You are on page 1of 21

LESSON TIMETABLE

MODULE : Investigation of Crimes Against Person/Property


SUBJECT : Crimes Against Property
DURATION : Eight (8) Hours

Duration Learning Outcomes Contents/Topics Strategy Assessment


/ Tasks (ATs)
Teaching
Learning
Activities
(TLAs)
8:00 – 8:30 INTRODUCTION
After the 30-minute preparation Lecture Recitation
(30 minutes) and introduction, the students  Prayer
will be able to:  Checking of Attendance Small Student
• Say a prayer  Clarification of Personal group Participation
Learning / Importance of discussion
• Sign in the attendance sheet Lesson Material
 Accomplish the clarification of  Overview of Crimes against
personal learning sheet Property
 Give an overview of the  Definition of important and
general knowledge about related terms
Crimes against Property
 Provide clear definitions of the
terminologies used in the
investigations of Crimes
against Property
8:31 – 10:00 PRESENTATION
Given a 90-minute Lecture Student
(1.5 hours) lecture/presentation, the  Robbery Investigation Participation
students will be able to: o Preliminary Investigation Discussion
 Define important terms in o Hostage Robberies
crimes against person Guidelines Small Graded
o Types of Robbery Group Recitation
 Provide details of the different o Typologies of Robbers Discussion
types of robbery and their o Investigative Procedure and
implications Presentati
on
 Expound on the correct
investigative procedures of
robbery
10:01 – 12:00 PRESENTATION
(2 hours) Given a 2 hour lecture/ Student
presentation, the students will  Burglary (Theft) Investigation Lecture / Participation
be able to: o Points of Entry Discussion
o Simulated Burglaries
 Identify the appropriate o Detailed Examination of the Graded
investigative procedures of Scene Recitation
Theft

 Discuss the detailed


examination of the scene of
burglary


12:01 – 1:00 LUNCH BREAK
1:01 – 5:00 Given a 4-hour practical PRESENTATION
(4 hours) application, the students must  Carnapping Lecture / Student
have: o Elements Discussion Participation
 Describe the different o Motivations for Motor
elements of carnapping Vehicle Theft
 Discuss surrounding concerns o Investigative Traffic Stop:
in an incident of carnapping Graded
Recognizing the Stolen
Recitation
vehicle
o Carnapping “Modus
Operandi”
o The Tools of the Trade or

National Forensic Science Training Institute 1 |S L P


of Motor Vehicle Theft

LESSON PLAN

COURSE : Public Safety Investigation and Detection Course (CRIDEC)

MODULE : Crimes Against Persons/Property

SUBJECT : Crimes Against Property

DURATION : Eight (8) Hours

LEARNING OUTCOMES :

At the end of the lesson, the students will be able to:

 Define important terms in crimes against person


 Provide details of the different types of robbery and their implications
 Expound on the correct investigative procedures of robbery
 Identify the appropriate investigative procedures of Theft
 Discuss the detailed examination of the scene of burglary
 Describe the different elements of carnapping
 Discuss surrounding concerns in an incident of carnapping

LEARNING AIDS :

 Multi-Media (Projector, Projector Screen, Speaker and Laptop Computer with


Accessories)
 Lapel Microphone (if necessary)
 Activity Sheet

REFERENCES/ TOOLS :

 CRIDEC Module III – Volume 1: Intelligence, Investigation and Detection


Operations
 2011 PNP Criminal Investigation Manual

I. INTRODUCTION

 Emphasize the Importance of Lesson Material


 Give an overview about Crimes Against Property.
 Define important and related terms.

II. PRESENTATION

 Discuss thoroughly the following topics; give specific examples to establish


complete knowledge and encourage student participation.

 Robbery Investigation
 Preliminary Investigation
 Hostage Robberies Guidelines
 Types of Robbery
 Typologies of Robbers
 Investigative Procedure

National Forensic Science Training Institute 2 |S L P


 Burglary (Theft) Investigation
 Points of Entry
 Simulated Burglaries
 Detailed Examination of the Scene
 Carnapping
 Elements
 Motivations for Motor Vehicle Theft
 Investigative Traffice Stop: Recognizing the Stolen vehicle
 Carnapping “Modus Operandi”
 The Tools of the Trade or of Motor Vehicle Theft
 Give examples of situations under the crimes of property
 Summarize the lesson and give emphasis on important details.

III. TEST
 Using the knowledge and comprehension learned during the Presentation and
Application phases of the lesson, answer the test provided.

National Forensic Science Training Institute 3 |S L P


CLARIFICATIONS OF PERSONAL LEARNING

Guide Questions

1. What do I want to learn from this subject? (List several goals)

2. What hopes and expectations do I have about this subject?

3. What anxieties or confusions do I have about this subject?

National Forensic Science Training Institute 4 |S L P


LESSON MANUSCRIPT

CRIMES AGAINST PROPERTY

It is a term used to refer to any crime that unlawfully deprives an owner of his property.

ROBBERY
Robbery is taking or attempting to take anything of value from the care, custody, or
control of a person or persons by force or threat of force or violence and/or by putting the
victim in fear. Robbery is a particularly frightening type of theft in that it occurs in the victim’s
presence. The victim, who usually is the owner or person having custody of the property, is
directly confronted by the perpetrator and is threatened by the element of force or threat of
force. If no force or threat of force is used, as in purse snatching, the offense becomes a theft
rather than a robbery.

In the investigation of robberies, a classifying system based on the degree of threatened


or applied forge should be used. Robbery is divided into the following categories: (1) Firearm,
(2) knife or cutting instrument, (3) other dangerous weapon, and (4) strong-arm (hands, fists,
feet, etc). Examples of armed robbery are incidents commonly referred to as “stick-ups,” “hold-
up,” hijackings,” and “heists.” Robberies in which no weapons are used are classified as
“strong-arms,” “muggings,” or “muscle jobs.” Law enforcement officers should guard against
using terminology such as “robbery of an apartment” or “safe robbery,” in as much as those
“robberies” are actually burglaries.

In any robbery, investigators should count one offense for each distinct operation. The
number of persons robbed or present, or the number of persons committing the crime, has
nothing to do with the number of offenses. For example, two males with guns appeared in a
tavern and ordered ten patrons and the owner to hand over their cash. After obtaining the loot,
the suspects fled. This counts as one offense.

Most police officers assigned to a “robbery in progress” or a “robbery just occurred” call,
feel a twinge of excitement. Why? Because robbery is regarded as major crime and a robbery
suspect is associated with weapon, usually a gun. When the officers arrive at the scene and find
that the suspect has fled, they generally experience a feeling of disappointment. This feeling
may result in a substandard preliminary investigation.

However, the preliminary investigation is the foundation for the follow-up investigation.
It is extremely important for the police officer to remember that the importance of the
preliminary investigation is not minimized by the escape of the suspect. After obtaining the
necessary information and initiating a crime broadcast, they should begin the investigation.

When conducting any investigation, officers should think positively and use initiative.
Each robbery is different to some degree, so the modus operandi will vary. An attempt should
be made to identify and locate the suspect and gather or preserve all physical evidence.

At the Crime Scene


The responding officers should begin by interviewing all victims and witnesses at the
crime scene to ascertain exactly how the robbery occurred. With a thorough understanding of
the crime and how it “went down,” officers will be better equipped to search for physical
evidence.

Latent Prints
Latent prints are often present yet are frequently overlooked or disregarded. If the
suspect touched any object (e.g a shopping cart or merchandise) and may have left prints, the
print specialist should be called. (If the responding officers are trained in lifting prints, they
should do so.) Precautions should be taken to avoid contaminating evidence by handling them,

National Forensic Science Training Institute 5 |S L P


but if a victim or witness has handled any item, its value should not be disregarded on that
basis alone. All that is needed in court is one good print, and there may still be a chance that
the suspect’s print can be lifted. If a note was used by the suspect, prints can be obtained from
it. It should be handled carefully, however.

Items to be “dusted” should be isolated. The officer should think before moving an item
or touching a surface, and others should be cautioned that the items are being held for prints.
Once it has been determined which items or surfaces are to be checked, the scene should be
methodically checked for other physical evidence.

Other Evidence
Frequently victims and/or witnesses are bound with either adhesive tape or rope. If
these items were brought to the scene by the suspect, they can be linked to other crimes
committed by the same suspect. The tape can be matched with the roll from which it was
taken, and if the tape was torn off, the pieces can be matched together. This can link the tape
found at the scene to a roll of tape found on suspect’s person or in his or her residence at the
time of arrest. Rope can be traced back in a similar way. If possible, the tape or rope should be
preserved in the condition in which they were found.

It is important to avoid missing important pieces of evidence by rushing or hurrying. The


investigator must be thorough and must not limit the scope of the search to the immediate
crime scene. Frequently the suspect will flee on foot down an alley or side street and discard or
inadvertently drop some item of evidence (e.g. a mask, gloves, or a money bag).

A careful check of the suspect’s probable avenue of escape will often prove fruitful. In
responding to the call, the officer can approach the location by this route and thus increase the
possibility of apprehending the suspect. It should be noted that most suspects have a vehicle
close by to facilitate escape, and a knowledge of the cars that are normally in the area may
help identify the suspect’s vehicle.

Any item that might have evidentiary value should be booked. Officers should record
exactly where the item was found. If it was given to the officers by someone else, they should
record that individual’s name and other information.

The best evidence is the original documents. If a witness comes forward with a piece of
paper with the suspect’s vehicle license number on it, that piece of paper should be booked and
the witness should be prepared to appear in court.

INTERVIEWS

Each interview should begin with the officer knowing exactly who it is that is being
interviewed. Officers should attempt to interview each victim and witness separately. Their
names, addresses, and telephone numbers should be recorded. It should be remembered that
the victim or witness may be nervous or excited and may overlook important facts. Questions
should be asked only for the purpose of obtaining information. This will eliminate idle
conversion, which is needless and time-consuming. The interview should be conducted without
“leading” the witness or suggesting possible facts.

There may be victims or witnesses at the scene who for one reason or another are
reluctant to step forward. The responding officers should circulate among them and talk to
them, asking them whether they saw the crime or know anything about it. This will frequently
produce witnesses who otherwise would have been overlooked.

The Suspect Modus Operandi

The suspect’s MO should be fully detailed in the narrative portion of the crime report.
This must include the chronological order of the events that took place during the crime. If the
suspect shopped in the establishment prior to the robbery, record that fact. If the suspect
purchased a pack of cigarettes, the brand purchased should be recorded. Anything the suspect

National Forensic Science Training Institute 6 |S L P


said to the victim while committing the robbery must be recorded verbatim. The suspect may
be inarticulate or use slang or four-letter words. This is part of his other MO and should be
documented.

After completing the report, the officer must make sure the victim reads it thoroughly. If
the victim’s court testimony does not coincide with the report, it may be discredited.

Miranda Warnings
The “Miranda warnings” administered to a suspect can be of great significance in a
robbery investigation. Generally, officers are not sure when to give the suspect these warnings.
Each situation must be evaluated on its own merits, but the following guidelines may prove
helpful:
a. Do not administer the warnings if there is no intention to question a suspect. Any
statements the suspect makes spontaneously and voluntarily are admissible in court
and should be recorded in the appropriate report.
b. If the person in custody is the suspect, it generally is best not to give him or her the
Miranda warnings. Should the suspect refuse to waive any rights, follow-up
investigation cannot interrogate him or her unless the suspect initiates the
conversation.
c. Admonishment becomes necessary when the investigation reaches the accusatory
stage. Once the questioning leads the investigator to believe that this suspect
committed the act, questing must cease until the Miranda warnings have been
administered.
d. Officers should not become creatures of habit and instantly advise persons taken
into custody of their rights. Think. Will the investigators wish to talk to the suspect?
Is the questioning urgent?
e. Equally important as the timely administering of Miranda warnings is the fashion in
which the suspect waives or acknowledges these rights. This information should
appear in the report.

FIELD SHOW-UPS
A field-show-up is an approved tactic wherein an officer who has a possible suspect in
custody of a recent crime shows the suspect to the victim or witness for the purpose of
eliminating that possible suspect in furtherance of the investigation. Field show-ups are an
excellent tool. However, if they are used incorrectly a good case may be lost in court. Generally,
a field show-up should be conducted to eliminate an innocent person as a possible suspect, but
such case must be decided according to the circumstances.

In 1967 the U.S. Supreme Court indicated that field show-ups tend to be “unnecessarily
suggestive” with respect to the suspect. Usually the suspect, handcuffed, is seated in the rear
seat of a police vehicle. This may influence the victim or witness(es). Officers must make every
effort to offset the possibility of an “unnecessarily suggestive” course of action. When a possible
is brought back to the scene, what is said to the victim or witness is very important. We
suggest the following statement:
Merely because this person is in the police vehicle does not men that this is the person
who committed the crime, and the fact that this individual is in police custody should not
influence your decision. This field confrontation is necessary to eliminate a possible suspect so
that the investigation of the offense may proceed accordingly.

Field show-ups should be used sparingly and only when the situation warrants such
action. If there is enough probable cause to justify a legal arrest, the field show-up should be
eliminated. If the officer knows that the perpetrator is in custody (e.g., the suspect has the
money in a bag marked with the victim’s name or business), a field show-up is necessary and
undesirable. Obviously, it would be difficult to convince a court that the field show-up was
conducted to eliminate the suspect from consideration.

HOSTAGE ROBBERIES

Initial steps

National Forensic Science Training Institute 7 |S L P


Occasionally a robbery suspect takes an innocent bystander or employee as a hostage in
order to effect his or her escape, thus complicating the preliminary investigation. This is the
type of situation most officers associate with the words robbery and hostage. In a hostage
robbery, the kidnap or detention of a hostage is premeditated and precedes the robbery
attempt. The robbery is usually initiated when a suspect telephones a close relative of the
hostage and demands money for the safe return of the hostage. For example, a male suspect
telephones a market manager and states that he is holding the manager’s wife hostage. The
manager is instructed to take money from the safe and deliver it to a particular location (drop
spot) within a certain time or his wife will be killed.

When the police are notified of this type of robbery, the purported kidnap of a hostage
has occurred but the robbery usually has not been completed. Officers should keep in mind the
fact that in a “hostage robbery” time is initially on the side of the suspect. There is a limited
amount of time in which to verify information, make decisions, and react. During normal
daytime working hours a hostage robbery may be investigated by special investigators,
depending on the agency. It is also possible that uniformed field officers may receive the initial
notification and handle the situation throughout. For these reasons, and since time is an
important factor, it is necessary for all officers to be aware of the procedures to be followed in
such a case.

Guidelines
The following guidelines should be followed by the officers who receive the initial notification of
a hostage robbery:
The victim or reporting person should be kept on the telephone to report additional
information and receive instructions. It is not necessary to obtain complete details of the crime
before initiating action. Certain notifications can be made to get officers en route to various
locations; additional information ca be relayed later. After initiating police action, the officer
should instruct the victim to record the serial numbers of the bills (or “bait money”) to be taken
to the drop spot. The victim should also be told to stall as long as possible. If a helicopter is
available, it should cover the business location and observe the drop spot. Investigators should
provide necessary details, including the drop spot location and a full description of the victim’s
clothing and/or vehicle. If two air units are available, one should cover the victim’s residence.

The business, drop spot, and victim’s residence should be covered by non-uniformed
officers with unmarked vehicles.

The victim should telephone his or her residence in an attempt to verify that the family
member is being held hostage. If it is necessary for officers to make an appearance at the
residence, they should be disguised (salesman, delivery man, gas man, etc.)

When approaching the locations involved, investigators must be aware of possible


suspects sitting in vehicles, standing in telephone booths, and so forth.

If the location of the suspects with the hostage is discovered, the following policy is
recommended:
Managers of major markets and banks should be notified of suggested procedures to be
followed during hostage robberies. This may save time and improve coordination between these
individuals and the police. Officers should keep in mind the fact that a hostage robbery can use
any type of business as a victim. It is important to think over the situation and act with caution.
The safety of the victim and members of his or her family is the primary concern.

Types of Robbery
Attempts have been made to classify and explain the character and dynamics of
robbery. In a study conducted in London, McClintock and Gibson (1961) found that robbery
follows one of vie patters:
1. Robbery of persons employed in position placing them in charge of money or goods.
Examples are robberies of banks, stores, offices, jewelry stores, or other sites where
money changes hands. The instance of these types of robberies has increased in recent

National Forensic Science Training Institute 8 |S L P


years. For example, between 1985 and 1990, robberies of convenience stores increased
by 28%, bank robbery by 23% and commercial robbery by 23%.
2. Robbery in open areas. These include muggings, street robberies, and purse snatchings.
Crimes of this nature constitute an estimated 60% of robberies in urban areas. On a
national scale, street robberies have increased 18% between 1987and 1991.
3. Robbery on private premises. This represents crimes in which robbers break into homes
and rob the residents. The FBI reports that this type of incident represents about 10%
of all robberies.
4. Robber after preliminary association of some duration between the victim and offender.
These are considerable less common than stranger-to-stranger robberies which account
for an estimated 75% of that total.

In accordance with the preceding typologies, the following examples of common


robberies should be considered. Notice the addition of crimes such as school and vehicle
robberies.

COMMERCIAL ROBBERIES: STORES AND BANKS

The commercial robbery typically occurs at the end of the work week and during the
evening and very early morning hours. Typical targets of the commercial robber are stores and
business located close to major thoroughfares such as main streets, highways, and interstates.
Such locations offer the offender a quick and easy means of escape. In addition, stores
employing only one or two employees make prime targets for the bandit.

Typical targets of the commercial robber are stores and business located close to major
thoroughfares.

Because many robberies are committed by persons with criminal records, their MO can
sometimes be established easily. Once identified, it can be compared with other robberies with
similar most to identify a suspect.

The most common method of bank robbery is a threat with a visible firearm, most
typically a handgun. Most of the remaining robberies are perpetrated with the use of a demand
note passed to the teller. In this case the note can be a valuable piece of evidence if the robber
fails to ask for its return. In addition, in the majority of bank robberies, the perpetrator acts
alone in the facility but accomplices may be awaiting in an escape vehicle outside. At times,
lookouts are also employed to spot police cruiser.

One of the best tracing clues in a robbery is the vehicle used in the escape. Such clues
will vary from one offense to another. For example, the professional robber’s getaway vehicle
may be rented or stolen and may have stolen license plates. This will enable the suspects to
ditch the vehicle or the plates after they have left the area of the robbery. Conversely, the
amateur robber will often use his or her own vehicle. One reason why bank robberies have
increased drastically in recent years is due to an increase in the number of branch banks, which
tend to be located in such a way as to be highly vulnerable to robbers.

The most common type of robbery is one committed on public streets and alleyways.
Most street robberies (also called muggings) are committed with a weapon, typically a
handgun, usually take place at night, and both the robber and victim are usually on foot.
Suspects in street robberies are apt to be teenagers, usually young males. The unarmed street
robbery is also common in many cities. In this case, the victim is approached by two or more
attackers who, through their numbers, intimidate the victim, reducing their willingness to resist.
Those who are most likely to become victims of the street “mugger” are the elderly and those
who are drunk in public. Both categories of victims pose no immediate threat to the robber, are
slow to react, and will probably not offer resistance.
The unarmed robber relies on opportunity rather than a strategic plan in selecting
victim. The most likely victim is one who walks alone on a secluded street after dark.

National Forensic Science Training Institute 9 |S L P


The residential robber is one of the most terrifying of types, as an armed
intruder breaks into the home and holds residents at gun or knifepoint. Often, this crime begin
as burglaries but “convert” to robberies after the intruder discovers that there is someone home
and chooses to use violence as a means of completing the theft. One common type of
residential robbery is when someone who has a right to be in the house, such as an invited
guest, commits the crime.

ROBBERIES IN SCHOOLS

The National Institute of Justice concluded that an estimated 3.2% of noncommercial


robberies occur in schools every year. This averages out to be an estimated 1 million school-
related robberies annually. Accordingly, the victimization rate for youths age 12 to 19 is about
1% per year.

School robberies fail to meet the stereotypic type of robbery in that they are not
stickups or muggings but for the most part are instances of petty extortion or “shakedowns” of
students (and teachers alike). Ironically, few of these robberies have resulted in property loss.

Typologies of robbers

Conklin(1972) developed another well-known typology of robbers rather than focusing


on the nature of robbery incidents, Conkling organized robbers into the following types:
1. Professional robber. The professional robber is characterized as having a long-term
commitment to crime as a source of livelihood, planning and organizing crimes before
committing them, and pursuing money to support a particular lifestyle. Professionals
may be robbers exclusively or may be involved in other types of crimes as well. The
professional robber recognizes robbery as a type of crime that is quick, direct, and
profitable. The “pro” might typically effect three or four “big scores” a year to support
himself, all well planned and while sometimes working in groups with specifically
assigned tasks for all group members.
2. Opportunist. The opportunist will steal to obtain small amounts of money when he or
she identifies what seems to be a vulnerable target. Examples of opportunist targets are
cab drivers, drunks, and the elderly. The opportunist is typically a younger perpetrator
who does not plan the crime well (e.g. use of weapons, getaway car, etc.). typically,
they operate in the environment of a juvenile gang.
3. Drug addict robber. The drug addict robber robs to support his or her drug habit. Unlike
the professional, he or she has a low commitment to robber because it supplies much-
need funds. Although the addict is less likely to use a weapon, he or she is more
cautious than the opportunist. When desperate for funds, however, he or she will be
less careful in selecting victims and carrying out the crime.
4. Alcoholic robber. Excessive consumption of alcohol may cause some persons to enter
into robbery as a criminal alternative. Alcoholic robbers plan their crimes randomly and
give little consideration to victim selection, escape or circumstances under which the
crime will be committed.

The First Officer on the Scene

After receiving the radio call, the first officer’s initial responsibility is to arrive at the
scene as quickly and safely as possible. Of the two, safety should be emphasized more so than
swiftness to the scene. The decision to use emergency equipment such as emergency lights and
siren is a judgment call for the officer and may depend on several considerations. Factors
influencing the decision to use emergency equipment include:
 Distance to be traveled to the crime scene
 Amount of traffic
 Inability to clear traffic
 Need to halt assault on the victim
Next, the officer should summon assistance and be prepared to wait for back-up before
attempting to enter the robbery location. When approaching the scene, be on the lookout for

National Forensic Science Training Institute 10 | S L P


fleeing subjects or persons sitting in parked cars. These might be accomplices or lookouts
working with the robber.

Police vehicles should summon assistance and be prepared to wait for back-up before
attempting to enter the robbery location. After removing the keys from the patrol car, the
officer should take a shotgun and approach the location cautiously on foot. The first officer on
the scene should cover the most likely exit from the robbery location. After assessing the
situation, it is his or her job to direct other responding officers to cover other escape routes. If
possible, a determination should be made as to whether or not the robbery is still in progress
before any officers enter the building.

If the robbery is still in progress, entry into the structure should not be authorized. It is
likely that robbers might exit the structure on their own, especially if they are unaware that the
police are at the location. If the suspect sees the police, the officer should, make every attempt
to convince him to surrender.

If it cannot be determined whether or not the crime is still in progress, officers covering
the front should enter together. Under no circumstances, however, should the first arriving
officer enter the location without assistance. Once on the scene, the suspect should be
apprehended if possible. First aid should then be rendered if victims have been injured. Finally,
witnesses should be located and questioned.

The Preliminary Investigation

When responding to calls in which the robbers have already left the scene, officers must
prioritize the care of any injured parties. In addition, they keep in mind that the robbery scene
is a crime scene where valuable evidence may be present. Therefore, possible locations of
fingerprints and other evidence should be protected. Next, witnesses should be located, and
statements should be taken regarding the description of the suspects and their vehicles so that
a “flash” description can be broadcasted.

The robbery is still in progress, entry into the structure should not be authorized. It is
likely that robbers might exit the structure on their own, especially if they are unaware that the
police are at the location. If the suspect sees the police, the officer should make every attempt
to convince him to surrender.

If it cannot be determined whether or not the crime is still in progress, officers covering
the front should enter together. Under no circumstances, however, should the first arriving
officer enter the location without assistance. Once on the scene, the suspect should be
apprehended if possible. First aid should then be rendered if victims have been injured. Finally,
witnesses should be located and questioned.

The robbery scene is a crime scene where valuable evidence may be present. Therefore,
possible locations of fingerprints and other evidence should be protected.

When obtaining description information from witnesses, officers should first separate
them to minimize discussion about the robbery and provide them with separate suspect
description sheets. It is important during this stage of the investigation to get description while
the witness’ recollection of the crime is still fresh. Officers should remember that although
speed is crucial at this stage of the preliminary investigation, so is accuracy. A second broadcast
is also required after further questioning of the witnesses is conducted. The purpose is to
correct any errors broadcast in the original transmission and to provide district officers with
additional details.

The Method of Operation in Robbery


Studies have shown that many people who commit the crime of robbery are repeat
offenders or recidivists. Therefore, it is important to document the techniques and methods of
operations. (MO) used by the suspect. The MO focuses on the behavior of the criminal during
the commission of the crime. For example, the location of the robbery, such as bank or

National Forensic Science Training Institute 11 | S L P


convenience store, may identify certain groups of suspects. Other factors include the type of
weapon used, the dress of the robber(s), and the amount of money, merchandise, drugs, and
so on, taken.

In addition to the age, sex, height, and race of the suspect, it is important to document their
specific behavior during crime. Such behavior might indicate nervousness(or calmness) or could
indicate that the person was under the influence of drugs at the time of commission of the
crime.
 Typical MO Information for Robbery:
 Type of location robbed
 Time and day of week
 Type of weapon used
 Use or threatened use of force
 Verbal statements made
 Vehicle used
 Object(s) stolen
 Number of suspects
 Use of disguises
 Other peculiarities

The treatment of the victim(s) could also have a bearing on the investigation. For example, was
violence used? If so, what were the damages? Was the victim kicked, beaten, shot, or struck
with weapon? Other actions might also be significant, such as:

 Did the suspect cut the telephone wires?


 Were the victims locked up?
 Were the victims tied up or gagged?

Investigators should remember that because of a lack of abundant physical evidence, robbery
scenes may suggest other types of evidence. Most in connection with any available physical
evidence may help identify the perpetrator and ultimately prove the case.

Physical Evidence
The crime scene should be processed as soon as possible after physical evidence has been
identified. Evidence in robberies may take several forms, including fingerprints, binding
material, and fired cartridges.

The value of fingerprints at the robbery crime scene is immense, so it is essential to conduct a
thorough search of all surfaces in near the scene that the robbers might have touched. These
surfaces include countertops, doors and door handles, cash registers and computers, and any
furniture encountered by the suspects. In particular if the robbers handled any paper
products(e.g. notes to a bank letters), such surfaces are particularly good for preserving latent
prints and should be protected and processed.

 Physical Evidence in Robberies


 Blood(if applicable)
 Fingerprints
 Notes from the robber
 Binding material
 Fired cartridges

Binding material, if located, can include strips of tape, such as duct or masking tape, cloth
strips, wire, rope, or any material used to incapacitate the victim. In the event that rope is used
as restraining device, care should be taken not to destroy any knots. These can be used to link
the suspect with any specialized technique of typing tying knots. Such items can be used as
comparison items in the event that similar material is later found in the possession of the
suspects.

National Forensic Science Training Institute 12 | S L P


Shell casings or cartridges may also provide important evidence of the robbery. Such items may
bear latent prints of the perpetrators or in identifying the type of weapon used for the crime. In
fact, rifling (impressions) on the sides of the casings might even be used in linking a specific
gun with the crime.

In the case of bank robberies, some banks might use bait money to aid in the capture of the
robbery suspect. When used, bait money is placed in a specially designated bin in the teller’s
cash drawer. This cash has had its serial numbers prerecorded in the event that the cash is
later found in a suspect’s possession. In other cases, bait money, when removed from the
drawer, will set off a silent alarm notifying local police that a robbery is in progress.

The Role of Witnesses


Because of the violent nature of the crime of robbery and the imminent threat of injury,
witnesses are not likely to remember any specific details of the crime. It is important, however,
that officers attempt to gather as much information as possible from any witnesses.
It is vital that each witness be separated so that their individual perceptions of what happened
won’t influence other witnesses. Experience has shown that an exchange of dialogue between
witnesses might unconsciously alter the way in which some witnesses “recall” the event. Once
separated, interviews should be conducted regarding both the event and details about the
robber(s).

People at the scene of the robbery will be afraid, confused, and even angry. Because of the
emotionally charged environment, officers should expect to receive somewhat different
interpretations of what occurred from the witnesses, as no two people will perceive a situation
exactly the same way. In fact, if the stories are, too similar, the investigator should question
truthfulness of the witness’s story. The details regarding perpetrators should be as specific as
possible. Information should be sought regarding specifics, such as scars, tattoos, jewelry worn,
or other particulars about the suspects. Leading questions asked by the investigator might help
draw out these details. Leading questions include:
 What did you notice most about their appearance?
 What were the most noticeable features about the robber’s face?
 Was there anything unique or unusual about the robber’s manner of speech?

Such questions encourage witnesses to stop and think about specific details regarding the
crime.

Burglary Investigation

Burglary is one of the most commonly encountered crimes investigated by the police. Because
the nature of the crime is so varied it is difficult to set down specific guidelines for its
investigation. Many of the techniques and procedures outlined in earlier chapters of the text are
pertinent to the burglary investigation. This chapter discusses some of the aspects of crime
scene investigation that deal more specifically with the crime of burglary. The first officer to
arrive at the burglary scene must be concerned with the suspect’s location. In cases where the
burglary is in progress, where the officer was called because of the presence of a prowler, silent
alarm, or a ringing burglar alarm, the first consideration must be to apprehend the suspect.
Once the suspect has been located or a determination has been made that the suspect is not at
the scene, the location must be secured. Witnesses should next be located and separated for
interviewing at a later time.

The crime scene search should commence. The officer conducting the crime scene investigation
of a burglary should understand that most experienced burglars attempt to leave behind only a
minimum amount of evidence at the location. The officer should also remember that it is
impossible for the suspect not to change the crime scene in some small way by leaving the
scene. The behind or by picking up small items of evidence when leaving the scene. The officer
must therefore collect evidence left behind by the suspect, e.g., fingerprints, shoe prints, tool
marks, etc., an evidence from the suspect that may have been removed from the scene, e.g.,
glass fragments, paint chips, wooden splinters, etc. the investigator should also be aware of the
modus operandi, or M.O., of the burglar. Frequently, a suspect may be responsible for a large

National Forensic Science Training Institute 13 | S L P


number of burglaries in an area and similarities in the cases may enable the investigator to
concentrate on one, rather than a number of suspects. Thus in some instances, it may be useful
to examine the tool marks left at different crime scenes in order to determine whether the same
tool was used.

CARNAPPING

Elements of the Crime

Most state laws dealing with auto theft address the act of unauthorized used rather than actual
“theft” of the vehicle. The elements are typically as follows:

Elements of Auto Theft

A person commits the act of auto theft if he or she

 Intentionally acquires, drives, or


 Transports a motor vehicle
 Without the consent of the lawful owner.

Motivations of Motor Vehicle Theft

Several motives have been identified that help investigators understand the causes for the
crime. Motivations include:

 Joy riding;
 Theft for resale;
 Transportation for other crimes
 Stripping and chop-shop operations

Understanding the criminal motive gives the investigator a handle on how to anticipate the
instances of crime as well as how to prevent such activity.

Joy Riding

It has been ranked as the premier criminal motivation for motor vehicle theft, committed
primarily by juvenile offenders since the mid-1970s, however, the average age of the auto theft
criminal has risen steadily. While typically in the company of friends, the juvenile auto thief
steals a car for enjoyment for short periods. When the ride is over, the vehicle is sometimes
stripped of certain “resalable” items, such as cellular telephones, radio equipment, and so on.
Tracing personal effects left in a vehicle is difficult because frequently the identification
numbers of the item have not be prerecorded by the victim.

Theft for Resale

Hard-core criminals have found motor-vehicle theft for resale to be highly profitable with
minimal risk. Many methods are used to dispose of stolen vehicles. For example, many are
transported to foreign countries for resale. Although this involves elaborate transportation
schemes, once the vehicle makes it into the hands of the foreign buyers, its chances o being
recovered are minimal. Included in this category are luxury cars, and heavy equipment, both of
which will frequently bring much higher illicit prices than the vehicleis actually worth.

National Forensic Science Training Institute 14 | S L P


Transportation for Other Crimes

In addition to the profit motive, stolen automobiles have been stolen for use in the commission
of other crimes. Here the vehicle may either be used as transportation ot and form various
crimes or actually used in the crime itself. This helps insulate the criminal from detection by not
having to use his or her own vehicle in the perpetration of the crime. The availability of
potential target vehicles and the opportunity to steal them will typically dictate which type of
vehicle is chosen. One of the greatest problems in investigating stolen vehicles is the ability of
the law enforcement officer to “read” the vehicle properly as one having been stolen.

Stripping and Chop-Shop Operations

The high profitability of stolen motor vehicles have been created a secondary market of sorts
for auto thieves. This market’s commodity is the parts of certain stolen autos. The terms chop-
shop and stripping operations refer to locations where stolen vehicles are disposed of. In a
typical stripping operation, a stolen vehicle is taken to a location, typically a private garage in
an unpopulated residential are of town. Such garages are usually rented by people using
fictitious names to avoid detection by authorities.

The strip location can sometimes be spotted by buildings with covered windows in areas of
frequent recoveries. In addition, people who are seen loading large items into vans in
residential garages would be worthy of further investigation. In contrast, chop-shop operation
vary in size and represent a growing business in which market entry is fairly easy. Anyone with
truck, garage, backyard, or a place of secluded land can get into the business.

Although similar to strip locations, chop-shop usually involves larger garages and deal in
larger quantities of goods. They are sometimes large enough to house both the stolen vehicle
and the think truck (the auto parts transport vehicle) inside the building where detection is
much more difficult.

Another difference between strip and chop-shop locations is that chop-shops will usually
remove any identifying numbers from remains of vehicles left behind after the valued parts
have been removed.

Once inside the garage, the stolen vehicle is disassembled. It is here where the prime
body parts are removed. These include bumpers, front-end assemblies, trunk lids, and doors,
interior parts, tires, and radio are also of great value to the thief.

Chop-shop operators use torches, power saws, or other tools to disassemble stolen
vehicles. After stripping the stolen vehicle, the parts are transported in vehicles called tin trucks
from which they are sold to repair shops and salvage yards that use them to repair damaged
vehicles. Once an auto has been stripped, the remaining parts are abandoned, such vehicles are
then typically driven or even pushed to a location away from the strip location.

Investigating officers should always remember that victims might be able to recall
certain characteristic marks on part of their stolen vehicle. These markings, which include
cigarette burns in the seat, dents on fenders, and so on, might be identifiable once shown to
the victim.

The Preliminary Investigation

The investigation of a stolen auto typically begins with a report by the victim to the
police. As a rule, it is the task of the patrol officer to respond to such complaints and determine
the facts and circumstances surrounding the alleged theft. These inquiries should include:

National Forensic Science Training Institute 15 | S L P


 Where was the vehicle last seen?
 Who was the last person to use the vehicle?
 Were the keys left in the ignition?
 Was the vehicle left unlocked?
 Is the victim in arrears in payment?
 Are others allowed to drive the vehicle?
 Was the vehicle equipped with special equipment, such as special wheels, fog
lights, or special sound system?

Answers to these questions allow the officer to determine if a crime has been
committed, or if another situation is at hand, such as civil dispute (divorce) or a vehicle
repossession by a bank or finance company. Other explanations for the disappearance
of a vehicle might also exist. For example, the driver might have been intoxicated and
may have been involved in a hit-and-run accident. The motor vehicle theft claim might
be an effort to cover up the details and avoid suspicion.

True ownership of the vehicle must also be determined early in the investigation.
This can be accomplished simply by requesting certain specific information from the
victim, such as the title of the vehicle or a copy of the vehicle’s insurance policy. Special
characteristics of the vehicle should also be noted in the theft report. Details such as
cigarette burns on the vehicle’s seat, scratches or dents, rusted areas of the vehicle,
decals or stickers, and so on, will all distinguish the stolen vehicle from others like it on
the street.

The Investigative Traffic Stop


Recognizing the Stolen Vehicle
As much as routine plays an important role in many aspects of criminal investigation,
recognizing a stolen or “hot” auto is a task for which there is no set method. Indeed, the
desire to identify stolen automobiles is always present within the law enforcement
community; however, the expertise typically is not.

Recognition of a stolen vehicle requires attention to detail. These details must then be
evaluated properly so that appropriate action can be taken. No single point may identify
a stolen auto as stolen, but subtle signals, typically in the form of circumstances, will
alert officers to the presence of a stolen vehicle.

Missing locks. If vehicle locks are observed missing, further investigation might
be warranted. Certainly, a former victim might be driving his or her vehicle, but the
driver might also be the thief.

Vehicles parked away from main flow of traffic. These vehicles could be stolen
vehicles that were abandoned after serving a thief’s purpose. Such an area could also be
a drop location where the vehicle could be picked up and taken to a trip location or
chop-shop. If located, the vehicle should be photographed and searched for evidence
such as personal papers or documents left behind by the thieves.

Accumulation of dirt or old parking tickets. These vehicles might also be stolen
that have been dumped.

Missing license plates or parts. This may also be an indicator that the vehicle has
been abandoned.

License plates or lack of license plates. This is usually one of the first tip-offs to a
stolen vehicle. A simple piece of carefully placed tape can quickly alter the appearance
of a number on a license plate. In addition, dirty plates on a clean car or clean plates on

National Forensic Science Training Institute 16 | S L P


a dirty car both indicate that plates have been switched. Further, a vehicle may have
only one tape when two are required, or plates may be attached in a hurried manner,
such as with wire or string.

In addition to the preceding signals, investigating officers should look for


anything unusual about the driver of the vehicle or the vehicle itself. Officer should also
be prepared to ask certain questions of the driver of the vehicle, if available.

Questions officers should ask themselves include:

 Does the driver match the vehicle?


 Is the driver familiar with the operation of the vehicle?
 Can the driver (once away from the car) estimate the approximate mileage of
the vehicle?
 Can the driver state when and where the last servicing was performed (the
answer can be compared to the “lube” sticker on the door jamb)?
 Can the sticker state what the license plate is on the vehicle?
 Can the driver answer questions based on information from the registration of
the vehicle.
 Are the keys used by the driver actually intended for the vehicle in question? Are
they from original manufacturer blanks.

Traffic stops are another way in which motor vehicle theft investigations are
commonly initiated. Once again, the patrol officer is one of the primarily players in
this early stage of the investigation. Once a motor vehicle has been observed as
being in violation of the law, officers have legal authority to stop it. In most cases,
law enforcement officers will focus their attention on the motor vehicle’s license
plates. These will typically provide officers with the information they are seeking
regarding the registrant of the vehicle. In this situation, information from the license
plates provides the officers only with limited information. This information includes
the fact that the license plates are not stolen and that the owner’s name and
address match the registration.

It is here, that the motor vehicle thief may slip past the watchful eye of the patrol
officer. Indeed, the officer making the stop should take time to record and check the
validity of the VIN. In almost all cases this will reveal whether or not the vehicle is
properly registered or even stolen. Police officers must, therefore, have sufficient
knowledge about the construction of the VIN to avoid common errors in recording
and identifying it.

Several methods of theft have been practiced by professional motor vehicle thieves.
Although complex to the inexperienced thief, these methods are commonly used in
organized theft rings. Theft methods most commonly employed include altering the
vehicle’s VIN, “tagging” or altering titling documents, modifying body parts of a
stolen vehicle, and dismantling the vehicle for sale or exchange of parts.

Vehicle Identification Number

The vehicle identification number (VIN) is as unique to a motor vehicle as a


fingerprint is to a human being. It has no resemblance to other numbers commonly
dealt with in criminal investigation, such as one’s social security number or date of
birth. Instead, it is assigned to the vehicle by the manufacturer at the time of
production and is designed to distinguish each vehicle from all others. The primary
purpose of the VIN is for identification and registration.

National Forensic Science Training Institute 17 | S L P


Disguising the Stolen Vehicle

One common way of distinguishing a vehicle is to change the VIN and alter the
documents that coincide with the VIN. Such a technique is commonly referred to as
staging. Other ways in which a vehicle’s true identity can be altered include:

THE SALVAGE SWTICH METHOD

The salvage switch involves the thief purchasing a wrecked vehicle that is
unrepairable, strictly for its certificate of title and for the vehicle identification
number. The purchase can be made from an individual or insurance company, but
typically is made from a wrecking or salvage yard. The vehicle must have both a VIN
plate and documents to support ownership of the vehicle.

Next, the thief steals a similar type of vehicle, and removes its VIN tag and
replaces it with the salvaged vehicle’s VIN. Any other numbers are either altered or
removed from the vehicle. It is then sold to either an innocent buyer or to a person
who may well suspect the validity of the transaction but participates anyway
because of a favorable price.

The modified VIN Technique

Another method of disguising a stolen vehicle is to replace the original VIN with
a phony one. This can be done in several ways. One way is to use a simple label
maker, which can be easily purchased at hardware stores. The VIN is then stamped
on a label. Next, it is spray painted with fat black paint and placed over the original
VIN. Other fashion should be fairly easily detected by observant investigators
through observing size, texture, and the size of the numbers of the tag. Another way
that thieves have attempted to alter VINs is to remove the original VIN, alter it, and
replace it back on the vehicle. Again this method is usually detected by the trained
investigator but may appear legitimate to the untrained eye.

The Bogus VIN

Still another method is to construct a completely bogus VIN that closely


resembles the original. Many criminals will attempt to steal blank VIN tags, which are
then stamped with numbers and placed on vehicles. This is where the ninth digit of
the VIN< the check digit, is beneficial in determining the authenticity of the tag.

Since 1970, American-made vehicles also display a federal safety certification


label on the driver’s door or the driver’s door post. These also display the VIN for the
vehicle and should match the VIN on the vehicle’s dash. To dispose of the vehicle
alter it has been tagged, several methods are adopted by the auto thief. For
example, in the salvage operation, the title will typically be placed in the fictitious
name before sale. In instances in which the VIN has been altered or manufactured
by the thief, phony title documents can then be prepared to match the bogus VIN>
in other cases, title documents may not even exist, only the registration of the
vehicle. In such cases, buyers who might suspect that the car is of a suspicious
origin might continue on with the transaction because of a low sales price. Such
sales are typically conducted in cash, at the thief’s request.

CARNAPPING MODUS OPERANDI

The Rip-Off

National Forensic Science Training Institute 18 | S L P


Typically, vehicles are stolen because of carelessness on the part of the owner. This
carelessness takes the form of the driver who leave their keys in an unattended car
or motorists who leave their cars running while they enter an establishment for a
short period. Vehicle thieves commonly watch these locations to wait for the most
opportune time to make their steal

When keys are not left in the ignition, many thieves have traditionally resorted to
entry techniques ranging from the classic “smash-and-grab” technique to
unobtrusive use of a screwdriver and flat iron. Today, entry into vehicles is becoming
more innovative. One such innovation includes the use of porcelain chips broken
from spark plugs. This technique involves attaching the chips to a wire, string, or
other handle, and simply hitting them against the vehicle glass for quick entry. This
method reduces time, noise, and chances of detection but may leave microscopic
fragments of glass on the intruder’s clothing. These fragments are excellent
evidence and can hopefully be located shortly after the theft by seizing the suspect’s
clothing for examination.

Another technique common used by thieves is to observe or “case” a parking lot


where cars are parked while people are at work. In this case, the thief has several
hours leeway from the time the vehicle is stolen to the time the theft is discovered.
Thus, the vehicle may be transported far from the theft location by the time of
discovery.

Many motorists invest in anti-theft devices in their vehicles. Although many of these
devices have proved to be effective, thieves have learned methods of defeating
them in many cases. The level of expertise in disabling an anti-theft device depends
on several variables: the thieves’ degree of mechanical experience, the quality and
effectiveness of the devices, and the location of the vehicle when stolen.

Professional Carnapping

Vehicles are obtained by many different means by professional thieves. For example,
tow trucks are often used to literally transport a vehicle desired by the vehicle thief.
Other common methods are the use of public parking facilities, such as mall parking
lots and car rental lots. In these instances, all vehicles are prime targets, especially if
they are left with keys in the ignition. Entry into a vehicle can be accomplished using
several tools. Professional thieves become proficient in the use of these tools and
employ them in a manner in which little, if any, damage, is done to the exterior of
the vehicle, which could easily be noticed.

Many tools that thieves commonly use also have a legitimate function. This,
however, is put to a sinister use by the criminal. When means are devised to counter
or deter motor vehicle thefts, criminals inevitable devise methods with which to
defeat these means.

The Tools of the Trade or of Motor Vehicle Theft:

 Slim Fim. This is a thin, easily obtainable piece of metal or aluminum, notched at
both ends. This tool enables easy entry by the thief who slides the tool in the
small crevice between the door and the door frame. Once the lock is
manipulated, the door is easily opened.
 Slide hammer. This tool is also referred to as a dent-puller or slam puller. Once
the thief removes the lock cap of the ignition, the slam puller is inserted by
screwing the tip into the keyway. Force is then applied to the slide mechanism,

National Forensic Science Training Institute 19 | S L P


away from the steering column; and lock is removed. The vehicle can then be
started by inserting a screw-driver which is twisted just like a car key.
 Ignition Extractor. Once in the stolen auto, the lock cap is removed. The
extractor is attached and turned to remove the lock. The vehicle can then easily
be started with a screwdriver.
 Force tool. After removing the lock cap, the force tool is placed over the lock and
tapped, the ratchet is then turned, thus destroying the locking mechanism.
 Key cutter, codebook, and blank keys. These tools enable entry into a single-key
vehicle and are widely used. A door lock is pulled, and the code number from
that lock can be obtained and a new key made. This gives the thief a new key
that he can use at a time of his choosing.

National Forensic Science Training Institute 20 | S L P


National Forensic Science Training Institute 21 | S L P

You might also like