What are the advantages of an investigative task force

Assignment Help Management Information Sys
Reference no: EM131848837

Background

A significant criminal event may occur at any place and at any time. The size of the jurisdiction does not dictate the scope and scale of the incident. It is perfectly possible, even predictable, that investigative needs will be beyond the resources and/or sophistication of a local law enforcement agency.

In such cases, one option is to expand the resources available through multiagency collaboration and cooperation (e.g., a task force). However, regardless of who or how many investigative resources are brought to bear on an incident, the parent agency remains responsible for the successful outcome of the criminal investigation.

Project Setting

Acting as a subject matter expert on criminal investigation, you have been asked to assist in the creation of a simulation exercise of a multijurisdictional criminal investigation. Some of the preliminary work has already been completed. Your specific task is to compile the post investigation review document (rubric) to be used by exercise assessors in their evaluation of the quality of the criminal investigation. This is what you know:

A series of 11 random explosions have occurred in an area that traverses two states, and a total of seven counties (five counties in one state and two counties in the other state), embracing a total of nine cities and incorporated towns. The explosions resulted in five deaths, 32 injuries, and significant property damage.

In each case, the explosion was detonated remotely. The lead investigative agency is the Virtual, Maryland, Police Department, because the first three explosions occurred within its jurisdiction. VPD has about 100 sworn personnel, including 17 all-purpose detective investigators. It has a certified forensic laboratory for rudimentary analysis, staffed by credentialed civilians.

Ultimately, two suspects were identified and apprehended, one adult male and one teenage (minor) male. Statements were made by each, resulting in investigative searches and seizures of forensic evidence. Both subjects eventually confessed to their respective and collective parts in the crimes.

Assessors in the simulation exercise will be debriefing the role players as to their actions; their understanding of the legal basis, purpose, and advantages and disadvantages of their investigative strategies; and the conduct of the investigation. The assessors have already come up with a series of questions for the participants. You have been asked to provide the "model" answer against which the responses of the participants will be graded.

Following are the questions to be posed by the simulation exercise assessors to the investigators:

Investigative Task Force

Assuming that legal authority was not an issue, should this investigation be conducted by VPD personnel or a multijurisdictional task force?

At what point should the potential of establishing an investigative task force be considered?

What are the advantages and disadvantages of an investigative task force?

Who, or what entities, should be involved in the decision to create an investigative task force?

Assuming, on balance, that you favor a task force approach, what difficulties do you foresee, and how will each be addressed?

What demands and/or concessions should VPD exercise in order to employ a cooperative task force in this particular case?

Legal Issues

1. What legal issues should be considered when embarking on a task force investigative strategy?

2. How are each of these issues resolved?

3. Forensic Evidence Collection and Analysis

Without regard to individual items of forensic evidence, describe the steps necessary to ensure that items, materials, and samples are eligible as forensic evidence in a criminal proceeding.Why?

In what ways do the evidence collection procedures differ at the scenes of the explosions versus the residences of each of the suspects?

4. Testimonial Evidence

1. Describe the steps necessary to ensure that verbal or written communications from each of the suspects are eligible as testimonial evidence in a criminal proceeding.

2. Describe the direct and indirect consequences if the testimonial evidence is deemed inadmissible by the trial court.

5. Public Information

As the investigation proceeds, in general terms, what information is or is not available to

non-VPD members of the task force?

other law enforcement agencies?

family members of the deceased and injured victims?

credentialed news reporters?

community members?

Who should be the point of contact for investigative information, and how should that designation be decided?

Project Assignment

You will compose a comprehensive "model" response for each of the questions posed by the simulation exercise assessors.

Note: This project submission is enhanced by outside resources that support the appropriateness of the model responses.

Creditable resources and citations (or lack thereof) will be graded accordingly.

Grading for this project will be based on

the comprehensiveness of the model responses

your description of reasons and rationales for the responses provided

your general understanding of cooperation and collaboration in conducting criminal investigations

the clarity and efficiency of your writing

Review of this project will help the instructor determine your ability to

communicate effectively across a wide variety of stakeholders

apply sound knowledge of administration, leadership, and organizational principles to a law enforcement agency

use interpersonal and leadership skills to work both independently and cooperatively as a member of a criminal justice team

Format Requirements

Paper should be a minimum of 2,500 words or about ten pages

Double space

12 pt. font

1" margins

Use APA citations for all sources

Include reference page using APA format guidelines (not included in word count)

Reference no: EM131848837

Questions Cloud

What point does the character of faith-motivated activism : To religious extremists, it is "God's law" that has been revealed to-and properly interpreted by-the extremist movement.
What factors determine the beta of a stock : What factors determine the beta of a stock? Define and describe each. How is beta used in the Capital Asset Pricing Model?
Mutually exclusive projects-payback period for projects : Consider the following two mutually exclusive projects. The payback period for Projects A and B is and years, respectively.
Different stock exchanges in the united states : Please identify two different stock exchanges in the United States. Describe the similarities and differences between the two stock exchanges.
What are the advantages of an investigative task force : Assuming that legal authority was not an issue, should this investigation be conducted by VPD personnel or a multijurisdictional task force?
Discuss the role and responsibilities of senior leadership : UCBS7040 Information Management Assessment - Conduct a literature review that critically discusses the concepts of Information Governance
Identify and describe the organized crime groups close : Identify and describe the organized crime groups most closely associated with prostitution, gambling, and drug crimes in urban areas.
Calculate the finance charge on this loan : Calculate the finance charge on this loan, assuming that the only component of the finance charge is interest.
Explain what specialized or alternative courts are : Discuss the current changes in victim rights laws. What rights do victim's have, how do specialized courts affect victims, if at all?

Reviews

Write a Review

Management Information Sys Questions & Answers

  What media messages have influence your perceptions of other

Consider the influence of this media on perceptions and communication. What media messages have influenced your perceptions of others?

  Identify a particular area of criminal justice

Define the area's boundaries by explaining the methodologies and statistical techniques used.

  Proposed system integration components architecture

Discuss which components and interfaces could be acquired and those that need to be developed from scratch.

  What are some security concerns when using mobile code

Explain the following terms: boot sector virus, meme virus, stealth virus, multipartite, macro virus, script virus, and tunneling virus

  Online professors response to marketing managementdiscuss

online professors response to marketing managementdiscuss the strengths and weaknesses of personal selling and describe

  Discussion of the prevention of cyber-attacks

Discussion of encryption techniques that can be used for the wireless network and the selection and justification of a proper technique for this facility and Discussion of the prevention of cyber-attacks and the proper maintenance needed to achieve..

  Describe googles adword and adsense services

Explain Google's AdWord and AdSense services and describe how each benefits a firm considering online advertising with Google.

  List the different components of the new system

ICT700 System Analysis and Design Task Assignment. List the different components of the new system and how you will deploy the system

  Review the privacy concerns scenario

Review the Privacy Concerns Scenario. Be sure to include the U.S. law that supports your position for each scenario.

  How specifically the group would update the given topics

Explanation of what topics need to be updated in the guidebook. Explanation of how specifically the group would update those topics?

  Discuss about the health care using information technology

Discuss about the Health care using Information Technology.

  Find an article on the internet outline a security breach

Find an article on the Internet outline a security breach or cyberattack. Provide a link to the article and suggest a control that would mitigate against that attack. Clearly explain why that control would be an effective mitigation strategy.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd