Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
23 views14 pages

Section 3

The document outlines the principles and processes involved in criminal investigations, emphasizing the importance of thorough evidence collection and analysis to ensure justice. It details the steps police must follow after registering a First Information Report (FIR) and the significance of public cooperation and modern technology in investigations. Additionally, it discusses intelligence operations, database investigations, and the principles governing effective digital forensics.

Uploaded by

Eman Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views14 pages

Section 3

The document outlines the principles and processes involved in criminal investigations, emphasizing the importance of thorough evidence collection and analysis to ensure justice. It details the steps police must follow after registering a First Information Report (FIR) and the significance of public cooperation and modern technology in investigations. Additionally, it discusses intelligence operations, database investigations, and the principles governing effective digital forensics.

Uploaded by

Eman Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Section-III

Criminal Investigation
"A lawful search for people and things to reconstruct the circumstances of an illegal
act, apprehend or determine the guilty party, and aid in the states prosecution of
the offender. The collection of information and evidence for identifying,
apprehending, and convicting suspected offenders.”

The goal of a criminal investigation is to determine whether someone is guilty and


to uncover the truth using legal methods. This is done by the police or law
enforcement agencies, who collect and present evidence in court.

It's essential for the police to investigate thoroughly so that criminals or


lawbreakers can be brought to justice. Without a proper investigation, proving a
crime in court becomes impossible.

Once a First Information Report (FIR) is registered, the police must begin an
investigation by following these steps:

 Visit the crime scene.


 Understand the facts and background of the case.
 Identify and arrest the suspected person(s).
 Collect evidence related to the crime.

Only the officer in charge of the police station has the authority to investigate a
cognizable offence—these are serious crimes where police can arrest a person
without a warrant.

For an effective criminal investigation, the following support and facilities are
essential:

 Public cooperation is vital, especially the help of witnesses.


 Investigators must be well-trained and properly equipped to handle
cases professionally.
 Logistical support such as transport, financial resources, and other basic
needs should be readily available.
 Evidence collection kits and assistance from other government
departments are necessary to collect and preserve crime scene evidence
properly.
 Modern technology, like computers, audio and video players, should be
available to store and present evidence in court.
 Forensic science laboratories must be fully equipped to analyze
fingerprints, DNA, voice samples, weapons, and chemical traces.
 Strong coordination between law enforcement agencies is important,
along with proper legal backing, to ensure smooth and lawful investigations.
Principles of Criminal Investigation (Simplified):

The way investigators handle a crime scene depends on what they find when they
arrive.
For example, a murder case needs a different approach than a robbery case.
To make sure the investigation is complete and organized, investigators usually
follow seven basic steps.
However, these steps are flexible — they can be done in a different order, some can
be combined, or even skipped — depending on what the situation demands.

Define the Crime Scene and Identify Hazards

 First, figure out how big the crime scene is and check for any dangers.
 Find the main spot where the crime happened (called the focal point).
 Mark a big enough area to cover all possible evidence. This could range from
a small room to many kilometers (like in a bomb blast).
 Look for possible paths where the criminal may have entered or exited.
 Always think about safety. There could be weapons, harmful chemicals,
biohazards, or even traps at the scene.
 If doctors, firefighters, or coroners are on the scene, tell them what not to
touch to avoid disturbing evidence.

2. Secure the Crime Scene

 Locard’s Principle of Exchange says that everyone who enters or leaves a


crime scene brings in or takes away some evidence. That’s why securing the
scene is critical.
 Set up a cordon (barrier) around the scene.
 Keep a log of everyone who goes in and out.
 Create one standard path for entering and exiting the scene.
 If needed, make extra spaces for storing evidence or for team discussions.

3. Plan, Communicate, and Coordinate

 Before collecting evidence, figure out what kind of crime you’re dealing with.
 This helps you predict what evidence might be present.
 You may need to talk to witnesses or other involved people to understand
what happened.
 Use this information to create a plan for collecting evidence. Consider
weather, lighting, and time of day.
 If the case is complex, you can call in forensic experts or other specialists to
help.
4. Do a Primary Survey/Walkthrough

 Start with a quick but careful walk through the scene to decide which
evidence is most important.
 The lead investigator will make notes and take early photographs of
everything.
 Document everything: room temperature, smells, positions of objects,
condition of equipment, etc.
 To make movement easier without disturbing evidence, mark a clear
“evidence-free” path to move through the scene safely.

5. Document and Process the Scene

 Once the plan is ready, the crime scene team begins a careful and well-
organized investigation.
 All useful evidence (called probative evidence) is collected.
 The entire scene is recorded using digital cameras, video recorders, or 3D
scanners if available.
 In some cases, detailed drawings or sketches are also made to show the
layout and position of evidence.
 Proper methods are followed to collect, pack, and preserve evidence—
especially biological materials like blood, hair, or skin, which are easily
damaged by weather or mishandling.

6. Conduct a Secondary Survey (Review)

 After the main evidence collection, a second check of the crime scene is done
to ensure no important evidence was missed.
 This step works as a quality check:
o To confirm everything listed in the first walkthrough was collected.
o To search for any new evidence that may have been missed earlier.
o To officially confirm the crime scene has been fully processed and can
now be opened to others.

7. Record and Preserve Evidence

 Every piece of evidence is listed in an evidence inventory log to make sure


nothing is lost.
 The details in the log (like size, type, and markings) must match the
photographs and the official crime scene report.
 For example, if a gun is found, its serial number in the log must match the
number in the photos taken on site.
 This process creates a chain of custody, which tracks every time the
evidence is handled or moved—important for ensuring it can be trusted in
court.

Manual of Preliminary Investigation

 A preliminary investigation is the first action taken by the police when


a crime is reported.
 The main goal is to collect early evidence that:
o Confirms a crime actually happened,
o Helps identify the offender,
o Leads to the arrest and conviction of the criminal.

Main Steps in a Preliminary Investigation

The investigation usually includes the following important tasks:

 Confirm that a crime took place.


 Identify the victim, the location, and the time of the crime.
 Find solvability factors — information that increases the chance of solving
the case.
 Record and report all the crime details.
 Check which investigation steps have been done and which are still left.

Clues That Help Solve a Crime (Solvability Factors)

These key details can help investigators solve the crime:

 People who witnessed the crime.


 Knowing the suspect’s name.
 Likely locations where the suspect may be found.
 A description of the suspect’s appearance.
 Any proof linking the suspect to the crime.
 Stolen or involved property with unique features.
 A clear pattern or method the suspect used (modus operandi).
 Vehicles or transport used by the suspect.
 Useful evidence found at the crime scene.
 Belief that publicizing the crime may help solve it.
 If further investigation may lead to results.
 If only one person could logically have committed the crime.

Intelligence Operations

Intelligence operations refer to systematic efforts carried out by state agencies,


military institutions, and specialized departments to collect, analyze, and interpret
information with the aim of identifying the capabilities, intentions, and
vulnerabilities of rival states, non-state actors, or potential threats. These
operations play a crucial role in shaping national security strategies, military
preparedness, and diplomatic decisions.

Objectives of Intelligence Operations

To achieve strategic foresight and preparedness, intelligence must perform the


following core functions:

1. Assessment of Current Conditions and Capabilities


Intelligence agencies evaluate the political, military, economic, and social
situation of the target entity to understand its strengths and weaknesses.
2. Prediction of Adversarial Actions
Based on available data and trends, potential moves and decisions of
adversaries are predicted, allowing proactive countermeasures.
3. Identification of Critical Vulnerabilities
Intelligence helps to detect weaknesses in enemy infrastructure or policy that
can be exploited in defense or diplomacy.
4. Formulation of Counterstrategies
Intelligence assists policymakers and military planners in developing effective
responses and contingency plans against anticipated threats.

Types of Intelligence

1. Strategic/National Intelligence
This refers to broad-spectrum information related to national security,
politics, economics, and societal trends of foreign nations. Strategic
intelligence shapes long-term policies and is generally handled by national
intelligence agencies (e.g., ISI, CIA, MI6).

1. Military Intelligence
Gathered by defense departments or military units, this type focuses on the
enemy’s military strength, deployment, logistics, weapons technology, and
combat readiness. It is crucial for operational planning and defense strategy.
Industrial Intelligence
Industrial intelligence refers to the information collected by business firms
about their competitors. This may include market trends, pricing strategies,
product innovations, or corporate tactics. In the globalized economy,
corporations often engage in industrial espionage to maintain or gain
competitive advantage.
2. Political Intelligence
Political intelligence involves acquiring insights into political strategies,
campaign planning, policy directions, or potential threats to state stability. In
democratic states, it is often used to assess political opponents, while in
authoritarian regimes, it may help rulers detect plots or opposition
movements.
3. Counterintelligence
Counterintelligence encompasses all activities aimed at neutralizing or
preventing adversaries from gaining access to sensitive information. This
includes identifying double agents, securing communication lines, and
monitoring foreign intelligence operatives. It plays a defensive role in
protecting national secrets and critical infrastructure.

Categories of Intelligence Collection

Intelligence collected through covert means typically falls into the following three
major categories:

1. Human Intelligence (HUMINT)


This involves gathering information directly from human sources, including
spies, informants, or defectors. HUMINT is especially valuable for
understanding the intentions, motives, and internal discussions of rival
entities, which technical methods cannot capture.
2. Signals Intelligence (SIGINT)
Signals intelligence is the interception of communications and electronic
signals. This includes the tapping of telephones, emails, and radio
transmissions. It provides critical information regarding operational plans,
coordination of attacks, or diplomatic communications.
3. Imagery or Photographic Intelligence (IMINT)
Collected through reconnaissance aircraft, satellites, or drones, this type of
intelligence captures visual data of enemy movements, installations, or
terrain features. Advanced tools like thermography and radar are also used to
detect objects not visible to the naked eye. It is vital for military planning and
surveillance operations.

Significance of Intelligence Operations

The integration of these intelligence types ensures a holistic view of potential


threats. For example, while signals intelligence may track troop movement, human
intelligence can uncover the motive behind the movement, and photographic
intelligence can confirm their current location. Intelligence operations thus facilitate
effective decision-making, from battlefield strategies to foreign policy formulation.

Tradecraft in Intelligence

The term tradecraft refers to the specialized techniques and methodologies


employed in clandestine operations and espionage. It includes covert surveillance,
code decryption, counter-intelligence, and use of technology for information
gathering.

Significance of Intelligence in Modern Governance

In the contemporary security paradigm, intelligence serves as the first line of


defense. It aids in preempting terrorist activities, managing internal insurgencies,
countering cyber warfare, and conducting diplomatic negotiations. Countries with
robust intelligence systems are better equipped to safeguard national interests and
respond effectively to both conventional and asymmetric threats.
Principles of Intelligence Operations

Intelligence operations are the cornerstone of effective decision-making in security,


military, and strategic affairs. Their success depends not only on data collection but
also on how efficiently information is processed, analyzed, and utilized. The
following are key principles that guide effective intelligence operations:

1. Centralized Management

Effective intelligence requires coordinated and centralized management. It is not a


product of isolated efforts but the outcome of integrating multiple specialized
domains such as human intelligence (HUMINT), signals intelligence (SIGINT), and
imagery intelligence (IMINT). A centralized command ensures that intelligence
collection, analysis, and dissemination are harmonized to produce actionable
insights.

2. Accurate Evaluation and Timely Dissemination

Intelligence must be interpreted correctly and delivered efficiently. The intelligence


officer plays a crucial role as both analyst and communicator, ensuring that all
implications of intelligence findings are clearly understood by decision-makers.
Their continuous involvement in the planning process ensures that intelligence
remains relevant and is properly aligned with strategic goals.

3. Tailored and Timely Intelligence

One of the fundamental principles of intelligence operations is relevance.


Intelligence must be specifically tailored to the needs of the user—whether a
military commander, policymaker, or security agency. It should be formatted clearly
and delivered promptly to influence decisions effectively. The focus must be on
transmitting accurate, relevant, and timely intelligence—not just raw data—to the
right person at the right moment.

4. Utilization: The Final Step

The true value of intelligence lies in its application. Intelligence holds no intrinsic
worth unless it is used to support operational planning or real-time decision-making.
The intelligence cycle—collection, processing, analysis, dissemination—is
incomplete unless the information is acted upon. Therefore, intelligence must
ultimately feed into policy formulation, threat neutralization, and tactical or
strategic execution.

Database Investigation

In the digital age, databases play a vital role in storing and managing large volumes
of sensitive information. A database is essentially a structured collection of data,
often organized in files or tables, that can be accessed and manipulated through
queries. Given the critical nature of the information stored—such as financial
records, personal identities, and classified intelligence—it is essential to conduct
forensic investigations on databases to prevent and trace cybercrimes.

Purpose and Importance

Database investigation primarily focuses on crimes related to computer technology,


which has become an integral part of modern life. With the increasing dependence
on digital systems, computer-related crimes such as:

 Financial fraud
 Unauthorized access or hacking
 Identity theft
 Intellectual property theft

are becoming more frequent. These crimes often target databases to retrieve or
manipulate sensitive data, making database investigation an indispensable
component of digital forensics.

Challenges in Database Investigations

For intelligence analysts and law enforcement agencies, one of the major
challenges is locating specific information across vast and often disconnected data
repositories. Investigations typically involve:

 Accessing hundreds of databases, each with its own security protocols and
passwords
 Manually extracting and compiling data from each source
 Analyzing and connecting the extracted data to find meaningful links

This process is time-consuming and complex, often compared to “finding a needle


in a haystack.”

Technological Advancements

To overcome these challenges, agencies like the Federal Bureau of


Investigation (FBI) have introduced advanced tools. One such example is the
Data Integration and Visualization System (DIVS), a cutting-edge platform
that:

 Integrates the FBI’s most-used databases


 Enables a single-source search capability
 Pulls information from hundreds of datasets in real time
 Provides access to millions of documents from one location

By simplifying data access and improving analysis efficiency, DIVS significantly


enhances the ability of investigators to trace criminal activity and gather critical
evidenc

Principles of Database Investigation


Database investigations form a critical part of digital forensics and cybercrime
detection. As sensitive and potentially admissible evidence is often stored digitally,
it is essential to follow strict forensic protocols to ensure the integrity, admissibility,
and credibility of digital evidence. The following principles govern effective and
legally compliant database investigations:

1. Preservation of Original Data

The most fundamental principle is that data stored on a computer or storage


media must not be altered or tampered with during an investigation. This is
crucial because:

 Such data may later be presented as evidence in court.


 Any modification can compromise its credibility and legal admissibility.
 Investigators must use forensically sound methods to create exact copies or
“bit-by-bit” images of data for analysis.

2. Competency of Investigators

Any person handling the data must be technically competent and trained in
digital forensics. The investigator must be capable of:

 Accessing and handling the data without altering it.


 Explaining the relevance of the evidence and justifying each
procedural step.
 Demonstrating expert-level understanding of database structures, query
language (SQL), and relevant software tools.

3. Maintenance of Audit Trails

A complete and verifiable audit trail must be maintained for all actions taken
during the investigation. This includes:

 Documentation of the processes, tools, and methods used.


 Records of data accessed, copied, or analyzed.
 Logs that can be reviewed by an independent third party to verify the
consistency and accuracy of the investigation.

The ability of an external expert to replicate the process and obtain the same
results is essential for ensuring objectivity and fairness.
4. Legal and Ethical Accountability

The investigator in charge must take full responsibility for ensuring that:

 All actions comply with relevant laws, regulations, and ethical


standards.
 The chain of custody is rigorously maintained.
 Investigative integrity is upheld, especially when handling confidential or
classified information.

This principle ensures accountability and builds the credibility of digital


evidence in judicial proceedings.

Electronic Investigation: Principles and Practices

Electronic investigation refers to the systematic process of identifying, collecting,


preserving, analyzing, and presenting electronic evidence in criminal cases. With
the advancement of technology, a significant proportion of criminal activities—
ranging from financial fraud to cybercrimes—now involve digital footprints,
making electronic investigation a critical component of modern law enforcement.

Nature and Characteristics of Electronic Evidence

 Electronic evidence includes any information or data of investigative


value that is stored on or transmitted through an electronic device.
 It may include emails, logs, databases, text messages, multimedia files,
metadata, and more.
 It is often latent, much like fingerprints or DNA—existing but not
immediately visible or accessible.
 It can transcend national boundaries with ease, requiring international
cooperation in investigation.
 It is fragile, easily alterable, destructible, or corruptible, and thus requires
careful handling and urgency.

General Principles of Electronic Evidence Handling

To maintain the integrity and admissibility of electronic evidence, the following


forensic and procedural principles must be strictly adhered to:

1. Integrity Preservation
o Any action taken during collection or analysis must not alter the
original evidence.
o Forensic tools and methods that create exact replicas (bit-stream
images) are used for examination purposes.
2. Expert Handling
oOnly trained and qualified personnel should be allowed to
examine, access, or interpret electronic evidence.
3. Documentation and Chain of Custody
o Every activity related to the seizure, examination, transfer, or
storage of digital evidence must be thoroughly documented and
preserved for audit and legal scrutiny.

Steps in Handling Electronic Evidence at a Crime Scene

The electronic evidence collection process involves several key steps:

1. Recognition and Identification


o Identifying potential sources of electronic data such as laptops, mobile
phones, USBs, hard drives, routers, etc.
2. Documentation
o Photographing and recording the state and position of each device
before any interaction.
3. Collection and Preservation
o Devices should be collected in a manner that avoids tampering, static
discharge, or unauthorized access.
o Use of Faraday bags may be required to block remote access during
transport.
4. Packaging and Transportation
o Proper anti-static packaging and secure transport to a forensic lab are
necessary to ensure data integrity.

Common Sources of Electronic Evidence

 Internally attached hard drives (e.g., in PCs, laptops)


 External storage devices (USBs, SD cards, portable HDDs)
 Mobile phones and tablets
 Cloud storage services and email accounts
 Smart devices and Internet-of-Things (IoT)

Each of these can yield crucial information such as user behavior, communication
records, location history, or traces of criminal activity.

Forensic Investigation: Meaning, Scope and Importance

The term "forensics" originates from the Latin word forensis, meaning “of the
forum” — referring to the Roman forum where legal cases were presented and
debated. In modern usage, forensic broadly refers to anything related to courts
or legal proceedings, particularly in the context of scientific investigation to
aid justice.
Definition and Purpose

A forensic investigation is the lawful and methodical process of collecting,


analyzing, and presenting evidence and facts in a court of law. It plays a pivotal
role in criminal justice systems worldwide, helping to determine the truth behind a
crime or dispute through scientific methods.

This type of investigation can apply to a wide range of criminal activities, including
but not limited to:

 Murder
 Kidnapping
 Sexual assault
 Arson
 Financial fraud
 Cybercrimes

Scope of Forensic Investigation

Forensic investigation encompasses several scientific disciplines, each providing


specific insights into different aspects of the crime. These include:

 DNA Analysis: Used to identify individuals through biological samples such


as blood, hair, or skin.
 Fingerprint Examination: Matches latent prints found at the crime scene
with suspects.
 Ballistics: Analyzes firearms, bullets, and the trajectory to determine
weapon use.
 Chemical Examination: Identifies substances such as drugs, poisons, or
accelerants in arson.
 Trace Evidence Analysis: Involves microscopic materials like hair, fibers,
paint, or glass.
 Soil and Blood Comparison: Compares samples from crime scenes to link
suspects.
 Electronic Evidence: Includes digital footprints from devices like computers
and mobile phones.

Forensic Investigation and Crime Scene Analysis

While forensic science is broadly used in many contexts, most public understanding
is centered on crime scene investigations, where physical evidence is
recovered, documented, and analyzed. Different types of crimes require
specialized forensic techniques:
 Arson: Use of chemical analysis to detect accelerants and identify ignition
points.
 Homicide: Comprehensive examination involving ballistics, DNA, bloodstain
patterns.
 Kidnapping: Use of digital forensics, trace evidence, and surveillance
reconstruction

Forensic Science and Its Role in Criminal Investigation

Forensic science refers to the application of scientific principles and techniques to


matters of law. It encompasses a wide range of disciplines utilized for the
collection, preservation, and analysis of physical and biological evidence
during criminal or civil investigations.

Role of Forensic Scientists

Forensic scientists play a critical role in modern investigations and the criminal
justice system. Their responsibilities typically include:

 Evidence Collection: Some forensic experts are deployed to crime scenes


to identify and collect physical evidence.
 Laboratory Analysis: Others remain in laboratories, where they analyze
evidence brought in by crime scene investigators, detectives, or legal
authorities.
 Expert Testimony: Forensic scientists are often called upon to testify in
court as expert witnesses, providing objective interpretations of evidence
that can be crucial for both the prosecution and defense in legal
proceedings.

Fields within Forensic Science

While technically any scientific field can be applied for forensic purposes, the
following disciplines are most commonly associated with forensic investigations:

 Forensic Biology & DNA Analysis


 Forensic Chemistry (toxicology, substance identification)
 Digital Forensics
 Forensic Pathology
 Ballistics and Firearms Examination
 Fingerprint Analysis
 Forensic Anthropology and Odontology

Ethical Responsibilities
Due to the critical legal implications of their work, forensic scientists are bound by
strict ethical standards. They must:

 Maintain objectivity in their analysis.


 Avoid personal or political biases.
 Adhere to professional integrity to ensure evidence is neither tampered
with nor misrepresented.
 Accurately report findings, even if they contradict the expectations of the
investigative or legal teams.

Challenges in Forensic Investigations

Contrary to the simplified portrayals in popular media and television shows, real-
world forensic investigations are complex, time-consuming, and often limited
by practical constraints such as:

 Lack of resources or technology


 Overburdened forensic laboratories
 Need for specialized training and continuous education
 Legal challenges in evidence admissibility

Despite these challenges, forensic science has become an indispensable tool


in the pursuit of justice, helping to both identify perpetrators and exonerate
the innocent.

You might also like