This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Exercising

Investigative Plan for Daytime Robbery Attacks

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Investigative Plan for Daytime Robbery Attacks

The goal of establishing this investigative plan is to identify why the multiple robbery attacks happen and to take a practical response strategy to reduce risks for future attacks. While previous attacks may have occurred without resulting to serious effects, high risks that might have been caused will be investigated alongside the incidents that really caused the loss. Because the investigation process will involve a progression of activities, this plan will move from tasks of gathering evidence to the analysis of information, to the development of theory and validation, to forming reasonable grounds for belief and then recommending strategies for actions to charging suspects (Plecas, 2019).

Planning this investigation will enable a systematic and complete inquiry, highlight the required resources, the persons/departments to be involved, the duration of the inquiry, whether the investigation would need a single investigator or a team (Shipley, 2014).

  1. Defining the case scenarios that have been the target for robbery attacks.

The aim is to understand the risks of daytime robbery attacks to operational businesses and general economic activities in the area. The purpose of this forensic step is to establish the risks and possible impact of the robbery attacks on the markets (Rowlingson, 2004).

The aim is to highlight business scenarios where this plan of action will be required. This plan will, therefore, identify and list the reported various cases of the robbery attacks from the area of investigation. Sources of this information will include the police officers who were only able to get limited information about the various incidences; the affected persons; and the witnesses.

Identifying specific cases will reduce the impact of robbery attack crimes. It will also enable the public to deal with legal orders to release data effectively; enable compliance with legal constraints; give insights into the investigation of the impact of the robbery attacks, and provide evidence to support potential plans of actions to suspects.

  1. Establishing the available sources and the various types of possible evidence

Available pieces of evidence into this investigation will include the limited information acquired by the police. This information will be resourceful in leading me to the specific robbery attack incidences, identifying the suspects, victims, and victims and the particular scenes of the crimes.

Don't use plagiarised sources.Get your custom essay just from $11/page

The police department(s) will provide sources of potential evidence that are available, or which can be generated. This step will be most effective in scoping what evidence would be availed from across the range of applications and systems to be applied (Melia, 2002).

This step may identify digital and online ESI or any other items of evidence that were collected and their places of collection. Those items will include but not limited to weapons, documents and contrabands. These items will guide us to such details as the duration of evidence storage; the person who can access the data; the person responsible for the availed data; how it can be made available to the investigation; the business processes it relates to; and whether it contains personal information.

  • Establishing the requirements for evidence collection

After identifying the possible sources of evidence, it will be possible to decide that it can be useful in dealing with the identified robbery attacks. The investigation will also identify whether it will be necessary to seek any further sources of evidence or work with the provided ones.

Identified source(s) of evidence collection has to be sufficient such that they minimize interruption to business processes. They should also proceed at a cost in proportion to the incidents; established evidence makes an impact on the possible success of any formal action, and the evidence is got lawfully without infringing the rights of the operating businesses.

  1. Establishing a capability for securely gathering evidence that is admissive to laws and which suits the investigation

After identifying the reliable source of evidence collection, there is a need to ensure that only credible sources are interrogated, and only keep reliable records. Preliminary checks before acting on the plan will focus on whether the evidence to be collected can interfere with the operations of the businesses, or if the evidence can be lawfully obtained. Legal advice will be sought to establish whether the needed evidence can be achieved in a planned manner. Legitimate questions on whether it would be right to monitor such personal accounts as e-mail addresses or phone conversations will be possible (International Journal of Digital Evidence, Winter 2004, (4):2).

This step will attempt to analyze relevant laws, in the areas of data protection, privacy, and human rights, with the potential to inevitably constraining what can be established.

  1. Coming up with a policy for safe storage and handling of potential evidence

This step will aim to secure the evidence for the longer term once it has been gotten to enable it from being retrieved whenever it is needed (Yasinsac and Manazano, 20001).

Measures to control access to and manipulation to the collected evidence will include exercising rigid control over authorized access to and control to the evidence stores, storing the potential evidence, restricting evidence files from access by other parties, and any other access. The Policy for secure storage and the use of possible evidence to preserve the authenticity of the information will be formulated.

The chain of custody policy will be established. Access to the evidence will be controlled, and any party that will need access to the evidence storage will have to sign it in and sign it back with the original contents. This Policy will make it mandatory to record the person/party that holds and has access to the evidence (Ceresini, 2001).

  1. Collecting data; Interviewing victims and witnesses and Analyzing the Data

This step will involve gathering information and details concerning the identified cases of robbery attacks.

The plan will seek to inquire from numerous sources for information, persons who have been involved in the robbery attacks, witnesses to the attacks, equipment and documents, and the scenes of incidents. Other approaches will include basic internet search for public information, online searches of public records filed by government agencies, reviewing agency records on previous allegations and investigations, carrying out comprehensive complainant reviews, and carrying out criminal background checks of significant parties.

Data analysis will focus on a chain of events. This action will seek to understand the sequences of events before identifying why the incidents occurred. It will also appreciate the root and underlying causes, as well as the direct purposes, identify the faulty environments (policies) that might have acted as the loopholes that enabled the attacks.

  • Coming up with measures to monitor and deter major robbery threats

The established sources of evidence will be monitored to develop threatened incidences periodically. This process will not only be important in collecting the evidence, but it will also be used in the detection process.

Event correlation (Chen, 2003) can be applied to meet high-risk audits that will be needed. Auditing will involve a review of the records that would have been provided by the prior police investigations.

  • Designing Immediate Corrective Action

Immediate corrective plan of action will include securing the area by availing enough/extra policing units to patrol the areas identified as hotspots for robbery attacks. Notifying relevant security bodies and patrol units and availing CCTVs as investigative aids will be additional corrective actions.

The actions will allow lowering the risks of recurrence of the robbery attacks and will bring in the possibility of eliminating experiences of other-but different incidents that are likely to occur, resulting from similar causes.

  1. Train the population in incident awareness and public security incidences

Those involved can comprehend their role in the evidence process and legal sensitivities of the evidence. A wide range of the population may become involved in public security incidences. The investigation team, corporate PR and HR departments, business owners, and corporate security. This step will ensure that relevant training is developed to prepare them for different duties they may take up before, during, and after a robbery attack.

The relevant participants will be equipped with knowledge on how not to tamper with evidence and be aware of the laws and regulatory policies that they need to be aware of.

  1. Presenting Evidence-Based Cases Describing the Incidents and their Impacts.

Reporting will be done after the closing of all the outstanding issues, and it will focus on communicating the findings. Mechanisms of the report would involve formal incident investigations reports

This step will seek to provide credible evidence and logical evidence answering the questions of what (nature) crimes occurred, who took part in the robbery attacks; why the normal daylight robberies occur; when and where they occurred; and how they happened (Endorf, 2003).

The report will seek to provide a foundation for action by the law enforcement bodies and justify disciplinary/legal actions and give a response on how such robbery attacks would be prevented in future (Rowlingson, 2004)

Technological Assistance for the Operation

Mounting mobile data terminals in the car used in an investigation. The in-car attached device will serve to connect with the central dispatch station. This terminal will as well be used to display the geographical mapping as well as security details. These would provide safety in the investigation process.

Computer-Aided Dispatch software will be used with an advanced mobile phone to keep track of the rooms storing collected evidence (s). This sophisticated mobile device software will monitor and deter unauthorized access to investigation exhibits.

GPS System will be used to identify locations of suspects, identifying the most effective routes, and the GIS System will be used to tracking the location of the police vehicles. These technologies will facilitate easier accessibility.

The gunshot detection system will be installed for operation in this high crime area. In case of a gunshot, this electronic sensor will help in detecting its location. There will, therefore, be a better time for response.

Databases and Information Exchange will be done to deal with profiling and fingerprints. Electronically analyzing physical details such as the fingerprint surveillance will enable seeing connections between criminal events and persons.

Measures to Take when Analyzing the Pattern of Robbery Activity

Ensuring legal review guide course of actions in response to the robbery attacks. It will be necessary to review the cases from legal standpoints at some points and seek legal advice on any subsequent actions. Legal advice will be essential to establish strengths of cases, and there will be required a justified and assessed formal work following an analysis.

Avoidance of sequential thinking is likely to introduce compartmentalization, prevent information sharing, and potentially lead to intelligence failure.

Relationship between the  information volume and the resources required to process the information will be considered. Information abundance or scarcity with limited resources will likely inhibit the possibility of catching the suspects. The scarcity of the data is as well likely to cause the formulation of wrong decisions, which can, later on, be found as false.

Avoiding information complexity during the investigation is a significant practical measure. Information can be complicated by both emerging and evolving information, in which case most of the data is wrong.

Synthesizing the Data and Coming to Conclusion

Indexing the information and fusing of data will be done to sift the large volumes of evidence. The sizes of evidence are likely to be large because of their multiple sources. These cases, which would permit multiple sources, would be correlated. The investigation will consider issues associated with data mining and how to summarize and classify potential exhibits (Will, 2013).

Investigative Units to Incorporate in the Operation

Crime scene investigators who investigated the respective cases; they will be tasked to availing pictures and physical measurements; tire tracks footprints and fingerprints obtained from the different scenes. The unit will also be tasked with preserving the exhibits.

Patrol units; will be tasked with spotting and giving insights to suspected robbery plans.

The National Institute of Justice will be sought to enhance forensic aspects of investigations and to support the production and maintenance of resources such as databases. This will include resources for mapping the crimes, testing forensic tools, and their reliability.

Supplies/Equipment to Purchase to Enable the Investigation and Operation

A gunshot detection system (GDS); this device will be installed to detect cases of gunshots in the high crime area. This will enable an easier time for response.

Digital video recording device; this will be mounted on the shirt or in the car to record the investigative activities. The recordings can, later on, be referred to during evidence analyses.

Steps to Procure More Funds for the Investigation

Partnering with private establishments and agencies, contracting with the vendors to pay up-front for some of the investigations. The private partner will then be refunded from the money recovered from the fines applied to the perpetrators once found guilty.

Apply for funding from the National Institute of Justice to support the investigations. Create and describe a list of 10 investigative steps you would take to address this situation.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask