Histone Modification: Acetylation n Methylation
 
Alkylation Unit
Alkylation UnitAlkylation Unit
Alkylation Unit
 

Ähnlich wie Chapter 5 - CJAD 340

Chapter 6 Student Slides.pptx
Chapter 6 Student Slides.pptxChapter 6 Student Slides.pptx
Chapter 6 Student Slides.pptxKettyM1
 
1Forensic Science and CriminalisticsAssociated Press.docx
1Forensic Science and CriminalisticsAssociated Press.docx1Forensic Science and CriminalisticsAssociated Press.docx
1Forensic Science and CriminalisticsAssociated Press.docxaulasnilda
 
Instantaneous Object Detection By Blob Assessment
Instantaneous Object Detection By Blob AssessmentInstantaneous Object Detection By Blob Assessment
Instantaneous Object Detection By Blob AssessmentIJRES Journal
 
Cyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationCyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationInfocyte
 
Candice Shamsher · Assess the situation.- You have to know w.docx
Candice Shamsher · Assess the situation.- You have to know w.docxCandice Shamsher · Assess the situation.- You have to know w.docx
Candice Shamsher · Assess the situation.- You have to know w.docxjasoninnes20
 
Candice Shamsher · Assess the situation.- You have to know w.docx
Candice Shamsher · Assess the situation.- You have to know w.docxCandice Shamsher · Assess the situation.- You have to know w.docx
Candice Shamsher · Assess the situation.- You have to know w.docxhacksoni
 
Ai 02 intelligent_agents(1)
Ai 02 intelligent_agents(1)Ai 02 intelligent_agents(1)
Ai 02 intelligent_agents(1)Mohammed Romi
 
Evidence Collection Process
Evidence Collection ProcessEvidence Collection Process
Evidence Collection ProcessMichelle Singh
 
The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016Ashley Deuble
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response Darren Pauli
 
Crime Scene Management (forensic science)
Crime Scene Management (forensic science)Crime Scene Management (forensic science)
Crime Scene Management (forensic science)AryaThampi9
 
Huawei STW 2018 public
Huawei STW 2018 publicHuawei STW 2018 public
Huawei STW 2018 publicAlan Smeaton
 
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.pptabhichowdary16
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillancePuneet soni
 
An introduction to intrusion detection systems
An introduction to intrusion detection systemsAn introduction to intrusion detection systems
An introduction to intrusion detection systemsUltraUploader
 

Ähnlich wie Chapter 5 - CJAD 340 (20)

Chapter 6 Student Slides.pptx
Chapter 6 Student Slides.pptxChapter 6 Student Slides.pptx
Chapter 6 Student Slides.pptx
 
Forensic[1]
Forensic[1]Forensic[1]
Forensic[1]
 
1Forensic Science and CriminalisticsAssociated Press.docx
1Forensic Science and CriminalisticsAssociated Press.docx1Forensic Science and CriminalisticsAssociated Press.docx
1Forensic Science and CriminalisticsAssociated Press.docx
 
Instantaneous Object Detection By Blob Assessment
Instantaneous Object Detection By Blob AssessmentInstantaneous Object Detection By Blob Assessment
Instantaneous Object Detection By Blob Assessment
 
p-1.pdf
p-1.pdfp-1.pdf
p-1.pdf
 
Cyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationCyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 Presentation
 
Candice Shamsher · Assess the situation.- You have to know w.docx
Candice Shamsher · Assess the situation.- You have to know w.docxCandice Shamsher · Assess the situation.- You have to know w.docx
Candice Shamsher · Assess the situation.- You have to know w.docx
 
Candice Shamsher · Assess the situation.- You have to know w.docx
Candice Shamsher · Assess the situation.- You have to know w.docxCandice Shamsher · Assess the situation.- You have to know w.docx
Candice Shamsher · Assess the situation.- You have to know w.docx
 
Csi ppt
Csi  pptCsi  ppt
Csi ppt
 
Ai 02 intelligent_agents(1)
Ai 02 intelligent_agents(1)Ai 02 intelligent_agents(1)
Ai 02 intelligent_agents(1)
 
Field Operations
Field OperationsField Operations
Field Operations
 
Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
 
Evidence Collection Process
Evidence Collection ProcessEvidence Collection Process
Evidence Collection Process
 
The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response
 
Crime Scene Management (forensic science)
Crime Scene Management (forensic science)Crime Scene Management (forensic science)
Crime Scene Management (forensic science)
 
Huawei STW 2018 public
Huawei STW 2018 publicHuawei STW 2018 public
Huawei STW 2018 public
 
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
 
An introduction to intrusion detection systems
An introduction to intrusion detection systemsAn introduction to intrusion detection systems
An introduction to intrusion detection systems
 

Mehr von difordham

Schm5e ppt ch17
Schm5e ppt ch17Schm5e ppt ch17
Schm5e ppt ch17difordham
 
Ppt chapter 14
Ppt chapter 14Ppt chapter 14
Ppt chapter 14difordham
 
Ppt chapter 7
Ppt chapter 7Ppt chapter 7
Ppt chapter 7difordham
 
Ppt chapter 16
Ppt chapter 16Ppt chapter 16
Ppt chapter 16difordham
 
Ppt chapter 15
Ppt chapter 15Ppt chapter 15
Ppt chapter 15difordham
 
Ppt chapter 13
Ppt chapter 13Ppt chapter 13
Ppt chapter 13difordham
 
Ppt chapter 12
Ppt chapter 12Ppt chapter 12
Ppt chapter 12difordham
 
Ppt chapter 11
Ppt chapter 11Ppt chapter 11
Ppt chapter 11difordham
 
Ppt chapter 10
Ppt chapter 10Ppt chapter 10
Ppt chapter 10difordham
 
Ppt chapter 9
Ppt chapter 9Ppt chapter 9
Ppt chapter 9difordham
 
Ppt chapter 8
Ppt chapter 8Ppt chapter 8
Ppt chapter 8difordham
 
Ppt chapter 6
Ppt chapter 6Ppt chapter 6
Ppt chapter 6difordham
 
Ppt chapter 5
Ppt chapter 5Ppt chapter 5
Ppt chapter 5difordham
 
Ppt chapter 4
Ppt chapter 4Ppt chapter 4
Ppt chapter 4difordham
 
Ppt chapter 3
Ppt chapter 3Ppt chapter 3
Ppt chapter 3difordham
 
Ppt chapter 2
Ppt chapter 2Ppt chapter 2
Ppt chapter 2difordham
 
Ppt chapter 1
Ppt chapter 1Ppt chapter 1
Ppt chapter 1difordham
 
Ch 12 separation agreements 2ed
Ch 12 separation agreements 2edCh 12 separation agreements 2ed
Ch 12 separation agreements 2eddifordham
 
Ch 14 adoption 2ed
Ch 14 adoption 2edCh 14 adoption 2ed
Ch 14 adoption 2eddifordham
 
Ch 13 family violence
Ch 13 family violenceCh 13 family violence
Ch 13 family violencedifordham
 

Mehr von difordham (20)

Schm5e ppt ch17
Schm5e ppt ch17Schm5e ppt ch17
Schm5e ppt ch17
 
Ppt chapter 14
Ppt chapter 14Ppt chapter 14
Ppt chapter 14
 
Ppt chapter 7
Ppt chapter 7Ppt chapter 7
Ppt chapter 7
 
Ppt chapter 16
Ppt chapter 16Ppt chapter 16
Ppt chapter 16
 
Ppt chapter 15
Ppt chapter 15Ppt chapter 15
Ppt chapter 15
 
Ppt chapter 13
Ppt chapter 13Ppt chapter 13
Ppt chapter 13
 
Ppt chapter 12
Ppt chapter 12Ppt chapter 12
Ppt chapter 12
 
Ppt chapter 11
Ppt chapter 11Ppt chapter 11
Ppt chapter 11
 
Ppt chapter 10
Ppt chapter 10Ppt chapter 10
Ppt chapter 10
 
Ppt chapter 9
Ppt chapter 9Ppt chapter 9
Ppt chapter 9
 
Ppt chapter 8
Ppt chapter 8Ppt chapter 8
Ppt chapter 8
 
Ppt chapter 6
Ppt chapter 6Ppt chapter 6
Ppt chapter 6
 
Ppt chapter 5
Ppt chapter 5Ppt chapter 5
Ppt chapter 5
 
Ppt chapter 4
Ppt chapter 4Ppt chapter 4
Ppt chapter 4
 
Ppt chapter 3
Ppt chapter 3Ppt chapter 3
Ppt chapter 3
 
Ppt chapter 2
Ppt chapter 2Ppt chapter 2
Ppt chapter 2
 
Ppt chapter 1
Ppt chapter 1Ppt chapter 1
Ppt chapter 1
 
Ch 12 separation agreements 2ed
Ch 12 separation agreements 2edCh 12 separation agreements 2ed
Ch 12 separation agreements 2ed
 
Ch 14 adoption 2ed
Ch 14 adoption 2edCh 14 adoption 2ed
Ch 14 adoption 2ed
 
Ch 13 family violence
Ch 13 family violenceCh 13 family violence
Ch 13 family violence
 

Kürzlich hochgeladen

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Kürzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Chapter 5 - CJAD 340

  • 1. Practical Crime Scene Processing and Investigation Greg Dagnan Chapter 5 - Assessing the Scene
  • 2. Learning Objectives Identify the purpose of assessment. Describe the function of barriers in maintaining scene integrity and contamination control. Identify and explain three factors when managing scene access. Identify the two approaches to team formation.
  • 3. Learning Objectives .. continued Identify and explain the five basic search patterns used in crime scene examination. Identify basic personal protective measures for crime scene team members. Explain the relationship of the media and police as it pertains to crime scenes.
  • 4. Crime Scene Processing Activities The six crime scene activities and their basic order are: – Assessing – Observing – Documenting – Searching – Collecting – Analyzing
  • 5. Assessing Assessment of the scene assists the investigator in making a decision on what to do, when to do it, and what resources may be required. Assessment must be accomplished before taking any action, but assessment is an on-going activity as well. The investigator is constantly assessing the scene throughout processing.
  • 6. Five Issues of Assessment Assessment involves five basic issues, these are: – Scope and complexity of the scene. – Scene integrity and contamination control. – Team approach and composition. – Search methods to be used. – Personal protective measures. Assessment by the crime scene team always involves a debriefing of the initial responders.
  • 7. Debriefing of Initial Responders Debriefing of the initial responders seeks to answer the following questions: – What is the scope and nature of the scene? – What actions or alterations have been taken or noted by first responders (including EMS)? – What is the status of involved parties? – What level of security has been established and what further security actions are required? Their observations may not always be accurate, but they give the team a point to start from.
  • 8. Scene Scope Investigators should re-access the scene boundary after debriefing. They use the same criteria as the initial officer: – Primary focal points. – Avenues of entry or exit. – Secondary scenes. Based on experience they may recognize minor nuances that require expanding the perimeter.
  • 9. Contamination Control Once the crime scene team is confident of the scene scope, the team should act to further isolate the crime scene. Initial perimeters are often a single barrier, leaving little if any buffer between the crime scene and the on-lookers.
  • 10. A Single Barrier Perimeter Initial Scene Perimeter A single barrier is fine for initial purposes. It does not provide a sufficient buffer for long term scene Area entailing the actual crime scene. effort. Area outside controlled perimeter where on-lookers and media may gather.
  • 11. Multi-level Containment Multi-level containment involves two barriers which creates three areas of access: – Inner Scene: This is the actual crime scene, where only authorized investigators and crime scene technicians operate. – Working Area: This is an area surrounding the inner scene, where other support police may enter, equipment is staged and evidence is brought to. – Outer Area: This is everything on the outside of the second barrier, where on-lookers, media and others may gather.
  • 12. Multi-level Containment Outer Scene Perimeter Two perimeters Inner Scene Perimeter provide for three areas of access. This keeps support police out of the Area entailing the actual crime scene. actual scene and Working area, evidence holding area and staging point others at a safe for equipment, it also provides a physical buffer between the actual scene and unauthorized individuals. distance. Area outside the controlled perimeters.
  • 13. Managing Access to the Scene Once the perimeter is established, a decision must be made on how the team will manage access to the scene. This involves identifying actual access points for the team and establishing entry control points. Determining how to access the scene isn’t always difficult, but it isn’t always simple either.
  • 14. Access Points to the Scene Determining how to access the scene is a function of three factors: – What avenues of approach are available? – Will these points expose operations to media scrutiny? – What avenues of approach or exit did the offender use? With these three factors in mind the crime scene team decides what points they will use to access the scene for processing purposes.
  • 15. Access Points Issues What avenues of approach are available? – There may only be one point of access. – Look for others. Will these points expose operations to media scrutiny? – Is there a way to shield the access point from the media and their prying eyes? What avenue of entry or exit did the offender use? – These are areas rich in evidence, so the team can’t simply tromp through them.
  • 16. Entry Control Logs The scene often requires multi-level containment, with several perimeters. Entry control logs can certainly be used at any perimeter, but they become a hindrance to operations. The inner perimeter (the true crime scene) requires an entry control log.
  • 17. Crime Scene Entry Control Log Time In Name/Unit Reason at Scene Time Out 1750 SA Brown – Homicide Scene Processing 1759 Smith/ME Investigator Scene exam 1823 1800 H. Jones – CS Unit Scene Processing 1800 L. Marshall- CS Unit Scene Processing 1817 Chief Kyle Scene visit 1833 1817 Maj. Darren – PIO Update by Homicide 1833 The entry control log keeps track of who entered the scene, when, why and when they left. It’s serves to validate scene integrity.
  • 18. Crime Scene Team Approach There are two approaches for creating crime scene teams: – By Area - single group of investigators is responsible for all activity in the scene. – By Function - specific groups are formed to handle different scene processing aspects (e.g. photo team, sketch team, latent team) In normal scenes, custom and size of the organization will often determine the approach.
  • 19. Team Approach … continued In complex scenes, issues of size or resources may require the organization to alter its approach. – Lack of equipment resources to handle multiple scenes, may force a functional approach. – If equipment resources are not an issue, but size is; area teams may be necessary to handle small zones with in a larger scene. – The need for specialty examinations on scene may force a functional approach.
  • 20. Crime Scene Team Composition Crime scene teams have to be manned appropriately. It is difficult to manage crime scene activity if the teams are under staffed. Different stages of the processing methodology demand different levels of minimum manning.
  • 21. Team Composition … continued Photography teams require two individuals. – One operates the camera. – Second maintains the photo log and assists. Sketch teams require three individuals. – Two take measurements. – One annotates the sketch and takes notes. – In a pinch, two can do the job, but be careful as notes and measurements get mixed up.
  • 22. Team Composition … continued Evidence Collection teams require two individuals. – One containerizes and physically collects the items. – A second maintains the evidence log. Search teams are a matter of circumstance, but always require a minimum of two individuals. – No two people survey or perceive the same way, so two sets of eyes prevents items from being overlooked.
  • 23. Search Considerations Ultimately, some form of search must be conducted at the scene to locate evidence. The particular search pattern chosen is a function of the situation. No matter what search pattern is chosen the crime scene team must decide on a search swathe size.
  • 24. Search Swathe Size The search swathe is the area that any given searcher is viewing at any given moment in the search. How tight or how broad this search swathe will be is a product of several considerations: – Nature of the ground being searched. – Lighting considerations. – On-scene environmental conditions. – Size of the item being searched for.
  • 25. Terrain and Search Swathe Size Terrain at Width 1 Terrain at Width 2 Terrain has a significant affect on the size of a search swathe. Search Search Width 1 Width 2 Area to be searched
  • 26. Lighting and Search Swathe Size Available lighting has a significant affect on the size of a search swathe. Have alternate lighting systems available, including: work lights and Alternate Light Sources (ALS).
  • 27. Environmental Conditions Extreme heat or cold can affect the ability of the searcher. Wind, rain, fog and other factors may also impede the searchers ability. Any of these conditions may demand narrowing the search swathe to preclude missing items.
  • 28. Size of the Item Being Sought In focused searches the size of the item being sought can affect the size of a search swathe. Sometimes we do directed searches, looking for a specific object, which impacts our decisions. It is one thing to look for a gun in the grass, its another to look for a shell casing.
  • 29. Search Patterns There are five basic crime scene search patterns: – Circle search. – Strip or line search. – Grid search. – Zone search. – Point to point search. Each pattern works in a variety of circumstances, but no single pattern works in every situation.
  • 30. Circle (a.k.a. Spiral) Search Excellent pattern in most interior or confined exterior scenes. Not effective in large exterior scenes or cluttered areas that impact on the circular movement. Searcher moves inward or outward from a starting point.
  • 31. Circle Search End End Start Narrowing Circle Widening Circle
  • 32. Strip Search Excellent in exterior scenes where a large area must be examined. Visual alignment to the strip is good for most situations, but as the area to be searched grows, it becomes more difficult to maintain a visual reference of the lanes. Physically laying out the strips with string or tape can help maintain the order.
  • 34. Line Search Variation of the strip search, where multiple searchers follow a single strip in one direction, while on-line with each other. Excellent for exterior scenes over rough terrain. Usually requires supervisor(s) to maintain the direction and alignment of the involved searchers.
  • 36. Grid Search The grid search is another variation on the strip search. Searchers follows strips in one direction, then cuts across the scene in another set of strips, oriented 90 degrees to the first. Provides for multiple views of the same ground by the same searcher from different perspectives.
  • 38. Zone Search The zone search is used in several variations: – To deal with small confined spaces where no patterned search will work. – To break a larger scene up into functional areas, that are then searched using some other patterned technique.
  • 39. Zone Search - Small Confined Areas Zone G Zone B Zone C Zone J Zone F Zone E Zone H Zone A Zone D Zone I An example is the car. No pattern search will work, so zones are created that are searched individually.
  • 40. Zone Search - Breaking Up a Larger Scene Zone 6 Zone 5 Zone 4 Zone 7 Zone 9 Zone 3 Zone 8 Zone 1 Zone 2 An example is a home and the grounds. To keep perspective, the grounds are broken up into zones, which are then searched individually using a standard pattern technique.
  • 41. Point to Point Search Not widely used in the United States. Searchers move from one focal point to the next, creating cleared pathways to and from each. They do not stray from these pathways. Each focal point is dealt with before moving on to the next.
  • 42. Assessing Crime Scene Hazards A variety of hazards to the crime scene technician exist in the scene. These include: – Bio-hazards from blood or body fluids. – Structural hazards in fire and explosion scenes. – Chemical and inhalation hazards in fire scenes. – Inhalation and chemical hazards from on-scene processing techniques. – Inhalation and explosion hazards associated to drug labs. – Bio-chemical hazards associated with terrorism.
  • 43. Crime Scene Hazards ... continued Each scene must be assessed for any obvious hazards. Any risks associated to the hazard should be mitigated, if possible, before exposing team members to the hazard. The use of personal protective equipment (PPE) will mitigate or reduce exposure to many common hazards (e.g. bio-hazards, chemical hazards)
  • 44. Personal Protective Equipment 1. Goggles/eye protection - splash and mucous membrane tissue protection. 1 2 2. Face/particle mask - inhalation protection. 3 3. Tyvek suit - impervious to liquid contaminants. 4 4. Rubber gloves - impervious to liquid contaminants. 5. Booties - splash and contact protection for footwear. 5
  • 45. Media Issues Assessment involves aspects of dealing with the media (e.g. what information will be held back, how much photo or video access will they get). The media are often viewed in an antagonistic fashion by the crime scene investigator. Use caution when dealing with the media, but treat them as professionals.
  • 46. Media Issues … continued Police are the gate-keepers. We decide how much access to allow and what information to release. Don’t speculate, don’t lie and if you’re not prepared to release information, then say so. Assign experienced officers as the Public Information Officer and then work as a team to decide what information to release.