Preview

Bomb Threat and Explosion Investigation

Good Essays
Open Document
Open Document
1485 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bomb Threat and Explosion Investigation
In addition, other law enforcement agencies may have specific information value. The Intelligence Service, Armed Forces of the Philippines (ISAFP), Police Intelligence Group (PIG) and National Intelligence Coordinating Agency (NICA) maintains files on individuals who make threats against political leaders. The Bureau of Customs (BOC) may provide information of imported goods; the Bureau of Immigration and Deportation (BID) can provide information on individuals entering or leaving the country; the Firearms and Explosive Division, Civil Security Group, Philippine National Police (FED, CSG, PNP) maintains records on firearms and explosives; the Bureau of Corrections (BUCOR) maintains records on fugitives; the Philippine Postal Corporation (PHILPOST) may assist in matters related to the mails; the National Anti-Kidnapping Task Force (NAKTAF) may, have files of information and intelligence because they have primary jurisdiction in kidnap-for-ransom cases.

On the local level, the local police authorities frequently maintain individual photo or “mug” files, alias files, business indexes, modus operandi (MO) files, victimization records and crime patterns. In addition, court records, probation and parole files, and other municipal records such as utilities, may prove valuable. Records of businesses, such as the telephone, electric and water companies, may also be helpful.

Surveillance and stakeouts are important components of kidnap-for-ransom investigations. These activities may require various forms of electronic surveillance, including wiretapping, eavesdropping, automobile locator systems, videotaping and photography. Such efforts may require assistance from other agencies. The investigator should be familiar, not only with the use of such equipment, but also with the laws surrounding their application. The investigator must know when a court order is necessary for the use of electronic surveillance. In no case should an investigator use extralegal means to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    During my research on the surveillance cameras used by local police departments, IBM has discovered a way for artificial intelligence which enables computers to recognize a crime in progress and refer the video feed to a human colleague for handling. This system will first replace mobile officers for traffic enforcement; eventually they will be capable of keeping watch for almost any crime or any known criminal. At the same time, police officers must track the use of new technologies for fighting criminal organizations. The Internet has made it possible for a variety of financial crimes, global operations by close-knit gangs that police agencies are not equipped to meet.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The documents scanned for the Criminal History Inquiry Unit (CHIU) are a variety of documents, which consist of “Agreements”, “License and /or Contracts”, “Miscellaneous Correspondence” and “User Account Forms”. Consequently, these documents have been submitted by various licensing agencies and/or entities throughout the state. The agency and/or entity are requesting “User” access to the “Secure” website to obtain criminal history information on potential applicant for hire at their agency and/or entity.…

    • 71 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Forensics Lab

    • 289 Words
    • 2 Pages

    3) Obtaining dental records can help in the identification of an unknown body by the name of the suspect, and many more information would be along with thos records.…

    • 289 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    On April 15, 2013, during the Boston Marathon, homemade explosions were detonated near the finish line taking the life of 3 Americans and injuring more than 260. The explosive devices were determined to be two pressure cookers strategically set to detonate 210 yards apart at 13 second intervals. The investigation lead was taken over by the Federal Bureau of Investigation (FBI) who released photographs and surveillance footage of two particular suspects on April 18. The two individuals were categorized as Chechen brother named Dzhokhar and Tamerlan Tsarnaev. Once these photos were released to the public, the two brothers took the life of an MIT police officer, carjacked a sport utility vehicle and exchanged gun fire with the Watertown police. The shoot out resulted in a second officer being critically injured while one of the suspects Tamerlan Tsarnaev was determined dead at the scene, younger brother Dzhokhar escaped with injuries. A Watertown manhunt followed the April 19 event with thousands of law enforcement personnel converging on a cordoned 20 block search area. Throughout the day long search, Watertown and nearby residents were warned to stay indoors with many public establishments closed. Later that day, the “shelter in place” advisory was lifted for the Watertown area. Shortly after these statements, a Watertown resident found the alleged suspect hiding in his back yard inside the family boat. Police forces converged on the area and arrested Dzhokhar. He was transported to the hospital with serious injuries. At the hospital, an initial questioning took place. Dzhokhar claimed his brother was the brains behind the incident and they were personally motivated because of the Afghan and Iraqi wars. They were indoctrinated with extremist Islamic beliefs and proclaimed as self-radicalized and had no outsourced connections to any terror groups around the globe. The brothers…

    • 2096 Words
    • 9 Pages
    Better Essays
  • Good Essays

    There are many different ways law enforcement agencies fight crime and solve them. The continuous usage of technology is one of those major ways. Law enforcement agencies uses different technologies that are needed depending on the situation and the outcome of it. Some examples of technology that police use Today are GPS systems(global…

    • 834 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Clay Dillow’s essay “To Catch a Bombmaker” emerged in October 2015 in Popular Science. This was a well written article whose main purpose was to inform the audience about a “little-known FBI forensics lab” (Dillow 54). His use of critical thinking in all eight elements only made his argument more valid and additionally convincing. Each one of these elements was covered thoroughly along with the use of strategies such as ethos and logos, which further the evidence that he was presenting. By utilizing his professional tone and moreover unveiling factual events, Dillow was able to produce a successful essay.…

    • 99 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 2 Part 2

    • 983 Words
    • 4 Pages

    TMA 01 – With the help of examples from the surveillance film, outline the ways in which surveillance is used to deliver crime control and social welfare (600-800 words).…

    • 983 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    1. What do you think would be the most challenging part of investigating a fire or explosion crime scene? Why?…

    • 462 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Another factor to consider was the cartels ability to intercept encrypted radio traffic over open airways. This posed a serious problem safeguarding information in reference to law enforcement positioning and travel routes. Radio traffic was minimized using code to describe law enforcement locations or actions during the trial. As Incident Commander, I initiated specific radio codes to be used as descriptors regarding law enforcement movement and activities over open airways. This was a very effective method of safeguarding sensitive information from possible radio traffic monitoring. The Los Zetas also had scouts driving by the courthouse at random times throughout the day, especially during the time the court was in session. In order to curtail this type of activity all FPS patrol vehicles were instructed to immediately contact the command center when surveillance was noted by vehicle or from a distant building. The command post made direct notification to Laredo and Webb County Police Departments. Local law enforcement immediately responded to the last known area reported and conducted a traffic stop on the vehicle in question or checked the facility that surveillance was being noted. All occupants of the suspicious vehicle were questioned and ran through NCIC for wants or warrants. The information obtained from the occupants was then checked for local gang or cartel affiliation. All field…

    • 1301 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Dna Evidence

    • 397 Words
    • 2 Pages

    References: Cops.usdoj.gov.2003. Evidence Identification, Collection & Preservation for Law Enforcement. Retrieved February 26, 2009. Available Online:…

    • 397 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Why Is Tda 2.2 Safeguarding

    • 4747 Words
    • 19 Pages

    The police also maintain databases for management of individuals that pose a risk to the public. For example the Vetting and Barring Scheme relies on regularly updated…

    • 4747 Words
    • 19 Pages
    Good Essays
  • Good Essays

    Techno corrections are currently a trending topic as well as a growing practice. There are a few different examples of techno corrections such as all-in-one drug detection spray, ground- penetrating radar, heartbeat monitoring, and personal alarm location system. However there are other more familiar practices such as electronic tracking and location systems. This tracking can be done either with the common bracelets, which are based off of cellular and satellite tracking. Some of these methods, especially electronic tracking are said to be intrusive on the privacy of the inmates. This raises the questions of inmate’s privacy versus security. Some individuals may argue that even though inmates have broken the law and have forgone the rights…

    • 659 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    2. What are the similarities and differences between an arson investigation and a bombing investigation?…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Arson: Mass Bombing

    • 342 Words
    • 2 Pages

    Arson destroys neighborhoods as surely as mass bombing. Only a few people commit the crime, but all residents must suffer the consequences.…

    • 342 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Arson And Bombing Essay

    • 655 Words
    • 3 Pages

    6. List and discuss the various clues that flames and smoke can offer the investigator in the arson ivestigation.…

    • 655 Words
    • 3 Pages
    Good Essays