Documente Academic
Documente Profesional
Documente Cultură
The major sources of recorded information are the files maintained by government
and business organizations. Within government, the agencies contacted most are those
concerned with criminal justice. They, as well as some others not part of the criminal
justice system, willingly provide information to the investigator. The remaining bureau-
cratic agencies, however, may not be very cooperative. The investigator will find them
similar to business firms that do not necessarily make it an easy matter to extract infor-
mation from their files. As a rule, problems arise when a detective does not, as a mat-
ter of right, have direct access to what is sought. That being so, the file keeper’s
cooperation must be secured. This chapter will describe methods that facilitate the acqui-
sition of recorded information and make its investigative value more timely.
This system may be adequate for many departments, but once set up, lethargy and lean bud-
gets often prevent periodic updating. To be relevant, files must be culled regularly, and after
some time, purged. Outdated records clearly do not meet the investigator’s needs, as com-
munity crime patterns shift to reflect social and economic change. Two developments,
though, hold promise of enhancing the investigative value of law enforcement records:
209
Copyright © 2007 Matthew Bender & Company, Inc.
Licensed to Kaplan University in Agreement with LexisNexis Anderson Publishing
210 CRIMINAL INVESTIGATION
The storage of data may be manual or electronic; its analysis will depend on the
sophistication of personnel and equipment. Modern computers facilitate the greatest
extraction of useful investigative information. Some of the possibilities include:
The first two possibilities may be achieved by the use of a modus operandi file. The
last two, partly because of a pioneering effort by university researchers and the Chicago
Police Department, are feasible to a greater degree than in the past. This will be discussed
later in the chapter.
duction of a list of suspects based on MO. Linkage also occurs when a common offender
is identified as the individual responsible for a series of crimes.
The ViCAP (Violent Criminal Apprehension Program) (see Appendix 3) was set up
by the FBI in 1985 to deal with serial murderers and other itinerant felons who commit
violent crimes. In some respects it may be seen as an extension of the MO concept to the
national level. The ViCAP program, which provides the necessary database software at
no charge to state and local agencies, concentrates on cases involving several factors,
including:
Information about cases involving the above criteria is inputted into a database and
is checked against other cases involving similar patterns or MOs. ViCAP encourages coor-
dination between agencies and allows participation between counties hundreds or
thousands of miles apart.
The John Wayne Gacy case evidenced the crucial need for a procedure that would
prevent a killer (in this case, of more than 30 adolescent boys within a three-year
period) from falling between the cracks of the criminal justice system. When reporting
the unexplained disappearances of their sons to police, some parents had voiced sus-
picions about Gacy. However, because each investigator had many other cases, and
because the data system was unequal to the task, the offender-victim connection was not
recognized. The suspect was ultimately apprehended by a department that followed up
on the investigation. Had an area-wide computer system been operational, the missing
persons thought to be victims of foul play would have been in its data bank, and the name
of one suspect (recurring in several of the cases) would have emerged sooner. Some of
the jurisdictions involved subsequently installed a computer with this capability.
Crime pattern analysis depends on the sophistication of equipment and personnel,
but any system—manual or fully automated—ultimately relies on those who design and
operate it. Curiosity, imagination, and a willingness to experiment and be objective when
appraising results are vitally needed to raise performance above the mediocre-to-ade-
quate level, which unfortunately is a hallmark. For crimes involving vehicles, the feature
an eyewitness is most likely to observe is an automobile’s color, yet many states in the
United States fail to require automobile color on license plate applications. If accom-
panied by other information about the vehicle, this detail would reduce the number of
suspected vehicles. In as much as the cost of acquiring and storing the data is negligi-
ble compared to the benefits to be derived in hit-and-run homicide investigations alone,
it is hard to fathom why this obvious step has not been universally adopted. (See Chap-
ter 22 for more on the use of computers in criminal investigation.)
A research project on burglary at the Criminal Justice Center, Sam Houston State Uni-
versity, focuses on further defining variables as a means of linking crimes and perpetrators.
The project goes a step further than more traditional analytical techniques by using modus
operandi and other pattern-based information in a relational database. Utilizing a
sophisticated statistical and linking program, it has been possible to provide investiga-
tors with more detailed information on suspects and crime patterns.
Type of Crime
As stated previously, a logical starting point in building a classification scheme for
MO would be by type of offense. Criminals, at least in the United States, usually do not
stick to one crime; they commit a variety of offenses, taking advantage of opportunities
presented. Regardless of the type of crime, such criminals often employ the same or very
similar MOs. For example, one offender ambushed his victims in apartment house hall-
ways. If the victim was male, he would commit robbery; if female, he would stuff the wash-
cloth he carried with him in her mouth, then rape and rob her. For taxonomy purposes,
the distinctive features are apartment house hallways and the use of a washcloth. Rob-
bery and rape are secondary for the purpose of MO.
Building
What type of building was involved? Was it a loft, factory, condominium, single-fam-
ily dwelling, or retail store? How was it entered? Did the burglar climb through a tran-
som or exhaust fan opening, file through bars, cut through a roof, use a celluloid strip
to slip the lock, or hide in a stairwell before closing time and then break in? These MOs
are helpful in distinguishing burglars.
Object
Sometimes the property damaged or taken, or the person attacked, will indicate
motive. It is often possible to determine whether the crime was “fingered” (i.e., it was an
“inside job” requiring private knowledge about the person or object of the crime). Expe-
rienced criminals hesitate to leave “scoring” to chance; they tend to seek assurances that
any attempt will be worth their time, and not be a poor risk. The number of people privy
to inside information being limited, this insight helps to channel investigative efforts.
Miscellaneous Idiosyncrasies
For reasons not fully understood, criminals will sometimes do something unusual,
something not related to the crime particularly, and which—like a trademark—brands
them. For example, one man intent on rape repeatedly selected a pedestrian who was
out early and ran her down with his car, apparently by accident. Then, offering to rush
her to the nearest hospital, he would proceed instead to a deserted place for the assault.
Although the MO was soon recognized, he was able to commit several more rapes in the
same fashion until enough information from the victims could be pieced together. The
alarm sent out at that point had sufficient facts to enable a patrol officer or detective to
identify his car. Without this unusual MO, the connection between the rapes and vehic-
ular accidents would not have been noted, nor would the assorted pieces of information
from each victim have been assembled and directed toward apprehending one specific
individual.
Peculiarities in MO are almost too numerous to mention. Examples include: the bur-
glar who, in addition to the customary objects of the crime (e.g., money and jewelry),
will always take food from the refrigerator; the robber who will offer the victim a ciga-
rette; and the pyromaniac who will set two fires exactly six blocks apart on the first Fri-
day of every month. Just as bizarre MOs can help to identify the criminal, so can unusual
habits of dress: for instance, wearing a black beret in a neighborhood where such
headgear is seldom seen. Again, before it is meaningful in a criminal investigation, odd
behavior or dress must be observed, reported, and placed in the file.
Many departments today utilize field interview cards (FICs) or some version of a
record of vehicle stops or interactions with the public. More recently this has been
required in connection with the collection of racial profiling data. This information can
also serve as a resource because, in most cases, the officer must explain why a stop was
made, and also provide other types of information—such as time of day, registration num-
ber of vehicle, and names of those interviewed. This information can provide a valuable
source of data for future reference if the data is recorded electronically.
Photographs
When a person is arrested for a serious crime, two bust-size photographs—one full
face, one profile—should be taken in addition to a full-length photograph, mounted on
a card or stored electronically, containing the MO, and filed according to a scheme devel-
oped to meet the needs of the particular department. To avoid viewer fatigue, the num-
ber of photographs shown to an eyewitness should be kept to a minimum. If the witness
selects one that “resembles” the criminal, it is removed and returned covertly to the next
group of photographs. If the eyewitness makes the same selection, greater reliance can
be placed on the identification.
The investigative value of geospatial analysis is only part of its usefulness in police
work. Other benefits include managerial proactive measures that can increase the pro-
ductivity of a patrol officer at the beat (or “post”) level and provide for a two-way exchange
of information between the police department and community organizations.
Figure 7.1
An appendix giving the probability of finding information in records. (From Confidential Information
Sources: Public and Private, 2nd ed. Boston: Butterworth-Heinemann, 1991. Courtesy, Butterworth-
Heinemann.)
Directories in Print takes a general approach to other likely sources of business infor-
mation and files.5 Its purpose is to supply business and industry with lists of the many direc-
tories printed in the United States by business and reference book publishers, trade
magazines, chambers of commerce, and federal, state, and city governmental agencies. Offer-
ing a means of locating the suppliers of products and services, the table of contents illus-
trates the extent of the areas and sources of information it can open up for the investigator.
It includes descriptive listings in the following categories: General Business; Specific
Industries and Lines of Business; Banking, Finance, Insurance, and Real Estate; Agricul-
ture, Resource Industries, and the Environment; Law, Military, and Government; Science,
Engineering, and Computer Science; Education; Information Sciences, Social Sciences, and
Humanities; Biography; Arts and Entertainment; Public Affairs and Social Concerns; Health
and Medicine; Religious, Ethnic, and Fraternal Affairs; Genealogical, Veterans, and Patri-
otic Affairs; Hobbies, Travel, and Leisure; and Sports and Outdoor Recreation.
Joseph Culligan, in his reference manual, You Can Find Anybody, lists a broad range
of public record sources and how to use them to locate individuals. The book provides
location and address information, and a detailed chapter on how to use the Internet to
search for information. The Encyclopedia of Associations rounds out this short list of
comprehensive volumes.6 This text may be described as a basic guide to information on
specific subjects. Unique in this respect, the associations and professional societies it
catalogs serve as “switchboards” connecting those in need of information to highly qual-
ified sources. Earlier editions were limited to national nonprofit organizations, but
later volumes have been expanded to encompass a wider variety. The encyclopedia
provides pertinent information in the following diverse areas:
The texts described above are veritable gold mines, with a scope and depth
unmatched by other compilations of recorded information. Perusing their contents
will suggest sources of which many investigators are unaware. They are indispensable
when preparing for an undercover assignment.
NOTES _______________________________________________
1 Llewelyn W. Atcherley, Modus Operandi: Criminal Investigation and Detection, rev. ed., G.C.
Vaughn, ed. (London: Her Majesty’s Stationery Office, 1937), 4.
2 Ibid.
3
Harry J. Murphy, Where’s What: Sources of Information for Federal Investigators (New York:
Quadrangle/New York Times, 1976).
4 John M. Carroll, Confidential Information Sources: Public and Private, 2nd ed. (Boston: Butter-
worth-Heinemann, 1991).
5
Gale Research, Directories in Print, 23rd ed. (Detroit: Thompson Gale, 2003).
6
Gale Research, Encyclopedia of Associations: National Organizations of the U.S., 40th ed. (Detroit:
Thompson Gale, 2003).