<?xml version="1.0" encoding="UTF-8" ?>
<!-- This is a WordPress eXtended RSS file generated by WordPress as an export of your site. -->
<!-- It contains information about your site's posts, pages, comments, categories, and other content. -->
<!-- You may use this file to transfer that content from one site to another. -->
<!-- This file is not intended to serve as a complete backup of your site. -->

<!-- To import this information into a WordPress site follow these steps: -->
<!-- 1. Log in to that site as an administrator. -->
<!-- 2. Go to Tools: Import in the WordPress admin panel. -->
<!-- 3. Install the "WordPress" importer from the list. -->
<!-- 4. Activate & Run Importer. -->
<!-- 5. Upload this file using the form provided on that page. -->
<!-- 6. You will first be asked to map the authors in this export file to users -->
<!--    on the site. For each author, you may choose to map to an -->
<!--    existing user on the site or to create a new user. -->
<!-- 7. WordPress will then import each of the posts, pages, comments, categories, etc. -->
<!--    contained in this file into your site. -->

	<!-- generator="WordPress/5.5.3" created="2021-01-12 23:19" -->
<rss version="2.0"
	xmlns:excerpt="http://wordpress.org/export/1.2/excerpt/"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:wp="http://wordpress.org/export/1.2/"
>

<channel>
	<title>Introduction to Criminal Investigation: Processes, Practices and Thinking</title>
	<link>https://pressbooks.bccampus.ca/criminalinvestigation</link>
	<description>Open Textbook</description>
	<pubDate>Tue, 12 Jan 2021 23:19:18 +0000</pubDate>
	<language>en-CA</language>
	<wp:wxr_version>1.2</wp:wxr_version>
	<wp:base_site_url>http://pressbooks.bccampus.ca/</wp:base_site_url>
	<wp:base_blog_url>https://pressbooks.bccampus.ca/criminalinvestigation</wp:base_blog_url>

		<wp:author><wp:author_id>120</wp:author_id><wp:author_login><![CDATA[klambert]]></wp:author_login><wp:author_email><![CDATA[klambert@bccampus.ca]]></wp:author_email><wp:author_display_name><![CDATA[klambert]]></wp:author_display_name><wp:author_first_name><![CDATA[Krista]]></wp:author_first_name><wp:author_last_name><![CDATA[Lambert]]></wp:author_last_name></wp:author>
	<wp:author><wp:author_id>31</wp:author_id><wp:author_login><![CDATA[ctli]]></wp:author_login><wp:author_email><![CDATA[telt@jibc.ca]]></wp:author_email><wp:author_display_name><![CDATA[ctli]]></wp:author_display_name><wp:author_first_name><![CDATA[]]></wp:author_first_name><wp:author_last_name><![CDATA[]]></wp:author_last_name></wp:author>
	<wp:author><wp:author_id>724</wp:author_id><wp:author_login><![CDATA[kqzheng]]></wp:author_login><wp:author_email><![CDATA[kqzheng@bccampus.ca]]></wp:author_email><wp:author_display_name><![CDATA[Kaitlyn Zheng]]></wp:author_display_name><wp:author_first_name><![CDATA[]]></wp:author_first_name><wp:author_last_name><![CDATA[]]></wp:author_last_name></wp:author>
	<wp:author><wp:author_id>727</wp:author_id><wp:author_login><![CDATA[acheveldave]]></wp:author_login><wp:author_email><![CDATA[acheveldave@bccampus.ca]]></wp:author_email><wp:author_display_name><![CDATA[acheveldave]]></wp:author_display_name><wp:author_first_name><![CDATA[]]></wp:author_first_name><wp:author_last_name><![CDATA[]]></wp:author_last_name></wp:author>
	<wp:author><wp:author_id>1</wp:author_id><wp:author_login><![CDATA[bpayne]]></wp:author_login><wp:author_email><![CDATA[wp-admin@bccampus.ca]]></wp:author_email><wp:author_display_name><![CDATA[bpayne]]></wp:author_display_name><wp:author_first_name><![CDATA[]]></wp:author_first_name><wp:author_last_name><![CDATA[]]></wp:author_last_name></wp:author>
	<wp:author><wp:author_id>103</wp:author_id><wp:author_login><![CDATA[jgray]]></wp:author_login><wp:author_email><![CDATA[josie.gray@bccampus.ca]]></wp:author_email><wp:author_display_name><![CDATA[Josie]]></wp:author_display_name><wp:author_first_name><![CDATA[Josie]]></wp:author_first_name><wp:author_last_name><![CDATA[]]></wp:author_last_name></wp:author>

		<wp:category>
		<wp:term_id>1</wp:term_id>
		<wp:category_nicename><![CDATA[uncategorized]]></wp:category_nicename>
		<wp:category_parent><![CDATA[]]></wp:category_parent>
		<wp:cat_name><![CDATA[Uncategorised]]></wp:cat_name>
	</wp:category>
				<wp:term>
		<wp:term_id>23</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[about-the-author]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[About the Author]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>24</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[about-the-publisher]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[About the Publisher]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>2</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[abstracts]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Abstract]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>3</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[acknowledgements]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Acknowledgements]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>25</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[acknowledgements]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Acknowledgements]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>26</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[afterword]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Afterword]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>58</wp:term_id>
		<wp:term_taxonomy><![CDATA[license]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[all-rights-reserved]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[All Rights Reserved]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>27</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[appendix]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Appendix]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>28</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[authors-note]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Author's Note]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>29</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[back-of-book-ad]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Back of Book Ad]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>4</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[before-title]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Before Title Page]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>30</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[bibliography]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Bibliography]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>31</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[biographical-note]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Biographical Note]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>52</wp:term_id>
		<wp:term_taxonomy><![CDATA[license]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[cc-by]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[CC BY (Attribution)]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>55</wp:term_id>
		<wp:term_taxonomy><![CDATA[license]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[cc-by-nc]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[CC BY-NC (Attribution NonCommercial)]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>57</wp:term_id>
		<wp:term_taxonomy><![CDATA[license]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[cc-by-nc-nd]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[CC BY-NC-ND (Attribution NonCommercial NoDerivatives)]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>56</wp:term_id>
		<wp:term_taxonomy><![CDATA[license]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[cc-by-nc-sa]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[CC BY-NC-SA (Attribution NonCommercial ShareAlike)]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>54</wp:term_id>
		<wp:term_taxonomy><![CDATA[license]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[cc-by-nd]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[CC BY-ND (Attribution NoDerivatives)]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>53</wp:term_id>
		<wp:term_taxonomy><![CDATA[license]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[cc-by-sa]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[CC BY-SA (Attribution ShareAlike)]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>59</wp:term_id>
		<wp:term_taxonomy><![CDATA[license]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[cc-zero]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[CC0 (Creative Commons Zero)]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>5</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[chronology-timeline]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Chronology, Timeline]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>32</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[colophon]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Colophon]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>33</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[conclusion]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Conclusion]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>34</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[credits]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Credits]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>65</wp:term_id>
		<wp:term_taxonomy><![CDATA[contributor]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[darryl]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Darryl]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>62</wp:term_id>
		<wp:term_taxonomy><![CDATA[contributor]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[darryl-plecas]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Darryl Plecas]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>6</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[dedication]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Dedication]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>35</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[dedication]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Dedication]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>7</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[disclaimer]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Disclaimer]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>8</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[epigraph]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Epigraph]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>36</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[epilogue]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Epilogue]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>60</wp:term_id>
		<wp:term_taxonomy><![CDATA[contributor]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[florence-daddey]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Florence Daddey]]></wp:term_name>
		<wp:termmeta>
			<wp:meta_key><![CDATA[contributor_first_name]]></wp:meta_key>
			<wp:meta_value><![CDATA[Florence]]></wp:meta_value>
		</wp:termmeta>
		<wp:termmeta>
			<wp:meta_key><![CDATA[contributor_last_name]]></wp:meta_key>
			<wp:meta_value><![CDATA[Daddey]]></wp:meta_value>
		</wp:termmeta>
	</wp:term>
		<wp:term>
		<wp:term_id>9</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[foreword]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Foreword]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>63</wp:term_id>
		<wp:term_taxonomy><![CDATA[contributor]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[gehl]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Gehl]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>50</wp:term_id>
		<wp:term_taxonomy><![CDATA[contributor]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[gehl-rod-plecas-darryl]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Gehl, Rod; Plecas, Darryl]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>10</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[genealogy-family-tree]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Genealogy, Family Tree]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>37</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[glossary]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Glossary]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>11</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[image-credits]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Image credits]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>38</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[index]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Index]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>12</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[introduction]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Introduction]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>13</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[list-of-abbreviations]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[List of Abbreviations]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>14</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[list-of-characters]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[List of Characters]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>15</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[list-of-illustrations]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[List of Illustrations]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>16</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[list-of-tables]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[List of Tables]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>17</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[miscellaneous]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Miscellaneous]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>39</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[miscellaneous]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Miscellaneous]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>40</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[notes]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Notes]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>48</wp:term_id>
		<wp:term_taxonomy><![CDATA[chapter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[numberless]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Numberless]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>18</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[other-books]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Other Books by Author]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>41</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[other-books]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Other Books by Author]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>42</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[permissions]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Permissions]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>19</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[preface]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Preface]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>20</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[prologue]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Prologue]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>51</wp:term_id>
		<wp:term_taxonomy><![CDATA[license]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[public-domain]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Public Domain]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>43</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[reading-group-guide]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Reading Group Guide]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>21</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[recommended-citation]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Recommended citation]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>44</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[resources]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Resources]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>61</wp:term_id>
		<wp:term_taxonomy><![CDATA[contributor]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[rod-gehl]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Rod Gehl]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>49</wp:term_id>
		<wp:term_taxonomy><![CDATA[contributor]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[rod-gehl-and-darryl-plecas]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Rod Gehl and Darryl Plecas]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>64</wp:term_id>
		<wp:term_taxonomy><![CDATA[contributor]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[rod-plecas]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Rod; Plecas]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>45</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[sources]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Sources]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>47</wp:term_id>
		<wp:term_taxonomy><![CDATA[chapter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[standard]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Standard]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>46</wp:term_id>
		<wp:term_taxonomy><![CDATA[back-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[suggested-reading]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Suggested Reading]]></wp:term_name>
	</wp:term>
		<wp:term>
		<wp:term_id>22</wp:term_id>
		<wp:term_taxonomy><![CDATA[front-matter-type]]></wp:term_taxonomy>
		<wp:term_slug><![CDATA[title-page]]></wp:term_slug>
		<wp:term_parent><![CDATA[]]></wp:term_parent>
		<wp:term_name><![CDATA[Title Page]]></wp:term_name>
	</wp:term>
		
	<generator>https://wordpress.org/?v=5.5.3</generator>

		<item>
		<title>image7</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image7/</link>
		<pubDate>Mon, 24 Apr 2017 18:46:07 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/04/image7.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>27</wp:post_id>
		<wp:post_date><![CDATA[2017-04-24 14:46:07]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-04-24 18:46:07]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[open]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image7]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/04/image7.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2017/04/image7.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1700;s:6:"height";i:2200;s:4:"file";s:18:"2017/04/image7.jpg";s:5:"sizes";a:7:{s:9:"thumbnail";a:4:{s:4:"file";s:18:"image7-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:18:"image7-232x300.jpg";s:5:"width";i:232;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:18:"image7-768x994.jpg";s:5:"width";i:768;s:6:"height";i:994;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:19:"image7-791x1024.jpg";s:5:"width";i:791;s:6:"height";i:1024;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:16:"image7-65x84.jpg";s:5:"width";i:65;s:6:"height";i:84;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:18:"image7-225x291.jpg";s:5:"width";i:225;s:6:"height";i:291;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:18:"image7-350x453.jpg";s:5:"width";i:350;s:6:"height";i:453;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image7-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image7-1/</link>
		<pubDate>Mon, 24 Apr 2017 18:46:09 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/04/image7-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>30</wp:post_id>
		<wp:post_date><![CDATA[2017-04-24 14:46:09]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-04-24 18:46:09]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[open]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image7-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/04/image7-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2017/04/image7-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1700;s:6:"height";i:2200;s:4:"file";s:20:"2017/04/image7-1.jpg";s:5:"sizes";a:7:{s:9:"thumbnail";a:4:{s:4:"file";s:20:"image7-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:20:"image7-1-232x300.jpg";s:5:"width";i:232;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:20:"image7-1-768x994.jpg";s:5:"width";i:768;s:6:"height";i:994;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:21:"image7-1-791x1024.jpg";s:5:"width";i:791;s:6:"height";i:1024;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:18:"image7-1-65x84.jpg";s:5:"width";i:65;s:6:"height";i:84;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:20:"image7-1-225x291.jpg";s:5:"width";i:225;s:6:"height";i:291;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:20:"image7-1-350x453.jpg";s:5:"width";i:350;s:6:"height";i:453;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image7-2</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image7-2/</link>
		<pubDate>Mon, 24 Apr 2017 18:46:10 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/04/image7-2.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>31</wp:post_id>
		<wp:post_date><![CDATA[2017-04-24 14:46:10]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-04-24 18:46:10]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[open]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image7-2]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/04/image7-2.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2017/04/image7-2.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1700;s:6:"height";i:2200;s:4:"file";s:20:"2017/04/image7-2.jpg";s:5:"sizes";a:7:{s:9:"thumbnail";a:4:{s:4:"file";s:20:"image7-2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:20:"image7-2-232x300.jpg";s:5:"width";i:232;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:20:"image7-2-768x994.jpg";s:5:"width";i:768;s:6:"height";i:994;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:21:"image7-2-791x1024.jpg";s:5:"width";i:791;s:6:"height";i:1024;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:18:"image7-2-65x84.jpg";s:5:"width";i:65;s:6:"height";i:84;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:20:"image7-2-225x291.jpg";s:5:"width";i:225;s:6:"height";i:291;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:20:"image7-2-350x453.jpg";s:5:"width";i:350;s:6:"height";i:453;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image7-3</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image7-3/</link>
		<pubDate>Mon, 24 Apr 2017 18:46:12 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/04/image7-3.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>35</wp:post_id>
		<wp:post_date><![CDATA[2017-04-24 14:46:12]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-04-24 18:46:12]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[open]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image7-3]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/04/image7-3.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2017/04/image7-3.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1700;s:6:"height";i:2200;s:4:"file";s:20:"2017/04/image7-3.jpg";s:5:"sizes";a:7:{s:9:"thumbnail";a:4:{s:4:"file";s:20:"image7-3-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:20:"image7-3-232x300.jpg";s:5:"width";i:232;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:20:"image7-3-768x994.jpg";s:5:"width";i:768;s:6:"height";i:994;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:21:"image7-3-791x1024.jpg";s:5:"width";i:791;s:6:"height";i:1024;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:18:"image7-3-65x84.jpg";s:5:"width";i:65;s:6:"height";i:84;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:20:"image7-3-225x291.jpg";s:5:"width";i:225;s:6:"height";i:291;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:20:"image7-3-350x453.jpg";s:5:"width";i:350;s:6:"height";i:453;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Photo-Lineup</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image7-4/</link>
		<pubDate>Mon, 24 Apr 2017 18:46:13 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/04/image7-4.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>36</wp:post_id>
		<wp:post_date><![CDATA[2017-04-24 14:46:13]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-04-24 18:46:13]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[open]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image7-4]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/04/image7-4.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2017/04/image7-4.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1700;s:6:"height";i:2200;s:4:"file";s:20:"2017/04/image7-4.jpg";s:5:"sizes";a:7:{s:9:"thumbnail";a:4:{s:4:"file";s:20:"image7-4-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:20:"image7-4-232x300.jpg";s:5:"width";i:232;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:20:"image7-4-768x994.jpg";s:5:"width";i:768;s:6:"height";i:994;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:21:"image7-4-791x1024.jpg";s:5:"width";i:791;s:6:"height";i:1024;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:18:"image7-4-65x84.jpg";s:5:"width";i:65;s:6:"height";i:84;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:20:"image7-4-225x291.jpg";s:5:"width";i:225;s:6:"height";i:291;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:20:"image7-4-350x453.jpg";s:5:"width";i:350;s:6:"height";i:453;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[Photo-Lineup]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Evidence-Types</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-3-what-you-need-to-know-about-evidence/img-01/</link>
		<pubDate>Mon, 08 May 2017 18:37:37 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-01.png</guid>
		<description></description>
		<content:encoded><![CDATA[Evidence Types: 
1. Direct Evidence: Will prove point in fact without interpretation of circumstances. 2. Indirect Evidence Circumstantial evidence interpretation required to prove point in fact. ]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>76</wp:post_id>
		<wp:post_date><![CDATA[2017-05-08 14:37:37]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-05-08 18:37:37]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[img-01]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>75</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-01.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2017/05/Img-01.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:2251;s:6:"height";i:1101;s:4:"file";s:18:"2017/05/Img-01.png";s:5:"sizes";a:7:{s:9:"thumbnail";a:4:{s:4:"file";s:18:"Img-01-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:6:"medium";a:4:{s:4:"file";s:18:"Img-01-300x147.png";s:5:"width";i:300;s:6:"height";i:147;s:9:"mime-type";s:9:"image/png";}s:12:"medium_large";a:4:{s:4:"file";s:18:"Img-01-768x376.png";s:5:"width";i:768;s:6:"height";i:376;s:9:"mime-type";s:9:"image/png";}s:5:"large";a:4:{s:4:"file";s:19:"Img-01-1024x501.png";s:5:"width";i:1024;s:6:"height";i:501;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:16:"Img-01-65x32.png";s:5:"width";i:65;s:6:"height";i:32;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:18:"Img-01-225x110.png";s:5:"width";i:225;s:6:"height";i:110;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:18:"Img-01-350x171.png";s:5:"width";i:350;s:6:"height";i:171;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[Types of Evidence chart. Direct Evidence and Indirect Evidence.]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Investigative-Response-Priority</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-4-the-process-of-investigation/img-02/</link>
		<pubDate>Mon, 08 May 2017 18:57:56 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-02.png</guid>
		<description></description>
		<content:encoded><![CDATA[Two levels. Level 1 is protecting the life and safety of people including police officers attending the scenes of crime. Level 2 includes identify, gather and preserve evidence; id and arrest suspects; record and document event; protection of property. ]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>80</wp:post_id>
		<wp:post_date><![CDATA[2017-05-08 14:57:56]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-05-08 18:57:56]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[img-02]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>79</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-02.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2017/05/Img-02.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:2251;s:6:"height";i:1732;s:4:"file";s:18:"2017/05/Img-02.png";s:5:"sizes";a:7:{s:9:"thumbnail";a:4:{s:4:"file";s:18:"Img-02-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:6:"medium";a:4:{s:4:"file";s:18:"Img-02-300x231.png";s:5:"width";i:300;s:6:"height";i:231;s:9:"mime-type";s:9:"image/png";}s:12:"medium_large";a:4:{s:4:"file";s:18:"Img-02-768x591.png";s:5:"width";i:768;s:6:"height";i:591;s:9:"mime-type";s:9:"image/png";}s:5:"large";a:4:{s:4:"file";s:19:"Img-02-1024x788.png";s:5:"width";i:1024;s:6:"height";i:788;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:16:"Img-02-65x50.png";s:5:"width";i:65;s:6:"height";i:50;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:18:"Img-02-225x173.png";s:5:"width";i:225;s:6:"height";i:173;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:18:"Img-02-350x269.png";s:5:"width";i:350;s:6:"height";i:269;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[Investigative Response Priority Results]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Exigent-Circumstances</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-4-the-process-of-investigation/img-03/</link>
		<pubDate>Mon, 08 May 2017 19:08:23 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-03.png</guid>
		<description></description>
		<content:encoded><![CDATA[Active Event + Explicit or Implied Threat to Life or Safety = Exigent Circumstances]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>81</wp:post_id>
		<wp:post_date><![CDATA[2017-05-08 15:08:23]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-05-08 19:08:23]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[img-03]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>79</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-03.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2017/05/Img-03.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:2251;s:6:"height";i:589;s:4:"file";s:18:"2017/05/Img-03.png";s:5:"sizes";a:7:{s:9:"thumbnail";a:4:{s:4:"file";s:18:"Img-03-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:6:"medium";a:4:{s:4:"file";s:17:"Img-03-300x78.png";s:5:"width";i:300;s:6:"height";i:78;s:9:"mime-type";s:9:"image/png";}s:12:"medium_large";a:4:{s:4:"file";s:18:"Img-03-768x201.png";s:5:"width";i:768;s:6:"height";i:201;s:9:"mime-type";s:9:"image/png";}s:5:"large";a:4:{s:4:"file";s:19:"Img-03-1024x268.png";s:5:"width";i:1024;s:6:"height";i:268;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:16:"Img-03-65x17.png";s:5:"width";i:65;s:6:"height";i:17;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:17:"Img-03-225x59.png";s:5:"width";i:225;s:6:"height";i:59;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:17:"Img-03-350x92.png";s:5:"width";i:350;s:6:"height";i:92;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[Active Event + Explicit or Implied Threat to Life or Safety = Exigent Circumstances]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Response-Transition-Matrix</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-4-the-process-of-investigation/img-04/</link>
		<pubDate>Mon, 08 May 2017 19:15:13 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-04.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>82</wp:post_id>
		<wp:post_date><![CDATA[2017-05-08 15:15:13]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-05-08 19:15:13]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[img-04]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>79</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-04.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2017/05/Img-04.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:2251;s:6:"height";i:2207;s:4:"file";s:18:"2017/05/Img-04.png";s:5:"sizes";a:7:{s:9:"thumbnail";a:4:{s:4:"file";s:18:"Img-04-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:6:"medium";a:4:{s:4:"file";s:18:"Img-04-300x294.png";s:5:"width";i:300;s:6:"height";i:294;s:9:"mime-type";s:9:"image/png";}s:12:"medium_large";a:4:{s:4:"file";s:18:"Img-04-768x753.png";s:5:"width";i:768;s:6:"height";i:753;s:9:"mime-type";s:9:"image/png";}s:5:"large";a:4:{s:4:"file";s:20:"Img-04-1024x1004.png";s:5:"width";i:1024;s:6:"height";i:1004;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:16:"Img-04-65x64.png";s:5:"width";i:65;s:6:"height";i:64;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:18:"Img-04-225x221.png";s:5:"width";i:225;s:6:"height";i:221;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:18:"Img-04-350x343.png";s:5:"width";i:350;s:6:"height";i:343;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[Response-Transition-Matrix]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Investigative-Process-Funnel</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-5-strategic-investigative-response/img-05/</link>
		<pubDate>Mon, 08 May 2017 19:20:56 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-05.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>85</wp:post_id>
		<wp:post_date><![CDATA[2017-05-08 15:20:56]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-05-08 19:20:56]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[img-05]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>84</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-05.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2017/05/Img-05.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:2251;s:6:"height";i:2781;s:4:"file";s:18:"2017/05/Img-05.png";s:5:"sizes";a:7:{s:9:"thumbnail";a:4:{s:4:"file";s:18:"Img-05-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:6:"medium";a:4:{s:4:"file";s:18:"Img-05-243x300.png";s:5:"width";i:243;s:6:"height";i:300;s:9:"mime-type";s:9:"image/png";}s:12:"medium_large";a:4:{s:4:"file";s:18:"Img-05-768x949.png";s:5:"width";i:768;s:6:"height";i:949;s:9:"mime-type";s:9:"image/png";}s:5:"large";a:4:{s:4:"file";s:19:"Img-05-829x1024.png";s:5:"width";i:829;s:6:"height";i:1024;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:16:"Img-05-65x80.png";s:5:"width";i:65;s:6:"height";i:80;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:18:"Img-05-225x278.png";s:5:"width";i:225;s:6:"height";i:278;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:18:"Img-05-350x432.png";s:5:"width";i:350;s:6:"height";i:432;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[Investigative-Process-Funnel]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>STAIR-Tool</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-5-strategic-investigative-response/img-06/</link>
		<pubDate>Mon, 08 May 2017 19:24:05 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-06.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>86</wp:post_id>
		<wp:post_date><![CDATA[2017-05-08 15:24:05]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-05-08 19:24:05]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[img-06]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>84</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-06.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2017/05/Img-06.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:2251;s:6:"height";i:2924;s:4:"file";s:18:"2017/05/Img-06.png";s:5:"sizes";a:7:{s:9:"thumbnail";a:4:{s:4:"file";s:18:"Img-06-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:6:"medium";a:4:{s:4:"file";s:18:"Img-06-231x300.png";s:5:"width";i:231;s:6:"height";i:300;s:9:"mime-type";s:9:"image/png";}s:12:"medium_large";a:4:{s:4:"file";s:18:"Img-06-768x998.png";s:5:"width";i:768;s:6:"height";i:998;s:9:"mime-type";s:9:"image/png";}s:5:"large";a:4:{s:4:"file";s:19:"Img-06-788x1024.png";s:5:"width";i:788;s:6:"height";i:1024;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:16:"Img-06-65x84.png";s:5:"width";i:65;s:6:"height";i:84;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:18:"Img-06-225x292.png";s:5:"width";i:225;s:6:"height";i:292;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:18:"Img-06-350x455.png";s:5:"width";i:350;s:6:"height";i:455;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[STAIR-Tool]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Originating-Stages-Evidence</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-8-crime-scene-management/img-07/</link>
		<pubDate>Mon, 08 May 2017 20:31:41 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-07.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>94</wp:post_id>
		<wp:post_date><![CDATA[2017-05-08 16:31:41]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-05-08 20:31:41]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[img-07]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>93</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-07.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2017/05/Img-07.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:2251;s:6:"height";i:1399;s:4:"file";s:18:"2017/05/Img-07.png";s:5:"sizes";a:7:{s:9:"thumbnail";a:4:{s:4:"file";s:18:"Img-07-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:6:"medium";a:4:{s:4:"file";s:18:"Img-07-300x186.png";s:5:"width";i:300;s:6:"height";i:186;s:9:"mime-type";s:9:"image/png";}s:12:"medium_large";a:4:{s:4:"file";s:18:"Img-07-768x477.png";s:5:"width";i:768;s:6:"height";i:477;s:9:"mime-type";s:9:"image/png";}s:5:"large";a:4:{s:4:"file";s:19:"Img-07-1024x636.png";s:5:"width";i:1024;s:6:"height";i:636;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:16:"Img-07-65x40.png";s:5:"width";i:65;s:6:"height";i:40;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:18:"Img-07-225x140.png";s:5:"width";i:225;s:6:"height";i:140;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:18:"Img-07-350x218.png";s:5:"width";i:350;s:6:"height";i:218;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[Originating-Stages-Evidence]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>The-Crime</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-8-crime-scene-management/img-08/</link>
		<pubDate>Mon, 08 May 2017 20:32:42 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-08.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>95</wp:post_id>
		<wp:post_date><![CDATA[2017-05-08 16:32:42]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-05-08 20:32:42]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[img-08]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>93</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-08.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2017/05/Img-08.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:2251;s:6:"height";i:2032;s:4:"file";s:18:"2017/05/Img-08.png";s:5:"sizes";a:7:{s:9:"thumbnail";a:4:{s:4:"file";s:18:"Img-08-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:6:"medium";a:4:{s:4:"file";s:18:"Img-08-300x271.png";s:5:"width";i:300;s:6:"height";i:271;s:9:"mime-type";s:9:"image/png";}s:12:"medium_large";a:4:{s:4:"file";s:18:"Img-08-768x693.png";s:5:"width";i:768;s:6:"height";i:693;s:9:"mime-type";s:9:"image/png";}s:5:"large";a:4:{s:4:"file";s:19:"Img-08-1024x924.png";s:5:"width";i:1024;s:6:"height";i:924;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:16:"Img-08-65x59.png";s:5:"width";i:65;s:6:"height";i:59;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:18:"Img-08-225x203.png";s:5:"width";i:225;s:6:"height";i:203;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:18:"Img-08-350x316.png";s:5:"width";i:350;s:6:"height";i:316;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[The-Crime]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Crime Scene Security Log</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-8-crime-scene-management/crime-scene-security-log/</link>
		<pubDate>Wed, 05 Jul 2017 16:16:48 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/CRIME-SCENE-SECURITY-LOG.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[This is a form used to log crime scene security. ]]></content:encoded>
		<excerpt:encoded><![CDATA[Crime Scene Security Log form. ]]></excerpt:encoded>
		<wp:post_id>139</wp:post_id>
		<wp:post_date><![CDATA[2017-07-05 12:16:48]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-07-05 16:16:48]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[crime-scene-security-log]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>93</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/CRIME-SCENE-SECURITY-LOG.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2017/05/CRIME-SCENE-SECURITY-LOG.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1700;s:6:"height";i:2200;s:4:"file";s:36:"2017/05/CRIME-SCENE-SECURITY-LOG.jpg";s:5:"sizes";a:7:{s:9:"thumbnail";a:4:{s:4:"file";s:36:"CRIME-SCENE-SECURITY-LOG-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:36:"CRIME-SCENE-SECURITY-LOG-232x300.jpg";s:5:"width";i:232;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:36:"CRIME-SCENE-SECURITY-LOG-768x994.jpg";s:5:"width";i:768;s:6:"height";i:994;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:37:"CRIME-SCENE-SECURITY-LOG-791x1024.jpg";s:5:"width";i:791;s:6:"height";i:1024;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:34:"CRIME-SCENE-SECURITY-LOG-65x84.jpg";s:5:"width";i:65;s:6:"height";i:84;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:36:"CRIME-SCENE-SECURITY-LOG-225x291.jpg";s:5:"width";i:225;s:6:"height";i:291;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:36:"CRIME-SCENE-SECURITY-LOG-350x453.jpg";s:5:"width";i:350;s:6:"height";i:453;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[Crime Scene Security Log]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Exhibit Log</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-8-crime-scene-management/exhibit-log/</link>
		<pubDate>Wed, 05 Jul 2017 16:26:10 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/EXHIBIT-LOG.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>140</wp:post_id>
		<wp:post_date><![CDATA[2017-07-05 12:26:10]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-07-05 16:26:10]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[exhibit-log]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>93</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/EXHIBIT-LOG.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2017/05/EXHIBIT-LOG.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1700;s:6:"height";i:2200;s:4:"file";s:23:"2017/05/EXHIBIT-LOG.jpg";s:5:"sizes";a:7:{s:9:"thumbnail";a:4:{s:4:"file";s:23:"EXHIBIT-LOG-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:23:"EXHIBIT-LOG-232x300.jpg";s:5:"width";i:232;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:23:"EXHIBIT-LOG-768x994.jpg";s:5:"width";i:768;s:6:"height";i:994;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:24:"EXHIBIT-LOG-791x1024.jpg";s:5:"width";i:791;s:6:"height";i:1024;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:21:"EXHIBIT-LOG-65x84.jpg";s:5:"width";i:65;s:6:"height";i:84;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:23:"EXHIBIT-LOG-225x291.jpg";s:5:"width";i:225;s:6:"height";i:291;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:23:"EXHIBIT-LOG-350x453.jpg";s:5:"width";i:350;s:6:"height";i:453;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[Exhibit Log]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Cover Image</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/?attachment_id=200</link>
		<pubDate>Mon, 14 Aug 2017 20:45:54 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?attachment_id=200</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>200</wp:post_id>
		<wp:post_date><![CDATA[2017-08-14 16:45:54]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-08-14 20:45:54]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[pb-cover-image]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>17</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/08/cover.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2017/08/cover.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:2550;s:6:"height";i:3300;s:4:"file";s:17:"2017/08/cover.jpg";s:5:"sizes";a:7:{s:9:"thumbnail";a:4:{s:4:"file";s:17:"cover-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:17:"cover-232x300.jpg";s:5:"width";i:232;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:17:"cover-768x994.jpg";s:5:"width";i:768;s:6:"height";i:994;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:18:"cover-791x1024.jpg";s:5:"width";i:791;s:6:"height";i:1024;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:15:"cover-65x84.jpg";s:5:"width";i:65;s:6:"height";i:84;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:17:"cover-225x291.jpg";s:5:"width";i:225;s:6:"height";i:291;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:17:"cover-350x453.jpg";s:5:"width";i:350;s:6:"height";i:453;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"1";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Casually Dressed Businesspeople Having Meeting In Boardroom</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/casually-dressed-businesspeople-having-meeting-in-boardroom/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:08 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/1-casual-meeting.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[Casually Dressed Businesspeople Having Meeting In Boardroom]]></excerpt:encoded>
		<wp:post_id>292</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:08]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:08]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[casually-dressed-businesspeople-having-meeting-in-boardroom]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/1-casual-meeting-scaled.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/1-casual-meeting-scaled.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:6:{s:5:"width";i:2560;s:6:"height";i:1706;s:4:"file";s:35:"2020/08/1-casual-meeting-scaled.jpg";s:5:"sizes";a:9:{s:6:"medium";a:4:{s:4:"file";s:28:"1-casual-meeting-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:29:"1-casual-meeting-1024x682.jpg";s:5:"width";i:1024;s:6:"height";i:682;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:28:"1-casual-meeting-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:28:"1-casual-meeting-768x512.jpg";s:5:"width";i:768;s:6:"height";i:512;s:9:"mime-type";s:10:"image/jpeg";}s:9:"1536x1536";a:4:{s:4:"file";s:30:"1-casual-meeting-1536x1024.jpg";s:5:"width";i:1536;s:6:"height";i:1024;s:9:"mime-type";s:10:"image/jpeg";}s:9:"2048x2048";a:4:{s:4:"file";s:30:"1-casual-meeting-2048x1365.jpg";s:5:"width";i:2048;s:6:"height";i:1365;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:26:"1-casual-meeting-65x43.jpg";s:5:"width";i:65;s:6:"height";i:43;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:28:"1-casual-meeting-225x150.jpg";s:5:"width";i:225;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:28:"1-casual-meeting-350x233.jpg";s:5:"width";i:350;s:6:"height";i:233;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:3:"3.5";s:6:"credit";s:0:"";s:6:"camera";s:14:"Canon EOS-1D X";s:7:"caption";s:59:"Casually Dressed Businesspeople Having Meeting In Boardroom";s:17:"created_timestamp";s:10:"1397411239";s:9:"copyright";s:0:"";s:12:"focal_length";s:2:"55";s:3:"iso";s:3:"800";s:13:"shutter_speed";s:7:"0.00625";s:5:"title";s:59:"Casually Dressed Businesspeople Having Meeting In Boardroom";s:11:"orientation";s:1:"1";s:8:"keywords";a:49:{i:0;s:8:"business";i:1;s:11:"businessman";i:2;s:13:"businesswoman";i:3;s:14:"businessperson";i:4;s:7:"meeting";i:5;s:6:"screen";i:6;s:12:"presentation";i:7;s:7:"working";i:8;s:9:"boardroom";i:9;s:5:"table";i:10;s:10:"discussion";i:11;s:8:"together";i:12;s:11:"cooperation";i:13;s:4:"team";i:14;s:8:"teamwork";i:15;s:7:"talking";i:16;s:7:"sitting";i:17;s:8:"standing";i:18;s:5:"chair";i:19;s:6:"office";i:20;s:9:"executive";i:21;s:6:"senior";i:22;s:7:"seniors";i:23;s:6:"modern";i:24;s:8:"standing";i:25;s:4:"male";i:26;s:6:"female";i:27;s:5:"woman";i:28;s:5:"women";i:29;s:3:"man";i:30;s:3:"men";i:31;s:12:"seven people";i:32;s:6:"person";i:33;s:6:"people";i:34;s:9:"caucasian";i:35;s:3:"60s";i:36;s:7:"sixties";i:37;s:3:"30s";i:38;s:8:"thirties";i:39;s:3:"20s";i:40;s:8:"twenties";i:41;s:10:"mixed race";i:42;s:16:"african american";i:43;s:5:"black";i:44;s:15:"native american";i:45;s:5:"asian";i:46;s:10:"horizontal";i:47;s:8:"chairman";i:48;s:15:"casual clothing";}}s:14:"original_image";s:20:"1-casual-meeting.jpg";}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image3-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image3-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:12 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image3-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>293</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:12]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:12]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image3-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image3-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image3-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:613;s:6:"height";i:447;s:4:"file";s:20:"2020/08/image3-1.jpg";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:20:"image3-1-300x219.jpg";s:5:"width";i:300;s:6:"height";i:219;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:20:"image3-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:18:"image3-1-65x47.jpg";s:5:"width";i:65;s:6:"height";i:47;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:20:"image3-1-225x164.jpg";s:5:"width";i:225;s:6:"height";i:164;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:20:"image3-1-350x255.jpg";s:5:"width";i:350;s:6:"height";i:255;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image4-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image4-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:13 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image4-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>294</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:13]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:13]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image4-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image4-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image4-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:300;s:6:"height";i:114;s:4:"file";s:20:"2020/08/image4-1.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:20:"image4-1-150x114.jpg";s:5:"width";i:150;s:6:"height";i:114;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:18:"image4-1-65x25.jpg";s:5:"width";i:65;s:6:"height";i:25;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:19:"image4-1-225x86.jpg";s:5:"width";i:225;s:6:"height";i:86;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image5-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image5-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:13 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image5-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>295</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:13]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:13]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image5-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image5-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image5-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1024;s:6:"height";i:377;s:4:"file";s:20:"2020/08/image5-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:20:"image5-1-300x110.jpg";s:5:"width";i:300;s:6:"height";i:110;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:20:"image5-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:20:"image5-1-768x283.jpg";s:5:"width";i:768;s:6:"height";i:283;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:18:"image5-1-65x24.jpg";s:5:"width";i:65;s:6:"height";i:24;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:19:"image5-1-225x83.jpg";s:5:"width";i:225;s:6:"height";i:83;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:20:"image5-1-350x129.jpg";s:5:"width";i:350;s:6:"height";i:129;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image6-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image6-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:13 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image6-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>296</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:13]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:13]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image6-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image6-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image6-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1024;s:6:"height";i:345;s:4:"file";s:20:"2020/08/image6-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:20:"image6-1-300x101.jpg";s:5:"width";i:300;s:6:"height";i:101;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:20:"image6-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:20:"image6-1-768x259.jpg";s:5:"width";i:768;s:6:"height";i:259;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:18:"image6-1-65x22.jpg";s:5:"width";i:65;s:6:"height";i:22;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:19:"image6-1-225x76.jpg";s:5:"width";i:225;s:6:"height";i:76;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:20:"image6-1-350x118.jpg";s:5:"width";i:350;s:6:"height";i:118;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image7-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image7-1-2/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:13 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image7-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>297</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:13]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:13]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image7-1-2]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image7-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image7-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1024;s:6:"height";i:345;s:4:"file";s:20:"2020/08/image7-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:20:"image7-1-300x101.jpg";s:5:"width";i:300;s:6:"height";i:101;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:20:"image7-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:20:"image7-1-768x259.jpg";s:5:"width";i:768;s:6:"height";i:259;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:18:"image7-1-65x22.jpg";s:5:"width";i:65;s:6:"height";i:22;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:19:"image7-1-225x76.jpg";s:5:"width";i:225;s:6:"height";i:76;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:20:"image7-1-350x118.jpg";s:5:"width";i:350;s:6:"height";i:118;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Technical and socio culture</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/technical-and-socio-culture/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:14 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Technical-and-socio-culture.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>298</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:14]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:14]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[technical-and-socio-culture]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Technical-and-socio-culture.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/Technical-and-socio-culture.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:620;s:6:"height";i:442;s:4:"file";s:39:"2020/08/Technical-and-socio-culture.png";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:39:"Technical-and-socio-culture-300x214.png";s:5:"width";i:300;s:6:"height";i:214;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:39:"Technical-and-socio-culture-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:37:"Technical-and-socio-culture-65x46.png";s:5:"width";i:65;s:6:"height";i:46;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:39:"Technical-and-socio-culture-225x160.png";s:5:"width";i:225;s:6:"height";i:160;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:39:"Technical-and-socio-culture-350x250.png";s:5:"width";i:350;s:6:"height";i:250;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image8-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image8-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:14 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image8-1.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>300</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:14]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:14]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image8-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image8-1.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image8-1.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:975;s:6:"height";i:659;s:4:"file";s:20:"2020/08/image8-1.png";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:20:"image8-1-300x203.png";s:5:"width";i:300;s:6:"height";i:203;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:20:"image8-1-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:12:"medium_large";a:4:{s:4:"file";s:20:"image8-1-768x519.png";s:5:"width";i:768;s:6:"height";i:519;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:18:"image8-1-65x44.png";s:5:"width";i:65;s:6:"height";i:44;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:20:"image8-1-225x152.png";s:5:"width";i:225;s:6:"height";i:152;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:20:"image8-1-350x237.png";s:5:"width";i:350;s:6:"height";i:237;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>3.1-Summary-of-PM-Framework</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/3-1-summary-of-pm-framework/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:15 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/3.1-Summary-of-PM-Framework.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>302</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:15]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:15]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[3-1-summary-of-pm-framework]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/3.1-Summary-of-PM-Framework.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/3.1-Summary-of-PM-Framework.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:697;s:6:"height";i:508;s:4:"file";s:39:"2020/08/3.1-Summary-of-PM-Framework.png";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:39:"3.1-Summary-of-PM-Framework-300x219.png";s:5:"width";i:300;s:6:"height";i:219;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:39:"3.1-Summary-of-PM-Framework-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:37:"3.1-Summary-of-PM-Framework-65x47.png";s:5:"width";i:65;s:6:"height";i:47;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:39:"3.1-Summary-of-PM-Framework-225x164.png";s:5:"width";i:225;s:6:"height";i:164;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:39:"3.1-Summary-of-PM-Framework-350x255.png";s:5:"width";i:350;s:6:"height";i:255;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>3.2-Process-Groups</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/3-2-process-groups/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:15 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/3.2-Process-Groups.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>303</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:15]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:15]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[3-2-process-groups]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/3.2-Process-Groups.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/3.2-Process-Groups.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:463;s:6:"height";i:324;s:4:"file";s:30:"2020/08/3.2-Process-Groups.png";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:30:"3.2-Process-Groups-300x210.png";s:5:"width";i:300;s:6:"height";i:210;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:30:"3.2-Process-Groups-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:28:"3.2-Process-Groups-65x45.png";s:5:"width";i:65;s:6:"height";i:45;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:30:"3.2-Process-Groups-225x157.png";s:5:"width";i:225;s:6:"height";i:157;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:30:"3.2-Process-Groups-350x245.png";s:5:"width";i:350;s:6:"height";i:245;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>3.3-PM-Process-Groups-and-Knowledge-Areas</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/3-3-pm-process-groups-and-knowledge-areas/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:15 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/3.3-PM-Process-Groups-and-Knowledge-Areas.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>304</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:15]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:15]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[3-3-pm-process-groups-and-knowledge-areas]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/3.3-PM-Process-Groups-and-Knowledge-Areas.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/3.3-PM-Process-Groups-and-Knowledge-Areas.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:558;s:6:"height";i:510;s:4:"file";s:53:"2020/08/3.3-PM-Process-Groups-and-Knowledge-Areas.png";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:53:"3.3-PM-Process-Groups-and-Knowledge-Areas-300x274.png";s:5:"width";i:300;s:6:"height";i:274;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:53:"3.3-PM-Process-Groups-and-Knowledge-Areas-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:51:"3.3-PM-Process-Groups-and-Knowledge-Areas-65x59.png";s:5:"width";i:65;s:6:"height";i:59;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:53:"3.3-PM-Process-Groups-and-Knowledge-Areas-225x206.png";s:5:"width";i:225;s:6:"height";i:206;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:53:"3.3-PM-Process-Groups-and-Knowledge-Areas-350x320.png";s:5:"width";i:350;s:6:"height";i:320;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>3.4-Knowledge-Areas-Tools-and-Techniques</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/3-4-knowledge-areas-tools-and-techniques/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:16 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/3.4-Knowledge-Areas-Tools-and-Techniques.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>305</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:16]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:16]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[3-4-knowledge-areas-tools-and-techniques]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/3.4-Knowledge-Areas-Tools-and-Techniques.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/3.4-Knowledge-Areas-Tools-and-Techniques.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:589;s:6:"height";i:501;s:4:"file";s:52:"2020/08/3.4-Knowledge-Areas-Tools-and-Techniques.png";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:52:"3.4-Knowledge-Areas-Tools-and-Techniques-300x255.png";s:5:"width";i:300;s:6:"height";i:255;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:52:"3.4-Knowledge-Areas-Tools-and-Techniques-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:50:"3.4-Knowledge-Areas-Tools-and-Techniques-65x55.png";s:5:"width";i:65;s:6:"height";i:55;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:52:"3.4-Knowledge-Areas-Tools-and-Techniques-225x191.png";s:5:"width";i:225;s:6:"height";i:191;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:52:"3.4-Knowledge-Areas-Tools-and-Techniques-350x298.png";s:5:"width";i:350;s:6:"height";i:298;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image10-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image10-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:16 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image10-1.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>307</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:16]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:16]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image10-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image10-1.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image10-1.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:634;s:6:"height";i:490;s:4:"file";s:21:"2020/08/image10-1.png";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:21:"image10-1-300x232.png";s:5:"width";i:300;s:6:"height";i:232;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image10-1-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image10-1-65x50.png";s:5:"width";i:65;s:6:"height";i:50;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image10-1-225x174.png";s:5:"width";i:225;s:6:"height";i:174;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image10-1-350x271.png";s:5:"width";i:350;s:6:"height";i:271;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>4.2-PM-Organization-Structure</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/4-2-pm-organization-structure/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:17 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/4.2-PM-Organization-Structure.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>308</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:17]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:17]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[4-2-pm-organization-structure]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/4.2-PM-Organization-Structure.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/4.2-PM-Organization-Structure.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:527;s:6:"height";i:385;s:4:"file";s:41:"2020/08/4.2-PM-Organization-Structure.png";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:41:"4.2-PM-Organization-Structure-300x219.png";s:5:"width";i:300;s:6:"height";i:219;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:41:"4.2-PM-Organization-Structure-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:39:"4.2-PM-Organization-Structure-65x47.png";s:5:"width";i:65;s:6:"height";i:47;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:41:"4.2-PM-Organization-Structure-225x164.png";s:5:"width";i:225;s:6:"height";i:164;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:41:"4.2-PM-Organization-Structure-350x256.png";s:5:"width";i:350;s:6:"height";i:256;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image11-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image11-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:17 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image11-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>310</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:17]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:17]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image11-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image11-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image11-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:905;s:6:"height";i:521;s:4:"file";s:21:"2020/08/image11-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image11-1-300x173.jpg";s:5:"width";i:300;s:6:"height";i:173;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image11-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image11-1-768x442.jpg";s:5:"width";i:768;s:6:"height";i:442;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image11-1-65x37.jpg";s:5:"width";i:65;s:6:"height";i:37;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image11-1-225x130.jpg";s:5:"width";i:225;s:6:"height";i:130;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image11-1-350x201.jpg";s:5:"width";i:350;s:6:"height";i:201;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>5.1-Power-Interest-Grid</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/5-1-power-interest-grid/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:18 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/5.1-Power-Interest-Grid.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>311</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:18]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:18]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[5-1-power-interest-grid]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/5.1-Power-Interest-Grid.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/5.1-Power-Interest-Grid.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:438;s:6:"height";i:246;s:4:"file";s:35:"2020/08/5.1-Power-Interest-Grid.png";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:35:"5.1-Power-Interest-Grid-300x168.png";s:5:"width";i:300;s:6:"height";i:168;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:35:"5.1-Power-Interest-Grid-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:33:"5.1-Power-Interest-Grid-65x37.png";s:5:"width";i:65;s:6:"height";i:37;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:35:"5.1-Power-Interest-Grid-225x126.png";s:5:"width";i:225;s:6:"height";i:126;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:35:"5.1-Power-Interest-Grid-350x197.png";s:5:"width";i:350;s:6:"height";i:197;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image13-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image13-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:18 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image13-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>312</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:18]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:18]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image13-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image13-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image13-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:958;s:6:"height";i:465;s:4:"file";s:21:"2020/08/image13-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image13-1-300x146.jpg";s:5:"width";i:300;s:6:"height";i:146;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image13-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image13-1-768x373.jpg";s:5:"width";i:768;s:6:"height";i:373;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image13-1-65x32.jpg";s:5:"width";i:65;s:6:"height";i:32;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image13-1-225x109.jpg";s:5:"width";i:225;s:6:"height";i:109;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image13-1-350x170.jpg";s:5:"width";i:350;s:6:"height";i:170;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image14-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image14-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:18 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image14-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>313</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:18]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:18]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image14-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image14-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image14-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1024;s:6:"height";i:466;s:4:"file";s:21:"2020/08/image14-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image14-1-300x137.jpg";s:5:"width";i:300;s:6:"height";i:137;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image14-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image14-1-768x350.jpg";s:5:"width";i:768;s:6:"height";i:350;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image14-1-65x30.jpg";s:5:"width";i:65;s:6:"height";i:30;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image14-1-225x102.jpg";s:5:"width";i:225;s:6:"height";i:102;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image14-1-350x159.jpg";s:5:"width";i:350;s:6:"height";i:159;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image15-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image15-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:19 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image15-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>315</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:19]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:19]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image15-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image15-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image15-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:800;s:6:"height";i:600;s:4:"file";s:21:"2020/08/image15-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image15-1-300x225.jpg";s:5:"width";i:300;s:6:"height";i:225;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image15-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image15-1-768x576.jpg";s:5:"width";i:768;s:6:"height";i:576;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image15-1-65x49.jpg";s:5:"width";i:65;s:6:"height";i:49;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image15-1-225x169.jpg";s:5:"width";i:225;s:6:"height";i:169;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image15-1-350x263.jpg";s:5:"width";i:350;s:6:"height";i:263;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image16-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image16-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:19 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image16-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>316</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:19]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:19]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image16-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image16-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image16-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:791;s:6:"height";i:1024;s:4:"file";s:21:"2020/08/image16-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image16-1-232x300.jpg";s:5:"width";i:232;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image16-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image16-1-768x994.jpg";s:5:"width";i:768;s:6:"height";i:994;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image16-1-65x84.jpg";s:5:"width";i:65;s:6:"height";i:84;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image16-1-225x291.jpg";s:5:"width";i:225;s:6:"height";i:291;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image16-1-350x453.jpg";s:5:"width";i:350;s:6:"height";i:453;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image17-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image17-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:20 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image17-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>319</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:20]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:20]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image17-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image17-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image17-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:571;s:6:"height";i:352;s:4:"file";s:21:"2020/08/image17-1.jpg";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:21:"image17-1-300x185.jpg";s:5:"width";i:300;s:6:"height";i:185;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image17-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image17-1-65x40.jpg";s:5:"width";i:65;s:6:"height";i:40;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image17-1-225x139.jpg";s:5:"width";i:225;s:6:"height";i:139;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image17-1-350x216.jpg";s:5:"width";i:350;s:6:"height";i:216;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image18-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image18-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:20 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image18-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>320</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:20]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:20]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image18-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image18-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image18-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:512;s:6:"height";i:152;s:4:"file";s:21:"2020/08/image18-1.jpg";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:20:"image18-1-300x89.jpg";s:5:"width";i:300;s:6:"height";i:89;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image18-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image18-1-65x19.jpg";s:5:"width";i:65;s:6:"height";i:19;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:20:"image18-1-225x67.jpg";s:5:"width";i:225;s:6:"height";i:67;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image18-1-350x104.jpg";s:5:"width";i:350;s:6:"height";i:104;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image19-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image19-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:21 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image19-1.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>321</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:21]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:21]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image19-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image19-1.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image19-1.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1024;s:6:"height";i:416;s:4:"file";s:21:"2020/08/image19-1.png";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image19-1-300x122.png";s:5:"width";i:300;s:6:"height";i:122;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image19-1-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image19-1-768x312.png";s:5:"width";i:768;s:6:"height";i:312;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image19-1-65x26.png";s:5:"width";i:65;s:6:"height";i:26;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:20:"image19-1-225x91.png";s:5:"width";i:225;s:6:"height";i:91;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image19-1-350x142.png";s:5:"width";i:350;s:6:"height";i:142;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image20-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image20-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:21 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image20-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>322</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:21]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:21]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image20-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image20-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image20-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:700;s:6:"height";i:1024;s:4:"file";s:21:"2020/08/image20-1.jpg";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:21:"image20-1-205x300.jpg";s:5:"width";i:205;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image20-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image20-1-65x95.jpg";s:5:"width";i:65;s:6:"height";i:95;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image20-1-225x329.jpg";s:5:"width";i:225;s:6:"height";i:329;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image20-1-350x512.jpg";s:5:"width";i:350;s:6:"height";i:512;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image21-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image21-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:22 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image21-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>323</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:22]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:22]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image21-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image21-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image21-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1024;s:6:"height";i:579;s:4:"file";s:21:"2020/08/image21-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image21-1-300x170.jpg";s:5:"width";i:300;s:6:"height";i:170;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image21-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image21-1-768x434.jpg";s:5:"width";i:768;s:6:"height";i:434;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image21-1-65x37.jpg";s:5:"width";i:65;s:6:"height";i:37;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image21-1-225x127.jpg";s:5:"width";i:225;s:6:"height";i:127;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image21-1-350x198.jpg";s:5:"width";i:350;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image22-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image22-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:22 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image22-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>324</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:22]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:22]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image22-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image22-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image22-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1024;s:6:"height";i:544;s:4:"file";s:21:"2020/08/image22-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image22-1-300x159.jpg";s:5:"width";i:300;s:6:"height";i:159;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image22-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image22-1-768x408.jpg";s:5:"width";i:768;s:6:"height";i:408;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image22-1-65x35.jpg";s:5:"width";i:65;s:6:"height";i:35;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image22-1-225x120.jpg";s:5:"width";i:225;s:6:"height";i:120;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image22-1-350x186.jpg";s:5:"width";i:350;s:6:"height";i:186;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image23-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image23-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:23 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image23-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>326</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:23]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:23]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image23-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image23-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image23-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1024;s:6:"height";i:699;s:4:"file";s:21:"2020/08/image23-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image23-1-300x205.jpg";s:5:"width";i:300;s:6:"height";i:205;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image23-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image23-1-768x524.jpg";s:5:"width";i:768;s:6:"height";i:524;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image23-1-65x44.jpg";s:5:"width";i:65;s:6:"height";i:44;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image23-1-225x154.jpg";s:5:"width";i:225;s:6:"height";i:154;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image23-1-350x239.jpg";s:5:"width";i:350;s:6:"height";i:239;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image24-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image24-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:23 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image24-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>327</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:23]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:23]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image24-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image24-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image24-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1024;s:6:"height";i:699;s:4:"file";s:21:"2020/08/image24-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image24-1-300x205.jpg";s:5:"width";i:300;s:6:"height";i:205;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image24-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image24-1-768x524.jpg";s:5:"width";i:768;s:6:"height";i:524;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image24-1-65x44.jpg";s:5:"width";i:65;s:6:"height";i:44;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image24-1-225x154.jpg";s:5:"width";i:225;s:6:"height";i:154;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image24-1-350x239.jpg";s:5:"width";i:350;s:6:"height";i:239;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image25-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image25-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:23 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image25-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>328</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:23]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:23]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image25-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image25-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image25-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:616;s:6:"height";i:92;s:4:"file";s:21:"2020/08/image25-1.jpg";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:20:"image25-1-300x45.jpg";s:5:"width";i:300;s:6:"height";i:45;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:20:"image25-1-150x92.jpg";s:5:"width";i:150;s:6:"height";i:92;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image25-1-65x10.jpg";s:5:"width";i:65;s:6:"height";i:10;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:20:"image25-1-225x34.jpg";s:5:"width";i:225;s:6:"height";i:34;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:20:"image25-1-350x52.jpg";s:5:"width";i:350;s:6:"height";i:52;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image26-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image26-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:24 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image26-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>329</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:24]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:24]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image26-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image26-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image26-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:323;s:6:"height";i:233;s:4:"file";s:21:"2020/08/image26-1.jpg";s:5:"sizes";a:4:{s:6:"medium";a:4:{s:4:"file";s:21:"image26-1-300x216.jpg";s:5:"width";i:300;s:6:"height";i:216;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image26-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image26-1-65x47.jpg";s:5:"width";i:65;s:6:"height";i:47;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image26-1-225x162.jpg";s:5:"width";i:225;s:6:"height";i:162;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image27-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image27-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:24 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image27-1.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>330</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:24]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:24]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image27-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image27-1.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image27-1.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:431;s:6:"height";i:281;s:4:"file";s:21:"2020/08/image27-1.png";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:21:"image27-1-300x196.png";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image27-1-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image27-1-65x42.png";s:5:"width";i:65;s:6:"height";i:42;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image27-1-225x147.png";s:5:"width";i:225;s:6:"height";i:147;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image27-1-350x228.png";s:5:"width";i:350;s:6:"height";i:228;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image28-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image28-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:24 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image28-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>331</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:24]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:24]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image28-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image28-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image28-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:330;s:6:"height";i:296;s:4:"file";s:21:"2020/08/image28-1.jpg";s:5:"sizes";a:4:{s:6:"medium";a:4:{s:4:"file";s:21:"image28-1-300x269.jpg";s:5:"width";i:300;s:6:"height";i:269;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image28-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image28-1-65x58.jpg";s:5:"width";i:65;s:6:"height";i:58;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image28-1-225x202.jpg";s:5:"width";i:225;s:6:"height";i:202;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image29-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image29-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:24 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image29-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>332</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:24]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:24]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image29-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image29-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image29-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:300;s:6:"height";i:217;s:4:"file";s:21:"2020/08/image29-1.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:21:"image29-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image29-1-65x47.jpg";s:5:"width";i:65;s:6:"height";i:47;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image29-1-225x163.jpg";s:5:"width";i:225;s:6:"height";i:163;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image30-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image30-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:24 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image30-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>333</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:24]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:24]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image30-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image30-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image30-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:450;s:6:"height";i:279;s:4:"file";s:21:"2020/08/image30-1.jpg";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:21:"image30-1-300x186.jpg";s:5:"width";i:300;s:6:"height";i:186;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image30-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image30-1-65x40.jpg";s:5:"width";i:65;s:6:"height";i:40;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image30-1-225x140.jpg";s:5:"width";i:225;s:6:"height";i:140;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image30-1-350x217.jpg";s:5:"width";i:350;s:6:"height";i:217;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image31-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image31-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:25 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image31-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>334</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:25]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:25]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image31-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image31-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image31-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1024;s:6:"height";i:401;s:4:"file";s:21:"2020/08/image31-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image31-1-300x117.jpg";s:5:"width";i:300;s:6:"height";i:117;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image31-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image31-1-768x301.jpg";s:5:"width";i:768;s:6:"height";i:301;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image31-1-65x25.jpg";s:5:"width";i:65;s:6:"height";i:25;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:20:"image31-1-225x88.jpg";s:5:"width";i:225;s:6:"height";i:88;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image31-1-350x137.jpg";s:5:"width";i:350;s:6:"height";i:137;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image32-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image32-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:25 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image32-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>335</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:25]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:25]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image32-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image32-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image32-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1024;s:6:"height";i:719;s:4:"file";s:21:"2020/08/image32-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image32-1-300x211.jpg";s:5:"width";i:300;s:6:"height";i:211;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image32-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image32-1-768x539.jpg";s:5:"width";i:768;s:6:"height";i:539;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image32-1-65x46.jpg";s:5:"width";i:65;s:6:"height";i:46;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image32-1-225x158.jpg";s:5:"width";i:225;s:6:"height";i:158;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image32-1-350x246.jpg";s:5:"width";i:350;s:6:"height";i:246;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image33-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image33-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:25 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image33-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>336</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:25]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:25]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image33-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image33-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image33-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1024;s:6:"height";i:597;s:4:"file";s:21:"2020/08/image33-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image33-1-300x175.jpg";s:5:"width";i:300;s:6:"height";i:175;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image33-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image33-1-768x448.jpg";s:5:"width";i:768;s:6:"height";i:448;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image33-1-65x38.jpg";s:5:"width";i:65;s:6:"height";i:38;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image33-1-225x131.jpg";s:5:"width";i:225;s:6:"height";i:131;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image33-1-350x204.jpg";s:5:"width";i:350;s:6:"height";i:204;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image34-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image34-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:26 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image34-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>337</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:26]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:26]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image34-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image34-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image34-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:696;s:6:"height";i:219;s:4:"file";s:21:"2020/08/image34-1.jpg";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:20:"image34-1-300x94.jpg";s:5:"width";i:300;s:6:"height";i:94;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image34-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image34-1-65x20.jpg";s:5:"width";i:65;s:6:"height";i:20;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:20:"image34-1-225x71.jpg";s:5:"width";i:225;s:6:"height";i:71;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image34-1-350x110.jpg";s:5:"width";i:350;s:6:"height";i:110;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image35-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image35-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:26 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image35-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>339</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:26]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:26]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image35-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image35-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image35-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1024;s:6:"height";i:163;s:4:"file";s:21:"2020/08/image35-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:20:"image35-1-300x48.jpg";s:5:"width";i:300;s:6:"height";i:48;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image35-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image35-1-768x122.jpg";s:5:"width";i:768;s:6:"height";i:122;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image35-1-65x10.jpg";s:5:"width";i:65;s:6:"height";i:10;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:20:"image35-1-225x36.jpg";s:5:"width";i:225;s:6:"height";i:36;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:20:"image35-1-350x56.jpg";s:5:"width";i:350;s:6:"height";i:56;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image36-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image36-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:27 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image36-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>341</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:27]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:27]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image36-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image36-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image36-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:844;s:6:"height";i:240;s:4:"file";s:21:"2020/08/image36-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:20:"image36-1-300x85.jpg";s:5:"width";i:300;s:6:"height";i:85;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image36-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image36-1-768x218.jpg";s:5:"width";i:768;s:6:"height";i:218;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image36-1-65x18.jpg";s:5:"width";i:65;s:6:"height";i:18;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:20:"image36-1-225x64.jpg";s:5:"width";i:225;s:6:"height";i:64;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image36-1-350x100.jpg";s:5:"width";i:350;s:6:"height";i:100;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image37-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image37-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:27 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image37-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>342</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:27]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:27]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image37-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image37-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image37-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:624;s:6:"height";i:650;s:4:"file";s:21:"2020/08/image37-1.jpg";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:21:"image37-1-288x300.jpg";s:5:"width";i:288;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image37-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image37-1-65x68.jpg";s:5:"width";i:65;s:6:"height";i:68;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image37-1-225x234.jpg";s:5:"width";i:225;s:6:"height";i:234;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image37-1-350x365.jpg";s:5:"width";i:350;s:6:"height";i:365;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image38-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image38-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:27 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image38-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>343</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:27]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:27]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image38-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image38-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image38-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:624;s:6:"height";i:147;s:4:"file";s:21:"2020/08/image38-1.jpg";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:20:"image38-1-300x71.jpg";s:5:"width";i:300;s:6:"height";i:71;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image38-1-150x147.jpg";s:5:"width";i:150;s:6:"height";i:147;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image38-1-65x15.jpg";s:5:"width";i:65;s:6:"height";i:15;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:20:"image38-1-225x53.jpg";s:5:"width";i:225;s:6:"height";i:53;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:20:"image38-1-350x82.jpg";s:5:"width";i:350;s:6:"height";i:82;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image39-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image39-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:27 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image39-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>344</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:27]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:27]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image39-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image39-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image39-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:863;s:6:"height";i:800;s:4:"file";s:21:"2020/08/image39-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image39-1-300x278.jpg";s:5:"width";i:300;s:6:"height";i:278;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image39-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image39-1-768x712.jpg";s:5:"width";i:768;s:6:"height";i:712;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image39-1-65x60.jpg";s:5:"width";i:65;s:6:"height";i:60;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image39-1-225x209.jpg";s:5:"width";i:225;s:6:"height";i:209;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image39-1-350x324.jpg";s:5:"width";i:350;s:6:"height";i:324;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image40-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image40-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:28 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image40-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>345</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:28]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:28]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image40-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image40-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image40-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:452;s:6:"height";i:215;s:4:"file";s:21:"2020/08/image40-1.jpg";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:21:"image40-1-300x143.jpg";s:5:"width";i:300;s:6:"height";i:143;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image40-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image40-1-65x31.jpg";s:5:"width";i:65;s:6:"height";i:31;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image40-1-225x107.jpg";s:5:"width";i:225;s:6:"height";i:107;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image40-1-350x166.jpg";s:5:"width";i:350;s:6:"height";i:166;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image41-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image41-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:28 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image41-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>346</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:28]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:28]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image41-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image41-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image41-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:443;s:6:"height";i:801;s:4:"file";s:21:"2020/08/image41-1.jpg";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:21:"image41-1-166x300.jpg";s:5:"width";i:166;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image41-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:20:"image41-1-65x118.jpg";s:5:"width";i:65;s:6:"height";i:118;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image41-1-225x407.jpg";s:5:"width";i:225;s:6:"height";i:407;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image41-1-350x633.jpg";s:5:"width";i:350;s:6:"height";i:633;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image42-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image42-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:28 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image42-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>347</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:28]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:28]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image42-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image42-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image42-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:624;s:6:"height";i:667;s:4:"file";s:21:"2020/08/image42-1.jpg";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:21:"image42-1-281x300.jpg";s:5:"width";i:281;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image42-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image42-1-65x69.jpg";s:5:"width";i:65;s:6:"height";i:69;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image42-1-225x241.jpg";s:5:"width";i:225;s:6:"height";i:241;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image42-1-350x374.jpg";s:5:"width";i:350;s:6:"height";i:374;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image43-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image43-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:29 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image43-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>348</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:29]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:29]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image43-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image43-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image43-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:845;s:6:"height";i:450;s:4:"file";s:21:"2020/08/image43-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image43-1-300x160.jpg";s:5:"width";i:300;s:6:"height";i:160;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image43-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image43-1-768x409.jpg";s:5:"width";i:768;s:6:"height";i:409;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image43-1-65x35.jpg";s:5:"width";i:65;s:6:"height";i:35;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image43-1-225x120.jpg";s:5:"width";i:225;s:6:"height";i:120;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image43-1-350x186.jpg";s:5:"width";i:350;s:6:"height";i:186;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image44-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image44-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:29 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image44-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>349</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:29]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:29]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image44-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image44-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image44-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:879;s:6:"height";i:693;s:4:"file";s:21:"2020/08/image44-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image44-1-300x237.jpg";s:5:"width";i:300;s:6:"height";i:237;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image44-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image44-1-768x605.jpg";s:5:"width";i:768;s:6:"height";i:605;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image44-1-65x51.jpg";s:5:"width";i:65;s:6:"height";i:51;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image44-1-225x177.jpg";s:5:"width";i:225;s:6:"height";i:177;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image44-1-350x276.jpg";s:5:"width";i:350;s:6:"height";i:276;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image45-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/image45-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:29 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image45-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>350</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:29]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:29]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image45-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image45-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image45-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:881;s:6:"height";i:677;s:4:"file";s:21:"2020/08/image45-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image45-1-300x231.jpg";s:5:"width";i:300;s:6:"height";i:231;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image45-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image45-1-768x590.jpg";s:5:"width";i:768;s:6:"height";i:590;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image45-1-65x50.jpg";s:5:"width";i:65;s:6:"height";i:50;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image45-1-225x173.jpg";s:5:"width";i:225;s:6:"height";i:173;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image45-1-350x269.jpg";s:5:"width";i:350;s:6:"height";i:269;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image46-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-13-risk-management-planning/image46-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:30 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image46-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>353</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:30]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:30]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image46-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>358</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image46-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image46-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1024;s:6:"height";i:356;s:4:"file";s:21:"2020/08/image46-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image46-1-300x104.jpg";s:5:"width";i:300;s:6:"height";i:104;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image46-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image46-1-768x267.jpg";s:5:"width";i:768;s:6:"height";i:267;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image46-1-65x23.jpg";s:5:"width";i:65;s:6:"height";i:23;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:20:"image46-1-225x78.jpg";s:5:"width";i:225;s:6:"height";i:78;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image46-1-350x122.jpg";s:5:"width";i:350;s:6:"height";i:122;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image47-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-13-risk-management-planning/image47-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:30 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image47-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>354</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:30]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:30]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image47-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>358</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image47-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image47-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:613;s:6:"height";i:478;s:4:"file";s:21:"2020/08/image47-1.jpg";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:21:"image47-1-300x234.jpg";s:5:"width";i:300;s:6:"height";i:234;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image47-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image47-1-65x51.jpg";s:5:"width";i:65;s:6:"height";i:51;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image47-1-225x175.jpg";s:5:"width";i:225;s:6:"height";i:175;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image47-1-350x273.jpg";s:5:"width";i:350;s:6:"height";i:273;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image48-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-13-risk-management-planning/image48-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:31 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image48-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>355</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:31]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:31]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image48-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>358</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image48-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image48-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:707;s:6:"height";i:611;s:4:"file";s:21:"2020/08/image48-1.jpg";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:21:"image48-1-300x259.jpg";s:5:"width";i:300;s:6:"height";i:259;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image48-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image48-1-65x56.jpg";s:5:"width";i:65;s:6:"height";i:56;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image48-1-225x194.jpg";s:5:"width";i:225;s:6:"height";i:194;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image48-1-350x302.jpg";s:5:"width";i:350;s:6:"height";i:302;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image49-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-13-risk-management-planning/image49-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:31 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image49-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>356</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:31]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:31]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image49-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>358</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image49-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image49-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:813;s:6:"height";i:677;s:4:"file";s:21:"2020/08/image49-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image49-1-300x250.jpg";s:5:"width";i:300;s:6:"height";i:250;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image49-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image49-1-768x640.jpg";s:5:"width";i:768;s:6:"height";i:640;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image49-1-65x54.jpg";s:5:"width";i:65;s:6:"height";i:54;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image49-1-225x187.jpg";s:5:"width";i:225;s:6:"height";i:187;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image49-1-350x291.jpg";s:5:"width";i:350;s:6:"height";i:291;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image50-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-13-risk-management-planning/image50-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:31 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image50-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>357</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:31]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:31]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image50-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>358</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image50-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image50-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:807;s:6:"height";i:329;s:4:"file";s:21:"2020/08/image50-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image50-1-300x122.jpg";s:5:"width";i:300;s:6:"height";i:122;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image50-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image50-1-768x313.jpg";s:5:"width";i:768;s:6:"height";i:313;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image50-1-65x26.jpg";s:5:"width";i:65;s:6:"height";i:26;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:20:"image50-1-225x92.jpg";s:5:"width";i:225;s:6:"height";i:92;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image50-1-350x143.jpg";s:5:"width";i:350;s:6:"height";i:143;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image51-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-14-procurement-planning-and-management/image51-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:32 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image51-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>359</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:32]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:32]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image51-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>364</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image51-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image51-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1024;s:6:"height";i:647;s:4:"file";s:21:"2020/08/image51-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image51-1-300x190.jpg";s:5:"width";i:300;s:6:"height";i:190;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image51-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image51-1-768x485.jpg";s:5:"width";i:768;s:6:"height";i:485;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image51-1-65x41.jpg";s:5:"width";i:65;s:6:"height";i:41;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image51-1-225x142.jpg";s:5:"width";i:225;s:6:"height";i:142;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image51-1-350x221.jpg";s:5:"width";i:350;s:6:"height";i:221;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image52-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-14-procurement-planning-and-management/image52-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:32 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image52-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>360</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:32]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:32]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image52-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>364</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image52-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image52-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:790;s:6:"height";i:326;s:4:"file";s:21:"2020/08/image52-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image52-1-300x124.jpg";s:5:"width";i:300;s:6:"height";i:124;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image52-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image52-1-768x317.jpg";s:5:"width";i:768;s:6:"height";i:317;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image52-1-65x27.jpg";s:5:"width";i:65;s:6:"height";i:27;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:20:"image52-1-225x93.jpg";s:5:"width";i:225;s:6:"height";i:93;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image52-1-350x144.jpg";s:5:"width";i:350;s:6:"height";i:144;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image53-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-14-procurement-planning-and-management/image53-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:32 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image53-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>361</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:32]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:32]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image53-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>364</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image53-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image53-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1024;s:6:"height";i:647;s:4:"file";s:21:"2020/08/image53-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image53-1-300x190.jpg";s:5:"width";i:300;s:6:"height";i:190;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image53-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image53-1-768x485.jpg";s:5:"width";i:768;s:6:"height";i:485;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image53-1-65x41.jpg";s:5:"width";i:65;s:6:"height";i:41;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image53-1-225x142.jpg";s:5:"width";i:225;s:6:"height";i:142;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image53-1-350x221.jpg";s:5:"width";i:350;s:6:"height";i:221;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image54-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-14-procurement-planning-and-management/image54-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:33 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image54-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>362</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:33]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:33]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image54-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>364</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image54-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image54-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1024;s:6:"height";i:647;s:4:"file";s:21:"2020/08/image54-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image54-1-300x190.jpg";s:5:"width";i:300;s:6:"height";i:190;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image54-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image54-1-768x485.jpg";s:5:"width";i:768;s:6:"height";i:485;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image54-1-65x41.jpg";s:5:"width";i:65;s:6:"height";i:41;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image54-1-225x142.jpg";s:5:"width";i:225;s:6:"height";i:142;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image54-1-350x221.jpg";s:5:"width";i:350;s:6:"height";i:221;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image55-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-14-procurement-planning-and-management/image55-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:33 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image55-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>363</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:33]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:33]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image55-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>364</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image55-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image55-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:790;s:6:"height";i:379;s:4:"file";s:21:"2020/08/image55-1.jpg";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image55-1-300x144.jpg";s:5:"width";i:300;s:6:"height";i:144;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image55-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image55-1-768x368.jpg";s:5:"width";i:768;s:6:"height";i:368;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image55-1-65x31.jpg";s:5:"width";i:65;s:6:"height";i:31;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image55-1-225x108.jpg";s:5:"width";i:225;s:6:"height";i:108;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image55-1-350x168.jpg";s:5:"width";i:350;s:6:"height";i:168;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image56-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-15-communication-planning/image56-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:34 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image56-1.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>365</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:34]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:34]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image56-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>368</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image56-1.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image56-1.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:809;s:6:"height";i:436;s:4:"file";s:21:"2020/08/image56-1.png";s:5:"sizes";a:6:{s:6:"medium";a:4:{s:4:"file";s:21:"image56-1-300x162.png";s:5:"width";i:300;s:6:"height";i:162;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image56-1-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:12:"medium_large";a:4:{s:4:"file";s:21:"image56-1-768x414.png";s:5:"width";i:768;s:6:"height";i:414;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image56-1-65x35.png";s:5:"width";i:65;s:6:"height";i:35;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image56-1-225x121.png";s:5:"width";i:225;s:6:"height";i:121;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image56-1-350x189.png";s:5:"width";i:350;s:6:"height";i:189;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image57-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-15-communication-planning/image57-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:34 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image57-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>366</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:34]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:34]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image57-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>368</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image57-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image57-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:495;s:6:"height";i:482;s:4:"file";s:21:"2020/08/image57-1.jpg";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:21:"image57-1-300x292.jpg";s:5:"width";i:300;s:6:"height";i:292;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image57-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image57-1-65x63.jpg";s:5:"width";i:65;s:6:"height";i:63;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image57-1-225x219.jpg";s:5:"width";i:225;s:6:"height";i:219;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image57-1-350x341.jpg";s:5:"width";i:350;s:6:"height";i:341;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image58-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-15-communication-planning/image58-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:35 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image58-1.jpeg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>367</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:35]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:35]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image58-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>368</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image58-1.jpeg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image58-1.jpeg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:600;s:6:"height";i:226;s:4:"file";s:22:"2020/08/image58-1.jpeg";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:22:"image58-1-300x113.jpeg";s:5:"width";i:300;s:6:"height";i:113;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:22:"image58-1-150x150.jpeg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:20:"image58-1-65x24.jpeg";s:5:"width";i:65;s:6:"height";i:24;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image58-1-225x85.jpeg";s:5:"width";i:225;s:6:"height";i:85;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:22:"image58-1-350x132.jpeg";s:5:"width";i:350;s:6:"height";i:132;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>image59-1</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-19-celebrate/image59-1/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:36 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image59-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>372</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:36]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:36]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image59-1]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>373</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image59-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image59-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:350;s:6:"height";i:392;s:4:"file";s:21:"2020/08/image59-1.jpg";s:5:"sizes";a:4:{s:6:"medium";a:4:{s:4:"file";s:21:"image59-1-268x300.jpg";s:5:"width";i:268;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image59-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image59-1-65x73.jpg";s:5:"width";i:65;s:6:"height";i:73;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image59-1-225x252.jpg";s:5:"width";i:225;s:6:"height";i:252;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Building Skills</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-20-reflections-and-employability-skills/building-skills/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:36 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image60-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[3D render illustration of construction site, including cranes and lifting machine, where the word Skills is being built.]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>374</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:36]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:36]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[building-skills]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>375</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image60-1.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image60-1.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:444;s:6:"height";i:270;s:4:"file";s:21:"2020/08/image60-1.jpg";s:5:"sizes";a:5:{s:6:"medium";a:4:{s:4:"file";s:21:"image60-1-300x182.jpg";s:5:"width";i:300;s:6:"height";i:182;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:21:"image60-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:19:"image60-1-65x40.jpg";s:5:"width";i:65;s:6:"height";i:40;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:21:"image60-1-225x137.jpg";s:5:"width";i:225;s:6:"height";i:137;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:21:"image60-1-350x213.jpg";s:5:"width";i:350;s:6:"height";i:213;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:120:"3D render illustration of construction site, including cranes and lifting machine, where the word Skills is being built.";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:15:"Building Skills";s:11:"orientation";s:1:"0";s:8:"keywords";a:31:{i:0;s:6:"Skills";i:1;s:9:"abilities";i:2;s:10:"experience";i:3;s:9:"expertise";i:4;s:12:"construction";i:5;s:4:"site";i:6;s:5:"built";i:7;s:8:"building";i:8;s:5:"crane";i:9;s:4:"lift";i:10;s:8:"floating";i:11;s:7:"letters";i:12;s:3:"red";i:13;s:4:"word";i:14;s:6:"symbol";i:15;s:10:"assembling";i:16;s:14:"infrastructure";i:17;s:7:"machine";i:18;s:10:"mechanical";i:19;s:4:"cage";i:20;s:5:"heavy";i:21;s:9:"equipment";i:22;s:7:"concept";i:23;s:8:"metaphor";i:24;s:4:"idea";i:25;s:12:"illustration";i:26;s:2:"3d";i:27;s:3:"cgi";i:28;s:6:"render";i:29;s:5:"white";i:30;s:6:"orange";}}}]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 1: Introduction</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-1-introduction/</link>
		<pubDate>Mon, 24 Apr 2017 17:44:22 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-1/</guid>
		<description></description>
		<content:encoded><![CDATA[<div class="textbox shaded"><em>“A good investigator needs to be conscious of his or her own thinking, and that thinking needs to be an intentional process.”</em></div>
It is too bad we can not just provide you with a basic template to follow every time you needed to conduct a criminal investigation; but it is not that simple. Criminal investigations can be imprecise undertakings, often performed in reaction to unpredictable and still-evolving events with incomplete information to guide the process. As such, it is impossible to teach or learn a precise methodology that can be applied in every case. Still, there are important concepts, legal rules, and processes that must be respected in every investigation. This book outlines these concepts, rules, and processes with the goal of providing practical tools to ensure successful investigative processes and investigative practices. Most importantly, this book informs you on how to approach the investigative process using “investigative thinking.” In this first chapter, we set the foundation for the book by calling attention to five important topics:
<ol>
 	<li>Criminal investigation as a thinking process</li>
 	<li>The need to think through the process</li>
 	<li>Towards modern-day investigation</li>
 	<li>The path to becoming an investigator</li>
 	<li>Understanding the investigative mind</li>
</ol>
<h1>Topic 1: Criminal Investigation as a Thinking Process</h1>
Criminal investigation is a multi-faceted, problem-solving challenge. Arriving at the scene of a crime, an officer is often required to rapidly make critical decisions, sometimes involving life and death, based on limited information in a dynamic environment of active and still evolving events. After a criminal event is over, the investigator is expected to preserve the crime scene, collect the evidence, and devise an investigative plan that will lead to the forming of reasonable grounds to identify and arrest the person or persons responsible for the crime. To meet these challenges, police investigators, through training and experience, learn investigative processes to develop investigative plans and prioritize responses.

In this book, these investigative responses, information analyses, and plan-making skills are broken out using illustrations of both tactical and strategic investigative thinking. The aim of the book is to guide you into the structured practices of tactical investigative response and strategic investigative thinking.

Criminal investigation is not just a set of task skills, it is equally a set of thinking skills. To become an effective investigator, these skills need to be consciously understood and developed to the point where they are deliberately engaged to work through the problem-solving process that is criminal investigation. Trained thinking and response can be difficult to adapt into our personal repertoires because we are all conditioned to be much less formal and less evidence driven in our everyday thinking. Still, as human beings, we are all born investigators of sorts. As Taber (2006) pointed out in his book, <em>Beyond Constructivism</em>, people constantly construct knowledge, and, in our daily lives, we function in a perpetual state of assessing the information that is presented to us. Interpreting the perceptions of what we see and what we hear allows us reach conclusions about the world around us (Taber, 2006). Some people are critically analytical and want to see evidence to confirm their beliefs, while others are prepared to accept information at face value until they are presented facts that disprove their previously held beliefs. Either strategy is generally acceptable for ordinary people in their everyday lives.
<h1>Topic 2: The Need to Think Through the Process</h1>
Diametrically opposing the analysis processes of everyday people, in the role of a police investigator, the process of discovering, interpreting, and determining the validity of information is different and this difference is critical. As an investigator, it is no longer sufficient to use the strategies that ordinary people use every day. Instead, it is incumbent on investigators to critically assess all the information they encounter because every investigation is an accountable process in which the investigator is not just making a determination about the validity and truth of the information for personal confirmation of a belief. Rather, the police investigator is responsible and empowered under the law to make determinations that could significantly affect the lives of those being investigated as well as the victims of crime.

The investigator’s interpretation of information and evidence commonly requires answers to many questions that can lead critical of decisions, actions, and outcomes, such as:
<ul>
 	<li>What must be done to protect the life and safety of persons?</li>
 	<li>Should force, up to and including deadly force, be used to resolve a situation?</li>
 	<li>Who will become the focus or subject of a criminal investigation?</li>
 	<li>What is the best plan to apprehend the person or persons responsible for a criminal act?</li>
 	<li>Will someone be subjected to a search of their person or of their home?</li>
 	<li>Will someone be subjected to detention or arrest and questioning for a criminal act?</li>
 	<li>Will someone have a criminal charge sworn against them?</li>
 	<li>Will someone be subjected to a criminal trial?</li>
 	<li>Will someone’s liberty as a free person be at risk?</li>
 	<li>Will justice be served?</li>
 	<li>Will the community be protected?</li>
</ul>
Significant to these possible outcomes, the investigator must always be ready to explain their thinking and actions to the court. For example, when an investigator is asked by a court, “How did you reach that conclusion to take your chosen course of action?” an investigator must be able to articulate their thinking process and lay out the facts and evidence that were considered to reach their conclusions and form the reasonable grounds for their actions and their investigative decision-making process. For an investigator speaking to the court, this process needs to be clear and validated through the articulation of evidence-based thinking and legally justifiable action. Thinking must illustrate an evidence-based path to forming reasonable grounds for belief and subsequent action. Thinking must also demonstrate consideration of the statutory law and case law relevant to the matter being investigated.

Considering this accountability to outcomes, it is essential for police investigators to have both the task skills and the thinking skills to collect and analyze evidence at a level that will be acceptable to the criminal justice system. Investigation is the collection and analysis of evidence. To be acceptable to the court, it must be done in a structured way that abides by the legal rules and the appropriate processes of evidence collection. Additionally, it must be a process the investigator has documented and can recall and articulate in detail to demonstrate the validity of the investigation.

Obviously, it is not possible for someone to remain in a constant state of vigilance where they are always critically assessing, documenting, and determining the validity of every piece of information they encounter. However, when on duty, it is frequently necessary for a police investigator to do this. For a police investigator, this needs to be a conscious process of being mentally engaged and “switched on” to a more vigilant level of information collection, assessment, and validation while on duty. A police investigator must master this higher and more accountable level of analytical thinking for both tactical and strategic investigative response. The “switched on” police investigator must:
<ul>
 	<li>Respond appropriately to situations where they must protect the life and safety of persons</li>
 	<li>Gather the maximum available evidence and information from people and locations</li>
 	<li>Recognize the possible offence or offences being depicted by the fact pattern</li>
 	<li>Preserve and document all evidence and information</li>
 	<li>Critically analyze all available information and evidence</li>
 	<li>Develop an effective investigative plan</li>
 	<li>Strategically act by developing reasonable grounds to either identify and arrest those responsible for criminal acts, or to eliminate those who are wrongfully suspected</li>
</ul>
Most traditional police training provides new officers with many hours of instruction in the task skills of investigation. However, the learning of investigative thinking skills is expected to develop through field experience, learning from mistakes, and on the job mentoring. This learning does not always happen effectively, and the public expectations of the justice system are evolving in a model where there is little tolerance for a mistake-based learning.

The criminal investigation of serious crimes has always drawn a substantial level of interest, concern, and even apprehensive fascination from the public, the media, and the justice system. Police actions and investigations have been chronicled and dissected by commissions of inquiry and the media.  From the crimes of the serial killers like Paul Bernardo (Campbell, 1996), and Robert Pickton (Oppal, 2013) to the historical wrongful convictions of David Milgaard (MacCallum, 2008) and Guy Paul Morin (Kaufman, 1998), true life crimes are scrutinized and the investigations of those crimes are examined and critically assessed.

When critiquing past investigations, the same types of questions are frequently asked:
<ul>
 	<li>Is it possible that the wrong person was arrested or convicted?</li>
 	<li>Is it possible that other persons were involved?</li>
 	<li>Were all the possible suspects properly eliminated?</li>
 	<li>Was information properly shared among police agencies?</li>
 	<li>Did the investigators miss something?</li>
 	<li>Was all the evidence found?</li>
 	<li>Was the evidence properly interpreted?</li>
 	<li>Were the investigative theories properly developed and followed to the correct conclusion?</li>
 	<li>Was tunnel vision happening and misdirecting the investigation?</li>
</ul>
Today, transparency throughout the criminal justice system and public disclosure of evidence through investigative media reports make it much easier for the public and the media to examine the investigative process. Public and media access to information about police investigative techniques and forensic tools has created an audience that is more familiar and sophisticated about police work. The ability of both social and traditional media to allow public debate has created a societal awareness where a higher standard for the investigation of serious crimes is now an expectation.

One only needs to look at the historical and contemporary judicial reviews and public inquiries to appreciate that there is an expectation for police investigators and police organizations to maintain and demonstrate a high level of competency. In a judicial review, it is often too late if an investigator discovers that they have pursued the wrong theory or they have failed to analyze a piece of critical information or evidence. These situations can be career-altering or even career-ending. A good investigator needs to be conscious of his or her-own thinking, and that thinking needs to be an intentional process.
<h1>Topic 3: Towards Modern-Day Investigation</h1>
Today, criminal investigation is a broad term encompassing a wide range of specialities that aim to determine how events occurred, and to establish an evidence-based fact pattern to prove the guilt or innocence of an accused person in a criminal event. In some cases, where a person is found committing the criminal act and apprehended at the scene, the criminal investigation is not a complex undertaking. However, in cases where the criminal event is discovered after the fact, or when the culprit is not readily apparent, the process of criminal investigation becomes more complex and protracted.

Although in both cases the criminal investigator must follow practices of identifying, collecting, recording, and preserving evidence; in the case of the unknown suspect, additional thinking skills of analysis, theory development, and validation of facts must be put to work.

The craft of criminal investigation has been evolving since the birth of modern policing in the mid-1700s when the Chief Magistrate of Bow Street, Henry Fielding, organized a group of volunteer plainclothes citizens and tasked them to attend the scenes of criminal events and investigate crimes. This group became known as the Bow Street Runners. Their existence speaks to an early recognition that attending a crime scene to gather information was a timely and effective strategy to discover the truth of what happened (Hitchcock, 2015).

From these early investigators, one of the first significant cases using forensic evidence-based investigation was recorded. To summarize the account by McCrery (2013) in his book <em>Silent Witness</em>; in one notable recorded case in 1784, the Bow Street Runners removed a torn piece of paper wadding from a bullet wound in the head of a murder victim who had been shot at point-blank range. In this early era of firearms, flintlock muskets and pistols required muzzle loading. To muzzle load a weapon, gunpowder would be poured down the barrel of the weapon, and then a piece of “wadding paper” would be tamped into place on top of the gunpowder using a long metal rod. The wadding paper used in this loading process was merely a piece of thick dry paper, usually torn from a larger sheet of paper kept by the shooter to reload again for the next shot. The musket ball bullet would be pushed down the barrel on top of the wadding paper. When the gun was fired, the wadding paper would be expelled by the exploding gunpowder, thus pushing the lead ball-bullet out of the barrel as a deadly projectile. This loading process required the shooter to be in possession of dry gunpowder, wadding paper, and musket balls to reload and make the weapon ready to fire. The Bow Street Runners considered this weapon loading practice and knew their shooter might be in possession of wadding paper. Upon searching their prime suspect, they did find him in possession of that kind of paper and, in a clever forensic innovation for their time, they physically matched the torn edges of wadding paper found in the victim’s wound to a larger sheet of wadding paper found in the pocket of their suspect. From this evidence, the accused was convicted of murder (McCrery, 2013).

This use of forensic physical matching is an example of circumstantial forensic evidence being used to link a suspect to an offence. This type of early forensic evidence also illustrates the beginnings of what exists today as a broad variety of forensic sciences to aid investigators in the development of evidence. This is also the beginning of forensic evidence being recognized as an investigative tool. In 1892, not long after the Bow Street Runners investigation, Sir Francis Galton published his book on the study of fingerprints. In 1900, Galton’s work was used by Sir William Henry who developed and implemented the Henry System of fingerprint classification, which is the basis of the fingerprint classifications system still in use today (Henry, 1900).

Only a few years earlier, in 1886, the use of photography for the first Rogues Gallery of criminal photographs was implemented by the New York City Police Department. This first Rogues Gallery was an organized collection of photographs of known criminals taken at the time of their most recent conviction for a crime (Byrnes, 2015). Prior to this organized collection of criminal photos, facial characteristics on wanted posters had been limited to sketch artists' renderings. With the advances evolving in photography, having the ability to preserve an actual picture of the suspect’s face amounted to a significant leap forward. With this innovation of photography, the use of mugshots and photographic identification of suspects through facial recognition began to evolve.

These early forensic innovations in the evolution of criminal investigation (such as physical matching, fingerprint identification, and facial recognition systems) demonstrate a need for investigators to develop the knowledge and skills to locate and utilize physical evidence that enables circumstantial links between people, places, and events to prove the facts of criminal cases. Physical evidence is the buried treasure for criminal investigators. Physical evidence can be collected, preserved, analyzed, and used in court to establish a fact. Physical evidence can be used to connect an accused to their victim or used at a crime scene to establish guilt or innocence. Forensic evidence may prove a point in fact that confirms or contradicts the alibi of an accused, or one that corroborates or contradicts the testimony of a witness.

Another significant development in forensic evidence from the 1800s started with the work of French criminal investigator Alphonse Bertillon who developed the Bertillon system of recording measurements of physical evidence (Petherick, 2010). One of Bertillon's students, Dr. Edmond Locard, a medical doctor during the First World War, went on to further Bertillon's work with his own theory that a person always leaves some trace of themselves at a crime scene and always takes some trace of the crime scene with them when they leave. This theory became known as “Locard's Exchange Theory” (Petherick, 2010). To this day, Locard’s theory forms the foundational concepts of evidence transfer theory.

Today, the ability of forensic experts to identify suspects and to examine physical evidence has increased exponentially when compared to early policing. Scientific discoveries in a wide range of disciplines have contributed to the development and evolution of forensic specialities in physical matching, chemical analysis, fingerprints, barefoot morphology, odontology, toxicology, ballistics, hair and fibre, biometric analysis, entomology, and, most recently, DNA analysis.

Many of these forensic science specialties require years of training and practice by the practitioner to develop the necessary level of expertise whereby the courts will accept the evidence of comparisons and subsequent expert conclusions. Obviously, it is not possible for a modern-day investigator to become a proficient practitioner in all of these specialties. However, the modern-day investigator must strive to be a forensic resource generalist with an understanding of the tools available and must be specialist in the deployment of those tools to build the forensic case.

In a criminal investigation, there is often a multitude competing possibilities guiding the theory development of how a criminal incident occurred with circumstantial links pointing to who committed the crime. Competing theories and possibilities need to be examined and evaluated against the existing facts and physical evidence. Ultimately, only strong circumstantial evidence in the form of physical exhibits, testimony from credible witnesses, or a confession from the accused may satisfy the court beyond a reasonable doubt. Critically, the quality of an investigation and the competency of the investigators will be demonstrated through the manner in which that evidence was located, preserved, analyzed, interpreted, and presented.

In the past, police officers generally took their primary roles as first responders and keepers of the peace. Criminal investigation was only a limited component of those duties. Now, given the accessibility to a wide range of effective forensic tools, any police officer, regardless of their assignment, could find themselves presented with a scenario that requires some degree of investigative skill. The expectation of police investigators is that they be well-trained with the knowledge and skills to respond and investigate crime. These skills will include:
<ul>
 	<li>Critical Incident Response</li>
 	<li>Interpretation of criminal law and offence recognition</li>
 	<li>Crime scene management</li>
 	<li>Evidence identification and preservation</li>
 	<li>Engaging forensic tools for evidence analysis</li>
 	<li>Witness assessment and interviewing</li>
 	<li>Suspect questioning and interrogation</li>
 	<li>Case preparation and documentation</li>
 	<li>Evidence presentation in court</li>
</ul>
In addition to these task skills of process and practice, investigators must also have strategic analytical thinking skills for risk assessment and effective incident response. They must have the ability to apply deductive, inductive, and quantitative reasoning to examine evidence and form reasonable grounds to identify and arrest suspects.

Engaging these higher-level thinking skills is the measure of expertise and professionalism for investigators. As our current justice system continues to change and evolve, it relies more and more on information technology and forensic science. With this evolution, the need for investigators to demonstrate higher levels of expertise will continue to grow.
<h1>Topic 4: The Path to Becoming an Investigator</h1>
For many people, their idea of what an investigator does is based on what they see, hear, and read in the media, movies, TV, and books. These depictions characterize personas ranging from dysfunctional violent rebels fighting for justice by their own rules, to by-the-book forensic investigators who get the job done clinically using advanced science and technology. The truth is, good investigation and real-life investigators are unlikely to make a captivating fictional script. Professional investigators and competent investigation is about the tedious processes of fact-finding and sorting through evidence and information. It is about eliminating possibilities, validating events, and recording evidence, all the while engaging in an intentional process of thinking, analyzing, and strategically working towards predetermined goals; not to mention extensive note taking and report writing.

Sometimes, new police investigators are, at first, deluded by fictional representations, only to find out, by experience, that the real job, although having moments of action, satisfaction, and excitement, is more about hard work and deliberate attention to detail.

Another common misnomer about the job is the conception that investigation is the exclusive domain of a police officer. Although this may have been true in the earlier evolution of the investigative craft, it has become much less the case today. This change is a result of the enactment of many regulatory compliance statutes that require investigative knowledge, skills, and thinking. Compliance investigators maintain adherence to regulated activities which often involve legal compliance for industries where non-compliance can pose significant risks that threaten the lives and safety of people or the environment. These regulated activities are often responsibilities of the highest order. What starts as a regulatory violation can escalate into criminal conduct. The investigative skills of compliance investigators and inspectors must be capable of meeting the same tests of competency as the police.

Not just anyone can become an investigator. There are certain personal traits that tend to be found in good investigators. Among these traits are:
<ul>
 	<li>Being passionate about following the facts to discover the truth, with a goal of contributing to the process of justice</li>
 	<li>Being detail-oriented and observant of the facts and the timelines of events</li>
 	<li>Being a flexible thinker, avoiding tunnel vision, and being capable of concurrently examining alternate theories while objectively using evidence as the measure to confirm or disconfirm validity of theories</li>
 	<li>Being patient and capable of maintaining a long-term commitment to reaching a conclusion</li>
 	<li>Being tenacious and not allowing setbacks and false leads to deter continued efforts</li>
 	<li>Being knowledgeable and skilled at the tasks, process, and procedure while respecting legal authorities and the limitations to take action</li>
 	<li>Being self-aware of bias and intuitive responses, and seeking evidence to support gut-feelings</li>
 	<li>Being trained in the processes of critical thinking that provide reliable analysis of evidence that can later be described and articulated in reports and court testimony</li>
</ul>
Considering this list of traits, we can appreciate that good investigators are people with particular attitudes, aptitudes, and intentional thinking processes. These traits all form part of the investigative mindset. Although you cannot teach someone to be passionate about discovering the truth, anyone who has these traits can work towards developing and refining their other traits and skills to become an investigator. Developing the mindset is a learning journey, and the first step of this journey is to become intentionally aware of and engaged in your own thinking processes.

Toward this point, the investigator must always be mindful of the proposition of Shah and Oppenheimer (2008) in their book <em>Heuristics Made Easy: An Effort Reduction Framework</em>. Shah and Opprenheimer remind us that people have learned to become quick thinkers using mental short cuts, known as heuristics, in an effort to make decisions quickly and problem solve the challenges we encounter. They offer the proposition that heuristics reduce work in decision-making by giving the user the ability to scrutinize a few signals and/or alternative choices in decision-making, thus diminishing the work of retrieving and storing information in memory. This streamlines the decision-making process by reducing the amount of integrated information necessary in making the choice or passing judgment (Shah, 2008).

In this book, we will point out that these heuristic shortcuts are often instinctive or intuitive reactions, as opposed to well-reasoned, evidence-based responses. Although they may serve us well in our everyday thinking, they must be monitored and recognized for their short-falls when we are required to investigate matters where the outcomes are critical.

To achieve the investigative mindset and be an objective investigator, it is important to be aware of the heuristic shortcuts and other negative investigative tendencies that can become obstacles to successful outcomes. For example, a good investigator needs to be focused on the objective of solving the case and making an arrest in a timely manner, but becoming too focused can lead to “tunnel vision,” which is the single-minded focus on a favourite suspect or theory to the extent that other suspects or alternate theories are ignored. Moreover, a good investigator needs to take responsibility and be accountable for the outcomes of the investigation; however, taken to the extreme, this can lead to an investigator taking complete ownership of the investigation to the exclusion of allowing the ideas of others to provide guidance and influence. Finally, a good investigator needs to be careful about how much information is shared with others. However, excessive secrecy can inhibit information sharing with those who might contribute to the successful conclusion of the case.

Thinking as an objective investigator, it is often necessary to consider and evaluate several competing theories or possibilities of how a crime was committed and who the suspect may be. Often, new investigators, or those uninitiated to the objective mindset, will focus on a favourite theory of events or a favourite suspect, and rush to be first to reach the conclusion and to make the arrest. There is a trap in shortcuts and the focused rush to make a fast arrest. In this trap, other viable suspects and theories are too quickly ignored or discarded. This sometimes leads to investigations being derailed by “tunnel vision.” Worse yet, tunnel vision can lead to the misinterpretation of evidence, ultimately leading to charges against an innocent person, while the guilty remain undiscovered.

To summarize the observations made by Kim Rossmo (2009) in his book on criminal investigative failures, tunnel vision and lost objectivity have been part of the findings in many public inquiries. Commissioners at public inquiries have concluded that, at times, investigators relentlessly pursue a favourite suspect. Sometimes an alternate suspect should have been apparent, or exculpatory evidence was present that should have caused the investigators to stop and re-evaluate their favourite suspect, but tunnel vision had set in and the objective investigative mindset had been lost (Rossmo, 2009).

Similarly and not totally unrelated to tunnel vision, other negative thinking responses also come into play, and can be observed in the behaviours of case ownership and excessive secrecy. It may seem that an investigator taking ownership for his or her investigation, and maintaining some degree of secrecy in the management of case related information, is completely acceptable and perhaps even desirable. However, as happens with any human behaviour, it can negatively influence the outcome of investigations. Information appropriately shared with the right people can often reveal connections that contribute to the evidence of a case, and investigators must remain open to this appropriate sharing. Many negative examples can be found where a police investigator, or even an investigative team, adopted the attitude that the conduct of an investigation is their own exclusive domain (Campbell, 1996). With that exclusive ownership, no one else is entitled or allowed to participate, and relevant information that needs to be shared with others can be jealously guarded. Opportunities are missed for other investigators to see details that could connect a similar fact pattern or make the connection to a viable suspect.
<h1>Topic 5: Understanding the Investigative Mindset</h1>
When we talk about the investigative mindset, in part, we are talking about the self-awareness and the organizational-awareness to avoid negative outcomes. Once learned and practiced, this awareness can be a safety net against destructive investigative practices (i.e. tunnel vision, case ownership, and excessive secrecy). Criminal investigation can require complex thinking where the investigator must assess and determine the validity of information and evidence to guide the investigative process. This thinking strives to move from a position of mere suspicion to one of reasonable grounds for belief to make an arrest and ultimately articulate evidence upon which the court can make a finding of guilt beyond a reasonable doubt. This is a conscious process of gathering and recording information, and thinking analytically to form reasonable grounds for belief supporting defendable actions of arrest and charges. From this conscious process, the investigator in court can articulate a mental map to describe how they derived their conclusions.

As we proceed towards learning the investigative thinking process, keep in mind that:
<ul>
 	<li>Investigative thinking is disciplined thinking, and investigators must be consciously aware of and consciously in control of their own thinking</li>
 	<li>This is a process of being intentionally engaged at a high level of analytical thinking</li>
 	<li>This thinking process is strategically focused, prioritizing investigative plans and actions to achieve outcomes</li>
 	<li>Developing a mental map, the investigator deliberately selects a path of the investigation will follow. He or she travels that path with the knowledge that the outcomes of the investigation will only be accepted by the court if the rationale for the path taken can be recalled accurately and articulated in detail</li>
</ul>
<h1>Summary</h1>
In this chapter, we have identified the investigative thinking processes as being distinctly different from the thinking processes used by most people in their everyday lives. The critical responsibilities that exist for police investigators in conducting their duties demand that investigators learn to think and respond in a structured and accountable manner. To this end, we have illustrated some of the common negative thinking processes that investigators must avoid, and we have looked at the traits and values that need to be pursued to become a criminal investigator. We have described structured and accountable thinking as the means to achieve an investigative mindset. You will find that investigative thinking and the investigative mindset are a theme throughout this book.
<div class="textbox textbox--exercises"><header class="textbox__header">
<p class="textbox__title">Study Questions</p>

</header>
<div class="textbox__content">
<ol>
 	<li>Provide two reasons why it is very important for a police investigator to routinely critically assess all of the information they encounter.</li>
 	<li>Provide two reasons why evidence gathered as part of an investigation must be collected in a structured way.</li>
 	<li>What do we mean when we say that an investigator must be “switched on”?</li>
 	<li>In a single sentence, summarize “Locard’s Exchange Theory” <span>(Petherick, 2010)</span>.</li>
 	<li>List seven characteristics commonly found in good investigators.</li>
 	<li>What are the skills a modern-day officer must achieve to respond to events and investigate crimes?</li>
 	<li>What is the first step in developing an investigative mindset?</li>
 	<li>What is the level of forensic knowledge that a modern-day investigator must achieve to become an effective investigator?</li>
 	<li>Why must police investigators be mindful of the heuristic shortcuts discussed by Shaw and Oppenheimer (2008)?</li>
 	<li>In addition to heuristic shortcuts, what are the other three negative investigative tendencies that can become obstacles to successful investigative outcomes?</li>
 	<li>Why must investigators be mindful of excessive secrecy?</li>
</ol>
</div>
&nbsp;

</div>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>5</wp:post_id>
		<wp:post_date><![CDATA[2017-04-24 13:44:22]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-04-24 17:44:22]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-1-introduction]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>3</wp:post_parent>
		<wp:menu_order>1</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
										<category domain="chapter-type" nicename="standard"><![CDATA[Standard]]></category>
						<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[727]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_export]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 1: Introduction]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_candela_citation]]></wp:meta_key>
		<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_old_slug]]></wp:meta_key>
		<wp:meta_value><![CDATA[chapter-1]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Study Questions and Answers</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/back-matter/appendix/</link>
		<pubDate>Mon, 24 Apr 2017 17:44:22 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/back-matter/appendix/</guid>
		<description></description>
		<content:encoded><![CDATA[<h1>Chapter 1</h1>
<ol>
 	<li>Provide two reasons why it is very important for a police investigator to routinely critically assess all of the information they encounter.
<ul>
 	<li><em>Because every investigation is an accountable process, and because every investigation involves making decisions that could significantly affect people’s lives.</em></li>
</ul>
</li>
 	<li>Provide two reasons why evidence gathered as part of an investigation must be collected in a structured way?
<ul>
 	<li><em>Because there are legal rules and processes that must be followed in order for evidence to be accepted by the court, and because the investigator must always be ready to articulate their thinking and justify their actions taken in court.</em></li>
</ul>
</li>
 	<li>What do we mean when we say that an investigator must be “switched on”?
<ul>
 	<li><em>“Switched on” means approaching and working through an investigation with an intentionally high level of vigilance in terms of the collection, assessment, and validation of information and evidence.” </em></li>
</ul>
</li>
 	<li>In a single sentence, summarize “Locard’s Exchange Theory”?
<ul>
 	<li><em>Locard’s Exchange Theory states that a person always leaves some trace of themselves at a crime scene, and always takes some trace of the crime scene when they leave.</em></li>
</ul>
</li>
 	<li>List seven characteristics commonly found in good investigators.
<ul>
 	<li><em>Being passionate about following the truth, being detailed oriented, patient, tenacious, objective, conscious of own thinking and biases, and being knowledgeable about the skills needed to conduct evidence and present that evidence in court.</em></li>
</ul>
</li>
 	<li>What are the skills a modern-day officer must achieve to respond to events and investigate crimes?
<ol>
 	<li><em>Critical Incident Response </em></li>
 	<li><em>Interpretation of criminal law and offence recognition</em></li>
 	<li><em>Crime scene management</em></li>
 	<li><em>Evidence identification and preservation</em></li>
 	<li><em>Engaging forensic tools for evidence analysis</em></li>
 	<li><em>Witness assessment and interviewing</em></li>
 	<li><em>Suspect questioning and interrogation</em></li>
 	<li><em>Case preparation and documentation</em></li>
 	<li><em>Evidence presentation in court</em></li>
</ol>
</li>
 	<li>What is the first step in developing an investigative mind-set?
<ul>
 	<li><em>Becoming intentionally aware of, and intentionally engaged in, your own investigative thinking processes.</em></li>
</ul>
</li>
 	<li>What is the level of forensic knowledge that a modern day investigator must achieve to become an effective investigator?
<ul>
 	<li><em>The modern day investigator must strive to be a forensic resource generalist with an understanding of the tools available and must be specialist in the deployment of those tools to build the forensic case.</em></li>
</ul>
</li>
 	<li>Why must police investigators be mindful of the heuristic shortcuts discussed by Shaw and Oppenheimer (2008)?
<ul>
 	<li> <em>Because mental shortcuts can lead to the assessment of evidence using thinking that is not evidence based.</em></li>
</ul>
</li>
 	<li>In addition to heuristic shortcuts, what are the other three negative investigative tendencies that can become obstacles to successful investigative outcomes?
<ol>
 	<li><em>Tunnel vision</em></li>
 	<li><em>Excessive secrecy </em></li>
 	<li><em>Exclusive case ownership</em></li>
</ol>
</li>
 	<li><em> </em>Why must investigators be mindful of excessive secrecy?
<ul>
 	<li><em>Because excessive secrecy can lead to missed opportunities to share information with persons who could make connections and reveal additional evidence.</em></li>
</ul>
</li>
</ol>
<h1>Chapter 2</h1>
<ol>
 	<li>What exactly do we mean when we refer to “fundamental justice” for people who are charged with a criminal offence in Canada?
<ul>
 	<li><em>We mean that whoever alleges an offence to have taken place must prove it, the person accused of an offence has the right to see the evidence against them, the accused person of an offence has the right to answer to the charge and provide a defence, the trier of fact must not be biased, the trier of fact must base their decision upon evidence, and they must articulate the evidence considered when handing down a decision. </em></li>
</ul>
</li>
 	<li>What protection regarding life, liberty and security is provided by Sec 7 of the Canadian Charter of Rights and Freedoms?
<ul>
 	<li><em>Everyone has the right to life, liberty and security and the right not to be deprived therefore except in accordance with the principles of fundamental justice.</em></li>
</ul>
</li>
 	<li>What protection regarding search and seizure is provided by Sec 8 of the Canadian Charter of Rights and Freedoms?
<ul>
 	<li><em>Everyone has the right to be secure against unreasonable search and seizure.</em></li>
</ul>
</li>
 	<li>What protection regarding detention or imprisonment is provided by Sec 9 of the Canadian Charter of Rights and Freedoms?
<ul>
 	<li><em>Everyone has the right not to be arbitrarily detained or imprisoned.</em></li>
</ul>
</li>
 	<li>What protection on arrest or detention is provided by Sec 10 of the Canadian Charter of Rights and Freedoms?
<ul>
 	<li><em>Everyone has the right on arrest or detention to be informed promptly of the reasons for the arrest or detention, to retain and instruct counsel without delay and be informed of that right, and to have the validity of the detention determined by way of habeas corpus and to be released if the detention is not lawful.</em></li>
</ul>
</li>
 	<li>What protection to witnesses is provided by Section 13 of the Canadian Charter of Rights and Freedoms?
<ul>
 	<li><em>A witness who testifies in any proceedings has the right to not have any incriminating evidence given used to incriminate them in any other proceedings, except in a prosecution for perjury or the giving of contradictory evidence.</em></li>
</ul>
</li>
 	<li>What language protections are provided by Section 14 of the Canadian Charter of Rights and Freedoms?
<ul>
 	<li><em>A party or witness in any proceedings who does not understand or speak the language in which the proceedings are conducted or who is deaf have the right to the assistance of an interpreter.</em></li>
</ul>
</li>
 	<li>What is the difference between “proof within a balance of probabilities” and “proof beyond a reasonable doubt”?
<ul>
 	<li><em>“Proof within a balance of probabilities” relates to civil cases and administrative law, and only requires a determination that one side is most likely/very probably correct. “Proof beyond a reasonable doubt” requires a determination that there is virtually no doubt that the accused is guilty. It does not involve proof to an absolute certainty, but more proof than the accused is probably guilty. </em></li>
</ul>
</li>
 	<li>What is the general test for “reasonable grounds to believe”?
<ul>
 	<li><em>A reasonable person in the position of the arresting officer must be able to conclude that there were reasonable and probable grounds for the arrest.</em></li>
</ul>
</li>
 	<li>When must an investigator remain diligent in collecting and preserving evidence, even though they believe they will not be proceeding with a criminal charge?
<ul>
 	<li><em>When they have reason to believe that the investigation may lead to a civil action.</em></li>
</ul>
</li>
 	<li>What is the role of the investigator in court when presenting evidence?
<ul>
 	<li><em>The investigator presenting evidence in court is essentially a witness, being careful to present their evidence in an objective, respectful, and balanced manner. Importantly, they are officers of the court and not adversaries to the defence.</em></li>
</ul>
</li>
 	<li>Why does the police investigator have to be attentive to common law?
<ul>
 	<li><em>Common law helps to define limits within statutory authorities and dictate the way the law is administered by, and by extension, helps define the way police investigations should be conducted, suspects should be treated, and the processes for collecting evidence and preserving it for court.</em></li>
</ul>
</li>
 	<li>Can a police investigator decide whether or not an accused should be afforded the defence of necessity?
<ul>
 	<li><em>Not in cases where harm to persons or significant property damage has occurred. In such cases, the investigator may collect evidence respecting the defence of necessity, but the final interpretation of that evidence is to be decided by the court. </em></li>
</ul>
</li>
 	<li>What common law doctrine can be applied when an accused is found in recent possession of stolen property?
<ul>
 	<li><em>The doctrine of recent possession, which allows the inference that unless an accused has a reasonable explanation for being in possession of certain property, it can be presumed that he/she had a role in the theft or related offence involving that property. </em></li>
</ul>
</li>
 	<li>What evidence must a police investigator gather to demonstrate that an accused was willfully blind?
<ul>
 	<li><em>Evidence that demonstrates that the accused knew or should have known the nature of the offence taking place, and deliberately failed to respect the reality of the situation.</em></li>
</ul>
</li>
 	<li>What does the term “mens rea” mean and why is it important?
<ul>
 	<li><em>It means the accused person had the mindful intent to commit the offence, and this is important to establish and state because nearly all crimes are only crimes where the accused can be showed to have had intent. </em></li>
</ul>
</li>
 	<li>What is a prima facie case?
<ul>
 	<li><em>It is the presentation of evidence that, if believed, would establish each of the elements necessary for a prosecution to succeed. This evidence is sworn into a criminal information. </em></li>
</ul>
</li>
 	<li>What is a criminal information?
<ul>
 	<li><em>It is a sworn statement of a police officer, presented in the form of a signed document that contains basic information about the criminal charge to be considered by the court. This is the first document considered by the court for consideration of a judge and includes information about the identity of the accused, the date or time frame in which the offence occurred, the place where the offence occurred, the identification of the offence and associated criminal code of other statute section, and the actions taken by the accused that will show they committed to the offence.</em></li>
</ul>
</li>
 	<li>Is a police investigator protected from criminal or civil liability if they make an error or cause injury to a person?
<ul>
 	<li><em>Yes, except where they are found to have acted with criminal intent, or where they were reckless or criminally negligent in the execution of their duties.</em></li>
</ul>
</li>
 	<li>In applying his/her discretion to not lay a charge where there is reason to believe a person has committed an indictable offence, what must a police investigator remember?
<ul>
 	<li><em>They must remember that they do not have absolute discretion. Rather, the discretion:</em>
<ol>
 	<li><em>Must be justified with concrete reasons, </em></li>
 	<li><em>It has to be proportional to the offence</em></li>
 	<li><em>It must be in the public interest, and </em></li>
 	<li><em>It must not be based on any favouritism or bias.</em></li>
</ol>
</li>
</ul>
</li>
 	<li>When can a police investigator arrest without a warrant?
<ul>
 	<li><em>A police investigator can arrest without warrant, when he/she believes on reasonable grounds that a person has committed or is about to commit an indictable offence, when he/she finds someone committing a criminal offence... </em></li>
</ul>
</li>
 	<li>When can a police investigator detain a person?
<ul>
 	<li><em>When the police investigator has a reasonable suspicion that a suspect is somehow implicated in the offence under investigation.</em></li>
</ul>
</li>
</ol>
<h1>Chapter 3</h1>
<ol>
 	<li>What do we mean when we say that evidence will be considered by the court on its “probative value”?
<ul>
 	<li><em>“Probative value” refers to the weight or persuasiveness that the court assigns to a particular piece of evidence when considering its value towards proving a point in fact of the charge.</em></li>
</ul>
</li>
 	<li>What is direct evidence, and
<ul>
 	<li> <em>Direct evidence is any evidence that proves the point in fact without the   interpretation of circumstances. </em></li>
</ul>
</li>
 	<li>Provide three examples of direct evidence?
<ul>
 	<li><em>Examples being, an eye witness account, video tape evidence of the crime in progress, or the confession of a suspect.</em></li>
</ul>
</li>
 	<li>Can an accused be convicted of circumstantial evidence alone?
<ul>
 	<li><em>Yes, so long as it leads to only one logical conclusion that satisfies the court as proof beyond a reasonable doubt.</em></li>
</ul>
</li>
 	<li>What is inculpatory evidence?
<ul>
 	<li><em>Inculpatory evidence is any evidence that will directly or indirectly link an accused person to the offence being investigated.</em></li>
</ul>
</li>
 	<li>What is exculpatory evidence?
<ul>
 	<li><em>Exculpatory evidence is the opposite of inculpatory evidence, in that it shows that the accused did not commit the crime.</em></li>
</ul>
</li>
 	<li>What is corroborative evidence?
<ul>
 	<li><em>Corroborative evidence refers to any type of evidence that supports the meaning, validity, or truthfulness of another piece of evidence that has already been presented to the court.</em></li>
</ul>
</li>
 	<li>What are the exceptions to the requirement of full disclosure?
<ul>
 	<li><em>Where the information involved is clearly irrelevant, considered privileged, risks exposing an ongoing police investigation, or would compromise the safety of a witness.</em></li>
</ul>
</li>
 	<li>Is hearsay evidence ever admissible in court?
<ul>
 	<li><em>Hearsay evidence is admissible if it relates to a dying declaration, a witness is the recipient of a spontaneous utterance, or a witness is testifying to hearsay from a child witness who is not competent.</em></li>
</ul>
</li>
 	<li>When can evidence be excluded by a court?
<ul>
 	<li><em>When the evidence was obtained following the violation of the Charter of Rights and Freedoms, including when police conducted an improper or unauthorized search of a person or a person’s property, when police fail to properly provide the appropriate warning and caution under Section 10 of the Charter, when police fail to provide a proper opportunity for an arrested or detained person to speak with counsel after arrest or detainment, and when failing to properly disclose all of the evidence prior to trial to allow the accused to make a full defence to the charge being considered. </em></li>
</ul>
</li>
 	<li>If evidence was illegally obtained, is it automatically excluded by the court?
<ul>
 	<li><em>No, illegally obtained evidence can be admissible so long as after a careful consideration of the circumstances and consequences involved by the court, it doesn’t bring the administration of justice into disrepute.</em></li>
</ul>
</li>
</ol>
<h1>Chapter 4</h1>
<ol>
 	<li>What is the difference between investigative tasks and investigative thinking?
<ul>
 	<li><em>Investigative tasks relate to the information gathering processes that feed into investigative thinking and the results. Investigative thinking, on the other hand, is the process of analyzing information and theorizing to identify suspects and develop investigative plans. </em></li>
</ul>
</li>
 	<li>What is the difference between Level One Priorities and Level Two Priorities?
<ul>
 	<li><em>Level One Priorities refer to the protection of the lives and safety of people, including all attending officers. Level Two Priorities include protecting property, gathering and preserving evidence, accurately documenting the event, and establishing reasonable grounds to identify and arrest offenders.</em></li>
</ul>
</li>
 	<li>What is the difference between a Tactical Investigative Response and a Strategic Investigative Response?
<ul>
 	<li><em>A Tactical Investigative Response is the response taken by the investigator to an Active Event, while a Strategic Investigative Response is the response taken to an Inactive Event.</em></li>
</ul>
</li>
 	<li>What is the difference between an Active Event and an Inactive Event?
<ul>
 	<li><em>An Active Event is a situation where the criminal act is or may still in progress, the suspect is or may be at the scene, and/or there is or may be a danger to lives and safety of people (including attending officers). An Inactive Event is a situation where the criminal act has concluded at the scene, the suspect or suspects have left the scene or have been arrested or detained, and the scene no longer represents a danger to the life and safety of people, including attending officers. </em></li>
</ul>
</li>
 	<li>When would an investigator consider the Threat vs. Action Analysis Dilemma?
<ul>
 	<li><em>When faced with a decision to enter a dangerous situation alone and take action or to wait for back-up to arrive before taking action.</em></li>
</ul>
</li>
 	<li>When does an investigator have the authority to enter a dwelling house without a warrant?
<ul>
 	<li><em>Under the authority of Sec 529 of the Criminal Code an investigator may enter a dwelling house for the purpose of arresting or apprehending a person if he/she has reasonable grounds to believe that the person is present in the house, or if entry is necessary to prevent imminent bodily harm or death to any person, or if entry is necessary to prevent the imminent loss or imminent destruction of evidence, and if by reasons of exigent circumstances, obtaining a warrant would be impractical.</em></li>
</ul>
</li>
 	<li>Why is it important for an investigator to thinking about “offence recognition” at the same time they are thinking about whether a situation should be classified as an Active Event or an Inactive Event?
<ul>
 	<li><em>It is important because the type of offence will guide the investigator’s mental inventory of the evidence and information they need to collect in support of a justification for an arrest or decision to not arrest. </em></li>
</ul>
</li>
 	<li>What is the Response Transition Matrix (RMT)?
<ul>
 	<li><em>The Response Transition Matrix is a tool to illustrate the considerations for police response when considering the authorities and issues to de-escalate from a Tactical Investigative Response to a Strategic Investigative Response and to consider the need to obtain search warrants once the authorities of exigent circumstances are no longer available. </em></li>
</ul>
</li>
</ol>
<h1>Chapter 5</h1>
<ol>
 	<li>What are the three most common errors investigators make in applying the Strategic Investigative Response?
<ul>
 	<li><em>The three most common errors include failing to identify and collect all of the available evidence and information, failing to effectively analyze the evidence and information collected to identify suspects and form reasonable grounds to take action, and becoming too quickly focused on one suspect or one theory of events and ignoring evidence of other viable suspects or theories that should be considered.</em></li>
</ul>
</li>
 	<li>What five groups of tasks must an investigator follow through on to complete a thorough investigation?
<ul>
 	<li><em>The five groups include identifying and collecting all available evidence, identifying all the significant people involved (witnesses, victims, and possible suspects), accurately documenting the criminal event, accurately documenting the investigative actions, and formulating a reasonable investigative plan to identify a suspect and make an arrest.</em></li>
</ul>
</li>
 	<li>What categories of tasks are involved in the Situation component of the STAIR tool?
<ul>
 	<li><em>The categories include breaking out the known facts of the event, classifying the offence as an Active event or an Inactive event, identifying all of people involved (witnesses, victims, and suspects), and completing an offence recognition.</em></li>
</ul>
</li>
 	<li>What categories of tasks are involved in the Tasks component of the STAIR tool?
<ul>
 	<li><em>The categories include engaging either a Tactical Investigative Response or a Strategic Investigative Response, crime scene management, canvassing and interviewing witnesses, profiling the people involved, and documenting the event.</em></li>
</ul>
</li>
 	<li>What categories of tasks are involved in the Analysis component of the STAIR tool?
<ul>
 	<li><em>The categories include:
</em><em>- Making observations and connections between people places, and circumstances
</em><em style="color: initial;">- Enhancing the meaning of physical evidence by forensic analysis
</em><em>- Determining evidence of the motive, opportunity, and means to commit the offence
</em><em>- Creating timelines of activities
</em><em>- Developing assumptions and theories that will guide the investigative process
</em><em>- Developing investigative plans based on theories, and
</em><em>- Using existing evidence to validate or disconfirm the theories </em></li>
</ul>
</li>
 	<li>What categories of tasks are involved in the Investigation component of the STAIR tool?
<ul>
 	<li><em>The categories include prioritizing the best investigative plans based on the most likely theory, testing theories against information and evidence discovered through investigation to identify suspects and form reasonable grounds, and possibly returning to ANALYSIS to form new theories or modify theories as new facts are found. </em></li>
</ul>
</li>
 	<li>What categories of tasks are involved in the Results component of the STAIR tool?
<ul>
 	<li><em>The categories include protecting the lives and safety of the people involved, protecting property, gathering and preserving evidence, accurately documenting the event, and establishing reasonable grounds to identify and arrest suspects.</em></li>
</ul>
</li>
</ol>
<h1>Chapter 6</h1>
<ol>
 	<li>Why must the investigator have the Results in mind at the outset of an investigation?
<ul>
 	<li><em>Because if the investigator knows where he/she is going and what the results need to be, he/she can know how to prioritize their actions to reach those results. Setting and monitoring those priorities is a critical piece of the mental mapping process.</em></li>
</ul>
</li>
 	<li>What are five reasons some people reporting a criminal event lie, fabricate, embellish, or misrepresent the facts?
<ul>
 	<li><em>Some of the reasons are that the person is doing it for a personal gain such as a financial reward (e.g. insurance fraud), attempting to take revenge on someone, covering up personal involvement in the crime, attempting to shift responsibility for a crime to someone else, and covering up the involvement of an associate to divert prosecution. </em></li>
</ul>
</li>
 	<li>What are four key questions an investigator should consider in authenticating a crime report?
<ul>
 	<li><em>The investigator should ask – Does the evidence support the report that an offence occurred, and if an offence did occur, did it happen at the time reported, did it happen at the place reported, and did it happen the way the fact pattern being reported suggests?</em></li>
</ul>
</li>
 	<li>What is meant by evidence transfer?
<ul>
 	<li><em>Evidence transfer means that the evidence will transfer from a suspect to a crime scene, a suspect to a victim, from the crime scene to the victims, and/or from the crime scene to a suspect. </em></li>
</ul>
</li>
 	<li>What is spatial relationship evidence?
<ul>
 	<li><em>It is evidence from circumstantial links that demonstrates a connection or relationship between objects, times, events, and people.</em></li>
</ul>
</li>
 	<li>What is timeline evidence?
<ul>
 	<li><em>It is evidence that demonstrates a time alignment of the suspect to the criminal event or to the victim.</em></li>
</ul>
</li>
</ol>
<h1>Chapter 7</h1>
<ol>
 	<li>What is a collaborative witness?
<ul>
 	<li><em>A collaborative witness is a person who can only provide circumstantial or indirect evidence of the events surrounding the crime. </em></li>
</ul>
</li>
 	<li>What is an independent witness?
<ul>
 	<li><em>An independent witness is someone not related to or associated in any way to the victim, the accused person(s), or the criminal event.</em></li>
</ul>
</li>
 	<li>Can an accused person be compelled to testify regarding a crime they have been involved in?
<ul>
 	<li><em>Yes, if there is a co-accused they can be compelled to testify against that person. However, the testimony they give can’t be used against them in their own trial.</em></li>
</ul>
</li>
 	<li>Are all persons considered competent to testify?
<ul>
 	<li><em>Yes, with the considered exception of children, persons with low mental capacity, and spouses – where it can be established in court that the person in question from one of these three groups of people is an incompetent witness.</em></li>
</ul>
</li>
 	<li>What is witness credibility assessment?
<ul>
 	<li><em>This is a required task of the investigator whereby he/she seeks to determine the level of confidence that can be attributed to each witness.</em></li>
</ul>
</li>
 	<li>What concerns should an investigator have about dominant witnesses?
<ul>
 	<li><em>Dominant witnesses pose a risk of potentially influencing or otherwise contaminating the statements of other witnesses. </em></li>
</ul>
</li>
 	<li>What should an investigator do in the case of an active event where immediate in-depth interviews are not possible?
<ul>
 	<li><em>The investigator should conduct immediate field interviews of each person at the scene, do an immediate classification of each of these people as victims, witnesses, or suspects, and take appropriate measures to separate them for the purpose of physical security and protection of future testimony from cross-contamination of witness accounts and conformity. </em></li>
</ul>
</li>
 	<li>Is it possible to have a witness statement in something other than written form?
<ul>
 	<li><em>Yes, witnesses can provide audio or video statements so long as they are ultimately transcribed and the witness signs the hard-copy transcription.</em></li>
</ul>
</li>
 	<li>What are two negative aspects of having a witness attempting to identify a suspect by paging through volumes of criminal file photos?
<ul>
 	<li><em>The negative aspects are that the process can take a great deal of time, and a witness can sometimes become confused by being overloaded with too many faces.</em></li>
</ul>
</li>
</ol>
<h1>Chapter 8</h1>
<ol>
 	<li>Can an investigator make changes (e.g. insert recalled facts) to the notes in his/her notebook when recalling information at a later date?
<ul>
 	<li><em>The investigator can’t ever change their notes, but they can record later recalled facts by writing them on a new note page, using the current time and date, and making a reference to the previous case notes, previous time, date, and page number. </em></li>
</ul>
</li>
 	<li>What actions must an investigator take under the Tasks category of the STAIR tool to protect the integrity of the crime scene?
<ul>
 	<li><em>To protect the integrity of the crime scene, the investigator must lock down the scene, set up crime scene perimeters, establish a path of continuity, and establish crime scene security.</em></li>
</ul>
</li>
 	<li>How is a crime scene perimeter defined?
<ul>
 	<li> <em>It is defined by the size of the crime scene as determined by the investigator, who will also ensure the perimeter is clearly marked by tape around its outside edges.</em></li>
</ul>
</li>
 	<li>What is a path of contamination?
<ul>
 	<li><em>The path of contamination is a designated pathway established by the first investigator where authorized personnel can enter and re-enter a crime scene to conduct their investigative duties after the scene has been locked down.</em></li>
</ul>
</li>
 	<li>What is a Crime Scene Security Log?
<ul>
 	<li><em>The Crime Scene Security Log is a document, created and maintained by the assigned crime scene security officer, to provide a running log of who attended the scene, when they attended, why they were there, and when they left the scene.</em></li>
</ul>
</li>
 	<li>What are the two greatest challenges to evidence management at a crime scene?
<ul>
 	<li><em>The two greatest challenges to evidence management at a crime scene are the contamination of evidence and loss of continuity of the evidence.</em></li>
</ul>
</li>
 	<li>Identify six ways in which the contamination of evidence can take place at a crime scene.
<ul>
 	<li><em>Contamination can take place through police or other first responders interfering with evidence during a tactical investigative response, suspects interfering with the crime scene to cover up or remove evidence, victims or witnesses handling evidence, animals causing unwanted transfer or removal of evidence through consumption, weather washing away evidence, or when crime scene investigators fail to follow proper crime scene management procedures.</em></li>
</ul>
</li>
 	<li>What is the purpose of an Exhibit Log?
<ul>
 	<li><em>The Exhibit Log is a document running record, for purposes of maintaining the chain of continuity, of where evidence was found at a crime scene, who found it, and the initials of anyone else who handled that evidence from the crime scene continuously to the main exhibit locker. </em></li>
</ul>
</li>
 	<li>What are the three possible stages of time where evidence can originate?
<ul>
 	<li><em>They are the pre-crime stage, the criminal event stage, and the post-crime stage?</em></li>
</ul>
</li>
 	<li>What kinds of items could be relevant and need to be considered by the investigator in gathering evidence at a crime scene?
<ul>
 	<li><em>Items that either the suspect or victim may have touched, items that the suspect may have brought to the scene, items that may have passed between the suspect and the victim, items that the suspect may have taken from the scene, and items that the suspect may have discarded while leaving the crime scene.</em></li>
</ul>
</li>
 	<li>Beyond having a path of contamination, how can cross-contamination be avoided or prevented at a crime scene?
<ul>
 	<li><em>Cross-contamination can be avoided or prevented by the practice of handling only one exhibit at a time, marking the exhibit, placing it in a secure container, and decontaminating the investigator by changing gloves and discarding any item that could have come in contact with a previous exhibit.</em></li>
</ul>
</li>
 	<li>What four sets of tasks need to be considered and addressed in every crime scene, regardless of how large or small it is?
<ul>
 	<li><em>The crime scene must be secured, preserved, and recorded until evidence is collected, existing contamination must be considered and recorded, cross-contamination must be prevented, and exhibits must be identified, preserved, collected, and secured in a manner that preserves the chain of continuity. </em></li>
</ul>
</li>
</ol>
<h1>Chapter 9</h1>
<ol>
 	<li>At what point would an investigator move from interviewing a person to questioning them?
<ul>
 	<li><em>When evidence is discovered to give the investigator reasonable grounds to suspect that that the person is involved in the event.</em></li>
</ul>
</li>
 	<li>At what point would an investigator move from questioning a suspect to interrogating them?
<ul>
 	<li><em>When evidence is discovered to give the investigator reasonable grounds to believe, and after the suspect has been placed under arrest.</em></li>
</ul>
</li>
 	<li>What are three common scenarios where an investigator is likely to come across a false confession?
<ul>
 	<li><em>When a person has been enlisted by organized crime to take the blame, when a person is protecting a friend or loved one, and where a person is mentally ill.</em></li>
</ul>
</li>
 	<li>What are two ways in which young offenders must be treated differently than adults by an investigator in the process of questioning them about involvement in a crime?
<ul>
 	<li><em>Dealing with young offenders requires that the investigator ensure that their parents or guardians are notified, and that he/she explains Charter Rights to youth in language appropriate to their age and level of understanding.</em></li>
</ul>
</li>
 	<li>What are six examples of ancillary offences that investigators need to be aware of?
<ul>
 	<li><em>These include conspiracy to commit an offence, attempting to commit an offence, being an accessory after the fact to an offence, aiding and abetting an offence, counselling a person to commit an offence, and compounding an indictable offence. </em></li>
</ul>
</li>
 	<li>What evidence must be provided to show that a person can be charged with being an “accessory after the fact”?
<ul>
 	<li><em>There must be evidence to show that the person knew that another person committed the primary offence and that they received, comforted, or assisted that person to enable them to escape justice.</em></li>
</ul>
</li>
 	<li>How is “aiding and abetting” different from other ancillary offences?
<ul>
 	<li><em>It is different from other ancillary offences in that it doesn’t become a separate charge from the primary offence. </em></li>
</ul>
</li>
</ol>
<h1>Chapter 10</h1>
<ol>
 	<li>In terms of a physical matching, what is the difference between a Level One and a Level Two examination?
<ul>
 	<li><em>Level One is an examination of an item for class characteristics, while Level Two is an examination of accidental characteristics (e.g. very unique markings associated to wear and tear).</em></li>
</ul>
</li>
 	<li>How are latent fingerprints made visible?
<ul>
 	<li><em>Latent fingerprints are made visible on most surfaces through the application of coloured fingerprinting powder that adheres to the oils left by our fingers.</em></li>
</ul>
</li>
 	<li>What is the difference between a Level One and Level Two ballistics examination?
<ul>
 	<li><em>A Level One examination is focused on the general characteristics of a firearm (e.g. calibre, firing mechanism), while a Level Two examination would focus on very distinct marking as determine through striations matching, chamber markings, firing pin comparisons, and ejector markings. </em></li>
</ul>
</li>
 	<li>What is blood spatter analysis?
<ul>
 	<li><em>It is detailed examination of how and where blood is distributed inside a crime scene providing indications of how the attack took place as indicated by the distribution patterns. </em></li>
</ul>
</li>
 	<li>What are four common post-mortem indicators considered in an autopsy?
<ul>
 	<li><em>The four most common post-mortem indicators are body temperature loss after death (algor mortis), the degree of stiffening of the body after death (rigor mortis), post-mortem settling of blood and staining of skin (liver mortis), and progress of decomposition.</em></li>
</ul>
</li>
 	<li>How else can a pathologist be helpful to police besides being able to speak to cause of death?
<ul>
 	<li><em>A pathologist can also be helpful in providing an expert opinion on such matters as features of weapons used, the direction of a laceration, distance from which a wound was inflicted, and the angle of the entry and exit point of a wound.</em></li>
</ul>
</li>
 	<li>What is forensic archeology?
<ul>
 	<li><em>Forensic archeology is the use of archeological methods by experts to exhume crime scenes, including bodies.</em></li>
</ul>
</li>
 	<li>What is forensic entomology?
<ul>
 	<li><em>Forensic entomology is the study of the life cycle of bugs coming and going from a dead body with attention to estimating relative time of death.</em></li>
</ul>
</li>
 	<li>What is criminal profiling?
<ul>
 	<li><em>Criminal profiling, also referred to as psychological profiling, is the study of criminal behaviour to develop the most likely social and psychological profile of the person who may have committed a particular crime. It is based on the profile and actions of known criminals who have committed the same type of crime in the past.</em></li>
</ul>
</li>
 	<li>What is ViCLASS?
<ul>
 	<li><em>ViCLASS is a database system that documents the criminal conduct of convicted violent offenders and sex offenders, as well as unsolved cases, with a goal of documenting crime types and criminal conduct into a searchable database where unsolved crimes can be linked to offenders with matching profiles. Developed by the Royal Canadian Mounted Police, there are more than 300,000 cases on the system and since 2007, over 3,200 linkages have been made. </em></li>
</ul>
</li>
</ol>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>7</wp:post_id>
		<wp:post_date><![CDATA[2017-04-24 13:44:22]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-04-24 17:44:22]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[appendix]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>1</wp:menu_order>
		<wp:post_type><![CDATA[back-matter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
										<category domain="back-matter-type" nicename="miscellaneous"><![CDATA[Miscellaneous]]></category>
						<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[727]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Study Questions and Answers]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_candela_citation]]></wp:meta_key>
		<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 2: Some Important Basic Concepts</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-2-some-important-basic-concepts/</link>
		<pubDate>Tue, 25 Apr 2017 23:25:50 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=chapter&#038;p=59</guid>
		<description></description>
		<content:encoded><![CDATA[<div class="textbox shaded"><em>“There are many legal rules, concepts, principles, doctrines, and protocols investigators must be attentive to as they work through an investigation, and each must be incorporated into their thinking process.”</em></div>
It would be impossible to properly appreciate the investigative process without first establishing an understanding of the real-life forum in which it occurs. That forum is the criminal justice system and in particular, the court system. The investigative process also exists within the statutory rules of law, including the Canadian <em>Charter of Rights and Freedoms</em>, and case law rulings adjudicated by the courts. Considering the existence of these conditions, obligations, and case law rules, there are many terms and concepts that an investigator needs to understand to function appropriately and effectively within the criminal justice system. The purpose of this chapter is to introduce some of the basic legal parameters and concepts of criminal justice within which the criminal investigation process takes place. These include:
<ol>
 	<li>Fundamental justice and the <em>Charter of Rights and Freedoms</em></li>
 	<li>Roles of the judges, the prosecutors, the defence, and the police in the justice system</li>
 	<li>The burden of proof</li>
 	<li>Belief beyond a reasonable doubt</li>
 	<li>Reasonable grounds for belief</li>
 	<li>Proof within a balance of probabilities</li>
 	<li>The adversarial system</li>
 	<li>Statutory law</li>
 	<li>Common law (Case law)</li>
 	<li><em>Actus Reus</em> and <em>Mens Rea</em></li>
 	<li><em>Prima facie case</em>, elements of the offence, and the information</li>
 	<li>Duty to investigate and use of discretion</li>
 	<li>Arrest and detention of a suspect</li>
</ol>
<h1>Topic 1: Fundamental Justice and the <em>Charter of Rights and Freedoms</em></h1>
Criminal justice systems exist to protect society using a broad range of laws and regulations designed to define, control, and prohibit unacceptable behaviour and conduct. The behaviour and conduct to be prohibited or controlled can range from criminal acts of terrorism and murder, to infractions of a minor nature, such as exceeding the speed limit or watering one’s lawn outside of permitted time periods. These laws and regulations can result in a variety of sentences, restrictions, and interventions to personal freedom or penalties against offenders. In Canada, penalties can range from life imprisonment with no parole eligibility for 25 years, to fines, probation, or a warning. As a core principle in the application of any of these laws, there are strong social values that reflect the expectations of citizens who live under the protection of the laws. Citizens expect and demand that the law be enforced and administered fairly and in a manner that respects their rights and freedoms as individuals. This expectation most particularly pertains to any person suspected of or charged with an offence.

These values and expectations of fairness have origins dating back to ancient Rome and of English common law, which eventually defined the principles of “natural justice,” now more commonly referred to in Canada as “fundamental justice” (Dostal, 2012h).

At the core of these principles of “natural justice” or “fundamental justice,” some basic operational imperatives have been established to guide the outcomes of the justice system and ensure fundamental justice for persons charged for an offence. For example, one who alleges an offence to have taken place must prove it, the person accused of an offence has the right to see the evidence against them, the person accused has the right to answer to the charge and provide a defence, the trier of fact (i.e. most commonly a judge) must not be biased, and the trier of fact must base their decision upon evidence and must articulate the evidence considered when the decision is handed down. Further entrenching these principles of “fundamental justice,” the <em>Canadian Charter of Rights and Freedoms</em> Sections 7–14 was enacted into law in 1982, replacing the existing<em> Canadian Bill of Rights </em>(Government of Canada, 2015).

Excerpt from <em>Charter of Rights and Freedoms</em><span> Sections 7–14, "Legal Rights": </span>
<blockquote>
<p style="padding-left: 30px;">7. Everyone has the right to life, liberty and security of the person and the right not to be deprived thereof except in accordance with the principles of fundamental justice.</p>
<p style="padding-left: 30px;">8. Everyone has the right to be secure against unreasonable search or seizure.</p>
<p style="padding-left: 30px;">9. Everyone has the right not to be arbitrarily detained or imprisoned.</p>
<p style="padding-left: 30px;">10. Everyone has the right on arrest or detention</p>
<p style="padding-left: 60px;">(a) to be informed promptly of the reasons therefor;</p>
<p style="padding-left: 60px;">(b) to retain and instruct counsel without delay and to be informed of that right; and</p>
<p style="padding-left: 60px;">(c) to have the validity of the detention determined by way of habeas corpus and to be released if the detention is not lawful.</p>
<p style="padding-left: 30px;">11. Any person charged with an offence has the right</p>
<p style="padding-left: 60px;">(a) to be informed without unreasonable delay of the specific offence;</p>
<p style="padding-left: 60px;">(b) to be tried within a reasonable time;</p>
<p style="padding-left: 60px;">(c) not to be compelled to be a witness in proceedings against that person in respect of the offence;</p>
<p style="padding-left: 60px;">(d) to be presumed innocent until proven guilty according to law in a fair and public hearing by an independent and impartial tribunal;</p>
<p style="padding-left: 60px;">(e) not to be denied reasonable bail without just cause;</p>
<p style="padding-left: 60px;">(f) except in the case of an offence under military law tried before a military tribunal, to the benefit of trial by jury where the maximum punishment for the offence is imprisonment for five years or a more severe punishment;</p>
<p style="padding-left: 60px;">(g) not to be found guilty on account of any act or omission unless, at the time of the act or omission, it constituted an offence under Canadian or international law or was criminal according to the general principles of law recognized by the community of nations;</p>
<p style="padding-left: 60px;">(h) if finally acquitted of the offence, not to be tried for it again and, if finally found guilty and punished for the offence, not to be tried or punished for it again; and</p>
<p style="padding-left: 60px;">(i) if found guilty of the offence and if the punishment for the offence has been varied between the time of commission and the time of sentencing, to the benefit of the lesser punishment.</p>
<p style="padding-left: 30px;">12. Everyone has the right not to be subjected to any cruel and unusual treatment or  punishment.</p>
<p style="padding-left: 30px;">13. A witness who testifies in any proceedings has the right not to have any incriminating evidence so given used to incriminate that witness in any other proceedings, except in a prosecution for perjury or for the giving of contradictory evidence.</p>
<p style="padding-left: 30px;">14. A party or witness in any proceeding who does not understand or speak the language in which the proceedings are conducted or who is deaf has the right to the assistance of an interpreter (Government of Canada, 2015).</p>
</blockquote>
As demonstrated by these eight explicit sections of the charter, any person accused of a crime has a significant level of protection from being presumed guilty or from being treated unfairly by the justice system because of an accusation.

In the criminal justice system, police investigators are very often the first point of contact and they hold a primary obligation to respect the rights and freedoms afforded by the <em>Canadian</em> <em>Charter of Rights and Freedoms</em>. The steps that must be taken by an investigator to ensure that the rights and freedoms are protected and the principles of fundamental justice are followed will be outlined in detail later in this book.
<h1>Topic 2: The Role of the Judge, the Prosecutor, the Defence, and the Police</h1>
As operational players within the criminal justice system, judges, crown prosecutors, defence lawyers, and police all contribute to the process of “natural justice” or “fundamental justice.” Each of these participants has specific and independent roles to play and duties to perform. For example, the role of the police investigator is to gather information, physical evidence, and witness evidence to form the reasonable ground that a particular suspect committed an offence. Once these reasonable grounds for belief have been formed, the evidence can be presented to the Crown Prosecutor to determine if a charge should be laid. The role of the crown prosecutor is to examine the evidence gathered by police investigators. If charges are laid, the crown prosecutor presents that evidence to a judge who will determine the guilt or innocence of the accused based upon the test of proof beyond a reasonable doubt. The role of the defence counsel is to represent the accused through examination of the evidence presented, testing the strength of the evidence presented, and challenging the reasonable grounds for belief. The defence’s goal is to demonstrate that the test of proof beyond a reasonable doubt has not been met.

Many are the occasions where police have identified and arrested the correct suspect, but the evidence collected in their investigation was rejected by the court because procedural rules were not properly applied. These kinds of cases, lost to errors in process or in misunderstanding of the rules, provide valuable lessons for the police investigator who failed; but sadly, they are a disappointing and a negative experience for the victim of the crime and the public who expect investigators to always get it right.
<h1>Topic 3: The Burden of Proof</h1>
For a police investigator, it is important to understand that matters under investigation can end up being presented in a criminal or civil court of law. Each of these court venues requires and applies a different burden of proof to the evidence presented. It is entirely possible that a police investigator will be called to present evidence of their investigation in either type of court. For instance, it is possible in cases, such as a motor vehicle crash, that the evidence collected by the police for a criminal court charge of Impaired Driving or Dangerous Driving could be used in a civil court trial where an injured victim sues the impaired driver for damages resulting from their injuries or the loss of their vehicle.

The criminal court is the one most commonly encountered by police investigators. These courts hear cases investigated under the Criminal Code and under Federal, Provincial, and Municipal Statues. Cases can cover offences ranging from personal and property offences to those covered under Municipal Statutes. For criminal courts, judges or judges and juries use the burden of proof described as “proof beyond a reasonable doubt” to determine if they will convict or acquit an accused person. Civil courts take responsibility for making decisions in relation to matters where one party is seeking a non-criminal judgement, damages, or a decision against another party. These can be cases related to personal injury cases, contractual disputes, divorce proceedings, and contested wills or estates. In these cases, the parties involved are referred to as the plaintiff and the defendant. The plaintiff is the party that initiates the civil court action, and the defendant is the party against whom the civil action is filed. In these civil actions, the burden of proof considered by the court is described as “proof within a balance of probabilities.” This is a much lesser test than proof beyond a reasonable doubt as the court seeks to determine, on the balance of probabilities, which side is most likely correct.
<h1>Topic 4: Proof Beyond a Reasonable Doubt</h1>
Proof beyond a reasonable doubt is the standard measure of proof that the criminal court will apply when determining if evidence presented by the prosecution is sufficient to convict the person charged with an offence. If the evidence is sufficient, and the burden of proof has been satisfied, the court may convict the accused. In these cases, the onus to prove all the elements of the charge rests completely with the prosecution. The accused person is not required to prove that they are innocent.

The Supreme Court of Canada has outlined the concept of proof beyond a reasonable doubt suggesting that it should be explained to juries as follows:
<blockquote>The standard of proof beyond a reasonable doubt is inextricably intertwined with that principle fundamental to all criminal trials, the presumption of innocence (<em>R v Lifchus</em>, 1997).
<ul>
 	<li>The burden of proof rests on the prosecution throughout the trial and never shifts to the accused.</li>
 	<li>A reasonable doubt is not a doubt based upon sympathy or prejudice, and instead, is based on reason and common sense.</li>
 	<li>Reasonable doubt is logically connected to the evidence or absence of evidence.</li>
 	<li>Proof beyond a reasonable doubt does not involve proof to an absolute certainty. It is not proof beyond any doubt, nor is it an imaginary or frivolous doubt.</li>
 	<li>More is required than proof that the accused is probably guilty. A jury which concludes only that the accused is probably guilty must acquit.</li>
</ul>
The Supreme Court of Canada emphasized in <em>R v Starr</em>, that an effective way to explain the concept is to tell the jury that proof beyond a reasonable doubt "falls much closer to absolute certainty than to proof on a balance of probabilities." It is not enough to believe that the accused is probably guilty, or likely guilty. Proof of probable guilt, or likely guilt, is not proof beyond a reasonable doubt (R v Starr, 2000).</blockquote>
It is important for investigators to understand that “proof beyond a reasonable doubt” is a different test from what they are required to meet when considering the value of evidence during their investigation. Later in this book, we will examine the importance of collecting, documenting, and properly preserving as much evidence as possible to assist the court reaching their belief beyond a reasonable doubt.
<h1>Topic 5: Reasonable Grounds to Believe</h1>
Reasonable grounds to believe, sometimes referred to as reasonable and probable grounds to believe, is the test a police investigator must apply when considering the evidence to exercise their powers during the investigation of an offence. Establishing reasonable grounds to believe that a person is responsible for an offence allows the investigator to exercise powers that are provided under the criminal code. These are the powers to arrest with or without a warrant, the power to search and seize evidence with or without a warrant, and the power to swear an information against a person once reasonable grounds to believe have been established.

Forming reasonable grounds for belief is a subjective thinking process. It is arguably the most important thinking processes an investigator will undertake. It is a thinking process based upon the consideration of information, evidence, and facts the investigator has collected during their investigation. These reasonable grounds for belief must be based upon the investigator’s assessment of the information and evidence available to them at the time the decision to act is made. Evidence of guilt discovered after an action (such as when an arrest or a search has taken place) cannot be used to retroactively justify that action of arrest or search. As such, when the court considers if the investigator was correct and justified in forming reasonable grounds to believe based upon the evidence available at the time of the action, the judge will think about the nature of the evidence the investigator has described in their testimony.

Justice Cory in<em> R v Storrey</em> (1990) provided a very common sense deliberation to be applied in determining if the investigator had reasonable grounds to believe:
<blockquote>The Criminal Code requires that an arresting officer must subjectively have reasonable and probable grounds on which to base the arrest. Those grounds must, in addition, be justifiable from an objective point of view. <em>That is to say, a reasonable person placed in the position of the officer must be able to conclude that there were indeed reasonable and probable grounds for the arrest</em><strong>.</strong> On the other hand, the police need not demonstrate anything more than reasonable and probable grounds. Specifically they are not required to establish a prima facie case for conviction before making the arrest. (<em>R v Storrey,</em> 1990)</blockquote>
Reasonable grounds to believe is a very important concept for an investigator to understand, and it must not be confused with the more onerous test of “proof beyond a reasonable doubt” (R v Starr, 2000), which is the test the court will use in weighing the evidence to determine if a conviction for the offence is justified. Confusing these two levels of belief is an error sometimes made by investigators, and it can cause an investigator to hesitate because they do not believe they have reached the adequate level of belief to take action.

It is fortunate that this lesser level of belief, reasonable grounds<strong><em>,</em></strong> is available for police investigators because it requires that police articulate only a subjective belief in the information and evidence available to them at the time of their investigation. It allows police investigators to form reasonable grounds of belief based on physical evidence they have seen, records they have reviewed, and hearsay information acquired from witnesses. In situations where time is of the essence to protect life and safety, protect evidence, or to bring a situation under control, it does not require the investigator to undertake any validation of the information they are relying on. The information may be taken at face-value.

Establishing reasonable grounds to believe and taking the action of making an arrest or conducting a search will not necessarily be the precursor to collecting enough evidence to lay charges. In some cases, an arrest is made because reasonable grounds existed and, after additional information and evidence are accessed, it becomes clear that the person is not guilty of the offence. Consequently, the process of laying a charge does not take place and the person is released. Remaining open to the outcome of determining innocence is truly a test of objectivity for investigators. This objectivity can sometimes be difficult to achieve when there is serious pressure to capture a dangerous offender. The mistake of being too quick to proceed with charges, or even discounting and ignoring evidence that indicates innocence, is a trap that has led many investigators to the end their careers under accusations of lost objectivity or even incompetence (Pennington, 1999).

When charges are laid, objectivity can become a key issue at the trial and the defence may demand that the investigator provide an accurate account of evidence that was considered or ignored in the thinking process to establish their reasonable grounds to believe. Forming reasonable grounds is a process that should be undertaken with careful consideration of the facts. Forming reasonable grounds requires a diligent intent to remember the facts, keeping in mind that an articulation of the subjective analysis used in forming reasonable grounds for belief may be required as testimony in a court.

This degree of self-awareness is a critical step in building the thinking skills to become a good investigator.  With these thinking skills in mind, tools will be provided later in this book that can assist an investigator with the practice of thinking through investigations using a step-by-step process.
<h1>Topic 6: Proof Within a Balance of Probabilities</h1>
As mentioned above, the balance of probabilities is the civil court standard of proof that is less onerous than the criminal court standard of proof beyond a reasonable doubt. For something to be proven within a balance of probabilities means that it is more likely than not to have occurred. On a scale of equal balance, if the likelihood is more than 50% that something occurred, the test of being “within a balance of probabilities” has been met. In most cases, if the criminal test of proof beyond a reasonable doubt has been met, that same evidence presented at a civil trial is likely to meet the required threshold of being within a balance of probabilities (Allen, 1991). It is important for a criminal investigator to understand that, even though there may not be enough evidence to meet the requirement for a criminal charge or establish proof beyond a reasonable doubt, the evidence may still be successful in establishing civil liability within a balance of probabilities. The possibility of civil action makes it important for investigators to remain diligent in collecting and preserving evidence, even if they believe there will not be a criminal charge proceeding.
<h1>Topic 7: The Adversarial System</h1>
In the trial of a person charged with an offence in a criminal court proceeding, the judge will hear the evidence and arguments presented by both the prosecution and the defence. The prosecution and the defence exist in court in an adversarial relationship with the onus resting with the prosecution to prove the facts of the case beyond a reasonable doubt. The defence may challenge the evidence, question the testimony and the credibility of witnesses, and present alternate theories of events or evidence, where the accused person could be considered not responsible or sometimes less responsible for the alleged offence. The facts required to be proven will vary depending on the offence being alleged; however, the prosecutor’s task to achieve a conviction requires that every element of the charge is proved beyond a reasonable doubt.

As an investigator, you will often work in partnership with the prosecutor assembling evidence to be presented in court. However, once in court, the police are merely witnesses for the court and do not play active role in the prosecution of an accused. Police investigators are not adversaries to the defence or the accused and should not consider themselves as such. Very often in court, a police investigator will have their evidence aggressively challenged by the defence lawyer in a very adversarial manner, and it will certainly feel as if the investigator is being challenged as an adversary. It is sometimes even a defence strategy to provoke the police investigator into a confrontation where they take an adversarial stance against the defence of the accused. In these cases, it is important for an investigator to remember that their credibility as an objective investigator can be compromised by the demonstration of an adversarial attitude or demeanour in court. This is not to say that an investigator must be submissive to the defence — providing evidence in an objective, respectful, and balanced manner is the key.

To share some advice once provided to this writer by a seasoned senior investigator:
<blockquote>"Your job ends on the court house steps. Do your investigation and take your evidence to court. Give your testimony and your job is done. Let the court make their decision and the case is done. If you allow yourself to take ownership of every decision the court makes, you will not last as an investigator. Let your job end on the court house steps” (Fookes, 1973).</blockquote>
Police investigators are officers of the justice system, independent to the crown prosecutor’s office. Police investigate and collect the evidence, and the crown prosecutor presents the evidence collected by the police to the court. The crown prosecutor does not and should not direct or interfere with police investigations. In Canada, this concept of independent functions between the police and the prosecutor’s office is sometimes misunderstood. This misconception can sometimes happen due to our exposure to the American justice system where district attorneys, as prosecutors, do become very involved in directing the investigative processes in American jurisdictions.
<h1>Topic 8: Statutory Law</h1>
Statutory law is written law enacted by different levels of government. These written laws regulate the conduct of citizens. Laws are enacted with escalating levels of authority from the three levels of government in Canada. The most serious laws are the domain of the federal government, which takes responsibility for controlling criminal conduct under the <em>Criminal Code of Canada</em>, as well as criminal conduct ascribed to be of national concern under a broad spectrum of other federal statues, such as:
<ol>
 	<li>The <em>Criminal Code of Canada</em></li>
 	<li>The <em>Controlled Drug and Substances Act</em> for drugs offences</li>
 	<li>The <em>Fire Arms Act</em> for the control of firearms and restricted weapons</li>
 	<li>The <em>Canadian Environmental Protection Act </em>for environmental offences</li>
 	<li>The <em>Canada Revenue Agency Act</em> for Income tax offences</li>
 	<li>The <em>Canadian Customs and Border Services Act</em> for border security</li>
</ol>
Statues, such as the <em>Motor Vehicles Acts</em> or the <em>Liquor Control and Licencing Acts</em>, are enacted by the provincial governments, and these laws vary somewhat from province to province. Each province has discretion to independently regulate issues, such as speed-limits or minimum drinking age, reflecting the cultural tolerances and social norms of their jurisdiction. At the lowest level, municipal governments enact by-law statues exclusive to their local concerns, such as parking or littering laws.

The <em>Criminal Code of Canada</em> is the most important and instructive federal statute for investigators. It provides police investigators with their authorities to use force, make arrests, enter private property, search for and seize evidence, and to lay charges against offenders. The wording of the Criminal Code of Canada is very clear regarding the types of action and conduct that constitute criminal offences. The Criminal Code also is generally clear about the rules for when and how a police officer may use force, arrest a suspect, enter private property, search and seize evidence, and lay a criminal charge against a suspect. However, there remains a significant amount of subjective interpretation in the code that must be done in the mind of an investigator to effectively use the various stated authorities to enforce the law. This need to interpret statutory law exists because of case law decisions and the common law precedents that have been established from those case law decisions.
<h1>Topic 9: Common Law (Case Law)</h1>
Common law is law that is not written down as legislation or a statue and is based on rulings and precedents of past cases to guide judges in making later decisions in similar future cases. It cannot be found in any statute or body of legislation, but only in past decisions. It is flexible and adapts to changing circumstances.

Fulfilling the role of a police investigator requires an understanding of specific statutory authorities, along with the case law and common law definitions for utilizing those authorities. Statutory authorities provide powers for arrest and use of force, powers for entry to private property, and powers to search for and seize evidence. Case law and common law are procedural in nature. They help define limits within statutory authorities and dictate the way the law is administered by the court. By extension, case law and rules of evidence define the way police investigations should be conducted, the way suspects should be treated, and the processes for collecting evidence and preserving it for court. The ability of an investigator to properly interpret and follow these statutory laws, case laws, and rules of evidence, can play a large part in determining if the evidence from an investigation is accepted or rejected by the court.

Case law and common law exist because, over the years, the courts have continually found that applying statutory law cannot happen without interpretation and consideration of exceptions. Critical points of subjective analysis, deciding issues of fairness to the accused, and balancing the need to protect society from criminal conduct have caused the courts to interpret how the law should be applied. These interpretations, when accepted by the judicial system, become precedents and sometimes even doctrines of law. Many of them directly comment on the matters an investigator should consider when making specific decisions to take action. With these stated matters of case law in mind, investigators are called upon to subjectively interpret the circumstances, evidence, and information relating to an event, and to determine if the specific facts and circumstances will meet the tests that allow action to be taken.

Many of an investigator’s interpretations and subsequent actions can be critical to the court accepting the evidence collected when the case goes to court, such as:
<ul>
 	<li>Using physical force, up to and including deadly force</li>
 	<li>Forming reasonable grounds to detain or arrest suspect</li>
 	<li>Entering private property with or without a warrant</li>
 	<li>Using the rules of exigent circumstances to protect life and safety of person or evidence</li>
 	<li>Using discretion to take actions, other than charges, when an offence has been committed</li>
</ul>
In addition to these case law decisions, common law also provides several doctrines of law that define consistent rulings of the courts when making assessments of the evidence being presented in relation to some specific common issues. A doctrine is established through repeated application of the same legal precedents, and there is an expectation that the lower courts will respect the application of these legal precedents in stated cases of the higher courts. Knowing these doctrines, and considering how the court might apply them to the evidence being presented, assists investigators on the proper ways to collect evidence that will best inform the court.
<h2>The Common Law Doctrine of Necessity</h2>
Under criminal law, the defence of necessity can be invoked by the defence in cases where the accused seeks to provide a rationale that committing the offence was the unavoidable result of some serious circumstance beyond his or her control. In considering this defence, the court will apply a very strict standard in order to meet the conditions prescribed in the common law doctrine of necessity (Gecker, 1989). It is important for an investigator to know the criterion that the court will apply, in-as-much as it will allow the investigator to seek out evidence that either supports or negates the necessity defence. The leading case in Canada for such a defence is <em>R v Perka</em> where Justice Dickson described the rationale for the defence as a recognition that:
<blockquote>A liberal and humane criminal law cannot hold people to the strict obedience of laws in emergency situations where normal human instincts, whether of self-preservation or of altruism, overwhelmingly impel disobedience.

However, it must be "strictly controlled and scrupulously limited." and <em>[sic]</em> can only be applied in the strictest of situations where true "involuntariness" is found. Three elements are required for a successful defence:
<ol>
 	<li>the accused must be in imminent peril or danger</li>
 	<li>the accused must have had no reasonable legal alternative to the course of action he or she undertook</li>
 	<li>the harm inflicted by the accused must be proportional to the harm avoided by the accused</li>
</ol>
The peril or danger must be more than just foreseeable or likely. It must be near and unavoidable.

At a minimum the situation must be so emergent and the peril must be so pressing that normal human instincts cry out for action and make a counsel of patience unreasonable.

With regard to the second element, if there was a reasonable legal alternative to breaking the law, then there can be no finding of necessity. Regarding the third element requiring proportionality, the harm avoided must be at least comparable to the harm inflicted (R v Perka, 1984).</blockquote>
Clearly, the standard for the defence of necessity sometimes requires the interpretation of complex issues. This interpretation determines if the circumstances and evidence fall within the ascribed definitions to be considered necessity. This interpretation is the job of the court assessing the evidence to reach their belief beyond a reasonable doubt.

If an investigator has discovered sufficient evidence and has reasonable grounds to believe an offence has been committed, there are sufficient grounds to lay the charge. In serious cases, where harm to persons, or significant property damage has occurred, police investigators do not have the discretion to consider if an accused person should be afforded the defence of necessity due to the complexity of the issues. In lesser cases, for instance where a police officer stops a car for speeding and the driver shows that they are speeding to get a critically injured person to the hospital, a police officer might use discretion and accept the excuse of necessity to forgo the speeding ticket. Conversely, if an accused person made the decision to cut a lifeline that caused a mountain climber to fall to his death to save himself from being pulled over the edge, that decision of necessity needs to be made by a judge in a court of law.

In serious cases, it is important for an investigator to remember that their job does not include making any final interpretation regarding the defence of necessity, even if evidence of necessity may exist. The investigator’s task is restricted to recognize and collect all evidence that may assist the court to make their decision on the issues of necessity. This would include recognizing and collecting evidence to show:
<ol>
 	<li>The nature of the danger being imminent or not</li>
 	<li>Evidence of other legal alternatives or actions that were available to the accused</li>
 	<li>Evidence that might indicate the danger was either avoidable or unavoidable</li>
 	<li>Evidence to demonstrate the anticipated harm from the threat, compared to the harm resulting from the accused’s action</li>
</ol>
<h2>Doctrine of Recent Possession</h2>
The doctrine of recent possession refers to the possession of property that has been recently stolen. It permits the court to make the inference that the possessor of the stolen property had knowledge that the property was obtained in the commission of an offence, and, in certain circumstances, was also a party to the initial offence (<em>R v Terrence</em>, 1983; &amp; <em>R v Kowlyk</em>, 1988). When considering whether to make the inference of recent possession, the prosecution must consider all the circumstances (<em>R v Abernathy</em>, 2002). This includes common sense factors, such as the amount of time that passed between possession and the offence (<em>R v Gagnon</em>, 2006). Factors to consider whether the possession was recent include the nature of the object, the rareness of the object, the readiness with which the object can and is likely to pass to another, and the ease of identification. To achieve an inference, the Crown must establish that the accused was found in possession of the item and that the item was recently stolen without an explanation (<em>R v Gagnon</em>, 2006). When the accused is found in recent possession without explanation, the prosecution can draw the inference and make the presumption that the accused had a role in the theft or related offences. The defence can present an argument to counter the presumption by providing evidence of a reasonable explanation (<em>R v Graham</em>, 1974).
<h2>Doctrine of Wilful Blindness</h2>
Wilful blindness, also called ignorance of the law or contrived ignorance, is something the court will consider when an accused provides a defence claiming that they were not aware of the facts that would make them either criminally or civilly liable for a criminal offence or a civil tort. As an example, this can arise where a person has purchased an expensive item of stolen property for a very small price, then attempts to defend against a charge of possession of stolen property by claiming that they did not to know the item was stolen and/or did not know the true value of the item. In applying the doctrine of wilful blindness, the court will carefully examine the circumstances to determine what the accused should have known or if the accused should have inquired further.

The Supreme Court of Canada articulated the thinking behind the assessment of wilful blindness in <em>R v Briscoe:</em>
<blockquote>“Wilful blindness does not define the mens rea required for particular offences. Rather, it can substitute for actual knowledge whenever knowledge is a component of the mens rea. The doctrine of wilful blindness imputes knowledge to an accused whose suspicion is aroused to the point where he or she sees the need for further inquiries, but deliberately chooses not to make those inquiries” (<em>R v Briscoe</em>, 2010).</blockquote>
The manner in which the court should examine these issues is further expressed in <em>Sansregret v The Queen</em><em>, </em>[1985] 1 S.C.R. 570 and<em> R v Jorgensen, </em>[1995] 4 S.C.R. 55<em>. </em>As<em> S</em>opinka J. succinctly put it in <em>R v Jorgensen</em> (at para. 103)<em>: </em>
<blockquote>“[a] finding of wilful blindness involves an affirmative answer to the question: Did the accused shut his eyes because he knew or strongly suspected that looking would fix him with knowledge? Courts and commentators have consistently emphasized that wilful blindness is distinct from recklessness. The emphasis bears repeating.”</blockquote>
As the Court explained further in <em>Sansregret v The Queen</em> (at p. 584):
<blockquote>"...while recklessness involves knowledge of a danger or risk and persistence in a course of conduct which creates a risk that the prohibited result will occur, wilful blindness arises where a person who has become aware of the need for some inquiry declines to make the inquiry because he does not wish to know the truth. He would prefer to remain ignorant. The culpability in recklessness is justified by consciousness of the risk and by proceeding in the face of it, while in wilful blindness it is justified by the accused’s fault in deliberately failing to inquire when he knows there is reason for inquiry“ (<em>Sansregret v The Queen</em>, 1985).</blockquote>
For an investigator who anticipates that wilful blindness may become an issue at trial, it is important to recognize the need to gather the additional evidence that might demonstrate the accused knew or should have known the nature of the offence taking place, and deliberately failed to inquire.
<h1>Topic 10: Actus Reus and Mens Rea</h1>
To recognize the types of evidence that need to be collected with respect to various offences, an investigator must become intimately familiar with the concept of <em>actus reus,</em> which is a Latin term definable as “the guilty act” or “the criminal act,” and the concept of <em>mens rea, </em>another Latin term meaning “guilty mind” or “the intent to commit a crime.” For any specific offence, the <em>actus reus </em>will be described by the wording of the statute that prohibits the conduct. For example, for the offence of theft, under the Criminal Code of Canada, the guilty act of theft, and variations of what constitute theft, are described in detail under section 322 (Criminal Code, 1985, s 322(1, 2)) of the Criminal Code of Canada:
<blockquote>Theft 322. (1) Every one commits theft who fraudulently and without colour of right takes, or fraudulently and without colour of right converts to his use or to the use of another person, anything, whether animate or inanimate, with intent
<p style="padding-left: 30px;">(a) to deprive, temporarily or absolutely, the owner of it, or a person who has a special property or interest in it, of the thing or of his property or interest in it;</p>
<p style="padding-left: 30px;">(b) to pledge it or deposit it as security;</p>
<p style="padding-left: 30px;">(c) to part with it under a condition with respect to its return that the person who parts with it may be unable to perform; or</p>
<p style="padding-left: 30px;">(d) to deal with it in such a manner that it cannot be restored in the condition in which it was at the time it was taken or converted.</p>
(2) A person commits theft when, with intent to steal anything, he moves it or causes it to move or to be moved, or begins to cause it to become movable.</blockquote>
The definition of the offence of theft provides a broad range of actions that will constitute the guilty act of theft. It defines items that can be stolen as anything, whether animate or inanimate. It includes conversion of the use of an item as being a theft, and it even defines the time a theft is completed, saying theft occurs when a person merely begins to cause something to be movable. For an investigator to collect evidence to prove the guilty act of theft, these definitions create a range of activities where evidence can be collected to illustrate a theft has occurred; but, just proving one of the actions that define the guilty act of theft occurred is insufficient because theft is one of the criminal offences that requires the act to be intentional. This is where the concept of <em>m</em><em>ens rea</em> comes into play.

The concept of <em>mens rea</em> seeks to determine if the accused person had the intent to commit the offence. Going back to the wording for the offence of theft, you will see that the words “with intent” are part of that offence wording. The words “with intent” allow that if a person takes someone’s property by accident or without the intent to steal, the offence of theft is not completed. For an investigator, this is an important concept because with this term, there is an added obligation to look for evidence that can assist the court in determining if the accused did in fact have the intent to commit the offence.

In the case of a theft, evidence of intent may be part of the observed actions of the accused, such as where a shoplifter is seen stuffing store merchandise into their pockets and then walking out the nearest exit of the store without paying. In such a case, it would not be enough for the investigator to show that the accused removed the property from the store. The act of concealing the items in the pockets is critical to demonstrate the intent to commit the offence. So, for offences where the term “with intent” forms part of the wording of the offence, the investigator needs to look for those extra pieces of evidence to demonstrate intent to the court.

It should be noted that intent does not form part of the wording for all offences. There are some offences where intent is not required. These are called a “strict liability offence” in Canada, and, with these offences, it only needs to be shown that the guilty act occurred. Some less serious offences, like speeding or failing to stop at a stop sign, are “strict liability” offences, and the investigator does not need to show that there was intent to commit the offence. There are also more serious strict liability offences, such as criminal negligence causing death or bodily harm, where proof of intent is not required. For offences sometimes called “crimes of omission,” it is only necessary to find evidence showing that the accused failed to meet the standard of care that is expected, and that they acted in a reckless manner. In other words, their reckless disregard caused or allowed the harm to occur.
<h2>Criminal Negligence</h2>
<blockquote>219. (1) Everyone is criminally negligent who
<p style="padding-left: 60px;">(a) in doing anything, or</p>
<p style="padding-left: 60px;">(b) in omitting to do anything that it is his duty to do,</p>
shows wanton or reckless disregard for the lives or safety of other persons.

Definition of “duty”
<p style="padding-left: 30px;">(2) For the purposes of this section, “duty” means a duty imposed by law (Criminal Code, 1985, s 219).</p>
</blockquote>
Even though intent in not a required element for this kind of charge, careful investigation of the evidence could elevate the offence from criminal negligence causing death or bodily harm to assault or even murder, if evidence of intent can be demonstrated. To demonstrate this point, let us examine a case where three men go hunting together and each is carrying a rifle. A shot is fired and one of the men is killed. The investigation of this death reveals that the shooter had been drinking heavily and was walking along with his loaded rifle and the safety on the rifle was off. The muzzle of his rifle was pointed in the direction of the victim walking beside him. The shooter confesses that he stepped over a log, tripped, and the gun discharged killing the victim. This evidence of drinking, the safety being off, and pointing a gun at the victim might support a charge for criminal negligence causing death.

Further investigation results in a statement from the third hunter who states that the victim and the shooter were business partners, and they had been arguing all morning over how they should divide the assets of the business they were selling. At one point, the shooter was heard telling the victim, “Be reasonable or I will just get rid of you and keep it all for myself.” This statement could be interpreted as an indication of motive and perhaps even intent to kill, and could be enough to elevate the criminal negligence causing death to a charge of murder. Hence, <em>Actus Reus</em> and <em>Mens Rea</em> become core concepts of investigative thinking. As the investigation proceeds, the investigator will undertake an ongoing process of evidence collection, offence recognition, and theory development to determine if an offence occurred, how the offence occurred, and why the offence occurred or is there evidence of intent. These concepts and the thinking to conduct theory development and evidence collection will be discussed in greater detail in the proceeding chapters of this book.
<h1>Topic 11: <em>Prima Facie</em> Case, Elements of the Offence, and the Criminal Information (Charge)</h1>
It is the job of the crown prosecutor to present evidence to the court that proves <em>a prima facie</em> case. <em>Prima facie </em>means at first sight and is the minimum amount of evidence required to prove each element of the formal charge against the accused. The elements of the offence include proving the specific acts alleged in the offence, such as assault or robbery; however, the elements of the offence also include other critical facts that a police investigator must consider to collect the correct evidence. It is the presentation of evidence that, if believed, would establish each of the elements necessary for the prosecution to succeed. In assessing whether a <em>prima facie</em> case is made, a judge does not decide whether the evidence is likely to be believed; but merely whether, if it were, it would establish the necessary elements for a conviction (Legal Information Institute, 2016).

The formal charge against a person in Canadian criminal law is called an ‘Information’, and there are specific elements or facts within that information that need to be proven. The information is a document sworn by a police officer alleging that the offence has taken place and accusing a person of that offence. The standard wording of a criminal information is as follows:
<div class="textbox textbox--examples"><header class="textbox__header">
<p class="textbox__title">Criminal Information</p>

</header>
<div class="textbox__content">

I, Constable (name of the informant), do solemnly swear that I have reasonable and probable grounds to believe and do believe that, on or about (date of offence), at or near (place of offence), in the Province of (province name), (name of accused), did unlawfully (statement of actions of the accused), and did thereby commit the offence of (name of the offence) contrary to the provision of (section number the offence under the criminal code or other statute), sworn before me this date of information swearing.

Signature of Judge or JP                                               Signature of the Informant

</div>
</div>
In the above Information, the elements that need to be proven to establish a <em>prima facie</em> case are:
<ol>
 	<li>The identity of the accused person named on the information</li>
 	<li>The date or time frame in which the offence occurred</li>
 	<li>The place where the offence occurred (establishing this place is within the jurisdiction of the presiding court)</li>
 	<li>The action or actions taken by the accused person that will show they committed the offence contrary to the law</li>
</ol>
In court, this information or charge becomes the first document for consideration by the judge. This information, also known as a criminal charge, is read to the accused on their first appearance in court and after the reading of the charge, the judge will ask the accused person to enter a plea of either guilty or not guilty. If the plea is guilty, the judge will hear circumstances of the offence that will determine the sentence or the penalty for the offence. If the plea is not guilty, the judge will determine if the offence is one that should be heard by a judge-and-jury or a judge alone; and, if it is one of the serious offences where the option for judge-and-jury is available, the accused will be asked to decide which type trail they would prefer. Having received a plea of not guilty, the judge will then schedule a trial date.

When the trial begins, the prosecutor will present evidence to establish the truth of each element of the information beyond a reasonable doubt. Because the court system is an adversarial system, the defence lawyer may challenge any piece of the evidence presented with the goal of not allowing the prosecution to prove one or more of the required elements to make out the <em>prime facie</em> case. The <em>prime facie</em> case is complete when sufficient evidence is presented to prove each element of the charge before the court. If any one element of the information is not proven, the <em>prima facie</em> case is not established beyond a reasonable doubt and the court will make a ruling of not guilty.
<h1>Topic 12: The Duty to Investigate and the Use of Discretion</h1>
An appointment as a peace officer and the duties of a police officer in Canada are made under the authority of various provincial police acts and at the federal level under the <em>RCMP Act</em>. The designation of a peace officer under any one of these acts enables the appointed person to exercise the powers and authorities of a peace officer described in those acts, as well as the powers and authorities to function as a peace officer under the provisions of the <em>Criminal Code of Canada </em>and any other federal and provincial statutes. In addition to these powers and authorities to act, persons designated as peace officers also have some limited protection from criminal charges and civil liabilities in cases where they unintentionally make an error or cause injury to a person. These protections from criminal and civil liability are provided under the Criminal Code for some criminal acts and under <em>Provincial Police Acts</em> and the <em>RCMP Act</em> for civil torts. These protections are not available, or can be withheld, where an officer is found to have acted with criminal intent or is found to have been reckless or criminally negligent in the execution of their duties.

So, police officers are endowed with powers and authorities to act as keepers of the peace. For the police, this responsibility is equated to doing their duty. To fully understand what this entails, one must consider these two most critical questions:
<ul>
 	<li>What are those duties?</li>
 	<li>Who decides when or if they have been properly done?</li>
</ul>
These questions have a long history of both philosophical and legal arguments, dating all the back to the origins of policing in England (Reith, 1943). <span style="background-color: #ff6600;"></span>In those early times, the police were predominately considered to be peace-keepers. As such, the neighbourhood “Bobby” would intervene to settle local disputes. Criminal charges were the last resort. This ability of police officers to settle local disputes using their own judgement and discretion became a valued function of policing skills. The use of discretion remains today at the core of community policing, restorative justice initiatives and alternate dispute resolution programs.

The arguments surrounding police use of discretion and alternate dispute resolution are twofold. Some have argued that police with too much discretion will misuse it and become corrupt, while others contend that the justice system will become overloaded with minor cases if the police do not have the discretion to try to resolve some disputes without laying charges (<em>R v Beare</em>, 1988).
<blockquote>"Directly on this point, Justice La Forest J. stated; Discretion is an essential feature of the criminal justice system. A system that attempted to eliminate discretion would be unworkably complex and rigid” (<em>R v Beare,</em> 1988).</blockquote>
Implicitly supporting the ongoing use of discretion, legislators continue to only provide very general definitions regarding what the duties of the police should be. Statements of police duties, such as the following are the norm.
<blockquote>“… (Police Officers) must perform the duties and functions respecting the preservation of peace, the prevention of crime and offences against the law and the administration of justice assigned to it or generally to peace officers by the chief constable, under the director's standards or under this Act or any other enactment” (Government of British Columbia, 2015).</blockquote>
Even under the <em>Criminal Code of Canada,</em> there is an implied discretion indicating that the laying of an information is a matter of <strong><em>may</em></strong> and not a requirement of <strong><em>will</em></strong>.
<blockquote>Section 504 CCC. Anyone who, on reasonable grounds, believes that a person has committed an indictable offence may lay an information in writing and under oath before a justice, and the justice shall receive the information, where it is alleged

(a) that the person has committed, anywhere, an indictable offence that may be tried in the province in which the justice resides (Criminal Code, 1985, s 504(1)(a)).</blockquote>
For investigators, this implied discretion to not take the action of laying a charge seems to leave the door open for a great deal of latitude and interpretation. Historically, this has been the case; but recently, there have been several cases where the incorrect use of discretion has resulted in case law providing more prescriptive direction and defined process for the use of discretion (<em>R v Beaudry</em>, 2007).

To examine the use of discretion, <em>R v Beaudry </em>(2007) has been very instructive in defining the criterion for officers. The brief facts of the case are as follows: the accused, Sgt. Beaudry, was a Quebec police officer who stopped a vehicle on September 22, 2000. The driver turned out to be intoxicated. Upon discovering that the driver was also a police officer whom he had met on a previous occasion, Sgt. Beaudry decided not to demand a breathalyser test from the driver. Sgt. Beaudry believed the driver to be depressed and stated that he was using discretion to give him a chance. Sgt. Beaudry was charged with and convicted of obstruction of justice. The court ruled that he had improperly used his discretion by allowing favouritism. Ultimately, the Supreme Court of Canada’s ruling clarified some of the limitations that they would assign to police discretion. It stated:
<blockquote>“discretion is not absolute. Far from having a carte blanche, police officers must justify their decisions rationally.”</blockquote>
In <em>R v Beaudry,</em> SCC ruled that the justification or using discretion must have three elements:
<ol>
 	<li>It must be an informed decision, based on evidence that constitutes reasonable ground</li>
 	<li>There must be concrete reasons for the decisions to use discretion that are not based on favouritism or bias</li>
 	<li>The officer must have both a subjectively and objectively honest belief in the reason for using the discretion, and the judge must determine that the officer’s belief reflected reality (<em>R v Beaudry</em>, 2007).</li>
</ol>
In addition to these three elements, the Supreme Court also stated that:
<blockquote>“Justification for discretion has to be proportional to the offence and has to be in the interest of public safety" (R v Beaudry, 2007).</blockquote>
From the <em>R v Beaudry</em> (2007) ruling, a set of seven principles were outlined and these principles serve as guidelines for police use of discretion in Canada:
<ol>
 	<li>Discretion is vital to the operation of the criminal justice system. Not all offenders must be charged.</li>
 	<li>The police still have discretion, but it is not absolute, it is limited.</li>
 	<li>Limited discretion means discretion must be proportional to the seriousness of the offence.</li>
 	<li>Use of discretion must be justified with concrete reasons.</li>
 	<li>Improper use of discretion does not automatically constitute “Obstruct Justice.”</li>
 	<li>A simple error of judgement is not “Obstruct Justice.”</li>
 	<li>"Obstruct Justice” is committed when discretion is disproportionate, unjustified, and intended to obstruct, pervert, or defeat the course of justice (<em>R v Beaudry</em>, 2007).</li>
</ol>
In 2007<em> f</em>ollowing this ruling, in the landmark civil case of <em>Hill v Hamilton-Wentworth Regional Police</em>, the Supreme Court of Canada added an additional rule to the existing <em>Beaudry</em> list of principles:
<blockquote>The decision not to charge an offender cannot be based on the selfish desire to avoid potential civil liability<em> </em>(<em>Hill v Hamilton-Wentworth Regional Police Services Board</em>, 2007).</blockquote>
<h1>Topic 13: Arrest and Detention</h1>
Arresting or detaining a suspect are two of the most critical actions that a police investigator can take in the process of any investigation. Each is a distinct course of action and offers the investigator strategic advantages to control the investigative environment by:
<ul>
 	<li>Bringing suspected persons under control in secure custody;</li>
 	<li>Stopping an offence in progress or preventing an offence about to be committed;</li>
 	<li>Enabling the search for items that may cause danger to the police investigator or others;</li>
 	<li>Enabling the search for evidence of the offence;</li>
 	<li>Establishing the identity of suspected persons; and</li>
 	<li>Compelling accused persons to attend court to face charges.</li>
</ul>
The concept of arrest for police investigators relates to the process of taking a person into custody upon reaching reasonable grounds to believe that an offence has been committed by the person being arrested. There are many statutes, both federal and provincial, that provide the police with powers of arrest. However, the Criminal Code of Canada provides direction for all police investigators in Canada. Section 495 of the <em>Criminal Code of Canada</em> states:
<blockquote>Arrest without warrant by peace officer
Section 495
<p style="padding-left: 30px;">(1) A peace officer may arrest without warrant</p>
<p style="padding-left: 60px;">(a) a person who has committed an indictable offence or who, on reasonable grounds, he believes has committed or is about to commit an indictable offence;</p>
<p style="padding-left: 60px;">(b) a person whom he finds committing a criminal offence; or</p>
<p style="padding-left: 60px;">(c) a person in respect of whom he has reasonable grounds to believe that a warrant of arrest or committal, in any form set out in Part XXVIII in relation thereto, is in force within the territorial jurisdiction in which the person is found.</p>
<p style="padding-left: 30px;">Limitation
(2) A peace officer shall not arrest a person without warrant for</p>
<p style="padding-left: 60px;">(a) an indictable offence mentioned in section 553,</p>
<p style="padding-left: 60px;">(b) an offence for which the person may be prosecuted by indictment or for which he is punishable on summary conviction, or</p>
<p style="padding-left: 60px;">(c) an offence punishable on summary conviction,</p>
<p style="padding-left: 60px;">in any case where</p>
<p style="padding-left: 60px;">(d) he believes on reasonable grounds that the public interest, having regard to all the circumstances including the need to</p>
<p style="padding-left: 90px;">(i) establish the identity of the person,</p>
<p style="padding-left: 90px;">(ii) secure or preserve evidence of or relating to the offence, or</p>
<p style="padding-left: 90px;">(iii) prevent the continuation or repetition of the offence or the commission of another offence, may be satisfied without so arresting the person, and</p>
<p style="padding-left: 60px;">(e) he has no reasonable grounds to believe that, if he does not so arrest the person, the person will fail to attend court in order to be dealt with according to law (Criminal Code, 1985, s 495(1, 2)).</p>
</blockquote>
As a specific power to take action, arrest provides police investigators with a means to intervene in criminal situations and stop persons in the process of dangerous or unlawful acts by taking them into custody. With any arrest, there is an obligation to bring the arrested person before the court for release or otherwise to release the person but compel them to court by other means, such as a summons or promise to appear.

As a lesser power, the police action of detaining a suspect has evolved in common law to allow police to take a person into custody for a shorter time. This detention can be used where reasonable grounds to believe the person has committed an offence have not yet been established, but there is some evidence or circumstances that point to the person as a suspect in the offence being investigated.

For police investigators, the actions of arrest and detention need to be considered as strategic functions of the investigative process. Making an arrest or detaining the suspect are not final outcomes, but merely strategic steps in the process of identifying the offender and gathering sufficient evidence to proceed with a charge. The powers and authorities that exist for police investigators to detain a subject or make an arrest are complex. Detaining a suspect or making an arrest may damage the investigation and threaten the admissibility of evidence flowing from detention or arrest if it is not done on the basis of real facts and circumstances that the officer can adequately articulate to the court.

There is extensive case law that speaks to the issues surrounding both the detention and arrest of a suspect. Case law makes a significant distinction that an investigator needs to consider if they are about to detain or arrest a subject. In the simplest of terms that distinction is:
<ul>
 	<li>To <strong>arrest</strong> a suspect, a police investigator needs to have reasonable grounds to believe that a person has committed the offence and in contrast,</li>
 	<li>To <strong>detain</strong> a suspect, a police investigator only requires a reasonable suspicion that a suspect is somehow implicated in the offence under investigation.</li>
</ul>
The distinction between forming reasonable grounds to believe a person has committed the offence and having a reasonable suspicion that a person is somehow implicated in the offence under investigation is a matter of evaluating the evidence available at the time detention or arrest are being considered.

To form reasonable grounds to believe a suspect has committed the offence, the investigator must have evidence that points directly to that suspect. This kind of evidence could be a witness identifying the suspect as committing the offence or strong circumstantial evidence such as fingerprints or DNA connecting the suspect to the scene or the victim. These types of evidence could provide the necessary reasonable grounds to believe the suspect committed the offence. In contrast, reasonable suspicion that a person is implicated in the offence under investigation requires significantly less concrete evidence. An investigator finding circumstantial evidence that points to a person as being implicated can be sufficient to make the detention. In articulating case law, judges have elaborated on the police common law powers to utilize detention as part of an investigation.
<blockquote>In 2004 in the case of <em>R v Mann</em>, the Supreme Court of Canada stated that, in spite of the fact that there is no general power for investigative detention, police may detain a person if there are reasonable grounds to suspect, in all the circumstances, that the individual is connected to a crime and the detention of that person is reasonably necessary on an objective view of the circumstances. The circumstances to be considered should include the extent to which a suspect’s liberty is interfered with in order for the police officer to conduct the required duties, and the individual being detained for investigation, must be told in simple language about the reason for that detention. The detention must be as short as possible in duration, and detention does not impose any obligation to answer questions. In addition, if a police officer has reasonable grounds to believe his safety or the safety of others is at risk, the officer may conduct and pat-down search on the detained subject and this kind of search is not the same as a search subsequent to an actual arrest (<em>R v Mann</em>, 2004).</blockquote>
With these distinctions for arrest and detention in mind, consider the following scenario to illustrate some of the decision-making an investigator must consider.
<div class="textbox textbox--examples"><header class="textbox__header">
<p class="textbox__title">Scenario #1</p>

</header>
<div class="textbox__content">

It is 3 AM on a Wednesday morning and you are a uniform patrol officer working the night-shift alone in your patrol car. Your unit and two other patrol units are dispatched to attend a break and enter alarm at a warehouse building located in an industrial area on the edge of the city. This industrial area is a complex with many warehouses and manufacturing facilities, and it borders a residential subdivision area. As you proceed to the scene of the alarm, you are advised on the radio that the two other units have already arrived at the warehouse. They are confirming that a break-in has taken place. They advise that the main entry glass doors of the warehouse have been smashed. The two other units are awaiting your arrival to commence a search for any suspects inside the warehouse. On the radio, you hear that the two other units have observed an unoccupied green Ford pickup truck parked on the street near the warehouse complex. Upon running the licence plate of the vehicle, it is determined that the vehicle is registered to a Larry Lurken. Criminal records check on Lurken reveal that he has a prior criminal record for several past offences of break enter and theft.

As you proceed to the industrial area, you approach the entry road through the residential subdivision. The warehouse you are going to is only one block inside the industrial area from your entry point off the subdivision. As you approach the entrance, you see a young man standing partly hidden behind a tree on the boulevard that separates the subdivision from the industrial complex. The young man is dressed in dark blue jeans and a dark hoodie and, as you approach him, he starts to walk away.

This is a typical case where the strategy of investigative detention could be used. The facts and circumstances facing you as an investigator are:
<ul>
 	<li>You have a young man dressed in dark clothing;</li>
 	<li>He is standing partly hidden behind a tree;</li>
 	<li>It is 3 AM;</li>
 	<li>This location is on the border of an industrial complex, only one block away from the scene of a confirmed break-in; and</li>
 	<li>He is starting to walk away.</li>
</ul>
These are sufficient grounds to suspect that this person may be involved in the criminal offence under investigation. In this case, the goal for you as the investigator would be to detain and determine the identity of this person. To properly observe the rights of this person, you would advise the young man as follows:
<blockquote>“I am conducting an investigation into a break-in at a nearby warehouse building and I am detaining you for my investigation of this break-in. You are not obliged to say anything and anything you do say can be used as evidence. You have the right to retain and instruct counsel without delay.”</blockquote>
After you provide this advice of detention and the appropriate charter and caution, this person is not obliged to answer any questions, other than to provide his identity. The fact that the detainee is not obligated to talk, does not mean you as an investigator are not permitted to ask questions. After all, there may be a reasonable explanation that this man can provide for being at this location at this time, and, as an objective investigator, you must always be prepared to hear these possibilities. He may tell you he lives in the house across the street from where he is standing, and when he heard the alarm going off at the warehouse, he came outside to see what was happening. If that was his claim, and you subsequently check his identification and confirm it to be true, your grounds to suspect he is involved in the offence become greatly diminished, likely to the point where he should be released from detention.

If, on the other hand, he only provides identification and refuses to answer questions about being at this location, your suspicion would remain. Your pat-down safety search of this suspect may reveal something incriminating, such as break-in tools or keys to a Ford truck, or perhaps even a walkie-talkie, which might indicate he is standing look-out for others who were doing the actual break-in. You may find shards of broken glass on his running shoes that may be like the glass from the broken front door of the warehouse, or you may run his name through the police databases to determine that he has a past record for breaking and entering, or perhaps is shown and being an associate of Larry Lurken, the owner of the vehicle parked near the break-in location. Any of these kinds of facts or associations would be sufficient to justify the continued investigative detention of this suspect. These facts could be the beginning of circumstantial evidence from which reasonable grounds to believe could be formed to make an arrest of this suspect.

If the warehouse is searched and Larry Lurken is found inside, Lurken has the matching walkie-talkie to your detained suspect, and it is then discovered that the Ford key in the detainee’s pocket is the key to Lurken’s parked Ford truck, sufficient circumstantial evidence would then exist to form reasonable grounds to believe your detained suspect was a party to this offence of breaking and entering.

If, upon arriving in the area and seeing this suspicious looking young man, you had immediately made an arrest, that arrest would not have been a lawful arrest because it would not have been supported by evidence that could pass the test of forming reasonable grounds for belief. Evidence located later, such as the walkie-talkie and vehicle keys found as part of that arrest, could be excluded by the court because they were not seized as part of a lawful search incidental to lawful arrest. In the foregoing case, detention was justified by the suspicious circumstances and the subsequent discovery of other incrimination evidence after that lawful detention could lead to an arrest on reasonable grounds that could be properly articulated to the court.

As previously mentioned, the process of detention and arrest are authorized actions that an investigator may take to progress through an investigation. These actions are part of the investigative process and they must be taken after careful consideration of evidence that justifies either having a reasonable suspicion to detain or forming reasonable grounds for belief to make an arrest. It is important for an investigator to undertake careful consideration of the available information and evidence before either of these actions are taken. Any arrest or detention of a suspect should be made with awareness that the evidence considered to support the decision for action will need to be articulated later in court.

</div>
</div>
<h1><span style="color: initial;">Summary</span></h1>
In this chapter, we have outlined and discussed many of the legal rules that must be considered by an investigator to guide their investigative process. In common for each of these legal definitions, concepts, principles, doctrines, and protocols is the need for each to be incorporated into the investigator’s thinking process. The investigator needs to consider the circumstances being encountered and apply the law as it exists specifically to those events. These legal definitions, concepts, principles, doctrines, and protocols form the basis of the knowledge that an investigator needs to incorporate into his or her mental map to successfully navigate the investigative process. An understanding of these issues and their appropriate application will demonstrate for the court that the investigator is aware of their duty to act, their authorities to act, and it will enable the investigator to properly articulate a justification of their action.
<div class="textbox textbox--exercises"><header class="textbox__header">
<p class="textbox__title">Study Questions</p>

</header>
<div class="textbox__content">
<ol>
 	<li>What exactly do we mean when we refer to “fundamental justice” for people who are charged with a criminal offence in Canada?</li>
 	<li>What protection regarding life, liberty and security is provided by Sec 7 of the Canadian Charter of Rights and Freedoms?</li>
 	<li>What protection regarding search and seizure is provided by Sec 8 of the Canadian Charter of Rights and Freedoms?</li>
 	<li>What protection regarding detention or imprisonment is provided by Sec 9 of the Canadian Charter of Rights and Freedoms?</li>
 	<li>What protection on arrest or detention is provided by Sec 10 of the Canadian Charter of Rights and Freedoms?</li>
 	<li>What protection to witnesses is provided by Section 13 of the Canadian Charter of Rights and Freedoms?</li>
 	<li>What language protections are provided by Section 14 of the Canadian Charter of Rights and Freedoms?</li>
 	<li>What is the difference between “proof within a balance of probabilities” and “proof beyond a reasonable doubt”?</li>
 	<li>What is the general test for “reasonable grounds to believe”?</li>
 	<li>When must an investigator remain diligent in collecting and preserving evidence, even though they believe they will not be proceeding with a criminal charge?</li>
 	<li>What is the role of the investigator in court when presenting evidence?</li>
 	<li>Why does the police investigator have to be attentive to common law?</li>
 	<li>Can a police investigator decide whether or not an accused should be afforded the defence of necessity?</li>
 	<li>What common law doctrine can be applied when an accused is found in recent possession of stolen property?</li>
 	<li>What evidence must a police investigator gather to demonstrate that an accused was willfully blind?</li>
 	<li>What does the term <em>“Mens Rea”</em> mean and why is it important?</li>
 	<li>What is a <em>prima facie</em> case?</li>
 	<li>What is a criminal information?</li>
 	<li>Is a police investigator protected from criminal or civil liability if they make an error or cause injury to a person?</li>
 	<li>In applying his/her discretion to not lay a charge where there is reason to believe a person has committed an indictable offence, what must a police investigator remember?</li>
 	<li>When can a police investigator arrest without a warrant?</li>
 	<li>When can a police investigator detain a person?</li>
</ol>
</div>
</div>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>59</wp:post_id>
		<wp:post_date><![CDATA[2017-04-25 19:25:50]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-04-25 23:25:50]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-2-some-important-basic-concepts]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>3</wp:post_parent>
		<wp:menu_order>2</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[727]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_export]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 2: Some Important Basic Concepts]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_candela_citation]]></wp:meta_key>
		<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>About the Authors</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/back-matter/about-the-authors/</link>
		<pubDate>Fri, 30 Jun 2017 21:56:05 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=back-matter&#038;p=129</guid>
		<description></description>
		<content:encoded><![CDATA[<strong>Rod Gehl</strong> is a retired police Inspector, and an instructor of criminal investigation for International Programs and the Law Enforcement Studies Program at the Justice Institute of British Columbia. These ongoing teaching engagements are preceded by 35 years of policing experience as criminal investigator and a leader of multi-agency major case management teams. From his experiences Rod has been a keynote speaker at several international homicide conferences and has assisted in the development and presentation of Major Case Management courses for the Canadian Police College. For his contribution to policing he has been conferred the Lieutenant Governor’s Meritorious Service Award for homicide investigation. Rod’s published research on the “The Dynamics of Police Cooperation in Multi-agency Investigations” was followed by his article, titled, “Multi-agency Teams, A Leadership Challenge,” featured in the US Police Chief Magazine. Rod retains a licence as a private investigator and security consultant and continues to work with regulatory compliance agencies in both public and private sector organizations for the development of their investigative training and systems.

&nbsp;

<strong>Darryl Plecas</strong> is Professor Emeritus at University of the Fraser Valley where he worked for 34 years, most recently holding the Senior University Research Chair (RCMP) and Directorship of the Centre for Public Safety and Criminal Justice Research. As Professor Emeritus he continues to co-author work with colleagues and supervises graduate students. He also serves as Associate Research Faculty at California State University – Sacramento, and as an annually invited lecturer to the Yunnan Police College in Kunming, China. He is the author or co-author of more than 200 research reports, international journal articles, books, and other publications addressing a broad range public safety issues. He is a recipient of numerous awards, including UFV’s Teaching Excellence Award, the Innovative Excellence in Teaching, Learning and Technology Award from the International Conference on College Teaching and Learning, the Order of Abbotsford, the CCSA Award of Excellence, and the British Columbia Lieutenant Governor’s Award for Public Safety. His most recent co-authored book “Evidenced Based Decision Making for Government Professionals” was awarded the 2016 Professional Development Award from the Canadian Association of Municipalities.]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>129</wp:post_id>
		<wp:post_date><![CDATA[2017-06-30 17:56:05]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-06-30 21:56:05]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[about-the-authors]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>2</wp:menu_order>
		<wp:post_type><![CDATA[back-matter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
										<category domain="back-matter-type" nicename="about-the-author"><![CDATA[About the Author]]></category>
						<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[727]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_export]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[About the Authors]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_candela_citation]]></wp:meta_key>
		<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Testimonials</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/back-matter/testimonials/</link>
		<pubDate>Fri, 30 Jun 2017 21:58:17 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=back-matter&#038;p=131</guid>
		<description></description>
		<content:encoded><![CDATA[<em> “A thoughtful, well designed</em><em>,</em><em> and very cleaver guide to investigation as a thinking process. While reading the book, I kept wondering, 'Why did it take so long for someone to finally produce such as useful teaching tool?' It is long overdue.”</em>

Professor Yvon Dandurand, School of Criminology and Criminal Justice, University of the Fraser Valley, and Fellow, International Centre for Criminal Law Reform and Criminal Justice Policy.

<em style="color: initial;">“This is an outstanding book that should be read by everyone interested or committed to excellence in police investigation. The book details an innovative model to guide criminal investigations, and the methodical way investigators must think and work when investigating crimes."</em>

Dr. Irwin Cohen, Senior University Research Chair (RCMP), School of Criminology and Criminal Justice University of the Fraser Valley

<em>"As a former Major Crime detective I know that training is critical to becoming a well-rounded investigator. Reading this book would have been beneficial before starting on my career. Rod and Darryl have nicely laid out what is required in the investigative process, as well as what is required to conduct thorough and ethical investigations." </em>

Inspector Steve McCartney, Program Director, BC Police Academy

<em>"Investigators constantly face complexity in the investigation of criminal offences, and analytical thinking skills are critical to the investigative process. That is what this text is about. It provides a sound framework for conducting investigations within the context of Canadian laws of evidence and police procedure. It provides thinking practices for evidence analysis, to avoid the pitfalls that can contribute to investigative failures and wrongful convictions." </em>

Stuart K Wyatt, (Ba, MA, Asc Forensic Identification Officer Retired)

<em>“A much needed insight into investigators, their thinking, and investigative processes in Canada. This primer should appeal to law enforcement, college professors, and the curious public alike. I encourage you to read this book and you will gain knowledge and respect for investigations — and never watch crime dramas the same way again.”</em>

Dr. Tim Croisdale, Associate Professor, Division of Criminal Justice, California State University, Sacramento.]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>131</wp:post_id>
		<wp:post_date><![CDATA[2017-06-30 17:58:17]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-06-30 21:58:17]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[testimonials]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>3</wp:menu_order>
		<wp:post_type><![CDATA[back-matter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
										<category domain="back-matter-type" nicename="notes"><![CDATA[Notes]]></category>
						<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[727]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_export]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Testimonials]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_candela_citation]]></wp:meta_key>
		<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>References</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/back-matter/references/</link>
		<pubDate>Wed, 05 Jul 2017 16:32:05 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=back-matter&#038;p=145</guid>
		<description></description>
		<content:encoded><![CDATA[R v Ferguson, 342 (BCCA) (British Columbia Court of Appeal 1996).

R v Perka, 2 S.C.R. 232 (Supreme Court of Canada 1984).

Abed, R. (2105, November 14). <em>Irish Journal of Psychological Medicine, 12.</em> Retrieved from http://journals.cambridge.org: http://journals.cambridge.org/action/displayAbstract?fromPage=online&amp;aid=9001896&amp;fileId=S0790966700002007

Allen, R. J. (1991). The Nature of Judicial Proof. <em>Cardozo Law Review</em>, 373-422 .

Arcaro, G. (2009). <em>Criminal Investitgations Forming Reasonable Grounds</em> (Fifth ed.). Toronto, Ontario: Emond Montgomery Publications Limited.

Bennett, M. (2015). <em>Unspringing the witness memory and demeanour trap: What every judge and jury needs to know about cognitive psychology and witness credibility.</em> Washington: American University of Law.

Brainerd, C. &amp;. (2005). <em>Oxford University Press.</em> Retrieved from Science of False Memory: https://books.google.ca/books?hl=en&amp;lr=&amp;id=fqtJaSTg7foC&amp;oi=fnd&amp;pg=PR13&amp;dq=the+ science+of+false+memory&amp;ots=zK_bzllYlF&amp;sig=XlOTss2QP35m2GieECfX3eGQVuc#v=on epage&amp;q=the%20science%20of%20false%20memory&amp;f=false

Britannica, E. o. (2015, MAY 15). <em>DNA Chemical Compound</em>. Retrieved from Encyclopedia Britannica: https://www.britannica.com/science/DNA

Byrnes, T. (2015, November 09). <em>Professional Criminals of America (1886)</em>. Retrieved from Online at Archive.org: https://archive.org/details/cu31924096989177

Campbell, A. (1996). <em>Bernardo Investigation Review.</em> Toronto: Ontario Lieutenant Governor.

Campbell, J. A. (1996). <em>Bernardo Investigation Review.</em> Toronto: Solicitor General and Minister of Correctional Services.

Canada, G. (2015, November 14). <em>Youth Criminal Justice .</em> Retrieved from Justice Laws Website - Youth Criminal Justice: http://laws-lois.justice.gc.ca/eng/acts/Y-1.5/page-57.html#h-49

Canada, Government. (2015, November 05). <em>Your Guide to the Canadian Charter of Rights and Freedoms</em>. Retrieved from Canadian Heritage: http://www.pch.gc.ca/eng/1356631760121/1356631904950

Canada, L. B. (2015). <em>Criminal Code of Canada.</em> Aurora: Martin's.

Canada, S. C. (2009). R. v. Basi. <a href="http://canliiconnects.org/en/cases/2009scc52"> 2009 SCC 52, [2009] 3 SCR 389</a>

Cox, W. A. (2015, November 14). <em>EARLY POSTMORTEM CHANGES.</em> Retrieved from forensicmd.files.wordpress.com: https://forensicmd.files.wordpress.com/2009/12/early-postmortem-changes1.pdf

Dass, S. C. (2016). <em>Classification of Fingerprints.</em> Retrieved January 15, 2017, from Department of Statistics &amp; Probabilities: https://www.cse.msu.edu/~cse802/Papers/802_FPClassification.pdf

De Saram G.S.W., W. G. (1955–1956). Post-Mortem Temperature and the Time of Death. <em>Crim. L. Criminology &amp; Police Science</em>, 46.

Dictionary, Legal. (2015 - 2, November 05). <em>Duhaime's Law Dictionary</em>. Retrieved from www.duhaime.org: www.duhaime.org

Dictionary, Legal. (2015, November 05). <em>Duhaime's Law Dictionary</em>. Retrieved from http://www.duhaime.org: http://www.duhaime.org/LegalDictionary/N/NaturalJustice.aspx

Dostal, P. (2012). <em>Accessory After the Fact</em>. Retrieved January 15, 2017, from The Canadain Criminal Law Notebook: http://criminalnotebook.ca/index.php/Accessory_After_the_Fact

Dostal, P. (2012). <em>Attempts</em>. Retrieved January 15, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Attempts

Dostal, P. (2012). <em>Conspiracy (Offence)</em>. Retrieved January 15, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Conspiracy_(Offence)

Dostal, P. (2012). <em>Counselling</em>. Retrieved January 15, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Counselling

Dostal, P. (2012). <em>Informer Privilege</em>. Retrieved January 16, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Informer_Privilege

Dostal, P. (2012). <em>Parties to an Offence</em>. Retrieved January 15, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Parties_to_an_Offence

Dostal, P. (2012). <em>Principled Exception to Hearsay</em>. Retrieved January 12, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Principled_Exception_to_Hearsay

Dostal, P. (2012). <em>Principles of Fundamental Justice</em>. Retrieved January 20, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Principles_of_Fundamental_Justice

Elsevier, B. (2016). <em>Coup contrecoup injury</em>. Retrieved January 27, 2017, from Science Direct: http://www.sciencedirect.com/topics/page/Coup_contrecoup_injury

Encyclopedia of Death and Dying. (2017). <em>Rigor Mortis and Other Postmortem Changes</em>. Retrieved January 16, 2017, from Encyclopedia of Death and Dying: http://www.deathreference.com/Py-Se/Rigor-Mortis-and-Other-Postmortem-Changes.html

EnkiVillage. (2017). <em>How Long Does It Take for a Body to Decompose?</em> Retrieved January 16, 2017, from EnkiVillage: http://www.enkivillage.com/how-long-does-it-take-for-a-body-to-decompose.html#affix-section-3

Fookes, S. A. (1973). Patrol Sergeant. (A. GEHL, Interviewer)

Gaytmenn R, S. D. (2003, May). Quantification of forensic DNA from various regions of human teeth. <em>Journal of Forensic Science, 48</em>(3), 622 to 625.

Gecker, R. A. (1989). The Doctrine of Necessity and Its Parameters. <em>Marquette Law Review</em>, 1 - 39 Volume 73 Article 1.

Giannelli, P. C. (2007). <em>Faculty Publications.Paper 153</em>. Retrieved Janauary 27, 2017, from Case Western University School of Law: http://scholarlycommons.law.case.edu/faculty_publications/153

Gibson, D. (2014). <em>The Kennedy Assassination Cover-up.</em> New York: Kroshka Books.

Goff, L. (2015, November 14). <em>Early post-mortem changes and stages of decomposition.</em> Retrieved from www.academia.dk: http://www.academia.dk/BiologiskAntropologi/Tafonomi/PDF/post-mortem-changes.pdf

Government of British Columbia. (2015, Nov 27). <em>British Columbia Police Act.</em> Retrieved from www.qp.gov.bc.c: http://www.qp.gov.bc.ca/police/ec36700.htm#34

Government of Canada. (2015, November 13). <em>Canada Evidence Act</em>. Retrieved from http://laws.justice.gc.ca/en/C-5/: http://laws.justice.gc.ca/en/C-5/

Government of Canada. (2017, January 16). <em>Canada Evidence Act (R.S.C., 1985, c. C-5)</em>. Retrieved January 23, 2017, from Justice Laws Website: http://laws-lois.justice.gc.ca/eng/acts/C-5/

Government of Canada. (2017, January 14). <em>Conspiracy</em>. Retrieved January 11, 2017, from Justice Laws Website: http://laws-lois.justice.gc.ca/eng/acts/C-46/section-465.html

Gubrium, J. &amp;. (2002). <em>Handbook of Interview Research: Context and Method.</em> Thousand Oaks: Sage Publications Inc.

Gudgonsson, G. H. (2015 , November 14). <em>Custodial interrogation: Why do suspects confess and how does it relate to their crime, attitude and personality.</em> Retrieved from http://www.researchgate.net: http://www.researchgate.net/publication/247166373_Custodial_interrogation_Why_do_suspects_confess_and_how_does_it_relate_to_their_crime_attitude_and_personality

Guharaj, P. V. (2003). <em>Forensic Medicine 2nd Edition.</em> Hyderabad: Longman Orient: Sangam Books Ltd.

Head, T. a. (2010). <em>Crime and Punishment in America.</em> New York: Infobase Publishing.

Henry, E. R. (1900). Classification and Uses of Fingerprints. <em>Routledge</em>.

Hill v Hamilton-Wentworth Regional Police Services Board, SCC 41, [2007] (Supreme Court of Canada 2007).

Hitchcock, T. S. (2015, June 05). <em>www.oldbaileyonline.org/static/Policing.jsp (searched June 2015).</em> Retrieved from The Proceedings of the Old Bailey, 1674-1913: www.oldbaileyonline.org/static/Policing.jsp

Irwin Law. (n.d.). <em>Prima facie case</em>. Retrieved January 14, 2017, from The Canadian Online Legal Dictionary: https://www.irwinlaw.com/cold/prima_facie_case

Jaffe, F. A. (1994). Petechial Hemorrhages: A Review of Pathogenesis. <em>The American Journal of Forensic Medicine and Pathology</em>, 203–207.

Jain, A. F. (2010). Fingerprint Matching. <em>Biometrics</em>, 36–44.

Justice Canada. (2017, January 14). <em>Rules of Evidence in Canada</em>. Retrieved January 14, 2017, from Canada Evidnce Act: http://laws.justice.gc.ca/en/C-5/

Justice Department Canada. (2017, January 02). <em>Rules of Evidene</em>. Retrieved from Canada Evidence Act: http://laws.justice.gc.ca/en/C-5/

Justice Laws Canada. (2017). <em>Duty of persons to provide necessaries</em>. Retrieved January 16, 2017, from Justice Laws Website: http://laws-lois.justice.gc.ca/eng/acts/C-46/section-215.html

Kaufman, F. (1998). <em>Report of the Kaufman Commission on Proceedings Involving Guy Paul Morin.</em> Toronto: Ontario Government.

Legal Information Institute. (2016, December 31). <em>Wex Legal Process</em>. Retrieved from Legal Information Institute : https://www.law.cornell.edu/wex/prima_facie

Lindsey, S. H. (2003). COMMUNICATING STATISTICAL DNA EVIDENCE. <em>Jurimetrics, 43 </em>(Winter 2003), 147 to 163.

MacCallum, E. P. (2008). <em>Report of the Commission of Inquiry into the Wrongful Conviction of David Milgaard.</em> Regina: Saskatchewan Government.

MacDonell, J. (1820). <em>Report of State Trials Volume 1.</em> London: The State Trial Committee.

MacDonell, J. (n.d.). <em>Report of State Trials .</em>

Macrae, M. (2015, April 17). <em>Is the Science of DNA Wrongful Conviction-Proof?</em> Retrieved January 17, 2017, from Innocence Canada: https://www.aidwyc.org/dna/

McCrery, N. (2013). <em>Silent Witnesses.</em> London: Random House Books p.51.

McRory, S. (2014, May). Introduction to Criminal Process for Inspector. <em>Compliance Assurance Learning and Development Program</em>, 43. Edmonton, Alberta, Canada: Alberta Energy Regulator.

Morgan, C. H. (2004). Accuracy of eyewitness memory for persons encountered during exposure to highly intense stress. <em>International Journal of Law and Psychiatry</em>, 265–279.

National Science Forensic Technology Center. (2012). <em>A Simplified Guide To Bloodstain Pattern Analysis .</em> Retrieved January 15, 2017, from National Science Forensic Technology Center: www.forensicsciencesimplified.org/blood/BloodstainPatterns.pdf

Oorsouw, K. M. (2015). Alcohol intoxication impairs memory and increases suggestibility for a mock crime: a filed study. <em>Applied Cognitive Psychology, 29</em>, 293–501.

Oppal, W. (2013). <em>The report of the mission women commission of inquiry.</em> Vancouver: British Columbia Government.

Pennington, M. (1999). Miscarriages of Justice ; A call for continued research focusing on reforming the investigative process. <em>Journal of Forensic Practice</em>, 61–71 Volume 13.

Petherick, W. A. (2010). <em>Forensic Criminology.</em> London: Elservier Academic Press.

Police Executive Research Forum. (2014, March 14). The Police Response to Active Shooter Incidents. <em>Critical Issues in Policing Series, </em>pp. 1–46.

R v Abernathy, BCCA 8 (2002).

R v Beaudry, 1 SCR 190 (Supreme Court of Canada 2007).

R v Gagnon, MBCA X at 13 (Manitioba Court of Appeal 2006).

R v Godoy, 1 S.C.R. 311 (Supreme Court of Canada 1999).

R v Grant, SCC 32 (Supreme Court of Canada 2009 ).

R v Lifchus, 3 S.C.R. 320 (Supreme Court of Canada 1997).

R v Schell, 188 CCC (3d) 254 (ABCA) (2004).

R v Starr, 2 S.C.R. 144 (Supreme Court of Canada 2000).

R v Steinberg, SCR 42 (Supreme Court of Canada 1931).

R v Stinchcombe, 3 S.C.R. 326 (Supreme Court of Canada 1991).

R v Storrey, 1 S.C.R. 241 (Supreme Court of Canada 1990).

R v Walsh, 199 (ONCA) (Ontario Court of Appeal 1978).

R v. Mann, 3 S.C.R. 59 (Supreme Court of Canada 2004).
<ol>
 	<li>v. Beare, 387 (S.C.RL December 17, 1988).</li>
 	<li>v. Briscoe, SCC 13 (Supreme Court of Canada 2010 ).</li>
 	<li>v. Graham, SCR 206 (1974).</li>
 	<li>v. Khan, 2 SCR 531 (Supreme Court of Canada 1990).</li>
 	<li>v. Kowlyk, 2 S.C.R. 59 (Supreme Court of Canada 1988).</li>
 	<li>v. Smith, 2 S.C.R. 915 (Supreme Court of Canada 1992).</li>
 	<li>v. Terrence, 1 S.C.R. 357 (Supreme Court of Canada 1983).</li>
 	<li>v. Woodcock, 168 E.R. 352 (K.B.) (Court of Kings Bench 1789).</li>
</ol>
Ratten v R, 3 AllER 801 (Court of Queens Bench 1971).

Reith, C. (1943). Preventive Principle of Police. <em>Journal of Criminal Law and Criminology</em>, 206–209 Volume 34.

Reith, C. (n.d.). Preventive Principle of Police. <em>Journal of C</em>.

Resnick, H. S., Kilpatrick, D. G., Dansky, B. S., Saunders, B. E., &amp; Best, C. L. (1993). Prevalence of civilian trauma and posttraumatic stress disorder in a representative national sample of women. <em>Journal of Consulting and Clinical Psychology</em>, 984–991.

Rex v Burdett:, 4 B &amp; A 95 (Court of Kings Bench Nov 27, 1820).

Rogers, Kara. (2016, May 27). <em>Chimera Genetics</em>. Retrieved from Encyclopedia Britannica: https://www.britannica.com/topic/chimera-genetics

Rose, C. &amp;. (2009). Eyewitness accounts: False facts, false memories, and false identification. <em>Journal of Crime and Justice, 39</em>(2), 243-263.

Rossmo, D. K. (1987). <em>Geographic Profiling Target Patterns of Serial Murderers.</em> Burnaby: Simon Fraser University.

Rossmo, K. (2009). <em>Criminal Investigative Failures.</em> Bocal Raton: CRC Press Taylor &amp; Fransis Group.

Royal Canadian Mounted Police. (2006, September 01). <em>National DNA Data Bank</em>. Retrieved January 16, 2017, from Royal Canadian Mounted Police: http://www.rcmp-grc.gc.ca/nddb-bndg/index-accueil-eng.htm

Royal Canadian Mounted Police. (2015, Nov 27). <em>Criminal Investigative Analysiswe.</em> Retrieved from Royal Canadian Mounted Police: http://www.rcmp-grc.gc.ca/tops-opst/bs-sc/crim-profil-eng.htm

Salhany, R. (2008). <em>Taman Inquiry into the Investigation and Prosecution of Derek Harvey-Zenk.</em> Winnipeg: Government of Manitoba.

Sansregret v. The Queen, 1 S.C.R. 570 (Supreme Court of Canada 1985).

Savino, J. &amp;. (2011). <em>Rape Investigation Handbook.</em> New York: Elsevier.

Sebetic, E. (1950, Fall). <em>Marquette Law Review 128.</em> Retrieved from Law Commons: http://scholarship.law.marquette.edu/mulr/vol34/iss2/6

Service, S. C. (2015, November 14). <em>Police Warnings - Transit Police.</em> Retrieved from www.transitpolice.bc.ca: www.transitpolice.bc.ca/.../transit%20police/.../od170%20%20police%20

Shah, A. K. (2008). Heuristics Made Easy: An Effort-Reduction Framework. <em>Psychological Bulletin, Princeton University</em>.

Smarlarz, L. &amp;. (2015). Contamination of eyewitness self-reports and the mistaken identification problem. <em>Association of Psychologoical Science, 24</em>(2), 120–124.

Smith, C. (2010). <em>Shaken Baby Syndrome An Investigator's Manual.</em> Abbotsford: University of the Fraser Valley.

Sopinka, J. (1999). <em>The Law of Evidence in Canada 2nd ed.</em> Toronto, Ontario: LexisNexis Canada.

Streets, G. M. (2011). The Homicide Witness and Victimization; PTSD in Civilian Populations: A Literature Review. <em>JEFFERSON JOURNAL OF PSYCHIATRY</em>, 59 - 65.

Taber, K. (2006). Beyond Constructivism: the Progressive Research Programme into Learning Science. <em>Studies in Science Education, 42,</em>, pp 125-184.

Thomas, S. a. (2000). <em>JonBenet: Inside the Ramsey Murder Investigation.</em> New York: St Maritn's Paperback.

Thompson, R. (2013, September 11). <em>Hearsay and Exceptions to Hearsay Rule.</em> Retrieved from Law Society of Saskatchewan Continuing Professional Development: https://library.lawsociety.sk.ca/inmagicgenie/documentfolder/EFLP3.PDF

Varney, C. A. (2009). Procedural Fairness. <em>13th Annual Competition Conference of the International Bar Association</em> (pp. 1–13). Fiesole Italy: Antitrust Division United States Department of Justice.]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>145</wp:post_id>
		<wp:post_date><![CDATA[2017-07-05 12:32:05]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-07-05 16:32:05]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[references]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>4</wp:menu_order>
		<wp:post_type><![CDATA[back-matter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
										<category domain="back-matter-type" nicename="bibliography"><![CDATA[Bibliography]]></category>
						<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[727]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_export]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[References]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_subtitle]]></wp:meta_key>
		<wp:meta_value><![CDATA[References]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_candela_citation]]></wp:meta_key>
		<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Versioning History</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/back-matter/versioning-history/</link>
		<pubDate>Thu, 01 Aug 2019 17:09:04 +0000</pubDate>
		<dc:creator><![CDATA[kqzheng]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=back-matter&#038;p=226</guid>
		<description></description>
		<content:encoded><![CDATA[This page provides a record of edits and changes made to this book since its initial publication in the <a href="https://open.bccampus.ca/browse-our-collection/find-open-textbooks/">B.C. Open Textbook Collection</a>. Whenever edits or updates are made in the text, we provide a record and description of those changes here. If the change is minor, the version number increases by 0.01. If the edits involve substantial updates, the version number increases to the next full number.

The files posted by this book always reflect the most recent version. If you find an error in this book, please fill out the <a href="https://open.bccampus.ca/reporting-an-open-textbook-error/">Report an Open Textbook Error</a> form.
<table style="border-collapse: collapse; width: 100%;" border="0">
<tbody>
<tr>
<th style="width: 12.6791%;">Version</th>
<th style="width: 14.8281%;">Date</th>
<th style="width: 37.3925%;">Change</th>
<th style="width: 35.1003%;">Details</th>
</tr>
<tr>
<td style="width: 12.6791%;">1.00</td>
<td style="width: 14.8281%;">September 25, 2017</td>
<td style="width: 37.3925%;">Added to the B.C. Open Textbook Collection.</td>
<td style="width: 35.1003%;"></td>
</tr>
<tr>
<td style="width: 12.6791%;">1.01</td>
<td style="width: 14.8281%;">August 1, 2019</td>
<td style="width: 37.3925%;">Updated the book’s theme.</td>
<td style="width: 35.1003%;">The styles of this book have been updated, which may affect the page numbers of the PDF and print copy.</td>
</tr>
<tr>
<td style="width: 12.6791%;">2.00</td>
<td style="width: 14.8281%;">August 1, 2019</td>
<td style="width: 37.3925%;">Accessibility remediation.</td>
<td style="width: 35.1003%;">Remediated the textbook to make it accessible. This involved
<ul>
 	<li>changing heading levels</li>
 	<li>adding image descriptions</li>
</ul>
</td>
</tr>
<tr>
<td style="width: 12.6791%;">2.01</td>
<td style="width: 14.8281%;">January 12, 2021</td>
<td style="width: 37.3925%;">Added an "About the book" section to the book's front matter.</td>
<td style="width: 35.1003%;"></td>
</tr>
</tbody>
</table>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>226</wp:post_id>
		<wp:post_date><![CDATA[2019-08-01 13:09:04]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2019-08-01 17:09:04]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[versioning-history]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>5</wp:menu_order>
		<wp:post_type><![CDATA[back-matter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[103]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>List of Links by Chapter for Print Users</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/back-matter/list-of-links-by-chapter-for-print-users/</link>
		<pubDate>Wed, 30 Oct 2019 19:08:40 +0000</pubDate>
		<dc:creator><![CDATA[acheveldave]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=back-matter&#038;p=237</guid>
		<description></description>
		<content:encoded><![CDATA[<h1>Accessibility Statement</h1>
<ul>
 	<li>Contact us: https://open.bccampus.ca/contact-us/</li>
 	<li>Download this book in another file format: https://pressbooks.bccampus.ca/criminalinvestigation/</li>
 	<li>Report an Open Textbook Error: https://open.bccampus.ca/reporting-an-open-textbook-error/</li>
 	<li>Web version of the <em>Introduction to Criminal Investigation: Processes, Practices and Thinking</em>: https://pressbooks.bccampus.ca/criminalinvestigation/</li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>237</wp:post_id>
		<wp:post_date><![CDATA[2019-10-30 15:08:40]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2019-10-30 19:08:40]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[list-of-links-by-chapter-for-print-users]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>6</wp:menu_order>
		<wp:post_type><![CDATA[back-matter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[727]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Evidence-Types</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-3-what-you-need-to-know-about-evidence-2/img-01-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:06 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-01.png</guid>
		<description></description>
		<content:encoded><![CDATA[Evidence Types: 
1. Direct Evidence: Will prove point in fact without interpretation of circumstances. 2. Indirect Evidence Circumstantial evidence interpretation required to prove point in fact. ]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>398</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:06]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:06]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[img-01-2]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>399</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-01.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/Img-01.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:2251;s:6:"height";i:1101;s:4:"file";s:18:"2020/08/Img-01.png";s:5:"sizes";a:9:{s:6:"medium";a:4:{s:4:"file";s:18:"Img-01-300x147.png";s:5:"width";i:300;s:6:"height";i:147;s:9:"mime-type";s:9:"image/png";}s:5:"large";a:4:{s:4:"file";s:19:"Img-01-1024x501.png";s:5:"width";i:1024;s:6:"height";i:501;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:18:"Img-01-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:12:"medium_large";a:4:{s:4:"file";s:18:"Img-01-768x376.png";s:5:"width";i:768;s:6:"height";i:376;s:9:"mime-type";s:9:"image/png";}s:9:"1536x1536";a:4:{s:4:"file";s:19:"Img-01-1536x751.png";s:5:"width";i:1536;s:6:"height";i:751;s:9:"mime-type";s:9:"image/png";}s:9:"2048x2048";a:4:{s:4:"file";s:20:"Img-01-2048x1002.png";s:5:"width";i:2048;s:6:"height";i:1002;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:16:"Img-01-65x32.png";s:5:"width";i:65;s:6:"height";i:32;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:18:"Img-01-225x110.png";s:5:"width";i:225;s:6:"height";i:110;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:18:"Img-01-350x171.png";s:5:"width";i:350;s:6:"height";i:171;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[Types of Evidence chart. Direct Evidence and Indirect Evidence.]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Investigative-Response-Priority</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-4-the-process-of-investigation-2/img-02-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:08 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-02.png</guid>
		<description></description>
		<content:encoded><![CDATA[Two levels. Level 1 is protecting the life and safety of people including police officers attending the scenes of crime. Level 2 includes identify, gather and preserve evidence; id and arrest suspects; record and document event; protection of property. ]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>400</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:08]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:08]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[img-02-2]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>403</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-02.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/Img-02.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:2251;s:6:"height";i:1732;s:4:"file";s:18:"2020/08/Img-02.png";s:5:"sizes";a:9:{s:6:"medium";a:4:{s:4:"file";s:18:"Img-02-300x231.png";s:5:"width";i:300;s:6:"height";i:231;s:9:"mime-type";s:9:"image/png";}s:5:"large";a:4:{s:4:"file";s:19:"Img-02-1024x788.png";s:5:"width";i:1024;s:6:"height";i:788;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:18:"Img-02-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:12:"medium_large";a:4:{s:4:"file";s:18:"Img-02-768x591.png";s:5:"width";i:768;s:6:"height";i:591;s:9:"mime-type";s:9:"image/png";}s:9:"1536x1536";a:4:{s:4:"file";s:20:"Img-02-1536x1182.png";s:5:"width";i:1536;s:6:"height";i:1182;s:9:"mime-type";s:9:"image/png";}s:9:"2048x2048";a:4:{s:4:"file";s:20:"Img-02-2048x1576.png";s:5:"width";i:2048;s:6:"height";i:1576;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:16:"Img-02-65x50.png";s:5:"width";i:65;s:6:"height";i:50;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:18:"Img-02-225x173.png";s:5:"width";i:225;s:6:"height";i:173;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:18:"Img-02-350x269.png";s:5:"width";i:350;s:6:"height";i:269;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[Investigative Response Priority Results]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Exigent-Circumstances</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-4-the-process-of-investigation-2/img-03-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:11 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-03.png</guid>
		<description></description>
		<content:encoded><![CDATA[Active Event + Explicit or Implied Threat to Life or Safety = Exigent Circumstances]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>401</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:11]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:11]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[img-03-2]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>403</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-03.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/Img-03.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:2251;s:6:"height";i:589;s:4:"file";s:18:"2020/08/Img-03.png";s:5:"sizes";a:9:{s:6:"medium";a:4:{s:4:"file";s:17:"Img-03-300x78.png";s:5:"width";i:300;s:6:"height";i:78;s:9:"mime-type";s:9:"image/png";}s:5:"large";a:4:{s:4:"file";s:19:"Img-03-1024x268.png";s:5:"width";i:1024;s:6:"height";i:268;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:18:"Img-03-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:12:"medium_large";a:4:{s:4:"file";s:18:"Img-03-768x201.png";s:5:"width";i:768;s:6:"height";i:201;s:9:"mime-type";s:9:"image/png";}s:9:"1536x1536";a:4:{s:4:"file";s:19:"Img-03-1536x402.png";s:5:"width";i:1536;s:6:"height";i:402;s:9:"mime-type";s:9:"image/png";}s:9:"2048x2048";a:4:{s:4:"file";s:19:"Img-03-2048x536.png";s:5:"width";i:2048;s:6:"height";i:536;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:16:"Img-03-65x17.png";s:5:"width";i:65;s:6:"height";i:17;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:17:"Img-03-225x59.png";s:5:"width";i:225;s:6:"height";i:59;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:17:"Img-03-350x92.png";s:5:"width";i:350;s:6:"height";i:92;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[Active Event + Explicit or Implied Threat to Life or Safety = Exigent Circumstances]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Response-Transition-Matrix</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-4-the-process-of-investigation-2/img-04-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:13 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-04.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>402</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:13]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:13]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[img-04-2]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>403</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-04.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/Img-04.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:2251;s:6:"height";i:2207;s:4:"file";s:18:"2020/08/Img-04.png";s:5:"sizes";a:9:{s:6:"medium";a:4:{s:4:"file";s:18:"Img-04-300x294.png";s:5:"width";i:300;s:6:"height";i:294;s:9:"mime-type";s:9:"image/png";}s:5:"large";a:4:{s:4:"file";s:20:"Img-04-1024x1004.png";s:5:"width";i:1024;s:6:"height";i:1004;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:18:"Img-04-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:12:"medium_large";a:4:{s:4:"file";s:18:"Img-04-768x753.png";s:5:"width";i:768;s:6:"height";i:753;s:9:"mime-type";s:9:"image/png";}s:9:"1536x1536";a:4:{s:4:"file";s:20:"Img-04-1536x1506.png";s:5:"width";i:1536;s:6:"height";i:1506;s:9:"mime-type";s:9:"image/png";}s:9:"2048x2048";a:4:{s:4:"file";s:20:"Img-04-2048x2008.png";s:5:"width";i:2048;s:6:"height";i:2008;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:16:"Img-04-65x64.png";s:5:"width";i:65;s:6:"height";i:64;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:18:"Img-04-225x221.png";s:5:"width";i:225;s:6:"height";i:221;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:18:"Img-04-350x343.png";s:5:"width";i:350;s:6:"height";i:343;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[Response-Transition-Matrix]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Investigative-Process-Funnel</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-5-strategic-investigative-response-2/img-05-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:17 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-05.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>404</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:17]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:17]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[img-05-2]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>406</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-05.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/Img-05.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:2251;s:6:"height";i:2781;s:4:"file";s:18:"2020/08/Img-05.png";s:5:"sizes";a:9:{s:6:"medium";a:4:{s:4:"file";s:18:"Img-05-243x300.png";s:5:"width";i:243;s:6:"height";i:300;s:9:"mime-type";s:9:"image/png";}s:5:"large";a:4:{s:4:"file";s:19:"Img-05-829x1024.png";s:5:"width";i:829;s:6:"height";i:1024;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:18:"Img-05-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:12:"medium_large";a:4:{s:4:"file";s:18:"Img-05-768x949.png";s:5:"width";i:768;s:6:"height";i:949;s:9:"mime-type";s:9:"image/png";}s:9:"1536x1536";a:4:{s:4:"file";s:20:"Img-05-1243x1536.png";s:5:"width";i:1243;s:6:"height";i:1536;s:9:"mime-type";s:9:"image/png";}s:9:"2048x2048";a:4:{s:4:"file";s:20:"Img-05-1658x2048.png";s:5:"width";i:1658;s:6:"height";i:2048;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:16:"Img-05-65x80.png";s:5:"width";i:65;s:6:"height";i:80;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:18:"Img-05-225x278.png";s:5:"width";i:225;s:6:"height";i:278;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:18:"Img-05-350x432.png";s:5:"width";i:350;s:6:"height";i:432;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[Investigative-Process-Funnel]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>STAIR-Tool</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-5-strategic-investigative-response-2/img-06-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:21 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-06.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>405</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:21]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:21]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[img-06-2]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>406</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-06.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/Img-06.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:2251;s:6:"height";i:2924;s:4:"file";s:18:"2020/08/Img-06.png";s:5:"sizes";a:9:{s:6:"medium";a:4:{s:4:"file";s:18:"Img-06-231x300.png";s:5:"width";i:231;s:6:"height";i:300;s:9:"mime-type";s:9:"image/png";}s:5:"large";a:4:{s:4:"file";s:19:"Img-06-788x1024.png";s:5:"width";i:788;s:6:"height";i:1024;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:18:"Img-06-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:12:"medium_large";a:4:{s:4:"file";s:18:"Img-06-768x998.png";s:5:"width";i:768;s:6:"height";i:998;s:9:"mime-type";s:9:"image/png";}s:9:"1536x1536";a:4:{s:4:"file";s:20:"Img-06-1182x1536.png";s:5:"width";i:1182;s:6:"height";i:1536;s:9:"mime-type";s:9:"image/png";}s:9:"2048x2048";a:4:{s:4:"file";s:20:"Img-06-1577x2048.png";s:5:"width";i:1577;s:6:"height";i:2048;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:16:"Img-06-65x84.png";s:5:"width";i:65;s:6:"height";i:84;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:18:"Img-06-225x292.png";s:5:"width";i:225;s:6:"height";i:292;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:18:"Img-06-350x455.png";s:5:"width";i:350;s:6:"height";i:455;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[STAIR-Tool]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Photo-Lineup</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-7-witness-management-2/image7-4-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:26 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image7-4.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>408</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:26]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:26]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[image7-4-2]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>409</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image7-4.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/image7-4.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1700;s:6:"height";i:2200;s:4:"file";s:20:"2020/08/image7-4.jpg";s:5:"sizes";a:9:{s:6:"medium";a:4:{s:4:"file";s:20:"image7-4-232x300.jpg";s:5:"width";i:232;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:21:"image7-4-791x1024.jpg";s:5:"width";i:791;s:6:"height";i:1024;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:20:"image7-4-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:20:"image7-4-768x994.jpg";s:5:"width";i:768;s:6:"height";i:994;s:9:"mime-type";s:10:"image/jpeg";}s:9:"1536x1536";a:4:{s:4:"file";s:22:"image7-4-1187x1536.jpg";s:5:"width";i:1187;s:6:"height";i:1536;s:9:"mime-type";s:10:"image/jpeg";}s:9:"2048x2048";a:4:{s:4:"file";s:22:"image7-4-1583x2048.jpg";s:5:"width";i:1583;s:6:"height";i:2048;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:18:"image7-4-65x84.jpg";s:5:"width";i:65;s:6:"height";i:84;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:20:"image7-4-225x291.jpg";s:5:"width";i:225;s:6:"height";i:291;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:20:"image7-4-350x453.jpg";s:5:"width";i:350;s:6:"height";i:453;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[Photo-Lineup]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Crime Scene Security Log</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-8-crime-scene-management-2/crime-scene-security-log-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:29 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/CRIME-SCENE-SECURITY-LOG.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[This is a form used to log crime scene security. ]]></content:encoded>
		<excerpt:encoded><![CDATA[Crime Scene Security Log form. ]]></excerpt:encoded>
		<wp:post_id>410</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:29]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:29]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[crime-scene-security-log-2]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>414</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/CRIME-SCENE-SECURITY-LOG.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/CRIME-SCENE-SECURITY-LOG.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1700;s:6:"height";i:2200;s:4:"file";s:36:"2020/08/CRIME-SCENE-SECURITY-LOG.jpg";s:5:"sizes";a:9:{s:6:"medium";a:4:{s:4:"file";s:36:"CRIME-SCENE-SECURITY-LOG-232x300.jpg";s:5:"width";i:232;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:37:"CRIME-SCENE-SECURITY-LOG-791x1024.jpg";s:5:"width";i:791;s:6:"height";i:1024;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:36:"CRIME-SCENE-SECURITY-LOG-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:36:"CRIME-SCENE-SECURITY-LOG-768x994.jpg";s:5:"width";i:768;s:6:"height";i:994;s:9:"mime-type";s:10:"image/jpeg";}s:9:"1536x1536";a:4:{s:4:"file";s:38:"CRIME-SCENE-SECURITY-LOG-1187x1536.jpg";s:5:"width";i:1187;s:6:"height";i:1536;s:9:"mime-type";s:10:"image/jpeg";}s:9:"2048x2048";a:4:{s:4:"file";s:38:"CRIME-SCENE-SECURITY-LOG-1583x2048.jpg";s:5:"width";i:1583;s:6:"height";i:2048;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:34:"CRIME-SCENE-SECURITY-LOG-65x84.jpg";s:5:"width";i:65;s:6:"height";i:84;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:36:"CRIME-SCENE-SECURITY-LOG-225x291.jpg";s:5:"width";i:225;s:6:"height";i:291;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:36:"CRIME-SCENE-SECURITY-LOG-350x453.jpg";s:5:"width";i:350;s:6:"height";i:453;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[Crime Scene Security Log]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Originating-Stages-Evidence</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-8-crime-scene-management-2/img-07-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:32 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-07.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>411</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:32]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:32]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[img-07-2]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>414</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-07.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/Img-07.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:2251;s:6:"height";i:1399;s:4:"file";s:18:"2020/08/Img-07.png";s:5:"sizes";a:9:{s:6:"medium";a:4:{s:4:"file";s:18:"Img-07-300x186.png";s:5:"width";i:300;s:6:"height";i:186;s:9:"mime-type";s:9:"image/png";}s:5:"large";a:4:{s:4:"file";s:19:"Img-07-1024x636.png";s:5:"width";i:1024;s:6:"height";i:636;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:18:"Img-07-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:12:"medium_large";a:4:{s:4:"file";s:18:"Img-07-768x477.png";s:5:"width";i:768;s:6:"height";i:477;s:9:"mime-type";s:9:"image/png";}s:9:"1536x1536";a:4:{s:4:"file";s:19:"Img-07-1536x955.png";s:5:"width";i:1536;s:6:"height";i:955;s:9:"mime-type";s:9:"image/png";}s:9:"2048x2048";a:4:{s:4:"file";s:20:"Img-07-2048x1273.png";s:5:"width";i:2048;s:6:"height";i:1273;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:16:"Img-07-65x40.png";s:5:"width";i:65;s:6:"height";i:40;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:18:"Img-07-225x140.png";s:5:"width";i:225;s:6:"height";i:140;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:18:"Img-07-350x218.png";s:5:"width";i:350;s:6:"height";i:218;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[Originating-Stages-Evidence]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>The-Crime</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-8-crime-scene-management-2/img-08-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:34 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-08.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>412</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:34]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:34]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[img-08-2]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>414</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-08.png]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/Img-08.png]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:2251;s:6:"height";i:2032;s:4:"file";s:18:"2020/08/Img-08.png";s:5:"sizes";a:9:{s:6:"medium";a:4:{s:4:"file";s:18:"Img-08-300x271.png";s:5:"width";i:300;s:6:"height";i:271;s:9:"mime-type";s:9:"image/png";}s:5:"large";a:4:{s:4:"file";s:19:"Img-08-1024x924.png";s:5:"width";i:1024;s:6:"height";i:924;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:18:"Img-08-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:12:"medium_large";a:4:{s:4:"file";s:18:"Img-08-768x693.png";s:5:"width";i:768;s:6:"height";i:693;s:9:"mime-type";s:9:"image/png";}s:9:"1536x1536";a:4:{s:4:"file";s:20:"Img-08-1536x1387.png";s:5:"width";i:1536;s:6:"height";i:1387;s:9:"mime-type";s:9:"image/png";}s:9:"2048x2048";a:4:{s:4:"file";s:20:"Img-08-2048x1849.png";s:5:"width";i:2048;s:6:"height";i:1849;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_small";a:4:{s:4:"file";s:16:"Img-08-65x59.png";s:5:"width";i:65;s:6:"height";i:59;s:9:"mime-type";s:9:"image/png";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:18:"Img-08-225x203.png";s:5:"width";i:225;s:6:"height";i:203;s:9:"mime-type";s:9:"image/png";}s:14:"pb_cover_large";a:4:{s:4:"file";s:18:"Img-08-350x316.png";s:5:"width";i:350;s:6:"height";i:316;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[The-Crime]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Exhibit Log</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-8-crime-scene-management-2/exhibit-log-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:38 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/EXHIBIT-LOG.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>413</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:38]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:38]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[exhibit-log-2]]></wp:post_name>
		<wp:status><![CDATA[inherit]]></wp:status>
		<wp:post_parent>414</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[attachment]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
						<wp:attachment_url><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/EXHIBIT-LOG.jpg]]></wp:attachment_url>
											<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attached_file]]></wp:meta_key>
		<wp:meta_value><![CDATA[2020/08/EXHIBIT-LOG.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_metadata]]></wp:meta_key>
		<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1700;s:6:"height";i:2200;s:4:"file";s:23:"2020/08/EXHIBIT-LOG.jpg";s:5:"sizes";a:9:{s:6:"medium";a:4:{s:4:"file";s:23:"EXHIBIT-LOG-232x300.jpg";s:5:"width";i:232;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:24:"EXHIBIT-LOG-791x1024.jpg";s:5:"width";i:791;s:6:"height";i:1024;s:9:"mime-type";s:10:"image/jpeg";}s:9:"thumbnail";a:4:{s:4:"file";s:23:"EXHIBIT-LOG-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:12:"medium_large";a:4:{s:4:"file";s:23:"EXHIBIT-LOG-768x994.jpg";s:5:"width";i:768;s:6:"height";i:994;s:9:"mime-type";s:10:"image/jpeg";}s:9:"1536x1536";a:4:{s:4:"file";s:25:"EXHIBIT-LOG-1187x1536.jpg";s:5:"width";i:1187;s:6:"height";i:1536;s:9:"mime-type";s:10:"image/jpeg";}s:9:"2048x2048";a:4:{s:4:"file";s:25:"EXHIBIT-LOG-1583x2048.jpg";s:5:"width";i:1583;s:6:"height";i:2048;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_small";a:4:{s:4:"file";s:21:"EXHIBIT-LOG-65x84.jpg";s:5:"width";i:65;s:6:"height";i:84;s:9:"mime-type";s:10:"image/jpeg";}s:15:"pb_cover_medium";a:4:{s:4:"file";s:23:"EXHIBIT-LOG-225x291.jpg";s:5:"width";i:225;s:6:"height";i:291;s:9:"mime-type";s:10:"image/jpeg";}s:14:"pb_cover_large";a:4:{s:4:"file";s:23:"EXHIBIT-LOG-350x453.jpg";s:5:"width";i:350;s:6:"height";i:453;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_attachment_image_alt]]></wp:meta_key>
		<wp:meta_value><![CDATA[Exhibit Log]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>About th</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=chapter&#038;p=431</link>
		<pubDate></pubDate>
		<dc:creator><![CDATA[jgray]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=chapter&#038;p=431</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>431</wp:post_id>
		<wp:post_date><![CDATA[2021-01-12 18:14:10]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[0000-00-00 00:00:00]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[]]></wp:post_name>
		<wp:status><![CDATA[draft]]></wp:status>
		<wp:post_parent>3</wp:post_parent>
		<wp:menu_order>13</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[103]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 3: What You Need To Know About Evidence</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-3-what-you-need-to-know-about-evidence/</link>
		<pubDate>Mon, 08 May 2017 18:54:52 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=chapter&#038;p=75</guid>
		<description></description>
		<content:encoded><![CDATA[<div class="textbox"><em>"Evidence forms the building blocks of the investigative process and for the final product to be built properly, evidence must be recognized, collected, documented, protected, validated, analyzed, disclosed, and presented in a manner which is acceptable to the court.”</em></div>
The term “evidence,” as it relates to investigation, speaks to a wide range of information sources that might eventually inform the court to prove or disprove points at issue before the trier of fact. Sources of evidence can include anything from the observations of witnesses to the examination and analysis of physical objects. It can even include the spatial relationships between people, places, and objects within the timeline of events. From the various forms of evidence, the court can draw inferences and reach conclusions to determine if a charge has been proven beyond a reasonable doubt.

Considering the critical nature of evidence within the court system, there are a wide variety of definitions and protocols that have evolved to direct the way evidence is defined for consideration by the court. Many of these protocols are specifically addressed and defined within the provisions of the <em>Canada Evidence Act</em> (Government of Canada, 2017).

In this chapter, we will look at some of the key definitions and protocols that an investigator should understand to carry out the investigative process:
<ol>
 	<li>The probative value of evidence</li>
 	<li>Relevant evidence</li>
 	<li>Direct evidence</li>
 	<li>Circumstantial evidence</li>
 	<li>Inculpatory evidence</li>
 	<li>Exculpatory evidence</li>
 	<li>Corroborative evidence</li>
 	<li>Disclosure of evidence</li>
 	<li>Witness evidence</li>
 	<li>Hearsay evidence</li>
 	<li>Search and seizure of evidence</li>
 	<li>Exclusion of evidence</li>
</ol>
<h1>Topic 1: The Probative Value of Evidence</h1>
Each piece of relevant evidence will be considered based on its “probative value,” which is the weight or persuasive value that the court assigns to that particular piece of evidence when considering its value towards proving a point of fact in question for the case being heard. This probative value of evidence goes towards the judge, or the judge and jury, reaching their decision of proof beyond a reasonable doubt in criminal court, or proof within a balance of probabilities in civil court.
<h2>Eye Witness Evidence</h2>
A competent, compellable, independent, eye witness with excellent physical and mental capabilities, who has seen the criminal event take place and can recount the facts will generally satisfy the court and provide evidence that has high probative value. In assessing the probative value of witness evidence, the court will consider several factors that we will discuss in more detail in our chapter on witness management. These include:
<ul>
 	<li>The witness type as either eye witness or corroborative witness</li>
 	<li>The witness competency to testify</li>
 	<li>The witness compellability to testify</li>
 	<li>The level of witness independence from the event</li>
 	<li>The witness credibility based on assessment of physical limitations</li>
</ul>
<h2>Physical Evidence</h2>
The court will also generally attribute a high probative value to physical exhibits. The court likes physical evidence because they are items the court can see and examine to interpret the facts in issue for proof beyond a reasonable doubt. Physical evidence can include just about anything, such as weapons, fingerprints, shoe prints, tire marks, tool impression, hair, fibre, or body fluids. These kinds of physical exhibits of evidence can be examined and analyzed by experts who can provide the court with expert opinions that connect the item of evidence to a person, place, or the criminal event. This allows the court to consider circumstantial connections of the accused to the crime scene or the accused to the victim. For example, in the case where the fingerprints of a suspect are found at a crime scene, and a DNA match of a murder victim’s blood is found on that suspect’s clothing, forensic connections could be made and, in the absence of an explanation, the court would likely find this physical evidence to be relevant and compelling evidence with high probative value.
<h1>Topic 2: Relevant Evidence</h1>
Relevant evidence speaks to an issue before court in relation to the charge being heard. Relevant evidence includes both direct evidence and indirect circumstantial evidence. For either direct or indirect circumstantial evidence to be considered relevant to the court, it must relate to the elements of the offence that need to be proven. If the evidence does not relate to proving the place, time, identity of the accused, or criminal acts within the offence itself, the evidence will not be considered relevant to the charge. The prosecution may present evidence in the form of a physical exhibit that the court can see and examine to consider, or they may present evidence in the form of witness testimony, in which case the witness is telling the court what they perceived within the limits of their senses.

[caption id="attachment_76" align="aligncenter" width="1024"]<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-01-1024x501.png" alt="Types of Evidence chart. Long description available." class="wp-image-76 size-large" width="1024" height="501" /> <a href="#evid">[Long Description]</a>[/caption]
<h1>Topic 3: Direct Evidence</h1>
Direct evidence is evidence that will prove the point in fact without interpretation of circumstances. (Justice Department Canada, 2017). It is any evidence that can show the court that something occurred <em>without the need for the judge to make inferences or assumptions to reach a conclusion</em>. An eyewitness who saw the accused shoot a victim would be able to provide direct evidence. Similarly, a security camera showing the accused committing a crime or a statement of confession from the accused admitting to the crime could also be considered direct evidence. Direct evidence should not be confused with the concept of direct examination, which is the initial examination and questioning of a witness at trial by the party who called that witness. And, although each witness who provides evidence could, in theory, be providing direct testimony of their own knowledge and experiences, that evidence is often not direct evidence of the offence itself.
<h1>Topic 4: Circumstantial Evidence</h1>
Indirect evidence, also called circumstantial evidence, is all other evidence, such as the fingerprint of an accused found at the crime scene. Indirect evidence does not by itself prove the offence, but through interpretation of the circumstances and in conjunction with other evidence may contribute to a body of evidence that could prove guilt beyond a reasonable doubt (Justice Department Canada, 2017). Strong circumstantial evidence that only leads to one logical conclusion can sometimes become the evidence the court uses in reaching belief beyond a reasonable doubt to convict an accused. It requires assumptions and logical inferences to be made by the court to attribute meaning to the evidence<em>. </em>
<blockquote><em>"When one or more things are proved, from which our experience enables us to ascertain that another, not proved, must have happened, we presume that it did happen, as well in criminal as in civil cases" (MacDonell, 1820).</em></blockquote>
Circumstantial evidence demonstrates the spatial relationships between suspects, victims, timelines, and the criminal event. These spatial relationships can sometimes demonstrate that an accused person had a combination of intent, motive, opportunity, and/or the means to commit the offence, which are all meaningful features of criminal conduct.

Circumstantial evidence of intent can sometimes be shown through indirect evidence of a suspect planning to commit the offence, and/or planning to escape and dispose of evidence after the offence. A pre-crime statement about the plan could demonstrate both intent and motive, such as, “I really need some money. I’m going to rob that bank tomorrow."

Circumstantial evidence of conflict, vengeance, financial gain from the commission of the offence can also become evidence of motive.

Circumstantial evidence of opportunity can be illustrated by showing a suspect had access to a victim or a crime scene at the time of the criminal event, and this access provided opportunity to commit the crime.

Circumstantial evidence of means can sometimes be demonstrated by showing the suspect had the physical capabilities and/or the tools or weapons to commit the offence.

Presenting this kind of circumstantial evidence can assist the court in confirming assumptions and inferences to reach conclusions assigning probative value to connections between the accused and a person or a place and the physical evidence. These circumstantial connections can create the essential links between a suspect and the crime.

There are many ways of making linkages to demonstrate circumstantial connections. These range from forensic analysis of fingerprints or DNA that connect an accused to the crime scene or victim, to witness evidence describing criminal conduct on the part of an accused before, during, or after the offence. The possibilities and variations of when or how circumstantial evidence will emerge are endless. It falls upon the investigator to consider the big picture of all the evidence and then analytically develop theories of how events may have happened. Once a reasonable theory has been formed, evidence of circumstantial connections can be validated through further investigation and analysis of physical exhibits to connect a suspect to the crime.
<h1>Topic 5: Inculpatory Evidence</h1>
Inculpatory evidence is any evidence that will directly or indirectly link an accused person to the offence being investigated. For an investigator, inculpatory evidence can be found in the victim’s complaint, physical evidence, witness accounts, or the circumstantial relationships that are examined, analyzed, and recorded during the investigative process. It can be anything from the direct evidence of an eyewitness who saw the accused committing the crime, to the circumstantial evidence of a fingerprint found in a location connecting the accused to the victim or the crime scene.

Naturally, direct evidence that shows the accused committed the crime is the preferred inculpatory evidence, but, in practice, this it is frequently not available. The investigator must look for and interpret other sources for evidence and information. Often, many pieces of circumstantial evidence are required to build a case that allows the investigator to achieve reasonable grounds to believe, and enables the court to reach their belief beyond a reasonable doubt.

A single fingerprint found on the outside driver’s door of a stolen car would not be sufficient for the court to find an accused guilty of car theft. However, if you added witness evidence to show that the accused was seen near the car at the time it was stolen, and a security camera recording of the accused walking off the parking lot where the stolen car was dumped, and the police finding the accused leaving the dump site where he attempted to toss the keys of that stolen car into the bushes, the court would likely have proof beyond a reasonable doubt.

If an abundance of inculpatory circumstantial evidence can be located for presentation to the court that leads to a single logical conclusion, the court will often reach their conclusion of proof beyond a reasonable doubt, unless exculpatory evidence is presented by the defence to create a reasonable doubt.
<h1>Topic 6: Exculpatory Evidence</h1>
Exculpatory evidence is the exact opposite of inculpatory evidence in that it tends to show the accused person or the suspect did not commit the offence. It is important for an investigator to not only look for inculpatory evidence, but to also consider evidence from an exculpatory perspective. Considering evidence from the exculpatory perspective demonstrates that an investigator is being objective and is not falling into the trap of tunnel vision. If it is possible to find exculpatory evidence that shows the suspect is not responsible for the offence, it is helpful for police because it allows for the elimination of that suspect and the redirecting of the investigation to pursue the real perpetrator.

Sometimes, exculpatory evidence will be presented by the defence at trial to show the accused was not involved in the offence or perhaps only involved to a lesser degree. In our previous circumstantial case of car theft, there is strong circumstantial case; but what if the defence produces the following exculpatory evidence where:
<ul>
 	<li>A tow truck dispatcher testifies at the trial and produces records showing the accused is a tow truck driver;</li>
 	<li>On the date of the car theft, the accused was dispatched to the site of the car theft to assist a motorist locked out of his car;</li>
 	<li>The accused testifies that he only assisted another male to gain entry to the stolen car because he could see the car keys on the front seat;</li>
 	<li>The accused explains that, after opening the car, he agreed to meet this male at the parking lot where the car was left parked;</li>
 	<li>He accepted the keys of the stolen car from the other male to tow the vehicle later to a service station from that location;</li>
 	<li>When approached by police, he stated that he became nervous and suspicious about the car he had just towed; and</li>
 	<li>He tried to throw the keys away because he has a previous criminal record and knew the police would not believe him.</li>
</ul>
Provided with this kind of exculpatory evidence, the court might dismiss the case against the accused.

Having read this, you may be thinking that this exculpatory evidence and defence sounds a little vague, which is the dilemma that often faces the court. If they can find guilt beyond a reasonable doubt, they will convict, but if the defence can present evidence that creates a reasonable doubt, they will make a ruling of not guilty. Experienced criminals can be very masterful at coming up with alternate explanations of their involvement in criminal events, and it is sometimes helpful for investigators to consider if the fabrication of an alternate explanation will be possible. If an alternate explanation can be anticipated, additional investigation can sometimes challenge the untrue aspects of the alternate possibilities.
<h1>Topic 7: Corroborative Evidence</h1>
The term corroborative evidence essentially refers to any type of evidence that tends to support the meaning, validity, or truthfulness of another piece of evidence that has already been presented to the court. A piece of corroborative evidence may take the form of a physical item, such as a DNA sample from an accused matching the DNA found on a victim, thus corroborating a victim’s testimony. Corroborative evidence might also come from the statement of one independent witness providing testimony that matches the account of events described by another witness. If it can be shown that these two witnesses were separated and did not collaborate or hear each other’s account, their statements could be accepted by the court as mutually corroborative accounts of the same event.

The courts assign a great deal of probative value to corroborative evidence because it assists the court in reaching their belief beyond a reasonable doubt. For investigators, it is important to not just look for the minimum amount of evidence apparent at the scene of a crime. Investigation must also seek out other evidence that can corroborate the facts attested to by witnesses or victims in their accounts of the event. An interesting example of corroborative evidence can be found in the court’s acceptance of a police investigators notes as being <em>circumstantially corroborative</em> of that officer’s evidence and account of the events. When a police investigator testifies in court, they are usually given permission by the court to refer to their notes to refresh their memory and provide a full account of the events. If the investigator’s notes are detailed and accurate, the court can give significant weight to the officer’s account of those events. If the notes lack detail or are incomplete on significant points, the court may assign less value to the accuracy of the investigator's account.

For the court, detailed notes properly made at the time corroborate the officer’s evidence and represent a circumstantial guarantee of trustworthiness for the officer’s testimony (McRory, 2014).
<h1>Topic 8: Disclosure of Evidence</h1>
It is important for an investigator to be aware that all aspects of their investigation may become subject to disclosure as potential evidence for court. As part of the process of fundamental justice within the <em>Canadian Charter of Rights and Freedoms</em>, a person charged with an offence has the right to full disclosure of all the evidence of the investigation (<em>R v Stinchcombe</em>, 1991). This means that any evidence or information gathered during the police investigation must be available for the defence to review and determine if that evidence could assist the accused in presenting a defence to the charge before the court.

In the disclosure process, the decision to disclose or not to disclose is the exclusive domain of the crown prosecutor and, although police investigators may submit information and evidence to the prosecutor with the request that the information be considered an exception to the disclosure rules, the final decision is that of the crown. That said, even the decision of the crown may be challenged by the defence and that then becomes a final decision for the Judge. The prosecutor will ask the police to provide a full disclosure of the evidence gathered during their investigation.

The list of what should form part of a normal disclosure will typically include:
<ul>
 	<li>Charging document</li>
 	<li>Particulars of the offence</li>
 	<li>Witness statements</li>
 	<li>Audio/video evidence statements by witnesses</li>
 	<li>Statements by the accused</li>
 	<li>Accused's criminal record</li>
 	<li>Expert witness reports</li>
 	<li>Notebooks and Police reports</li>
 	<li>Exhibits</li>
 	<li>Search warrants</li>
 	<li>Authorizations to intercept private communications</li>
 	<li>Similar fact evidence</li>
 	<li>Identification evidence</li>
 	<li>Witnesses' criminal records</li>
 	<li>Reports to Crown Counsel recommending charges</li>
 	<li>Witness impeachment material</li>
</ul>
It is worth stressing that police notes and reports relating to the investigation are typically studied very carefully by the defence to ensure they are complete and have been completely disclosed. Disclosure will also include investigation notes and reports that relate to alternate persons considered, investigated, and eliminated as suspects in the crime for which the accused is being tried. If alternate suspects were identified and not eliminated during the investigation, that lack of investigation may form the basis for a defence to the charge.

The issues relating to the disclosure of evidence have been the subject of several Supreme Court of Canada rulings and a few exceptions to disclosure had been identified where certain information does not need to be disclosed. These exceptions to disclosure were outlined in the benchmark disclosure case of <em>R v Stinchcombe </em>(1991)<em>.</em> These exceptions include:
<ul>
 	<li>Information that is clearly irrelevant</li>
 	<li>Information that is considered privileged</li>
 	<li>Information that would expose an ongoing police investigation</li>
 	<li>Information that would compromise the safety of a witness</li>
</ul>
For an investigator, the requirement to comply with disclosure is one of the best reasons to make sure notes and reports are complete and accurately reflect the investigation and actions taken during the investigation. From the court’s perspective, there will never be any excuse for a police investigator to intentionally conceal or fail to disclose evidence or information.
<h1>Topic 9: Witness Evidence</h1>
Witness evidence is evidence obtained from any person who may be able to provide the court with information that will assist in the adjudication of the charges being tried. This means that witnesses are not only persons found as victims of a crime or on-scene observers of the criminal event. They may also be persons who can inform the court on events leading up to the crime, or activities taking place after the crime.

These after-the-crime activities do not just relate to activities of the suspect, but also include the entire range of activities required to investigate the crime. Consequently, every police officer involved in the investigation, and every person involved in the handling, examination, and analysis of evidence to be presented in court, is a potential witness.

Issues relating to the collection of witness evidence will be discussed in more detail in Chapter 7 on Witness Management.
<h1>Topic 10: Hearsay Evidence</h1>
Hearsay evidence, as the name implies, is evidence that a witness has heard as a communication from another party. In addition to verbal communication, legal interpretations of the meaning of hearsay evidence also include other types of person-to-person communication, such as written statements or even gestures intended to convey a message. As defined by John Sopinka in his book, <em>T</em><em>he Law of Evidence</em>, hearsay is:
<blockquote><strong>"</strong>Written or oral statements or communicative conduct made by persons otherwise than in testimony at the proceedings in which it is offered, are inadmissible if such statements or conduct are tendered either as proof of their truth or as proof of assertions implicit therein" (Sopinka, 1999, p. 173).</blockquote>
Hearsay evidence is generally considered to be inadmissible in court at the trial of an accused person for several reasons; however, there are exceptions where the court will consider accepting hearsay evidence (Thompson, 2013). The reasons why hearsay is not openly accepted by the court include the rationale that:
<ul>
 	<li>The court generally applies the best-evidence rule to evidence being presented and the best evidence would come from the person who gives the firsthand account of events;</li>
 	<li>The original person who makes the communication that becomes hearsay, is not available to be put under oath and cross-examined by the defence;</li>
 	<li>In hearing the evidence, the court does not have the opportunity to hear the communicator firsthand and assess their demeanour to gauge their credibility; and</li>
 	<li>The court recognizes that communication that has been heard and is being repeated is subject to interpretation. Restatement of what was heard can deteriorate the content of the message.</li>
</ul>
The court will consider accepting hearsay evidence as an exception to the hearsay rule in cases where:
<ul>
 	<li>There is a dying declaration</li>
 	<li>A witness is the recipient of a spontaneous utterance</li>
 	<li>The witness is testifying to hearsay from a child witness who is not competent</li>
</ul>
<h2>Dying Declarations</h2>
Exceptions to the hearsay rule include the dying declaration of a homicide victim. This type of declaration is allowed since it is traditionally believed that a person facing imminent death would not lie. Justice Eyre in the 1789 English case of <em>R v Woodcock</em> stated:
<blockquote><strong>"</strong>The general principle on which this species of evidence is admitted is, that they are declarations made in extremity, when the party is at the point of death, and when every hope of this world is gone: when every motive to falsehood is silenced, and the mind is induced by the most powerful considerations to speak the truth; the situation so solemn and so awful, is considered by the law as creating an obligation equal to that which is imposed by a positive oath administered in a court of justice" <em>(R v Woodcock</em>, 1789).</blockquote>
Per the rules of the <em>Canada Evidence Act </em>(Government of Canada, 2015), for a dying declaration to be acceptable to the court, the victim:
<ul>
 	<li>Must be a victim of 1st or 2nd degree murder, manslaughter, or criminal negligence causing death;</li>
 	<li>Must be making a statement in regards to the cause of death;</li>
 	<li>Must know at the time they make the statement that their death is imminent;</li>
 	<li>Must be someone who would have been a competent witness had they lived; and</li>
 	<li>Must die of their injuries within a reasonable time after the statement was made.</li>
</ul>
This is a delicate area because in cases where the victim of a serious assault is in danger of dying, the investigator may have the opportunity to gain evidence by taking a statement from that victim; however, that statement would need to include some acknowledgement by the victim that they believed they are in imminent danger of dying (Sebetic, 1950).
<h2>Recipient of a Spontaneous Utterance</h2>
In cases where a witness hears a spontaneous utterance of a victim, the court may accept the witnesses restating of that utterance if, according to <em>Ratten v R </em>(1971):
<blockquote>"… the statement providing it is made in such conditions of involvement or pressure as to exclude the possibility of concoction or distortion to the advantage of the maker or the disadvantage of the accused" (<em>Ratten v R</em>, 1971).</blockquote>
<h2>Hearsay of Statement from a Child Witness Who is Not Competent</h2>
In cases where a child witness is not competent or available to provide evidence, the parent or another adult, who has heard a statement from that child, may be permitted to provide that information by way of hearsay to the court. These circumstances have been illustrated in case law from the case of <em>R v Khan </em>(1990). In this case, the mother of a 3 ½ year old girl was not present when the child was sexually assaulted by her doctor during an examination. However, immediately after the examination, the child made explicate statements of what happened to the mother and provided descriptions of acts that a child could not have made up. From this case, the court did consider hearsay evidence as an exception to the hearsay rule. The case of <em>R v Khan</em> created what has become known as the “principled approach” and it allows that hearsay evidence may be admissible if two conditions are proven. These conditions are necessity and reliability.

In <em>R v Khan </em>(1990), the S.C.C. defined <strong>necessity</strong> as instances where:
<ul>
 	<li>A child was not competent to testify by reason of young age;</li>
 	<li>A child is unable to testify;</li>
 	<li>A child is unavailable to testify; or</li>
 	<li>In the opinion of an expert psychologist providing testimony would be too traumatic and harmful to the child.</li>
</ul>
In <em>R v Khan </em><span>(1990)</span>, the court defined <strong>reliability</strong> factors as relating to the credibility of the person’s observations and these included:
<ul>
 	<li>When the hearsay statement was made about the offence;</li>
 	<li>The nature of the child’s demeanour;</li>
 	<li>The level of the child’s intelligence and understanding; and</li>
 	<li>The lack of a reason for the child to have fabricated the story.</li>
</ul>
Since the adoption of the <em>Khan Rul</em>e, the rules of hearsay have expanded on the principled approach that if the evidence is considered necessary to prove a fact in issue at the trial, the hearsay evidence being submitted is found to be reliable (Dostal, 2012). To prove reliability, the crown must submit evidence that demonstrates the circumstantial guarantee of trustworthiness. This definition of reliability was further articulated in <em>R v Smith</em>:
<blockquote>"The criterion of 'reliability' or the circumstantial guarantee of trustworthiness — is a function of the circumstances under which the statement in question was made. If a statement sought to be adduced by way of hearsay evidence is made under circumstances which substantially negate the possibility that the declarant was untruthful or mistaken, the hearsay evidence may be said to be 'reliable,' i.e., a circumstantial guarantee of trustworthiness is established” (<em>R v Smith</em>, 1992).</blockquote>
An interesting aspect of hearsay evidence that sometimes confuses new investigators is that during any investigation, the investigator is searching out and retrieving hearsay accounts of events from various witnesses. From these hearsay accounts, the investigator is considering the evidence and using that hearsay information to form reasonable grounds to believe and take action. This is a totally acceptable and legally authorized process, and, if ever questioned in court regarding the process of forming reasonable grounds on the basis of hearsay, the investigator can qualify their actions by pointing out their intent to call upon the original witness to provide the court with the unfettered firsthand account of events. Investigators are merely the people empowered to assemble the available facts and information from various sources found in witnesses and crime scene evidence. As an investigator assembles the evidence they are empowered to form reasonable grounds for belief and take actions of search, seizure, arrest, and charges to commence the court process. Once in court, the investigator’s testimony will only relate to the things they have done in person or statements they have heard as exceptions to the hearsay rule while forming of reasonable grounds to take action.
<h1>Topic 11: Search and Seizure of Evidence</h1>
In order for items of physical evidence to be accepted by the court as exhibits, each item of evidence must meet the test of having been searched for and seized using the correct lawful authorities. There are a number of ways in which items of evidence may be legally searched for and seized.

Investigators may search for and seize or receive items of evidence:
<ul>
 	<li>By consent of the person being searched</li>
 	<li>On authority of a search warrant under Section 487(1) of the <em>Criminal Code of Canada</em></li>
 	<li>As part of a search incidental to the lawful arrest of a suspect</li>
 	<li>As part of a safety search incidental to the lawful detention of a suspect</li>
 	<li>Under the doctrine of evidence in plain view at a lawfully entered crime scene</li>
</ul>
It is important to note that when evidence is being presented to the court, the investigator will be held accountable to provide an explanation of the circumstances under which an item of evidence was searched for and seized. This may involve the investigator articulating not only details of how they discovered the item, but also circumstances to illustrate the offence committed and their authority to arrest, detain, and/or enter a crime scene lawfully

With similar accountability, when a Section 487(1) Criminal Code warrant is issued, the police are required in advance to swear an affidavit of facts articulating their reasonable grounds to believe that an offence has been committed and the evidence of that offence exists in the premises to be searched. This warrant and the affidavit of facts can be examined and challenged at the trial. As we proceed through this book we will discuss the process of developing the mental map that enables an investigator to meet the challenge of seeing and articulating the issues of lawful authority to search and seize evidence.
<h1>Topic 12: Exclusion of Evidence by the Court</h1>
In hearing any case, the court has the authority to either accept or exclude any piece of evidence being presented. An evaluation is applied to all evidence to determine if it will be admissible or excluded. The types of evidence that can be admitted or excluded range from the physical exhibits found at the crime scene, to the accounts of events provided by witnesses to a confession taken from a suspect. For investigators, it is important to understand that any piece of evidence could be challenged by the defence for exclusion. If challenged, the court will decide if evidence should be excluded based on a number of rules and depending on the type of evidence being presented.

In the case of witness evidence, the court will first consider if the witness is competent and compellable to give evidence. A competent witness is <em>generally</em> a compellable witness (<em>R v Schell</em>, 2004). Competent means legally qualified to testify, and compellable means legally permitted to testify. Witness competence and compellability are each decided based upon several factors that will be discussed later in the witness management portion of this book.

If a witness is found to be both competent and compellable, the court will hear their testimony and will then consider the value of the evidence provided after assessing the credibility of the witness. If a witness is found to be either not competent or not compellable, their evidence will be excluded at trial.

Like witness evidence, physical evidence is also evaluated by the court to determine its admissibility at trial based upon a number of factors. These factors will be discussed further in our chapter on crime scene management; however, they include:
<ul>
 	<li>If the evidence was lawfully seized</li>
 	<li>How the evidence was collected, marked, and preserved</li>
 	<li>If the evidence was somehow contaminated</li>
 	<li>If the chain of continuity for the evidence has been properly maintained</li>
</ul>
A flaw in any of these factors can result in evidence being excluded at trial. In addition, the court can completely exclude any evidence that has been obtained following a violation of the <em>Charter Rights and Freedoms</em> of the accused person. Such infringements on these guaranteed rights and freedoms would include:
<ul>
 	<li>Improper or unauthorized search of a person or a person’s property</li>
 	<li>Improper taking of a statement from a suspect by failing to provide the appropriate warning and caution under section 10 of the Charter</li>
 	<li>Failing to provide proper opportunity for the arrested or detained person to speak with counsel after arrest or detainment</li>
 	<li>Failing to properly disclose all the evidence prior to trial to allow the accused to make full defence to the charge</li>
</ul>
Section 24 of the <em>Canadian Charter of Right and Freedoms</em> states:
<blockquote>24. (1) Anyone whose rights or freedoms, as guaranteed by this Charter, have been infringed or denied may apply to a court of competent jurisdiction to obtain such remedy as the court considers appropriate and just in the circumstances.

(2) Where, in proceedings under subsection (1), a court concludes that evidence was obtained in a manner that infringed or denied any rights or freedoms guaranteed by this Charter, the evidence shall be excluded if it is established that, having regard to all the circumstances, the admission of it in the proceedings would bring the administration of justice into disrepute.

Practices regarding what evidence may be brought against an individual in trials are addressed by section 24(2). When evidence is obtained through the violation of a Charter right, the claimant is able to apply to have the evidence excluded from the trial under this section (Government of Canada, 2015).</blockquote>
The exclusion of evidence flowing from a Charter violation is not automatic, and there is significant case law that the court will consider to determine if evidence will be excluded.
<blockquote>In the case <em>R v Grant </em>(2009), the Supreme Court of Canada created a new test to determine when the administration of justice has been brought into disrepute (replacing the 1987 test in <em>R v Collins</em>). The Grant test lists three factors the courts must consider:
<p style="padding-left: 30px;">(1) the seriousness of the Charter infringing conduct (focusing on a review of how society would view the actions of the state),</p>
<p style="padding-left: 30px;">(2) the impact of the breach on the Charter protected interests of the accused (focusing on a review of how the state's actions affected the accused), and</p>
<p style="padding-left: 30px;">(3) society's interests in the adjudication of the case on its merits (focusing on a review of the importance and reliability of the evidence) (<em>R v Grant</em>, 2009).</p>
</blockquote>
Knowing the rules for evidence collection, handling, and preservation can assist an investigator to avoid errors that could exclude evidence at trial. Following the rules that define Charter violations can assist an investigator to avoid having valuable evidence excluded completely at trial because of a charter violation. These topics will all be covered in more detail as we proceed through the various chapters to follow.
<h1>Summary</h1>
Evidence is a key feature to any investigation, so it is important for investigators to understand the various legal definitions of evidence, the various types of evidence, and the manner in which evidence is considered and weighed by the court. Evidence forms the building blocks of the investigative process and for the final product to be built properly, evidence must be recognized, collected, documented, protected, validated, analyzed, disclosed, and presented in a manner that will be acceptable to the court. As we proceed through this book, evidence will continue to be a key element for consideration in the development of proper investigative processes.
<div class="textbox textbox--exercises"><header class="textbox__header">
<p class="textbox__title">Study Questions</p>

</header>
<div class="textbox__content">
<ol>
 	<li>What do we mean when we say that evidence will be considered by the court on its “probative value”?</li>
 	<li>What is direct evidence?</li>
 	<li>Provide three examples of direct evidence.</li>
 	<li>Can an accused be convicted of circumstantial evidence alone?</li>
 	<li>What is inculpatory evidence?</li>
 	<li>What is exculpatory evidence?</li>
 	<li>What is corroborative evidence?</li>
 	<li>What are the exceptions to the requirement of full disclosure?</li>
 	<li>Is hearsay evidence ever admissible in court?</li>
 	<li>When can evidence be excluded by a court?</li>
 	<li>If evidence was illegally obtained, is it automatically excluded by the court?</li>
</ol>
</div>
</div>
<h1>Long Descriptions</h1>
<strong id="evid">Evidence Types long description:</strong> There are two types of evidence: direct and indirect. Direct evidence will prove point in fact without interpretation of circumstances. Indirect evidence is circumstantial evidence; interpretation is required to prove point in fact. <a href="#attachment_76">[Return to Evidence Types]</a>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>75</wp:post_id>
		<wp:post_date><![CDATA[2017-05-08 14:54:52]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-05-08 18:54:52]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-3-what-you-need-to-know-about-evidence]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>3</wp:post_parent>
		<wp:menu_order>3</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[727]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_export]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 3: What You Need To Know About Evidence]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_candela_citation]]></wp:meta_key>
		<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 4: The Process of Investigation</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-4-the-process-of-investigation/</link>
		<pubDate>Mon, 08 May 2017 19:16:21 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=chapter&#038;p=79</guid>
		<description></description>
		<content:encoded><![CDATA[<div class="textbox">

<em>“For the court to be satisfied that the investigator acted lawfully and within the bounds of legally prescribed authority, the judge needs to hear the investigator describe their thinking processes to form reasonable grounds, or in some emergency cases, to have a reasonable suspicion that justifies the action taken.”</em>

</div>
An effective strategy for learning any new skill is to define it and break it down into logical steps, establishing a progression that can be followed and repeated to reach the desired results. The process of investigation is no exception and can be effectively explained and learned in this manner. In this chapter, you will learn how each of the following issues relates to the process of investigation.
<ol>
 	<li>The distinction between investigative tasks and investigative thinking</li>
 	<li>The progression of the investigative process</li>
 	<li>The distinction between tactical investigative and strategic investigative responses</li>
 	<li>The concepts of event classification and offence recognition</li>
 	<li>The threat vs. action response dilemma</li>
 	<li>The distinction between active events and inactive events</li>
 	<li>The connection of active events and Level 1 priority results to the powers afforded under exigent circumstance</li>
 	<li>The Response Transition Matrix (RTM) and the critical need to transition from tactical response to strategic response</li>
</ol>
<h1>Topic 1: The Distinction Between Investigative Tasks and Investigative Thinking</h1>
To understand the process of investigation, it is necessary to comprehend the distinction between investigative tasks and investigative thinking. Investigative tasks relate to the information gathering processes that feed into investigative thinking and the results. Investigative thinking, on the other hand, is the process of analyzing information and theorizing to develop investigative plans. Let us consider this distinction in a little more depth.
<h2>Investigative Tasks</h2>
Investigative tasks relate to identifying physical evidence, gathering information, evidence collection, evidence protection, witness interviewing, and suspect interviewing and interrogation. These are essential tasks that must be learned and practiced with a high degree of skill to feed the maximum amount of accurate information into the investigative thinking process. Criminal investigation is aimed at collecting, validating, and preserving information in support of the investigative thinking process. Accordingly, it is important to learn to do these evidence collection tasks well.
<h2>Investigative Thinking</h2>
Investigative thinking is aimed at analyzing the information collected, developing theories of what happened, the way an event occurred, and establishing reasonable grounds to believe. Those reasonable grounds to believe will identify suspects and lead to arrest and charges. Investigative thinking is the process of analyzing evidence and information, considering alternate possibilities to establish the way an event occurred and to determine if they are reasonable.
<h1>Topic 2: Progression of the Investigative Process</h1>
The investigative process is a progression of activities or steps moving from evidence gathering tasks, to information analysis, to theory development and validation, to forming reasonable ground to believe, and finally to the arrest and charge of a suspect. Knowing these steps can be helpful because criminal incidents are dynamic and unpredictable. The order in which events take place, and the way evidence and information become available for collection, can be unpredictable. Thus, only flexible general rules to structured responses can be applied. However, no matter how events unfold or when the evidence and information are received, certain steps need to be followed. These include collection, analysis, theory development and validation, suspect identification and forming reasonable grounds, and taking action to arrest, search, and lay charges.

In any case, as unpredictable as criminal events may be, the results police investigators aim for are always the same. And, you should always keep the desired results in mind to provide focus and priority to the overall investigative process. We will talk more later in this book about developing a mental map of the investigative process to assist in recording, reporting, and recounting events. It is mentioned now because a mental map is an appropriate metaphor to illustrate the investigative thinking process.

In this process, even though the path we will take to investigate may be unclear and unpredictable at first, the destination, <em>the results we seek in our investigation</em>, will always be the same and can be expressed in terms of <strong>results</strong> and their <strong>priorities</strong>.

Results and priorities focus first on the protection of the lives and safety of people. They focus second on the priorities of protecting property, gathering and preserving evidence, accurately documenting the event, and establishing reasonable grounds to identify and arrest offenders.

Priorities refer to Level One Priorities, as the protection of the lives and safety of people. This includes the protection and safety of the police officer's own life and the life and safety of other officers.

The Level Two priorities are the four remaining aforementioned results, and these may be considered equal value to each other. Depending on circumstances, a rationale can be made for choosing to concentrate on one Level Two priority at the expense of another depending on the circumstances presenting.

[caption id="attachment_80" align="aligncenter" width="1024"]<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-02-1024x788.png" alt="Chart of investigative response priority results. Long description available." class="wp-image-80 size-large" width="1024" height="788" /> <a href="#irpr">[Long Description]</a>[/caption]The critical point to be made here is that under no circumstances should an investigator ever choose to focus his or her efforts and attention to a Level Two priority if doing so would compromise the Level One priority of protecting the life and safety of a person, including police officers themselves. In the event that evidence is lost or destroyed, or that a suspect is not identified or apprehended because investigators were taking care of the Level One priority, that is a justifiable outcome. A response that would sacrifice the safety of people to achieve a level two priority would not be justifiable, and could even lead to civil or criminal outcomes against the investigators making such a choice.

Now that we have looked at the critical aspects of investigative tasks and the response priorities police investigators need to apply to decision making when they take action, we can proceed to examine the two different types of investigative response. We will refer to these as the <strong>Tactical Investigative Response</strong> and the <strong>Strategic Investigative Response</strong>.
<h1>Topic 3: Distinction Between a Tactical Investigative Response and a Strategic Investigative Response</h1>
These two different types of investigative responses are defined by the nature and status of the event that the investigator is facing. If it is an active event, it will require a Tactical Investigative Response and if it is an inactive event it will require a Strategic Investigative Response. It is important for an investigator to understand these two different levels of response because they include different response protocols, different legal authorities, and limitations to authority.
<h2>Tactical Investigative Response</h2>
Tactical Investigative Response is faced by operational officers who are engaged in the frontline response to criminal events. As mentioned earlier, police are often challenged to respond to events, sometimes life and death situations, where information is limited and critical decisions need to be made to take action. In these Tactical Investigative Responses, the responding officers often have little or no time to undertake the tasks of gathering information. They must rely on the information of a dispatched complaint, coupled with their own observations made once they arrive at the scene. If an officer takes the action of making an arrest or using force to bring the situation under control, they are accountable for the action they have taken, and they may be called upon by the court to articulate their thinking, albeit based on limited information.
<h2>Strategic Investigative Response</h2>
Once an investigator has arrived at the scene of an event and has brought the event under control by either making an arrest or by determining that the suspect has fled the scene and no longer poses a threat to the life or safety of persons, the investigation becomes a strategic investigative response. With this expiration of life and safety issues, also comes the expiration of exigent circumstances and the additional authorities to detain persons suspected and to enter and search private property without a warrant.

Clearly understanding and being able to define and articulate the circumstances of either an active event and tactical response, or a controlled event and a strategic response is critical. In court, it becomes important for a police investigator to describe what they were told going into the complaint, what they saw and heard when they arrived at the complaint, and, most importantly, what they were thinking to justify the action that was taken. For the court to be satisfied that the investigator acted lawfully, the judge needs to hear the investigator describe their thinking process to form reasonable grounds, or in some emergency cases, to have a reasonable suspicion that justifies the action taken.

To properly articulate their thinking in these investigative responses, it is important for the officer to understand the situational elements that can help define their thinking process when they testify in court. Two of the most important situational elements to understand are <strong>event classification</strong> and <strong>offence recognition</strong>.
<h1>Topic 4: Event Classification and Offence Recognition</h1>
In order to enter any investigation in either the tactical or the strategic response mode, an investigator must engage their thinking processes and make decisions about the event they are confronting. Is it an <em>active event</em> in progress that requires immediate and decisive tactical actions; or is it an <em>inactive event</em> where a less urgent, slower, and more strategic approach can be taken? This slower and more considered approach is the strategic investigative response, and the situational elements of this approach will be discussed in detail later in this chapter. Thinking about these situational elements of active event or inactive event is call event classification.

Considering the possible crime being committed in the event is called “offence recognition,” and this recognition of a specific offence activates the investigator’s thinking to look for the evidence that supports the elements of that recognized offence.
<h1>Topic 5: Classifying the Event as Either an Active Event or an Inactive Event</h1>
For each of these classifications of <strong>active event</strong> or <strong>inactive event</strong>, the investigator has some different legal authorities to put into action, as well as some immediate responsibilities for the protection, collection, and preservation of evidence. When attending the scene of any reported event, the investigator should assume that the event is active until it has been established to be inactive.

In many cases, an event can be re-classified as an inactive event when it is determined that the suspect has left the scene of the event, or the event has concluded by the suspect being arrested. In cases where the suspect is still at the scene of an active event, the investigator needs to be thinking about the possibility of detaining the suspect or making an arrest of that suspect for an offence in progress. To make that detention or arrest, the investigator should be thinking about what possible offence they are being called to investigate by the initial complaint, and also by the evidence they are seeing and hearing upon arrival.

The classification of active event or inactive event is critical. It is a distinction that will guide an officer to determine what powers of detention, arrest, use of force, entry to property, and search may be relied upon to take action. The defining elements between active event and inactive event are:
<h2>An Active Event</h2>
<ol>
 	<li>The criminal act is or may still be in progress at the scene.</li>
 	<li>The suspect is or may still be at the scene of the event.</li>
 	<li>The situation is, or may be, a danger to the life or safety of a person, including the life or safety of attending police officers.</li>
</ol>
<h2>An Inactive Event</h2>
<ol>
 	<li>The criminal act has concluded at the scene.</li>
 	<li>The suspect or suspects have left the scene or have been arrested or detained.</li>
 	<li>The situation at the scene no longer represents a danger to the life or safety of a person, including police officers.</li>
</ol>
<h1>Topic 6: Threat vs. Action Analysis Dilemma</h1>
The critical elements of this <em>Threat vs. Action Analysis Dilemma</em> were demonstrated in what became known as “Active Shooter calls” flowing from the incident at Columbine High School in 1999 (Police Executive Research Forum, 2014). In this incident, two armed teenagers went on a shooting spree in the high school killing 13 people and wounding 20 others before turning their weapons on themselves and committing suicide. Officers responding to that call followed departmental protocols of that era. These protocols dictated they should wait for the arrival of their Emergency Response Team in events where armed suspect confrontations were taking place. The fact that these first responders waited despite ongoing killing taking place inside the high school led to a determination that police have a duty to take action in such cases, and waiting is not the correct response. As a result of these determinations, active shooter response protocols were adopted across North America and police agencies re-trained their personnel to respond to active shooters with more immediate action and strategies to enter and confront the shooters in order to protect lives of possible victims.

The <em>Threat vs. Action Analysis Dilemma</em> response protocols in the active shooter response situations now provide the standard or benchmark that a responding officer must consider when faced with the decision to enter a dangerous situation alone and take action, or to wait for back-up before entering to take action. For active shooter situations, the protocols across North America are now prescribed responses, where responding officers are trained to enter and confront with minimal back-up. That said, not every potentially dangerous <em>Threat vs. Action Analysis Dilemma</em> is going to be an active shooter. Responding officers will often be faced with other calls where danger exists to the safety of persons and the decision to enter or wait for back-up must still be made. In these cases, the responding officer must weigh the available information and respond or wait for back-up per their own threat vs risk assessment of the facts. The active shooter protocols have provided something of a calibration to this analysis where extreme ongoing threat to life and safety of person equals high duty and high expectation to take action.
<h1>Topic 7: Rules of Engagement for an Active Event or an Inactive Event</h1>
Police officers may be called to action by many different means. It may be a radio dispatch 911 call to attend an emergency, a citizen flagging down the passing police car to report an incident, or an officer coming upon a crime in progress. Whatever the means of being called to action, this is the first step of the police officer becoming engaged in a thinking process to gather and evaluate information, make decisions, and take action. The first step of this thinking process for the investigator is to make the evaluation and ask the questions:
<ol>
 	<li>Is this an<strong> Active Event </strong>requiring a<strong> Tactical Investigative Response? </strong></li>
 	<li>Is this an <strong>Inactive Event </strong>requiring a<strong> Strategic Investigative Response?</strong></li>
</ol>
As a subsequent part of this evaluation determining an Active Event or Inactive Event, the investigator should also be alert to the type crime being encountered. For example, is it an assault, a robbery, or a theft? From the perspective of police tactical investigative response, an investigator confronted with an active event must first assess the threat level. Is there a danger to the life or safety of persons that would require a <strong>Level One Priority Result</strong>, taking immediate action to protect life and safety of persons, including the life and safety of attending police officers?

In assessing these threat levels to life and safety, police are often faced with very limited information. Sometimes there is only a possible threat, or an implied threat to the life or safety of persons. In such cases, it is only necessary for the police to suspect that there is a threat to the life or safety of a person to evoke the extended powers provided by exigent circumstances. In these cases of implied threats, police are authorized to rely on the powers afforded by exigent circumstances to enter private property without a warrant and to detain and search suspects who may present a danger. These are significant powers and an investigator must be aware that if they use these powers, there is a strong possibility they will later be called upon to justify the exercise of those powers. Let us consider that section of the <em>Criminal Code</em> that authorizes officers to enter a dwelling without a warrant, and then apply that understanding to some scenarios:
<blockquote><strong>Authority to enter dwelling without warrant under the <em>Criminal Code of Canada</em></strong>

529.3 (1) Without limiting or restricting any power a peace officer may have to enter a dwelling-house under this or any other Act or law, the peace officer may enter the dwelling-house for the purpose of arresting or apprehending a person, without a warrant referred to in section 529 or 529.1 authorizing the entry, if the peace officer has reasonable grounds to believe that the person is present in the dwelling-house, and the conditions for obtaining a warrant under section 529.1 exist but by reason of exigent circumstances it would be impracticable to obtain a warrant. <span>(Criminal Code, 1985, s 529(1))</span>

Exigent circumstances
(2) For the purposes of subsection (1), exigent circumstances include circumstances in which the peace officer

(a) has reasonable grounds to<strong> suspect</strong> that entry into the dwelling-house is necessary to prevent imminent bodily harm or death to any person; or

(b) has reasonable grounds to <strong>believe</strong> that evidence relating to the commission of an indictable offence is present in the dwelling-house and that entry into the dwelling-house is necessary to prevent the imminent loss or imminent destruction of the evidence. (Criminal Code, 1985, s 529(2)(a,b))

<strong>Where warrant is not necessary pursuant to the <em>Criminal Code of Canada</em></strong>

487.11 A peace officer, or a public officer who has been appointed or designated to administer or enforce any federal or provincial law and whose duties include the enforcement of this or any other Act of Parliament, may, in the course of his or her duties, exercise any of the powers described in subsection 487(1)<span>(Criminal Code, 1985, s 487(1))</span> or
492.1(1) without a warrant if the conditions for obtaining a warrant exist but by reason of exigent circumstances it would be impracticable to obtain a warrant. <span>(Criminal Code, 1985, s 492(1))</span></blockquote>
<div class="textbox textbox--examples"><header class="textbox__header">
<p class="textbox__title">Scenario #1</p>

</header>
<div class="textbox__content">

A uniform patrol officer receives a call to attend a complaint through radio dispatch. The 911 caller is reporting that he has just witnessed his neighbour punch his wife in the front yard and then drag her forcibly into their house. The responding officer is immediately able to classify this event as an <em>active event</em>. The officer’s <em>offence recognition</em> of the criminal act is that it is likely an assault and possibly a forcible confinement. Given this assessment, the situation requires a <em>Tactical Investigative Response</em>. The suspect is still at the scene and there is an ongoing possibility of danger to the life or safety of the suspect's wife. In this type of case, the officer can draw upon the extended powers under exigent circumstances to ensure the safety of the wife. Considering the information that has been reported, the officer may go to the residence with a view to using the necessary force to enter without a warrant to investigate the safety and well-being of the identified victim. If, after entering the home, further investigation provides evidence to confirm an assault, the officer can arrest the identified suspect for that offence. In this scenario, the information that allows the classification of the <em>active event</em> and the offence recognition is fairly clear in the reported circumstances.

</div>
</div>
<div class="textbox textbox--examples"><header class="textbox__header">
<p class="textbox__title">Scenario #2</p>

</header>
<div class="textbox__content">

Sometimes an event cannot be immediately classified as either an active event or an inactive event. In these cases, where the information is less clear, the investigator may be justified to assume an ongoing danger to the life or safety of persons, and remain in the tactical investigative response mode utilizing the powers afforded under exigent circumstances to pursue the investigation until it is determined that an implied danger no longer exists. For example, consider the situation where police dispatch receives a 911 call from a woman crying. Before any further information can be obtained from the caller, the call is terminated from the caller's end. A patrol unit is dispatched to attend the residential address associated with the identified phone number. Upon arrival at the front door of the caller's address, attending officers are met by a male resident of the home who identifies himself as the home owner. The attending officers advise the male that a terminated 911 call from a crying woman was received from this address. The male states that there is nothing wrong in his home and he refuses to allow officers to enter the premises. The officers advise the male that they need to enter the premises to satisfy themselves that there is no ongoing threat to the life or safety of the crying woman caller. The officers warn the man that they will be entering the premises and if he resists he will be arrested for obstructing a police officer.<strong> </strong>

The man steps aside and the officers enter the home and find a woman in the bedroom area with a bleeding nose and a bruised face. The woman tells officers that the male, her husband, punched her in the face during an argument and when she attempted to call police he ripped the phone cord from the wall and struck her again. She states that he threatened to kill her if she cried out when the police came to the door. The man is arrested for assault, forcible confinement, and uttering threats. He is provided with his Charter Rights and warning, and he is then asked if he wishes to make any statement.

To evaluate this scenario, the officers had very little information in the first instance that would allow them to make a determination of active event or inactive event. The information to identify a criminal act was equally limited. Fortunately, case law has evolved to recognize this kind of information-limited case, and it provides a framework for making a response that can protect life and safety. In such situations, an officer is still empowered to act under the authority of “exigent circumstances.” Considering information-limited circumstances like this, the officer only needs to have a suspicion that there is a threat to the life or safety of a person to act. That threat may be simply implied by the circumstances being presented. In this case, the implied threat to life or safety of a person was the disconnected 911 call. The officers had a duty to attend and resolve the possible threat to life or safety of a person implied in this disconnected 911 call (<em>R v Godoy</em>, 1999).

</div>
</div>
As you might imagine, an officer attending the calls outlined in the preceding scenarios needs to be very clear on the circumstances where implicit distress and exigent circumstances can be interpreted to use the powers to enter private property. This same need extends to using appropriate levels of force and making an arrest. Considering these are active and still evolving criminal events, there is urgency to act. It is critical for the investigating officer to have a clear understanding of these principles to quickly assess the presented facts, make the event classification, and take the necessary action in an expedient manner.

As outlined earlier in this book, there is a significant difference between reasonable grounds to believe and reasonable grounds to suspect, and an officer who is not clear on the distinction might have a difficult time articulating to the court how and why they took the initiative to act or not to act. It is these types of cases, where there is implied distress, or an implied threat to life or safety, that an investigator must be clear on their interpretation of the event and on their authorities to take action. The thinking involved might be described as an active event and an explicit or implied threat to life or safety equals exigent circumstances.

<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-03-1024x268.png" alt="Active Event + Explicit or Implied Threat to Life or Safety = Exigent Circumstances" class="aligncenter size-large wp-image-81" width="1024" height="268" />
<h2>More on Offence Recognition</h2>
At the same time the event is being classified as either active event or inactive event, the investigator should be engaging in the thinking process of offence recognition. In other words, what offence is being reported or what is the offence being observed in the fact pattern that is unfolding? With this offence recognition, the investigator will begin to assemble a mental inventory of the evidence and information that will be required to support the recognized offence(s). Having an offence in mind, the investigator will also begin to consider their range of powers and authorities that can be used under the law regarding that offence. The investigator will ask them self;
<ul>
 	<li>Is this a summary conviction offence where the suspect must be found committing to justify an arrest?</li>
 	<li>Or, is it an indictable or dual procedure offence where there is direct evidence or strong circumstantial evidence to support an arrest?</li>
</ul>
If the investigator determines that they are attending to an Active Event and their offence recognition suggests that there may be a danger to the life or safety of a person, such as assault causing bodily harm, they will know that they need only find evidence to form reasonable grounds to believe in order to make an arrest. As part of attendance to the scene of the event, the investigator should be classifying the location to determine what their legal requirements are for their authority to enter. Consideration of the possible authorities to enter private property would include:
<ul>
 	<li>Consent of the property owner</li>
 	<li>Section 487 CCC warrant to search</li>
 	<li>Exigent circumstances to suspect a need to protect the life or safety of a person</li>
 	<li>Exigent circumstance with reasonable grounds to believe there will be a destruction of evidence of an indictable offence</li>
 	<li>Fresh pursuit of a suspect found committing an offence</li>
</ul>
If the investigator arrives at the scene where a suspect is immediately apparent, the investigator can make an immediate detention or perhaps even an arrest. The investigator may rely on the Section 529 (2) of the <em>Criminal Code of Canada </em><span>(1985) </span>under exigent circumstance to enter private property without a warrant to make the arrest and ensure the safety of persons at the scene. If the investigator makes an arrest after forming reasonable grounds for belief, they are required by the <em>Canadian Charter of Rights and Freedoms</em> to tell the suspect what offence they are being arrested for.
<h2>Required Warnings</h2>
The following is the standard <em>Charter of Rights</em> (Canadian Charter, 1982, s 10(a,b)) warning and police warning. These standard caution warnings are given as follows:
<blockquote>I am arresting you (or detaining you) for [name of offence(s)].

<strong>POLICE WARNING</strong>
I wish to give you the following warning: You need not say anything. You have nothing to hope from any promise or favour, and nothing to fear from any threat whether or not you do say anything. Anything you do or say may be used as evidence.

Do you understand? (Transit Police, 2015)

<strong>CHARTER WARNING</strong>

You have the right to retain and instruct counsel without delay. You also have the right to free and immediate legal advice from duty counsel by making free telephone calls to [toll-free phone number(s)] during business hours and [toll-free phone number(s)] during non-business hours.

Do you understand?

Do you wish to call a lawyer?

You also have the right to apply for legal assistance through the provincial legal aid program.

Do you understand? (Transit Police, 2015)</blockquote>
Let us consider the following scenario to illustrate these principles in action.
<div class="textbox textbox--examples"><header class="textbox__header">
<p class="textbox__title">Scenario #3</p>

</header>
<div class="textbox__content">

An officer is dispatched to attend the complaint of an assault with a weapon and determines that it is taking place in a residential dwelling house in a nearby subdivision. Upon arrival, the officer is met on the front lawn by a man claiming to have witnessed the owner of the home stab a visitor to the home during an altercation as a second male runs out the front door holding his side and bleeding from an apparent wound. A third man holding a bloody knife comes to stand in the front doorway and the witness identifies him as the owner of the home. The officer directs the man with the knife to drop it on the ground and step out of the residence. The man complies and is arrested for assault with a weapon.

</div>
</div>
From this fact pattern the investigator could make an immediate arrest for assault with a weapon. The investigator would seize the bloody knife and protect it as evidence of that offence. The facts within this scenario that allow the investigator to take action, enter the private property, and form their reasonable grounds for belief and make the arrest. When the case goes to court, the investigator of this case will articulate the chain of events along with their thinking to substantiate their reasonable grounds for belief. To achieve this, the investigator’s testimony would be that:
<ul>
 	<li>they were dispatched to attend a complaint of assault with a weapon in progress,</li>
 	<li>the suspect was still on scene and it was an active event,</li>
 	<li>considering the potential danger to life or safety of a person, they entered the property under the provisions of exigent circumstances,</li>
 	<li>an independent witness at the scene stated the home owner had stabbed a guest in the home,</li>
 	<li>a man bleeding from an apparent wound ran from the home, and</li>
 	<li>another man standing in the doorway was holding a bloody knife and was identified by the witness as the home owner.</li>
</ul>
The investigating officer arriving at the scene of this event would treat this as a Level One priority because there is an ongoing danger to the life and safety of persons. Under these circumstances, the <em>Criminal Code</em> authorities of exigent circumstances would apply. The investigator would be justified in detaining all parties present, including the witness and the victim, on the reasonable suspicion that they may all have been involved in combative behaviour and might each still pose a threat to the life and safety of others, including the investigator. The powers of exigent circumstances are significant in this kind of scenario, and provide authority to take immediate action that will neutralize threats to the safety of people. Even if the facts of this assault with a weapon had evolved to show that it was taking place inside the private home of the suspect with the bloody knife, the authority of exigent circumstances would permit the investigator to enter that home without a warrant to protect the life and safety of persons. A very significant point to be made here is that as soon as the event is under control the <em>extended powers of exigent circumstances expire.</em>

Once this event has been brought under control and the threat to the life or safety of persons had been eliminated by arresting or detaining all persons present, the investigator must reclassify this event as an inactive event. As soon as this occurs, some of the rules of engagement and legal authorities to take action change, and the investigation must switch to a Strategic Investigative Response.

With the expiry of exigent circumstances and the switch to a Strategic Investigative Response, several factors change. If this assault with a weapon had been taking place in the suspect’s private home, and the investigator had entered under the authority of exigent circumstance, the authority to remain in the private residence and search it would expire. If the investigator needed to collect additional physical evidence in that home, such as blood from the stabbing assault, a warrant or consent to search would now be required.

In this type of case, the residence of the suspect could be locked down externally and all persons removed until a search warrant was obtained to complete the investigation. Evidence obtained up to the point where the arrest was made and before exigent circumstances expired would be lawfully seized without a warrant. This would include the seizure of the bloody knife as plain-view search or a search incidental to arrest. Anything else searched for and seized after the arrest could be challenged as an unlawful seizure if it was taken without a search warrant.

In addition to the requirement for search warrants, in some cases after exigent circumstances expire, other priorities and investigative must also change. As you will recall, the protection of life and safety of people is the Level One priority. With that priority, the court allows significant leeway to investigators in regards to the protection of crime scenes and the collection of evidence. If an investigator is attending any criminal event, the protection and collection of evidence always takes a backseat to the protection of life or safety of people. That said, once the life and safety issues have been resolved, the securing of the crime scene and the subsequent protection and collection of evidence becomes the number one priority.

Once the life and safety issues are resolved, it is time to lock down the crime scene and start protecting evidence for court. If it is possible to protect the life and safety of people and collect, protect, and preserve evidence, this is the preferred outcome. If it is not possible, the court will accept the fact that damage to evidence occurred prior to life and safety issues being resolved. Once those issues are resolved, the expectation is that a high level of care will be taken. If proper care is not taken, and evidence becomes contaminated, or continuity of possession is lost, the evidence may be ruled inadmissible at a trial. It is important for the investigator to fully grasp the construct that dictates when to transition from Tactical Investigative Response to Strategic Investigative Response.
<h1>Topic 8: Response Transition Matrix (RTM)</h1>
The <strong>RTM</strong> is a matrix tool to illustrate the considerations for police response when considering the authorities and issues to escalate or de-escalate from a Tactical Investigative Response to Strategic Investigative Response. Considering the following questions will help an investigator to identify an event as either a Tactical Investigative Response or a Strategic Investigative Response:
<ol>
 	<li>Is the event active or inactive?</li>
 	<li>What offence(s) is possibly occurring?</li>
 	<li>Do I suspect an implicit or explicit danger to the life or safety of a person?</li>
 	<li>Do I have reasonable grounds to believe evidence of an indictable offence will be lost or destroyed?</li>
 	<li>What immediate actions can be taken to protect the life or safety of persons?</li>
 	<li>What immediate action can be taken to protect evidence, without compromising life or safety?</li>
 	<li>Have life and safety issues been resolved, and should the change be made from Tactical Investigative Response to Strategic Investigative Response?</li>
</ol>
The <em>Canadian Charter of Rights and Freedoms</em>, the <em>Criminal Code</em>, and common law authorities provide police with both powers to act and limitations to taking action. In the Canadian justice system, both statutory law and case law have evolved to establish a range of authorities and police powers that allow rapid response at the more dangerous end of the matrix, and more time-consuming restrictions to act at the less threatening end of the matrix. The chart below illustrates the duty to act, the authority to act, and the priorities for action to consider.<a id="rtm"></a>

[caption id="attachment_82" align="aligncenter" width="1024"]<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-04-1024x1004.png" alt="Response transition matrix. Long description available." class="wp-image-82 size-large" width="1024" height="1004" /> <a href="#rtmd">[Long Description]</a>[/caption]
<h1>Summary</h1>
In this chapter, we have discussed the progression of the investigative process and the key elements within the progression that must be considered by an investigator. These elements within the investigative process are the signposts on the roadway of a mental map. These signposts of active event or inactive event tell us to either take action within the extended authorities of exigent circumstances or to modify our response for an inactive event and recognize the need to make the transition to a strategic response. An investigator’s understanding of the changes in circumstances that define these situations and the change from active to inactive events can make the difference between successful and unsuccessful investigative outcomes.
<div class="textbox textbox--exercises"><header class="textbox__header">
<p class="textbox__title">Study Questions</p>

</header>
<div class="textbox__content">
<ol>
 	<li>What is the difference between investigative tasks and investigative thinking?</li>
 	<li>What is the difference between Level One Priorities and Level Two Priorities?</li>
 	<li>What is the difference between a Tactical Investigative Response and a Strategic Investigative Response?</li>
 	<li>What is the difference between an active event and an inactive event?</li>
 	<li>When would an investigator consider the Threat vs. Action Analysis Dilemma?</li>
 	<li>When does an investigator have the authority to enter a dwelling house without a warrant?</li>
 	<li>Why is it important for an investigator to thinking about “offence recognition” at the same time they are thinking about whether a situation should be classified as an active event or an inactive event?</li>
 	<li>What is the Response Transition Matrix (RTM)?</li>
</ol>
</div>
</div>
<h1>Long Descriptions</h1>
<strong id="irpr">Investigative response priority results long description:</strong> There are two levels of investigative response priority results. Level 1 includes "Protecting the life and safety of people including police officers attending the scenes of crime."

Level 2 has four priority results:
<ol>
 	<li>Identifying, gathering, and preserving evidence</li>
 	<li>Establishing reasonable grounds to identify and arrest suspects</li>
 	<li>Accurately recording and documenting the event in notes and reports</li>
 	<li>Protecting property</li>
</ol>
<a href="#attachment_80">[Return to Investigative response priority results]</a>

<strong id="rtmd">The RTM: Response Transition Matrix long description:</strong> In the case of an active event with recognized offence, suspected issues of life safety or reasonable and probable grounds of evidence destruction, police need to take tactical investigative response action considering level-one priority results. Immediate action is required in such exigent circumstances, and as such, an officer has reasonable and probable grounds to detain and search without a warrant.

In the case of an inactive event with recognized offence but no life or safety issues or issues of evidence destruction, police need to take strategic investigative response action considering level-two priority results. This action should be specific to an identified offence. In such non-exigent circumstances, an officer has reasonable and probably grounds to perform an arrest and search only with a warrant. <a href="#rtm">[Return to The RTM: Response Transition Matrix]</a>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>79</wp:post_id>
		<wp:post_date><![CDATA[2017-05-08 15:16:21]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-05-08 19:16:21]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-4-the-process-of-investigation]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>3</wp:post_parent>
		<wp:menu_order>4</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[727]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_export]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 4: The Process of Investigation]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_candela_citation]]></wp:meta_key>
		<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 5: Strategic Investigative Response</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-5-strategic-investigative-response/</link>
		<pubDate>Mon, 08 May 2017 19:25:37 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=chapter&#038;p=84</guid>
		<description></description>
		<content:encoded><![CDATA[<div class="textbox">

<em>“The STAIR model is a tool a new investigator can use to start structuring and developing their own investigative thinking processes.”</em>

</div>
In this chapter, we will examine the operational processes of investigation. To this point, we have examined many definitions, concepts, and response protocols to set the stage for embarking on the strategic investigative response. If it can be said that there is a creative art anywhere in the processes of investigation, the strategic investigative response is where that creative art takes place. In this chapter, you will learn how each of the following concepts and processes relates to the strategic investigative response:
<ol>
 	<li>Avoiding the three big investigative errors</li>
 	<li>Recognizing the transition and implementing the strategic investigative response</li>
 	<li>Describing investigation as a process within the justice system</li>
 	<li>Utilizing the <strong>STAIR</strong> tool to work through the investigative process</li>
</ol>
<h1>Topic 1: Avoiding the Three Big Investigative Errors</h1>
In very fundamental terms, the three most common errors of the Strategic Investigative Response are:
<ol>
 	<li>Failing to identify and collect all the available evidence and information,</li>
 	<li>Failing to effectively analyze the evidence and information collected to identify suspects and form reasonable grounds to take action, and</li>
 	<li>Becoming too quickly focused on one suspect or one theory of events and ignoring evidence of other viable suspect or theories that should be considered.</li>
</ol>
From the moment a police investigator is dispatched to attend an incident, the opportunity to gather and evaluate information and evidence occurs. It is not uncommon for new investigators to operate under the misconception that all the available evidence and information is going to be readily available and apparent to them at the scene. This is the misconception behind Error #1: failing to identify and collect all the available information and evidence. New investigators often don’t understand that some information and evidence can be elusive and will exist in secondary source locations that must be sought out. There is no room for complacency in the processes of collecting information and evidence. The investigator must be engaged at an elevated level of awareness to access secondary source locations. Information and evidence about the event needs to be actively looked for, recorded, and preserved in a manner that can analyzed, interpreted, and eventually presented in court.

In the first instance of collecting information and evidence, an investigator may become engaged in the process through several different means. It may be receiving information as circumstances provided by the dispatcher in the details of a 911 call, it may be a report from a citizen on the street, or it may even be an on-view situation where the investigator discovers a crime in progress. From the moment the process begins, information will be incoming and available in the form of things that are seen and heard personally by the investigator, and this includes witnesses statements received. In most investigative responses, these are the first level facts that the investigator receives to guide the immediate event classification and offence recognition. But, this information of initial complaint and first observations are not all the information that might be available. There is usually much more information and evidence to be found. This is where the extended task of information gathering begins. Consideration of pre-crime and post-crime activities of the suspect can produce evidence not available at the crime scene. Database searches for records of the suspect, victim, and witnesses, can have great value. This is where the investigator must proactively search. There are many possible sources of additional information and evidence to consider, such as:
<ul>
 	<li>CPIC (Canadian Police Information Center) for criminal records info, outstanding warrants and pointers to criminal association</li>
 	<li>Police RMS (Record Management Systems) PRIME AND PROS databases to provide information on past records of complaints, investigations of criminal activities, and historical criminal associations</li>
 	<li>ViCLAS (Violent Crime Linkage Analysis System) provides a database of searchable criminal conduct acquired from the past crimes of known offenders</li>
 	<li>MVB (Motor Vehicle Branch) records for current vehicles registered, driving record, physical descriptors, and resident address</li>
</ul>
These information data sources can all add to the personal observations made by the investigator regarding the scene of the crime. These along with the appearance and demeanour of suspects, victims, and witness; and information provided by those suspects, victims, and witnesses about the event can speak volumes. Now, add to this the physical exhibits of evidence specific to the criminal event as each of these might have meaning in their immediate form or may provide future meaning through forensic analysis.

Having gathered all of the available information from each of the possible sources and locations we have avoided making Error #1.

To avoid making Error #2, we must now analyse the information we have collected. It is not just information about the event and the fact-pattern that are important, it is also information about the people involved in the event and how they are connected within the fact pattern. Criminal records and police records of each person associated to the incident can provide valuable perspectives, such as people’s reputation, credibility, association to past criminal conduct, or even event-related connections between the players.

Evidence and information gathered about the event only exists at face value until the investigator undertakes the proactive process of evaluation and analysis to determine the information’s relevance to the investigation at hand. It may seem that the implications and meanings of the available information and evidence should be clear and, sometimes in simple investigations, it is clear. Sometimes, what you see is what you get. If there are eyewitnesses describing a clear fact pattern and an identified suspect, the investigation will be a straight forward matter of collecting the evidence for presentation to the court.

That said, it is not often that simple in criminal investigations. Frequently, a suspect has not yet been identified and the fact pattern of the crime is unclear. Without a proactive process of evidence analysis, it is not possible to reconstruct the event and recognize the implications and connections within the multiple layers of evidence and information. The indicators of motive, opportunity, and means may not be immediately apparent. If an investigator goes to a criminal event and all they do is record the facts at face value and collect the evidence that is visible on-site, the job is only half complete. They are merely recording the crime.

The outcomes of analyzing information and physical evidence can be truly significant. A focused effort to analyze physical evidence and information can often yield results that contribute to establishing a fact pattern, identifying a suspect, and forming reasonable grounds for arrest and charges. Let us consider again the example of the <em>British Bow Street Runners </em><span class="s1">(Hitchcock, 2015) </span>who located a piece of wadding paper from the fatal bullet wound in the head of their victim. At that time, wadding paper was typically used when loading any firearm as a plug to compact the powder and direct the explosive force that discharged the bullet. Investigators could have easily recorded this exhibit and dismissed it as just another piece of wadding paper. Instead, they considered the implications. Their analysis of the information and evidence was done by comparing the torn edges of that wadding paper and making a physical match to the originating piece of wadding paper that was found in the pocket of their suspect. This critical piece of circumstantial evidence made the connection between the suspect and the crime, and it led to a conviction in court.

Error # 3 is commonly known as "tunnel vision." Over the years, commissions of inquiry into wrongful convictions have often determined that investigators in those cases had allowed themselves to fall prey to tunnel vision (MacCallum, 2008; Kaufman, 1998), This tendency to focus on a single suspect or a single theory of events can be pervasive, and even when other viable suspects are present and the physical evidence does not support their theory, investigators have been seen to continue with a single minded focus. Tunnel vision has happened frequently enough that investigators are now cautioned to be self-aware that anyone can fall prey to this error. As part of proper major case management, investigative team members are encouraged to challenge each other when they believe that evidence is being misinterpreted and a single suspect or theory is being exclusively pursued to the point where other viable suspects and theories are excluded or ignored.
<h1>Topic 2: Recognizing the Transition and Implementing the Strategic Investigative Response</h1>
As much as the tactical investigative response is driven by urgent circumstances that require immediate and decisive action to reach successful outcomes, strategic investigative response is driven by the complexity of circumstances. The investigator will need to take a slower and more deliberate approach. This means observing the rules of law that are more demanding of due process and the rules of evidence that are more demanding of adherence to protocols for crime scene management, evidence preservation, and evidence collection.

The situational elements that define a strategic investigative response are essentially the opposite of those for tactical investigative response. Specifically, the scene is now an inactive event because the suspect has left the scene or has been arrested, and there is no ongoing explicit or implied danger to the life or safety of persons including police. In the strategic investigative response, the Level Two priorities of protection of property, gathering and preserving of evidence, accurately documenting the event, and establishing reasonable grounds to identify and arrest suspects now become the paramount concerns. Switching from a tactical investigative response to a strategic investigative response is a transition point where mistakes can occur. These mistakes happen because the need to shift is not recognized and the transition to Level Two priorities is not engaged. The switch from an active event and tactical response to an inactive event and strategic response means locking down the crime scene to protect evidence and obtaining a warrant to continue the search for evidence.

This failure to transition may happen because the officers attending the scene of an active event are intensely focused on the issues of protecting life and safety. Once those very critical issues of life and safety are resolved, the adrenaline is still flowing and shift to Level Two priorities can seem less significant than it really needs to be. Investigators need to be aware and recognize the requirement to transition to strategic investigative response and make it happen.
<h1>Topic 3: Describing the Investigation Process Within the System</h1>
Strategic investigative response process is slow-paced and deliberate. In this response there is a priority to collect and record the maximum amount of information and evidence for court. These tasks of strategic response include witness management, crime scene management, evidence collection, and documenting the event.

Once the determination has been made that the investigation is in strategic investigative response mode, the priorities for results change, and the investigator must start organizing their investigation of the crime being encountered. In cases where the circumstances are simple and the suspect is immediately apparent, this can be a straightforward matter of evidence collection and witness interviews. In other cases, where the facts of the case are not clear or the suspect is not immediately apparent, the tasks of investigation can be daunting, and it requires a more systematic approach. A thorough investigation is one with systems to:
<ul>
 	<li>Identify and collect all available evidence,</li>
 	<li>Identify all the witnesses, victims, and possible suspects,</li>
 	<li>Accurately document the criminal event,</li>
 	<li>Accurately document the investigative actions,</li>
 	<li>Develop theories of how the crime was committed and who may be a suspect, and</li>
 	<li>Formulate an investigative plan to form reasonable grounds and make an arrest.</li>
</ul>
It may be helpful to think about the Strategic Investigative Response like a big funnel where many sources of information and evidence pour data into the top of the funnel. That data passes through the investigative filters of analysis to determine the possibilities, developing theories to identify the best probabilities, and investigating to test those theories against known evidence and facts. It narrows itself down to inculpatory evidence that will support reasonable grounds for belief, or exculpatory evidence that will show innocence and eliminate suspects. Sufficient inculpatory evidence can tip the scale to give police reasonable grounds for belief to take action of arrest and finding proof of guilt beyond a reasonable doubt provides the court with the ability to make a finding of guilt. Exculpatory evidence tips the balance to support the presumption of innocence for the accused.

[caption id="attachment_85" align="aligncenter" width="829"]<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-05-829x1024.png" alt="The investigative process funnel. Long description available." class="wp-image-85 size-large" width="829" height="1024" /> <a href="#ipf">[Long Description]</a>[/caption]
<h1>Topic 4: Utilizing the STAIR Tool to Work Through the Investigative Process</h1>
At this point in our study of the investigative process, it is necessary to examine a structured process for strategic investigative response. To illustrate a system for strategic investigative response that can assist an investigator in thinking through the investigative process, we will use a model called the <strong>STAIR</strong> tool. Organized thinking and the ability to articulate a structured response cannot flow from a disorganized process. Through experience over time, most police investigators learn to structure their thinking, their investigative process, and their response priorities. Each investigator learns to build one's own mental road map.

The methods and mental mapping of the <strong>STAIR</strong> tool illustrated here are not an attempt to change the current reality of investigative thinking, it is merely the model of a process to illustrate the thinking used by many investigators. A new investigator can use this tool to start structuring and developing an investigative thinking processes.

Every day, operational police officers are tasked to respond to incidents in a never ending variety of scenarios. Arriving at the scene of an incident, the police investigator is usually at the disadvantage of not knowing many of the facts. The investigator is challenged to gather the available information and analyze what is relevant with a goal of responding quickly, effectively, and appropriately. An effective and appropriate response is a response where the investigator has made decisions according to a predetermined set of priorities. For the investigator, these priorities and the desired results should always be protecting the life and safety of persons, protecting property, gathering and preserving evidence, accurately documenting the event, and establishing reasonable grounds to identify and arrest offenders. With these results in mind, we can start by remembering that in every reported incident, a police investigator is met with a situation <strong>Situation</strong> that must be resolved. With this situation understood immediate <strong>Tasks </strong>must then be undertaken to protect life and safety, gather relevant information, preserve evidence, and identify offenders. Lastly, in every situation, the information discovered must be <strong>Analyzed</strong> to inform and guide the <strong>Investigation</strong> that must happen to reach the desired <strong>Results</strong>.

To become more self-aware, an investigator might imagine oneself working through this process and creating a mental map of the road to be travelled for each investigation. This mental map can later be articulated, describing one's thinking process and responses, observing the law as rules of the road, describing landmarks of evidence, navigating curves in the fact patterns, backing out of the dead ends of false leads, and validating the evidence discovered that led to a final destination. Ideally, that destination is the positive identification of a suspect and sufficient evidence to make an arrest and provide the court with proof beyond a reasonable doubt.

Later, when preparing notes, reports, court briefs, and testifying in court, the investigator will be able to recall their mental map and articulate their decision-making process to form the necessary reasonable grounds for belief to take action. If the crime remains unsolved and the investigation concludes as a cold case, the notes and reports describing the mental road map of the investigation remain on file for the next investigator who will be able to gain a clear picture of the investigation to date.
<h2>SITUATION: achieving a big picture view of the event to classify and prioritize a response</h2>
<ul>
 	<li>Break out the known facts of the event</li>
 	<li>Offence classification – active event or inactive event</li>
 	<li>Identify all the players – victims, witnesses, and suspects</li>
 	<li>Offence recognition – identify the possible offence or offences being encountered</li>
</ul>
<h2>TASKS: focus on the results and the priorities of those results based on event status</h2>
<ul>
 	<li>Tactical investigative response on active event – Level 1: resolve life and safety issues</li>
 	<li>Strategic investigative response on inactive event – Level 2: priorities engaged</li>
 	<li>Crime scene management – evidence identification, evidence preservation, and evidence collection</li>
 	<li>Canvassing for witnesses – witness interviewing</li>
</ul>
<ul>
 	<li>Profiling the players – use all police data base information – CPIC, PRIME, PROS</li>
 	<li>Document the event – notes, reports, photographs, diagrams, videos</li>
</ul>
<h2>ANALYSIS: examining the reported facts, the observed facts, and the physical evidence</h2>
<ul>
 	<li>Make observations and connections between people and circumstances</li>
 	<li>Enhance the meaning of physical evidence by forensic analysis</li>
 	<li>Determine evidence of motive, opportunity, and means to commit the offence</li>
 	<li>Create timelines of activities</li>
 	<li>Develop assumptions and theories that will guide the investigative process</li>
 	<li>Develop investigative plans based on theories</li>
 	<li>Authentication of the event - did it occur at the time, at the place, and in the manner being reported, or is the report a fabrication?</li>
</ul>
<h2>INVESTIGATION: validating the facts through corroboration of witness accounts and evidence</h2>
<ul>
 	<li>Prioritize the best investigative plans based on most likely theory</li>
 	<li>Test theories against information and evidence discovered through investigation to identify suspects and form reasonable grounds</li>
 	<li>Return to analysis to form new theories or modify theories as new facts are found</li>
</ul>
<h2>RESULTS: prioritizing and focusing on the results to guide the investigative process</h2>
<ul>
 	<li>Protection of the lives and safety of people</li>
 	<li>Protection of property</li>
 	<li>Gathering and preserving evidence</li>
 	<li>Accurately documenting the event</li>
 	<li>Establish reasonable grounds to identify and arrest suspects</li>
</ul>
[caption id="attachment_86" align="aligncenter" width="788"]<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-06-788x1024.png" alt="STAIR tool. Long description available." class="wp-image-86 size-large" width="788" height="1024" /> <a href="#stair">[Long Description]</a>[/caption]<em>Please note: The STAIR investigation tool as developed and depicted in this book is based on the author’s conceptual modification of the STAR technique which is commonly used as a tool for behavioural interviewing. </em>
<h1>Summary</h1>
In this chapter, we have focused on the strategic investigative process and described the <strong>STAIR</strong> tool as a means of illustrating and working through the investigative process. This is a process that can be likened to climbing a set of stairs, whereby getting to the top (<strong>Results</strong>) requires taking one step at a time from the bottom (the <strong>Situation</strong>). The second step (<strong>Tasks</strong>) then leads to a third step (<strong>Analysis</strong>) and the fourth step (<strong>Investigation</strong>). At this point, the investigator can expect to take a step back more than once to do further <strong>Analysis</strong>. In any case, the goal is always to get to the top of the stairs. Skipping any of these steps will likely lead an investigator to miss an important part of the process.

As with the preceding chapters, the intent here is simply to assist you in defining and visualizing the investigative process. This delineation should help you to conceptualize investigation as a structured process. This is a process consisting of practices of information and evidence collection, analysis, theory development, and investigative planning, pointing toward achieving consistent outcomes. In the chapters that follow, you will be challenged to apply this thinking in some scenario exercises.
<div class="textbox textbox--exercises"><header class="textbox__header">
<p class="textbox__title">Exercises</p>

</header>
<div class="textbox__content">
<ol>
 	<li>What are the three most common errors investigators make in applying the Strategic Investigative Response?</li>
 	<li>What five groups of tasks must an investigator follow through on to complete a thorough investigation?</li>
 	<li>What categories of tasks are involved in the <strong>Situation</strong> component of the STAIR tool?</li>
 	<li>What categories of tasks are involved in the <strong>Tasks</strong> component of the STAIR tool?</li>
 	<li>What categories of tasks are involved in the <strong>Analysis</strong> component of the STAIR tool?</li>
 	<li>What categories of tasks are involved in the <strong>Investigation</strong> component of the STAIR tool?</li>
 	<li>What categories of tasks are involved in the <strong>Results</strong> component of the STAIR tool?</li>
</ol>
</div>
</div>
<h1>Long Descriptions</h1>
<strong id="ipf">The investigative process funnel long description:</strong> The Strategic Investigative Response can be imagined as a funnel into which many sources of information and evidence are poured, such as physical evidence and forensic analysis; information gathered from witnesses and victims; information gathered from police databases; investigators' personal observations; and information gathered from suspect interrogation. That information is then filtered using analysis to determine possible chains of events, which are further scrutinized while determining the probabilities of these possibilities during the development of theories and investigative plans.

Once there is a theory, the investigation proceeds to discovery of provable facts, of which there are two kinds: exculpatory, which is evidence of innocence, and inculpatory, which is evidence of guilt. Both kinds of evidence must be weighed on the scale of proof. In our justice system, there is presumption of innocence until proven guilty beyond a reasonable doubt, but enough exculpatory evidence will tip the scale of proof firmly toward innocence. Enough inculpatory evidence can give the police reasonable grounds for belief to investigate and the courts proof of guilt beyond a reasonable doubt. <a href="#attachment_85">[Return to The investigative process funnel]</a>

<strong id="stair">The STAIR tool long description:</strong> STAIR stands for:
<ul>
 	<li><strong>Situation:</strong> Achieving a big picture view of the event to classify and prioritize a response. Focus on the results and priorities. This entails:
<ul>
 	<li>Breaking out the known facts of the event</li>
 	<li>Offence classification — Active event or Inactive event</li>
 	<li>Identifying all the players — Victims, witnesses, suspects</li>
 	<li>Offence recognition — Identifying the possible offence or offences being encountered</li>
</ul>
</li>
 	<li><strong>Tasks:</strong> Gathering, protecting and preserving evidence and information. This entails:
<ul>
 	<li>Tactical investigative response on active event — Level 1 Resolve life and safety issues</li>
 	<li>Strategic investigative response on inactive event — Level 2 priorities engaged</li>
 	<li>Crime scene management — Evidence identification, evidence preservation, evidence collection</li>
 	<li>Profiling the players — Use all police database information — CPIC, PRIME, PROS</li>
 	<li>Document the event — Notes, reports, photographs, diagrams, videos</li>
</ul>
</li>
 	<li><strong>Analysis:</strong> Examining the reported facts, the observed facts, and the physical evidence to develop theories. This entails:
<ul>
 	<li>Making observations and connections between people and circumstances</li>
 	<li>Enhancing the meaning of physical evidence by forensic analysis</li>
 	<li>Determining evidence of motive, opportunity and means to commit the offence</li>
 	<li>Creating timelines of activities</li>
 	<li>Developing assumptions and theories that will guide the investigative process</li>
 	<li>Developing investigative plans based on theories</li>
 	<li>Authentication of the event — Did it occur at the time, at the place, and in the manner being reported or is the report a fabrication</li>
</ul>
</li>
 	<li><strong>Investigation:</strong> Validating the facts through corroboration of witness accounts and forensic analysis. This entails:
<ul>
 	<li>Prioritizing the best investigative plans based on the most likely theory</li>
 	<li>Testing theories against information and evidence discovered through investigation to identify suspects and form reasonable grounds</li>
 	<li>Returning to analysis to form new theories, or modify theories as new facts are found</li>
</ul>
</li>
 	<li><strong>Results:</strong> Prioritizing and focusing on the results to guide the investigative process. In order of priority, these results are:
<ul>
 	<li>Protection of the lives and safety of people</li>
 	<li>Protection of property</li>
 	<li>Gathering and preserving evidence</li>
 	<li>Accurately documenting the event</li>
 	<li>Establishing reasonable grounds to identify and arrest suspects</li>
</ul>
</li>
</ul>
<a href="#attachment_86">[Return to The STAIR Tool]</a>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>84</wp:post_id>
		<wp:post_date><![CDATA[2017-05-08 15:25:37]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-05-08 19:25:37]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-5-strategic-investigative-response]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>3</wp:post_parent>
		<wp:menu_order>5</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[727]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_export]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 5: Strategic Investigative Response]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_candela_citation]]></wp:meta_key>
		<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 6: Applying the Investigative Tools</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-6-applying-the-investigative-tools/</link>
		<pubDate>Mon, 08 May 2017 19:56:06 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=chapter&#038;p=88</guid>
		<description></description>
		<content:encoded><![CDATA[<div class="textbox"><em>“As you proceed through the STAIR tool, the process of <strong>Analysis</strong> and <strong>Investigation</strong> can become somewhat circular — as the investigation reveals new information, and new information is analyzed to confirm, disprove, or modify the theories of suspects and events that are being considered.”</em></div>
In this chapter we will work through some investigative <strong>STAIR</strong> scenarios to demonstrate the required investigative awareness required to transition from the tactical investigative response to the strategic investigative response. Once in the strategic response mode we will practice applying theory development to conduct our analysis of the evidence and information found and we will create investigative plans.

This chapter presents two investigative scenarios each designed to illustrate steps of the <strong>STAIR</strong> tool allowing the student to recognize both the tactical and the strategic investigative responses and the implications of transitioning from the tactical to the strategic response.

In the strategic investigative response of the second scenario, the student is challenged to work through an exercise of identifying the available information and evidence and developing theories in order to guide their investigative plans.
<h1>Topic 1: Beginning With Your End in Mind and Focusing on <strong>Results</strong></h1>
Any investigation an investigator embarks upon must focus on the desired <strong>Results </strong>to guide the thinking and investigative action. If we know where we are going and what our results need to be, we will know how to prioritize our actions to reach those results. Setting and monitoring priorities is a critical piece of the mental mapping process. A police investigator needs to know that whatever course of action taken to achieve a result, it will be incumbent upon the investigator later to provide a reasonable and justifiable explanation of how and why that chosen course of action was taken. Understanding and keeping these <strong>Results</strong> in mind while entering a <strong>Situation</strong> allows better clarity to define the priorities and develop the immediate investigation and action plan.

As mentioned above, in defining and assigning priorities to the <strong>Results</strong>, the top priority is very clear: protecting the life and safety of persons. Achieving the other priorities will sometimes be sacrificed to make certain this primary priority is achieved. Protecting property, gathering and preserving evidence, accurately documenting the event, and establishing reasonable grounds to identify and arrest offenders are all important, but are considered secondary results. These individual <strong>Results</strong> may also sometimes be sacrificed, one in favour of the other, depending on the way events unfold. The setting and defining of priorities for <strong>Results</strong> will be further illustrated and practiced in several scenarios presented below. For now, with our <strong>Results</strong> concept in mind, let us apply the <strong>STAIR</strong> tool in the following scenario.
<div class="textbox textbox--examples"><header class="textbox__header">
<p class="textbox__title">Scenario #1</p>

</header>
<div class="textbox__content">

You are working as a uniform patrol officer in a one-person marked police cruiser. It is 9 PM on Saturday evening, and you receive a radio call from dispatch assigning you to attend a domestic dispute complaint in a residential neighbourhood. Dispatch advises you that the call has been received from a neighbour to the home where the domestic dispute is taking place.

The caller, Bill Murphy, reports to dispatch that he heard a woman screaming and, when he went outside, he saw his neighbour, Randy Smith and Randy’s wife, Jane, standing on their front lawn yelling at each other. He then saw Randy strike Jane in the face with his fist, and drag her by the hair back into the house. He can still hear them yelling, and he heard some crashing noises coming from their house. He does not know if there is alcohol involved, although he does know that Randy often drinks heavily. No weapons were seen, and the neighbour does not know if Smith owns any firearms. The Smiths have two young sons, eight years and four years of age. The neighbour did not see the two boys.

</div>
</div>
<h2>Situation</h2>
In this <strong>Situation</strong> phase of our <strong>STAIR</strong> tool, you have been provided with a limited amount of information. You start by breaking down the information into components:
<ul>
 	<li>A witness, Bill Murphy, has identified his neighbour as having assaulted a woman, identified as the suspect’s wife, Jane</li>
 	<li>Suspect identified is Randy Smith</li>
 	<li>Victim identified as Jane Smith</li>
 	<li>Randy Smith may be a heavy drinker, and alcohol may be a factor</li>
 	<li>This is an active event and it may still be in progress as noise from the house continues</li>
 	<li>The offence recognition would define this as an assault and possibly forcible confinement</li>
 	<li>Persons who may have their safety in danger are Jane Smith and her two young sons</li>
 	<li>The incident is reported as being currently confined to inside the house; however, the incident was, at one point, on the front lawn of their home</li>
</ul>
Keep in mind that to investigate this incident and to act in the execution of your duties, each piece of the foregoing information may be considered and acted upon as the truth, until it has been verified. Each piece of information here can contribute to the forming of reasonable grounds to enter onto private property or to make an arrest. Each piece of information you have can assist in forming beliefs regarding the safety of persons.

Remember that we begin with our end in mind considering our <strong>Results. </strong>At this stage of the investigation, there appears to be an immediate threat to the safety of Jane Smith. Domestic disputes are always emotionally charged situations, and it is reasonable for attending police officers to consider that their own personal safety will also be at risk. This is definitely a Level 1 Results priority.
<h2>Tasks</h2>
As you proceed to attend to the area of the call, you embark upon the <strong>Tasks</strong> portion of the <strong>STAIR</strong> tool.
<h3>Task 1: <em>Responding in the Correct Mode</em></h3>
In this case, the report identifies an active event where the suspect is still at the scene and criminal activity may still be in progress. You will be responding in Tactical Investigative Response mode.
<h3>Task 2: <em>Identifying the Players in the Event</em></h3>
<ul>
 	<li>Randy Smith</li>
 	<li>Jane Smith</li>
 	<li>Two sons – ages 8 years and 4 years old</li>
 	<li>Witness Bill Murphy</li>
</ul>
<h3>Task 3: <em>Breaking out the Facts of the Event</em></h3>
In this case, possible criminal actions witnessed by the neighbour indicate that an assault has taken place. The wife was struck in the face and dragged into the house. There may be a forcible confinement taking place. Your offence recognition, in this case, is focused on two possible offences: assault and forcible confinement. You recognize that each of these offence types is an indictable offence for which an arrest can be made if you form reasonable grounds to believe the offence(s) have been committed by Randy Smith.
<h3>Task 4: <em>Gathering All Additional Information That Might be Available</em></h3>
Faced with these circumstances, additional information would assist in making a risk/threat assessment. You proceed to the CPIC and PRIME - RMS databases to determine:
<ul>
 	<li>Criminal record information on both Randy and Jane Smith</li>
 	<li>History of previous calls to this residence</li>
</ul>
From CPIC, you determine that Randy Smith, of this address, has a record for Impaired Driving. There is no criminal record for Jane Smith. Police Records Information Management Environment (RMS) shows a previous complaint of a domestic dispute at this same residence 11 month ago. At that time, Randy Smith was arrested but not charged with assault. Jane Smith, the complainant in that case, would not proceed with charges, and there were no independent witnesses to the assault.
<h2>Analysis</h2>
For a police officer attending the scene of an in-progress event, it is important to consider the issues of safety and ongoing threats to safety to know how best to approach the scene and what immediate actions can be taken. As is the case with many in-progress events, there is a concern for the safety of all persons. In this case, the wife, Jane Smith, has reportedly been assaulted and dragged back into the premises. There are possibly two young sons also at the premises. Whenever there is a concern for the safety of persons, exigent circumstances exist and a police officer has extensive powers for the entry onto private property, if necessary, to detain any persons present to secure the scene and stop the continuation of an offence.
<h2>Investigation</h2>
Considering the explicit threat to the safety of Jane Smith, and a possible implied threat to the safety of the two sons, the issue of the safety of persons here is clear. Since this is a domestic violence complaint, there is also an implied danger to all police officers attending that must also be considered. In this case, you call for a backup patrol unit to attend. Your <em>tactical investigative response</em> plan is to approach the premises using concealment and cover as you and your backup unit assess what you can hear and see as you approach the scene.

You decide that if you do not hear or see any ongoing immediate threat, you will approach by knocking on the front door and making contact. If you do see or hear evidence to indicate there is an ongoing threat to the safety of a person (e.g. ongoing assault), you know you can enter the premises without a warrant under exigent circumstances to protect the safety of persons. You know you have an eyewitness to the offence of assault, and, with this piece of witness evidence alone, you have formed reasonable grounds to believe the offence of assault has taken place. The added information of possible alcohol involvement and past record of domestic assault complaints can be considered in the evaluation of the threat level to engage the extended authorities of exigent circumstances.

As you walk towards the house, the neighbour/witness, Bill Murphy, approaches you and states that Randy Smith just left the premises alone in his blue Dodge truck. You can see a woman and two young boys looking out the front window of the premises.

Your event classification now must change to an inactive event, and you transition to a <em>strategic investigative response</em> mode. The <strong>Results </strong>priorities now change as well. Your new priorities become:
<h2>Results</h2>
<ol>
 	<li>Gather and preserve evidence:
<ol>
 	<li>Interview witness Bill Murphy</li>
 	<li>Interview the victim Jane Smith</li>
 	<li>Take photographs of any injuries to the victim</li>
 	<li>Determine if there are other witnesses available</li>
 	<li>Determine if other physical evidence, weapons, and/or liquor bottles are present</li>
</ol>
</li>
 	<li>Accurately document the event
<ol>
 	<li>Take the statement of witness Bill Murphy</li>
 	<li>Take statement of the victim, Jane Smith</li>
 	<li>Make personal notes</li>
 	<li>Complete an occurrence report</li>
</ol>
</li>
 	<li>Establish reasonable grounds to identify and arrest an offender
<ol>
 	<li>Verify that an offence has occurred</li>
 	<li>Verify the type of offences (e.g. assault, or assault causing bodily harm, and/or forcible confinement, and possibly impaired driving)</li>
 	<li>Verify the identity of Randy Smith as the person responsible for identified offences</li>
 	<li>If an offence and an identity of the suspect are verified, broadcast a “Be On Lookout For (BOLF)” to arrest Randy Smith for assault</li>
</ol>
</li>
</ol>
In this case, the offender was easily identifiable. This is true of many in progress occurrences that police attend. These types of cases are often handled in the progression described above, starting off as a tactical investigative response and transitioning to a strategic investigative response mode.

In cases where the offender is not immediately identifiable, or the fact pattern of the event is not clear, the investigation becomes more complex and protracted. These are the cases where the strategic investigative response will include analyzing the information and evidence to develop theories, to identify possible suspects, and to test possible fact patterns against the physical evidence and timelines.

To examine this process of strategic investigative response, we will look at a more complex scenario where additional skill sets and strategies need to be considered within the <strong>STAIR</strong> Tool.
<div class="textbox textbox--examples"><header class="textbox__header">
<p class="textbox__title">Scenario #2</p>

</header>
<div class="textbox__content">

You are in a marked patrol vehicle, and you are dispatched to attend a local jewellery store where a robbery has just taken place. It is August 15, 2017, 4 PM on Saturday. The store is in a strip mall complex on the main street of your city. You arrive at the scene to take the complaint and investigate.

The store manager reports that at approximately 3:30 PM, three suspects entered through the front door of the store from the front parking lot. All three suspects were wearing ski masks, gloves, blue jeans, and dark jackets. All three were armed with handguns. One suspect stood guard at the front door and the other two entered the store yelling at everyone to lay face down on the floor. There were three customers in the store: two elderly women shopping together and one young woman approximately 25 years of age.

There were also two store employees working at the time. One is the store owner/manager and the other is a female sales clerk. After everyone was on the floor, the two men started smashing glass display cases and dumping the contents into white cloth bags that they had with them. One robber demanded that the manager open the cash register, which he did. There was only approximately $350 in the cash register, which was typical because most customers use credit or debit cards. The manager estimates that approximately $120,000 worth of inventory was stolen. The most valuable items taken were diamond rings and high-end designer wrist watches. Watches have serial numbers and are identifiable, and some of the diamonds are identifiable by laser micro-engraving.

The entire robbery happened in just under five minutes and, when the robbers left the store, they ran south around the corner of the building. No vehicle was seen.

</div>
</div>
<h2>Situation</h2>
Using the <strong>STAIR</strong> tool, as you approach the scene, you are aware that the suspects have left the crime scene and this is an inactive event. Although aware of the possibility that you may see suspects leaving the area of the crime scene, your arrival and approach to the crime scene do not require the tactical investigative response of an active event. The immediate danger to the life and safety of persons at the crime scene has passed. You are in the strategic investigative response mode. Beginning with your end in mind, you now consider what will be the <strong>Results</strong> for this case:
<ul>
 	<li>Protecting the life and safety of persons at this crime scene is no longer an issue because the armed suspects have now left the scene</li>
 	<li>Protecting property will be an issue because $120,000 worth of merchandise and $350 in cash have been taken and need to be recovered</li>
 	<li>Gathering and preserving evidence will be an issue because there are witnesses to interview at the scene and possibly physical evidence left behind by the suspects</li>
 	<li>Accurately documenting the event will be necessary</li>
 	<li>Establishing reasonable grounds to identify and arrest offenders will certainly be the desired outcome</li>
</ul>
<h2>Tasks</h2>
With our <strong>Results</strong> priorities clearly in mind, you now undertake some specific <strong>Tasks</strong> of the <strong>STAIR</strong> tool:
<ul>
 	<li>Secure the crime scene</li>
 	<li>Examine the crime scene and call upon forensics for evidence collection</li>
 	<li>Broadcast a description of the suspects and incident details as a BOLF</li>
 	<li>Identify all witnesses and victims present</li>
 	<li>Run each witness and victim through police databases to determine any criminal records, history of criminal conduct, or association to known criminals</li>
 	<li>Take individual statements from each witness and victim</li>
</ul>
After completing your victim and witness interviews and your database searches, you have the first pieces of information from which the <strong>Analysis </strong>component can begin. Your forensic team is at the scene dusting for fingerprints and photographing the damage.
<h2>Analysis</h2>
As mentioned above, <strong>STAIR</strong> will assist in developing strategies to guide the <strong>Investigation </strong>efforts. Based on the Strategic Investigative Response Funnel, all incoming information is flowed into the top of the funnel to start the process of analysis. The analysis begins by considering each of the individual known facts about the incident. In this case, the facts to be considered include:
<ul>
 	<li>Date of offence: Saturday August 15, 2012</li>
 	<li>Time: 4 PM</li>
 	<li>Location: jewellery store in down town strip mall</li>
 	<li>Owner/manager and one employee present (witnesses)</li>
 	<li>Two elderly women shopping together present (witnesses)</li>
 	<li>One 25-year-old female shopper present (witness)</li>
 	<li>Three apparently male suspects entered the store through front door</li>
 	<li>All suspects were wearing ski masks, gloves, blue jeans, and dark jackets</li>
 	<li>Each suspect had a handgun</li>
 	<li>One suspect stood guard</li>
 	<li>Two suspects entered the store</li>
 	<li>Suspects told everyone to lay on the floor</li>
 	<li>Suspects smashed display cases and loaded jewellery and watches into bags</li>
 	<li>Each suspect carried away the stolen goods in white bags</li>
 	<li>One suspect had the manager open the cash register and took $350 cash</li>
 	<li>Approx. $120,000 worth of jewellery was taken</li>
 	<li>Some of the watches and diamonds stolen are identifiable by serial numbers</li>
 	<li>Suspect fled out the front door and south around the corner of the building</li>
 	<li>No vehicle was seen</li>
 	<li>Entire robbery took under five minutes</li>
</ul>
To continue this <strong>Analysis,</strong> we start by reflecting on some of the theories we might evolve considering the facts of this case. This will begin the process of developing theories and formulating investigative plans to identify suspects and search for new evidence that either confirms or disproves those theories.
<ol>
 	<li>What theories might you have about the time and location of this offence?</li>
 	<li>Can you develop any theories about the level of planning that went into the robbery?</li>
 	<li>Consider theories about how well these three suspects know each other.</li>
 	<li>Is it possible that the suspects had been at the store sometime prior to this robbery?</li>
 	<li>What relevant theories might be considered from the way the suspects were dressed?</li>
 	<li>What relevant theories might be considered from the fact that the robbers carried handguns?</li>
 	<li>What theories might be considered from the way the robbery was carried out?</li>
 	<li>What theories might be considered regarding the items taken?</li>
 	<li>Theorize and consider if these three suspects were working alone.</li>
 	<li>Theorize who else might be involved.</li>
</ol>
Think about the fact pattern of this incident and answer these questions. In this process, you will engage your imagination and your deductive reasoning skills to consider the possibilities and develop theories to guide your investigative plan going forward. In this step of the <strong>Analysis </strong>process in the <strong>STAIR</strong>, what logical theories can you develop to explain how this crime may have been committed, and who may have been involved? Try and develop at least two or three alternate theories. As you answer each question, consider different avenues of investigation you might follow to confirm or disprove some of your theories. Can aspects of your theories be confirmed or disconfirmed against an examination of the existing physical evidence?
<h2>Investigation</h2>
As you proceed through the <strong>STAIR</strong> tool, the process of <strong>Analysis</strong> and <strong>Investigation</strong> can become somewhat circular, as the investigation reveals new information, and new information is analyzed to confirm, disprove, or modify the theories of suspects and events that you are considering.

<strong><em>Do your theories present any avenues where you can investigate further to gain additional information?</em></strong>

Outline your own analysis, assumptions, deductions, and theories. Outline the further avenues for investigations that you can undertake in this case. After you have completed your own analysis, theory development, and investigative plans, move to the end of this chapter and check your assumptions, analysis, theories, and investigative plans against the answers provided there.
<h1>Topic 2: Getting Answers in the Robbery Scenario</h1>
<ol>
 	<li><strong>What theories might you consider about the time and location of this offence?</strong>
<ul>
 	<li>The fact that the jewellery store is in a strip mall may have been a factor in the robbers selecting this location as a target. This type of business premises allows for drive by viewing of the inside of the premises, as well as quick access and exit to the outside parking area. This location also allows for the suspects to maintain an ongoing look-out for approaching police response.</li>
 	<li>The time of the offence could have been intentionally chosen closer to the end of the day on a Saturday in the hope that more cash would be in the store. Depending on the typical customer traffic volume in the mall area on a Saturday, the suspects may have hoped for more traffic volume to assist with their escape.</li>
</ul>
</li>
 	<li><strong>Can you develop any theories about the level of planning that went into the robbery?</strong>
<ul>
 	<li>Since the suspects arrived in disguise, armed with handguns, and carrying bags to take away the proceeds of the robbery, it might be theorized that they took some time to put together this special equipment to carry out the crime.</li>
 	<li>The precision with which the robbery was carried out (e.g. completed in five minutes, one suspect guarding the door, all persons ordered onto the floor) would indicate a high level of planning to orchestrate this robbery.</li>
</ul>
</li>
 	<li><strong>How well did these three suspects know each other?</strong>
<ul>
 	<li>It is very likely that the three suspects knew each other well enough to establish the level of trust required to carry out the robbery.</li>
 	<li>The type of goods taken in this robbery, except for the cash, would need to be converted to cash to be divided up later. This could indicate that a longer term relationship exists between these robbers.</li>
 	<li>The planning that is apparent would indicate that the suspects spent some time together to plan, collect the necessary equipment, and divide up the proceeds of the robbery.</li>
</ul>
</li>
 	<li><strong>Is it possible the suspects had been at the store sometime prior to this robbery?</strong>
<ul>
 	<li>To plan this robbery and execute it with this level of precision, it is very likely that the suspects spent at least some time looking over the premises and the surrounding area to plan their approach, execute the robbery, and plan their escape.</li>
</ul>
</li>
 	<li><strong>What relevant theories might be considered from the way the suspects were dressed?</strong>
<ul>
 	<li>It appears that all three suspects were wearing similar outfits with dark jackets, blue jeans, and ski masks. This may indicate that the suspects deliberately purchased specific gear for committing a crime.</li>
 	<li>This clothing might be considered somewhat non-descript, and not easily distinguishable or unique for a witness to accurately or specifically describe the fleeing suspects. The use of masks and non-descript outfits might indicate that the criminals were experienced.</li>
 	<li>The fact that they are all wearing jackets on a summer day in August might indicate that they were covering up tattoos, scars, or other distinguishing features that might otherwise assist in identifying the suspects.</li>
 	<li>The fact that all suspects were wearing gloves would indicate that they are aware that any fingerprints left behind could identify them.</li>
</ul>
</li>
 	<li><strong>What relevant theories might be made from handguns being carried by the robbers?</strong>
<ul>
 	<li>Handguns are more easily concealed and may be the weapon of choice for more professional criminals.</li>
 	<li>Handguns are more difficult to obtain, and legal handguns are generally registered, so it is likely that these were unregistered or stolen handguns.</li>
</ul>
</li>
 	<li><strong>What might be theorized from the way they carried out the robbery?</strong>
<ul>
 	<li>From the overall planning and precision in the execution of the robbery, it might be theorized that this is not the first robbery that these three have done together. This method may have been used elsewhere.</li>
</ul>
</li>
 	<li><strong>What might be theorized considering the items taken?</strong>
<ul>
 	<li>Considering that the items taken were specialty items and that some were marked with identifying serial numbers, it might be theorized that the robbers have a prearranged or preplanned means of disposing of the items or otherwise converting them to cash.</li>
 	<li>Alternately, the fact that they have taken items that are identifiable by serial numbers may indicate a level of haste or even inexperience because these items, if discovered after being sold, may be traced back to the robbery suspects.</li>
</ul>
</li>
 	<li><strong>Were these three suspects working alone? </strong>
<ul>
 	<li>Considering the speed of execution and the apparent level of planning that went into this robbery, it is possible that there was a fourth accomplice waiting outside in a get-away vehicle.</li>
 	<li>There is a possibility that the suspects had some inside knowledge of the jewellery store and the inventory through association with a person connected to the store.</li>
</ul>
</li>
 	<li><strong>Who else might be involved?</strong>
<ul>
 	<li>A fourth criminal associate as a get-away driver and lookout.</li>
 	<li>A customer inside the store, at the time of the robbery, acting as a scout.</li>
 	<li>A current or former employee of the store may have provided inside information.</li>
 	<li>The owner/manager of the store could be involved as part of an insurance fraud scheme.</li>
</ul>
</li>
</ol>
<h1>Topic 3: Answers to Possible Theories in the Robbery Scenario</h1>
<h2>Theory #1</h2>
This is a well-planned robbery executed by three or four experienced criminals. In addition to the three suspects in the store, there might have been an outside get-away driver acting as a lookout. They intentionally selected this store because of the strip mall location and the easy access to inventory by smashing the display cabinets. They were wearing disguises and jackets to avoid facial identification and possible tattoo or scar identification. They were wearing gloves probably because they already have criminal records and know that any fingerprints left behind may allow for the suspects to be identified. The suspects gained the information to execute their robbery by conducting surveillance on the store. They intentionally selected the date and time to conduct the robbery because of customer traffic patterns. They have some means of converting or disposing of the stolen items for cash. Considering the precision of the crime, this is likely not their first robbery of this type. The possession of handguns also indicates they are likely professional criminals.
<h2>Theory #2</h2>
As with Theory #1, this is a well-planned robbery executed by three or four experienced criminals; however, the store was selected because they had an inside person, employee, or former employee working with them, and were provided with information to assist in the plan.
<h2>Theory #3</h2>
As with Theory #1, this is a well-planned robbery executed by three or four experienced criminals; however, the store owner/manager is a conspirator in the robbery, and assisted with the offence to collect insurance with the possible additional intent to be the person who resells the stolen merchandise. If this is the case, the owner/manager may be providing an inflated inventory of items taken or perhaps incorrect serial numbers for the items taken to allow for the stolen items to be more easily disposable.
<h1>Topic 4: Answers — Investigative Plans From Theory Development</h1>
Do the theories above present any avenues where you can investigate further to gain additional information?
<h2>Theory #1</h2>
<ul>
 	<li>Since it is likely not their first robbery of this kind, we should search police records for other robberies using this similar <em>modus operandi</em> (MO) in the recent past and in our area and its surrounding areas. We would be looking for similarities in:
<ol>
 	<li>Target selection</li>
 	<li>Number of suspects</li>
 	<li>Disguises used</li>
 	<li>Weapons of choice</li>
 	<li>Methodology (i.e. guard at door, making patrons lie down on the floor, bags to carry away goods)</li>
</ol>
</li>
 	<li>Considering the likelihood that these suspects conducted surveillance of this store to select it as a target, we should look at security cameras in the strip mall area and from the victim’s store for images of possible suspects watching the store on the previous Saturday at this same time.</li>
 	<li>Since a few of the items stolen had serial numbers, these numbers can be entered into CPIC as identifiers to stolen property.</li>
 	<li>Since the handguns used were likely stolen, we should look for incidents of stolen handguns recently reported.</li>
</ul>
<h2> Theory #2</h2>
<ul>
 	<li>Considering the possibility that an inside person, employee, or former employee is involved and provided the robbers with information, we should look closely into the criminal record and police record of the employees present at the time of the crime, as well as any other employees or former employees who can be identified. We are looking for:
<ol>
 	<li>Evidence of criminal conduct by any employee or former employee</li>
 	<li>Information of any associations between the employees or former employees to criminals, particularly those with records for robbery</li>
 	<li>Information from the owner/manager about suspicious conduct on the part of an employee, a past employee, or a disgruntled past employee</li>
 	<li>Since customers inside the store at the time of the robbery may have also been in collusion with the robbers, all three customers should be examined for criminal histories or associations to known criminals.</li>
</ol>
</li>
</ul>
<h2>Theory #3</h2>
<ul>
 	<li>If the owner/manager is involved in the robbery for the proposes of insurance fraud and/or inventory resale, we should examine several areas for evidence and information:
<ol>
 	<li>Any past record of criminal conduct by the owner/manager, particularly insurance fraud</li>
 	<li>A record of association to known criminals</li>
 	<li>A record of insurance policy status on inventory, particularly recent increases</li>
 	<li>Cross-check and verification of product inventories against items alleged to be stolen</li>
 	<li>Verification of accuracy of serial numbers on items stolen against supplier inventory records.</li>
</ol>
</li>
</ul>
<h1>Topic 5: Validation of the Report</h1>
Based on the theories considered in our robbery investigation, everyone present in the jewellery store at the time of the robbery is being considered a possible suspect. This is a part of analysis and theory development called <strong>validating the report</strong>. In criminal investigations, it occurs time and again that people reporting criminal events will lie, fabricate, or embellish, the facts. These failures to provide an accurate account of what happened occur for a variety of reasons, including, but not limited to:
<ul>
 	<li>Personal gain or financial reward, such as insurance fraud</li>
 	<li>Attempting to take revenge on someone by accusing them of a crime</li>
 	<li>Covering up personal involvement in the criminal act to avoid prosecution</li>
 	<li>Attempting to shift responsibility for a crime to someone else</li>
 	<li>Covering up the involvement of an associate to divert prosecution</li>
</ul>
With these kinds of motives in mind, an investigator analyzing and validating the facts and developing a theory of the crime should always consider four key questions to authenticate the crime report:
<ol>
 	<li>Does the evidence support the report that an offence occurred?</li>
 	<li>If an offence did occur, did it happen at the time being reported?</li>
 	<li>If an offence did occur, did it happen at the place being reported?</li>
 	<li>If an offence did occur, did it happen the way the fact pattern being reported suggests (Arcaro, 2009)?</li>
</ol>
Thinking about these questions as part of the <strong>Analysis</strong> can help the investigator to formulate possible theories and develop effective investigative plans.

At this point in the investigative process, as theories are developed and tested, additional new facts are discovered. With the discovery of new facts, the <strong>Analysis</strong> and <strong>Investigation</strong> steps of the <strong>STAIR</strong> tool become, as noted earlier, a bit of a circular process, where a new fact can confirm, disprove, or modify a theory, and a new investigative plan may evolve in a new direction seeking the formation of reasonable grounds to believe a particular suspect is responsible for the offence.
<h1>Topic 6: Evidence Transfer Theory</h1>
In our robbery scenario, the reported fact pattern appears to be fairly clear. The investigative strategies being planned are aimed at suspect identification as a first goal. But, once a suspect or suspects have been identified, because of some circumstantial association or linkage to the crime scene, it does not mean they can immediately be arrested. Often, these kinds of linkages are sufficient to only provide grounds for suspicion and are not enough to form reasonable grounds for belief to make an arrest.

The ability to link a suspect back to a crime and to form reasonable grounds for belief to make an arrest can depend on the existing evidence transfer. Evidence transfer means that evidence will transfer from a suspect to the crime scene, a suspect to a victim, from the crime scene to the victim, or from the crime scene to the suspect. Modern forensic science has evolved into forensic specialties that look for evidence transfer. For example, with the advances being made in DNA science, evidence transfer is becoming more refined allowing the analysis of ever smaller samples for comparison (Savino, 2011).

Remarkably, it is not just DNA or fingerprints that can contribute to connecting a suspect to a criminal event. Hair and fibre, shoe prints, tool marks, bite marks, ballistics, and other forensic exhibits do contribute to the range of comparison tools. We will discuss these more in-depth later in our chapter on forensic evidence; however, the point is that forensic comparisons are only one form of evidence that is developed to create circumstantial connections between a suspect, the crime, and/or the victim.
<h1>Topic 7: Spatial Relationships and Timelines</h1>
Other circumstantial evidence can be illustrated that connect suspects to the crime through relationships, associations, and chronology. This type of circumstantial evidence can include exhibits and witness statements that demonstrate spatial relationships. Spatial relationships are circumstantial links that demonstrate connections between objects, events, or people. This can be any type of evidence that demonstrates a connection or relationship between the suspect and the criminal event or the suspect and the victim. It could also be evidence that demonstrates where a suspect was during the critical times when the crime was occurring.

Recall the example of the young man standing behind a tree one block away from the scene of the warehouse break in. This was an example of both timeline evidence, namely being present at the scene <em>when the event took place</em>, and spatial relationship evidence, namely <em>being one block away from the crime scene</em>. This kind of evidence can be considered by the investigator in forming reasonable suspicion and reasonable grounds to believe and take action at a later point in time.
<h1>Topic 8: Timeline Evidence</h1>
Timeline evidence is any item that demonstrates a time alignment of the suspect to the criminal event or the victim. Spatial relationship evidence comes from items that demonstrate other types of connections, relationships, or associations. Consider for example, the following scenario.
<div class="textbox textbox--examples"><header class="textbox__header">
<p class="textbox__title">Scenario #3</p>

</header>
<div class="textbox__content">

The body of a young woman is found by a janitor in the utility storage area of a local airport at 12 noon. It appears that she was sexually assaulted and murdered shortly after arriving on a domestic flight AC204 from a neighbouring city. This is confirmed by the boarding pass still in her pocket for Seat 16A that shows her arrival time at 10 AM.

Another airport employee is identified as a possible suspect because security cameras show him in the area of the utility storage area at 10:45 AM. Upon questioning, it is determined that he had also been on flight AC204 and that his boarding pass was for seat 16B.

A search of the suspect’s pockets shows that he has a key that opens the utility storage closet where the victim’s body was found. In this case, there is both timeline evidence and evidence of spatial relationships.

</div>
</div>
Timeline evidence would include:
<ul>
 	<li>12 Noon: time the body was found by the janitor</li>
 	<li>10 AM: time the victim’s flight arrived</li>
 	<li>10 AM: time the suspect’s flight arrived</li>
 	<li>10:45 AM: time the suspect was recorded on security camera near the crime scene</li>
</ul>
This timeline evidence provides some significant information, as it establishes a time range when the crime occurred and it establishes that the suspect was at the airport during the possible time of the crime.
<h1>Topic 9: Spatial Relationship Evidence</h1>
<ul>
 	<li>Victim and suspect’s boarding passes show that they were both on Fight AC201 and were seated next to each other</li>
 	<li>Security video puts the suspect in the area of the crime scene during the timeframe when the crime occurred</li>
 	<li>The suspect is an airport employee and was in possession of a key that would open the door of the crime scene</li>
</ul>
It is important to note here that the items of evid, in this case, ase are not forensic exhibits such as fingerprints or DNA that might draw a definite link between the suspect and the crime. They are instead linkages in times and common locations within those times. These connections within time and locations are spatial relationships, and although this circumstantial evidence from spatial relationships alone is not sufficient to prove guilt beyond a reasonable doubt, it is often sufficient to form reasonable grounds to believe that an individual is implicated in the offence. In this case, the suspect would be detained and cautioned. Additional forensic evidence collection and interrogation would follow to develop reasonable grounds for belief and possibly the grounds to lay a charge, if additional forensic evidence could be developed.
<h1>Summary</h1>
In this chapter, we have worked through some scenarios demonstrating the application of the <strong>STAIR</strong> tool in both tactical and strategic investigative processes. In working through the strategic process, we have practiced examining the fact patterns of events and making the assumptions to drive theory development directing the engagement of our investigative plans. This is truly the creative art of the investigative process and, as such, it is a process that can be enhanced through practice and experience. This can also be a great opportunity for collaboration and teamwork where brainstorming sessions take place to analyze the facts, develop theories, and develop investigative plans. Along with theory development and investigative plan making, we have examined the ways physical and circumstantial evidence of spatial relationships can be used to confirm, negate, and modify theories and investigative plans.
<div class="textbox textbox--exercises"><header class="textbox__header">
<p class="textbox__title">Study Questions</p>

</header>
<div class="textbox__content">
<ol>
 	<li>Why must the investigator have the Results in mind at the outset of an investigation?</li>
 	<li>What are five reasons some people reporting a criminal event lie, fabricate, embellish, or misrepresent the facts?</li>
 	<li>What are four key questions an investigator should consider in authenticating a crime report?</li>
 	<li>What is meant by evidence transfer?</li>
 	<li>What is spatial relationship evidence?</li>
 	<li>What is timeline evidence?</li>
</ol>
</div>
</div>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>88</wp:post_id>
		<wp:post_date><![CDATA[2017-05-08 15:56:06]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-05-08 19:56:06]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-6-applying-the-investigative-tools]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>3</wp:post_parent>
		<wp:menu_order>6</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[727]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_export]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 6: Applying the Investigative Tools]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_candela_citation]]></wp:meta_key>
		<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 7: Witness Management</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-7-witness-management/</link>
		<pubDate>Mon, 08 May 2017 20:20:44 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=chapter&#038;p=90</guid>
		<description></description>
		<content:encoded><![CDATA[<div class="textbox">

<em>“Different types of witnesses will provide evidence from different perspectives, and these perspectives need to be assessed by the investigator to establish the reliability of the evidence provided.”</em>

</div>
For any investigation, the details of events provided by witnesses are a critical element of the evidence gathered. Witness testimony is the verbal account of events or knowledge of the facts relevant to the crime. Witness statements will assist the investigator in forming reasonable grounds to lay a charge and will assist the court in reaching a decision that the charge against an accused person has been proved beyond a reasonable doubt.

As the law has evolved regarding witnesses, many rules of evidence, definitions, and protocols have developed to govern the way witnesses may testify in court. It is important for an investigator to understand these elements as this allows an investigator to evaluate witnesses and collect witness evidence that will be acceptable to the courts. The purpose of this chapter is to discuss the following concepts as they relate to the process of witness management.
<ol>
 	<li>Identifying witnesses</li>
 	<li>Defining witness types</li>
 	<li>Defining competence and compellability</li>
 	<li>Identifying the witness/suspect dilemma</li>
 	<li>Witness credibility assessment</li>
 	<li>The truthfully-incorrect witness</li>
 	<li>Recognizing dominant witness influences and conformity</li>
 	<li>Dealing with uncooperative witnesses</li>
 	<li>Conducting witness interviews</li>
 	<li>The field interview</li>
</ol>
<h1>Topic 1: Identifying Witnesses</h1>
It is sometimes the case that persons found as apparent witnesses to an event do not always provide accurate information about their identity. The reasons for this deception can vary from actual involvement in the crime to fear of reprisals from the suspect to simply not wanting to become involved with the criminal justice system. Regardless of the reason, it is imperative for an investigator to verify the identity of each witness. This can be best achieved by viewing a valid photo ID or, in the absence of photo ID, by establishing the witness’ identity through other means, such as police records, confirmation of identity, or verification of identity by a credible third party.
<h1>Topic 2: Witness Types</h1>
Once the identity of a witness has been determined, an investigator needs to establish an understanding of the witness classification. Different types of witnesses will provide evidence from different perspectives, and these perspectives need to be assessed by the investigator to establish the reliability of the evidence provided. This is important for several reasons, including that if charges ever go before the court, a judge will also consider these witness types and apply appropriate rules of evidence and levels of probative value to the evidence each type of witness provides.
<h2>Eye Witnesses and Corroborative Witnesses</h2>
As discussed in previous chapters, evidence can be classified as either direct evidence indirect circumstantial evidence. An eyewitness is a person who directly saw the criminal event take place, while a corroborative witness is a person who can only provide circumstantial or indirect evidence of the events surrounding the crime. For example, consider two scenarios where a young cashier is shot to death during the robbery of a convenience store. In the first scenario, one witness is found at the scene of the crime when the police arrive. This witness was a customer inside the convenience store. She saw the robber walk up to the counter, raise his handgun, and shoot the cashier. This witness can identify the suspect. In the second scenario, the witness is a customer who was walking up to the front of the store when he heard what sounded like a gunshot. He then saw a man running out the front of the store with a handgun in his hand. Upon entering the store, he saw the cashier had been shot. He can identify the suspect.

In both scenarios, a male suspect is apprehended in possession of a handgun only two blocks away from the scene of the crime. In the first scenario, the witness would be classified as an <em>eyewitness; </em>but in the second scenario, the witness would be a <em>corroborative witness</em>.

In the described scenarios, both witnesses can provide valuable testimony; however, the evidence of the eyewitness in scenario one would be given more weight at trial because there is a direct connection that the accused committed the offence through direct evidence, and the court would not need to make any interpretation on the veracity of any circumstantial evidence. The witness was present and saw the suspect shoot the victim. The corroborative witness in the second scenario provides strong circumstantial evidence to suggest that the man running from the store committed the shooting; however, additional investigation would be needed to support the circumstantial assumption that the person seen running from the store committed the shooting.

Clearly, eyewitnesses are the type of witness that investigators hope to find in their investigative efforts. Any police investigator will tell you, eyewitnesses are frequently not present at the scene of a crime, and therefore investigators need to be skilled at discovering additional physical and circumstantial evidence that can assist the court in reaching its conclusions in relation to the evidence of a corroborative witness.

In the second scenario, additional evidence that might assist the court to reach a conclusion that the suspect running from the store was the shooter might include the following: ballistics from the handgun seized from the suspect matching the fatal bullet found in the body of the accused, gunshot residue from the hand of the suspect showing that he had recently fired a weapon, and/or conclusive information indicating that the suspect and the shooting victim were the only two persons inside the store at the time of the shooting.

This is not to say that these same items of additional evidence would not also be useful to corroborate the witness in the first scenario. The difference is that, in the case of an eyewitness, the additional evidence is a value that is added, while in the case of the corroborative witness, more evidence is required to support the conclusion of guilt beyond a reasonable doubt.
<h2>Independent Witness</h2>
In addition to considering the evidence of a witness based on being an eyewitness or a corroborative witness, the court will also give additional weight to evidence that comes from a person who is an independent witness. An independent witness is sometimes referred to as a third-party witness. They are characterized as independent because;
<ul>
 	<li>They are not associated with the victim</li>
 	<li>They are not associated with the suspect</li>
 	<li>They are not in any way associated to the criminal event</li>
</ul>
In other words, an independent witness is someone with nothing to lose and nothing to gain by the outcome of the case. With this inferred lack of vested interest to either side, the independent witness is seen by the court as providing unbiased testimony. Similar to the court, an investigator can attribute more confidence to statements made by persons who are established to be independent eyewitnesses or independent corroborative-witnesses to an event.    <strong>      </strong>
<h1>Topic 3: Competence and Compellability</h1>
For a person to be called as a witness to testify in court, that person must be accepted by the court as being both a competent witness and a compellable witness. There are some rules that apply to assessing both competence and compellability of witnesses, and it is important for an investigator to understand these rules and definitions since it can negatively affect a case if key evidence is expected from a witness who is found either not competent or not compellable to testify. The examination here is not intended to be a comprehensive review of the rules of competence and compellability, but an overview of the main statutory issues. Case law relating to the finer points of witness competence and compellability is constantly evolving and, where applicable, may be presented in a court to challenge a witness.
<h2>A Compellable Witness</h2>
Most of the people an investigator will encounter during their investigations will be considered compellable to testify. Any person can be compelled to attend court as a witness by way of issuing a subpoena. If they fail to attend court after being served with a subpoena, the court may issue a warrant for the arrest of that witness to bring them before the court to testify. That said, once a person is compelled to attend court by either a subpoena or a warrant, there are still certain circumstances under which that person may be considered exempt, or not compellable to provide certain types of testimony. These circumstances relate to when the witness is an accused person or when the witness is the spouse of the accused.
<ol>
 	<li><strong><strong>An accused person cannot be compelled. </strong></strong>Under Sec 11 of the <em>Canadian Charter of Rights and Freedoms </em>(1982), an accused person cannot be compelled to testify at his or her own trial. However, if the accused person is charged jointly with another person, they may be compelled to testify against their co-accused. Under those circumstances, the witness can be afforded protection under the <em>Canada Evidence Act</em> (1985) and their testimony cannot subsequently be used against them at their own trial for that same offence.</li>
 	<li><strong><strong>When the witness is married to the accused. </strong></strong>To preserve the privilege of communication between two partners in their marriage, legislation and case law provides a protection of privacy, and anything said between two married partners in relation to a criminal event cannot be compelled as testimony in court. This exemption to testify is stated under the <em>Canada Evidence Act </em>(1985)<em>. </em>Specifically, Sec 4(3) states:</li>
</ol>
<blockquote>
<p style="padding-left: 90px;">No husband is compellable to disclose any communication made to him by his wife during their marriage, and no wife is compellable to disclose any communication made to her by her husband during their marriage.</p>
</blockquote>
<p class="no-indent" style="padding-left: 90px; text-align: left;">Many people incorrectly believe that this is a blanket protection where one spouse cannot testify against the other. However, the legislation only provides protection to the communication between spouses. It does not restrict a spouse being called to testify regarding observations of physical evidence or relationships. For example, a husband may arrive home covered in blood and carrying a bloody knife confessing to his wife that he just stabbed someone to death. Although the communication of the confession of the crime would not be compellable testimony, the observations of the blood, the knife, the time and location of the observation would be a compellable testimony. On this point, Sec 4(2) of the <em>Canada Evidence Act</em> (1985) also states:</p>

<blockquote>
<p style="padding-left: 90px;">No person is incompetent, or compellable, to testify for the prosecution by reason only that they are married to the accused.</p>
</blockquote>
<p style="padding-left: 90px;">In addition to the ability to call a spouse to testify regarding observations of evidence, the prosecution can compel a spouse to give evidence, including personal communications, for the prosecution in cases that involve an offence of violence against that spouse and certain sexual offence against children.</p>

<h2>A Competent Witness</h2>
Like the rules of compellability, persons are presumed to be compellable to testify unless they meet the exceptions stated under the <em>Canadian Charter of Rights and Freedoms</em> or <em>The Canada Evidence Act</em>. All witnesses are also considered competent to testify unless it can be shown that they lack certain personal abilities or capacities. Historically, common law barred certain people from testifying. These people included convicted criminals, very young children, the mentally ill, and spouses of an accused person.

Many of these rules have been overturned by statute, for example, the rule against convicts was removed by section 12 of the <em>Canada Evidence Act</em> (1985). The record of a convicted person can still be used as character evidence.

There are three classes of exceptions; children, persons with low mental capacity, and spouses. For each of these classes of people, it is up to the opposing counsel in court to make a challenge and establish the incompetence of the witness.

There is a presumption that the witness possesses both capacity and responsibility to give evidence. To testify, a witness needs only the ability to recall what they have seen and heard, and be able to communicate what they recall. To communicate, the witness must be able to understand and respond to questions, and the witness must demonstrate the moral capacity to tell the truth. Moreover, the determination of competency is guided by the following rules established in case law:
<blockquote><em>The proof of competency or incompetency is on the balance of probabilities </em>(R v Ferguson, 1996).</blockquote>
<blockquote><em>Where competency is challenged, it must be established by a voir dire before the witness can be sworn </em>(<em>R v Steinberg</em>, 1931).

<em>A witness who states that they may not tell the truth is still competent to testify. Such issues of truthfulness are factors of credibility for the trier-of-fact </em>(<em>R v Walsh</em>, 1978).</blockquote>
When considering the issues of witness competence and compellability, an investigator must keep in mind that the evidence collected from certain witnesses, such as spouses, children, and persons of low mental capacity, may be subjected to these rules. Exemptions for witness testimony and exclusion of the evidence may occur at trial (<em>R v Khan</em>, 1990; Justice Canada, 2017).

That said, during the investigation, it remains within the purview of the investigator to assess the information and evidence collected, and to consider that evidence when forming reasonable grounds to believe and take action. When considering the nature of the information and evidence received, it is not up to the investigator to assess whether the court will accept the information or not. The investigator’s use of the information and evidence received from a spouse, a child, or a person of low mental capacity should not be discounted in forming reasonable grounds simply in anticipation of a possible exemption of the witness and exclusion of evidence by the court. If the person giving the information or evidence is assessed as being a credible witness, the investigator should consider that material and give it fair weight in forming reasonable grounds for belief.
<h1>Topic 4: The Witness/Suspect Dilemma</h1>
Although the circumstances vary, it is a common occurrence that crimes are reported by a perpetrator posing as a victim or a witness. Crimes, such as break-and-entry and motor vehicle thefts, are quite often insurance frauds. Other crimes, including murder, have also had the offender make the report as a witness to explain their presence at the crime scene and avoid being considered as a suspect. Being aware of this possibility requires investigators to undertake a process of validating the reported crime and assessing the information being reported by witnesses or victims as a routine part of their investigation. To do this, an investigator should be attentive to questioning the report and the evidence presented to assess:
<ol>
 	<li>Did the crime happen at the time being reported?It is often difficult for a person fabricating a report to provide the true timing of the events without implicating themselves as present at the time of the crime. Asking questions that demand timelines accounting for witness activities during the crime time can sometimes detect deception.</li>
 	<li>Did the crime happen at the place being reported?Persons fabricating a report will sometimes change the location of the reported crime to avoid detection of the true crime scene where incriminating physical evidence may still be present. Carefully assessing the report in comparison to evidence present or not present can sometimes indicate this deception.</li>
 	<li>Did the crime happen in the manner being reported?False accounts of crime will often exaggerate or over report details of the event. The report will contain some level of fabrication that explains their own connection to the events. Assessing each witness version of the event for consistency or inconsistency with physical evidence and other witness versions can reveal deception.</li>
</ol>
Even with careful attention to these questions, it may not be immediately possible to confirm the validity of the crime being reported, and the investigation must proceed to take the report as true until other evidence emerges to prove otherwise.

The advantage of investigating this kind of falsely reported crime is that the suspect is presenting themselves as a witness or victim. As such, all of their statements may be taken and will be admissible against them later, without <em>voir dire</em>, if deception in their statement becomes provable. Until some distinct piece of incriminating evidence emerges, the investigator is under no obligation to caution or warn the witness. Each new statement can afford opportunities to investigate further in search of evidence of the lie that will prove deception.
<h1>Topic 5: Witness Credibility Assessment</h1>
In addition to determining if a person is an eyewitness, a corroborative witness, an independent witness, a competent witness, or a compellable witness, every person who is a witness during an investigation needs to be subjected to a credibility assessment. As information and evidence are collected from each witness, it is part of the investigator’s job to determine the level of confidence that can be attributed to each witness. This is called witness credibility assessment.

One of the most significant issues to be considered in assessing a witness is determining if they are a witness, or if they are a suspect posing as a witness. More likely than interviewing false reporters of crime, investigators find themselves interviewing a variety of ordinary people who truly have been the victim of a crime, have witnessed a crime, or witnessed some aspect of a criminal event. The level of confidence an investigator can have in a witness will be contingent on several factors relating to who the witness is, the abilities of the witness, and the circumstances of the event.
<ol>
 	<li><strong>Witness profile.</strong> Ideally, every witness would be an upstanding member of the community with a high level of integrity and an outstanding reputation. This is rarely the case. The nature of criminal activity and the natural proximity and association of criminals within a criminal community, often skew the witness list more towards those with more colourful and less upstanding personal profiles. Being part of the criminal community, or having a criminal record, does not necessarily mean that a witness will not be truthful. However, these are factors that an investigator must consider when assessing the value of the evidence being reported. For example, if a witness has a record for perjury, their evidence should be carefully scrutinized and additional corroboration may be required to strengthen the witness' account of the events to achieve acceptable credibility for the court.</li>
 	<li><strong>Witness bias — motivation to lie.</strong> As discussed earlier in this chapter, independent witnesses who are not connected to the victim, the accused, or the event itself make the most credible witnesses. People close enough to a criminal event to become witnesses are often, in some way, related to the victim, the suspect, or to the event itself. As such, the associated witness may have a bias in making their report of the event. As a friend or foe, the witness may have some motivation to withhold information or to lie to influence the outcome. Understanding how each witness fits into the event, and what their linkages are to other participants or the event itself, is an important dynamic to uncover. In the case of a bias witness, additional corroboration should also be looked for.</li>
 	<li><strong>Witness involvement — emotional impact of the event.</strong> Criminal events can be very stressful and anxiety producing experiences. This is not only true for the victim but for anyone who has been exposed to danger, violence, or situations where threats to personal safety or incidents of injuries or death have occurred. As human beings, we are not conditioned to live through these kinds of events without experiencing some kind of emotional response. Post-Traumatic Stress Disorder speaks directly to the emotional damage traumatic events can inflict (Resnick, Kilpatrick, Dansky, Saunders, &amp; Best, 1993). It is important for an investigator to consider the nature of the event and the exposure of the witness to these dynamics. Extreme post traumatic trauma, such as observing the violent death of a loved one, can sometimes render that witness unable to provide a reliable account of details (Streets, 2011). It may be necessary to give some witnesses time to regain their composure to provide information or evidence. In some cases, the traumatic effect is too significant and the information cannot be recovered. Knowing how a witness is connected to the event and being able to comprehend their potential exposure to emotional trauma provides the investigator with the insight that certain strategies, such as softer interview techniques, flexible timing, and professional support resources that take the emotional trauma of the witness into consideration, may be necessary and appropriate. Another kind of emotional trauma is a witness’ fear for their personal safety. This can be a fear of physical, psychological, or emotional reprisals for the witness providing evidence. In a situation that includes organized criminal groups, this fear is a genuine and understandable concern. In these types of cases, it may be difficult to protect the identity of a witness, and assurances of protection of the witness can be subject to jurisdictional or organizational limitations of witness protection resources.</li>
 	<li><strong>Location when viewing the event.</strong> A witness’ physical location when observing an event can become an important point of evidence, and should be considered and included in the interview and statement of each witness. If a witness is providing details of the event that required them to be in direct proximity of the accused or the event to observe or hear, the physical location of the witness at the time of those observations is a critical element. Physical location can also be important in explaining gaps or differences in witness observations. The fact that one witness to a crime observed certain actions, but another witness did not, can sometimes be explained by the alternate angles of observation of each witness or because of some physical obstruction that affected one witness but not the other. Crime scene photos and diagrams can often help witnesses to demonstrate and describe their distinct perspectives. Returning to the scene of the crime to physically establish these locations and angles of observation can be a useful exercise for investigators to conduct.</li>
 	<li><strong>Awareness of the crime — intent to observe and recall the occurrence.</strong> In most cases where a crime has occurred, a witness will know that the crime is happening, and this awareness will engage their attention to make observations that they can later recall and give an account of. In other cases, where a witness has not been alerted to the crime and is only observing the evolution of events as part of an unremarkable sequence, their memory is not as engaged and their processes of observation may not be as keen. To demonstrate this point, consider an example where a group of three people are standing in the teller’s line at a bank.
<div class="textbox textbox--examples"><header class="textbox__header">
<p class="textbox__title">Scenario</p>

</header>
<div class="textbox__content">

At the front of the line, a young man hands the bank teller a note advising, “This is a robbery. I have a gun. Put all the cash from your till into an envelope and give it to me. Do not press the alarm or I will shoot you." The bank teller is aware that a crime is taking place; however, the two customers standing in line behind the robber are simply waiting their turn. The customer standing immediately behind the robber suddenly notices that the teller looks frightened and sees she is placing the contents of her cash drawer into an envelope. The third customer in line remains unaware and is talking on the telephone to his wife about their grocery list. The robber grabs the cash-filled envelope from the teller and turns to run out of the bank. The customer immediately behind him steps out of his way, but he bumps into the third customer still talking to his wife. In this scenario, an investigator could expect to get a detailed account of the events from the bank teller who was engaged in the event and aware of the crime from the outset. The customer immediately behind the robber become aware of the crime and was making observations half way into the robbery. This customer could likely provide some significant details. The third customer in line was never aware that a crime was in progress and, other than perhaps providing a limited description of a man who bumped into him, his value as a witness may be negligible. Many witnesses who make observations of a criminal’s activities in the pre-crime stage or in the post crime stage, when they are leaving the scene of the crime, fall into the category of not being aware of the crime. This does not mean these witnesses will be of no value but that their casual observations need to be identified and recorded as soon as possible.

</div>
</div></li>
 	<li><strong>Length of observation time.</strong> Very simply, length of observation time is the amount of time a witness had to see the event taking place. This amount of time will vary with circumstances, as there would be a difference in opportunity for observation between one witness standing stationary at the crime scene observing the event, and another driving past the unfolding events at 100 kilometers per hour. This can also be an issue contingent upon the awareness of the event taking place. Some witnesses become aware of the event more quickly and have a longer opportunity to observe. As with our example of the bank robbery, the teller being robbed had the longest observation time, the customer immediately behind the robber became aware that something was happening and had a shorter observation time, but the third customer did not become aware of anything until the robber bumped into him. This scenario demonstrates the value and detail of evidence an investigator might expect from witness with differing levels of observation time.</li>
 	<li><strong>Time elapsed between the event and the interview.</strong> A critical aspect of gaining the best account of events from any witness is making sure that the interview happens at the earliest opportunity. It is a practice in police investigation to make every effort to identify and interview witnesses as soon as possible. As a simple exercise to demonstrate the importance of finding and interviewing witness quickly, take a piece of paper and to the best of your ability, write down the details of your day starting at the beginning of the day three days ago. What did you do? Where did you go? Who did you see? If you are like most people, you have some level of daily structure to your life. From that structure, perhaps you will recall you got out of bed at a usual time. Maybe you went to work or stopped at the gym or at your favourite coffee shop on the way to work. These benchmarks of your daily routine may be easily remembered. But, on your way to work, did you happen to see a green van with extensive damage to the front end on the street near your home? Of course, this is a fictitious question, but this would be the kind of inconsequential daily observation information you might be asked to recall by police canvassing for witnesses to a crime.Understanding this time limited aspect of human memory, investigators need to consider how much weight they can place on the accuracy of information being recounted by a witness. If a witness is providing a remarkably accurate recollection of something being recounted from any distance in the past, it is a good idea to ask that person how they can recall what should be a mundane event with such a degree of accuracy or clarity. If they are correct, the witness will sometimes provide a memory trigger that made them notice and causes them to recall. For example, a witness may answer, “Yes, I remember that green van with all the damage to the front end because my brother has a green van just like that and I looked at the driver and saw that it wasn’t my brother. I looked at it even closer because I had never seen that van on my street before.”</li>
 	<li><strong>Ability to record or repetitively recount details</strong>. If a witness was aware that they had witnessed a crime and they were making a conscious effort to record or otherwise memorize the facts, this is a point that the court will be interested in hearing as part of the witness’ evidence. If, for example, to remember the licence number of a suspect vehicle, the witness repeated the number over and over until they were able to write it down, this is an important detail that should be recorded in the witness statement, and the paper upon which the number was written should be seized and retained as an exhibit that can be shown to that witness on the stand as the note they made at the time of the event. This demonstrated that the witness had intent to recall and record the details of an event, which will contribute in a positive way to the credibility of the witness.</li>
 	<li><strong>Physical abilities — hearing, sight, smell, touch, taste and cognitive perception.</strong> The physical faculties of the senses may be used by a witness in their recollection of the events they are describing. When a witness makes a statement referring to their senses, their credibility in giving that evidence will depend upon the extent to which their senses are working. In taking statements from witnesses, the investigator must be satisfied that a witness who claims to have seen an event has adequate vision to make that observation. Similarly, a person who states that they heard something must be able to demonstrate that they have adequate hearing to have heard it. Speaking very quietly to test the hearing limits of a witness or asking a witness to describe something within the visual ranges of the evidence they saw are both reasonable strategies to informally test a witness’s range or limitations of senses. Asking a witness questions about their use of eyeglasses, contact lens, or hearing aids during their observation of events are all reasonable strategies to establish the credibility of a witness to make the observations they are reporting. Flowing from the use of their senses, witnesses will often provide information and cognitive perceptions of the events they witnessed. The cognitive perceptions of a witness are their own personal interpretation of the information they took in through their senses. As such, they are a subjective analysis of the information being sensed. A witness may provide a statement regarding the age of a suspect, the size of an object, the speed of a vehicle, the smell of alcohol on a person’s breath, or even the distance they stood from the event they witnessed. To a certain degree, the court will allow such evidence and opinions of common knowledge from non-expert witnesses; however, a witness may be challenged on their observations, and it is best to understand any misperceptions in advance. Again, informal testing of a witness to become comfortable that their cognitive perceptions and subject interpretations are accurate and not significantly skewed is a reasonable way to test credibility. For estimating the age of a suspect, an investigator could ask the witness to point out other persons who are approximately the same age. Similar tests could be undertaken in testing perceptions of the size of objects, the speed of vehicles, and the distance to locations. For statements regarding observations, such as the smell of alcohol, the investigator should ask the witness to describe their personal experiences with alcohol to know that it was alcohol they smelt. If the witness had not experienced alcohol or been with people who were drinking alcohol, that opinion of smell would lose credibility.</li>
 	<li><strong>Cognitive capacity and age of witness.</strong> To establish the competency of either a child or a person of limited mental capacity, conducting a careful witness credibility assessment will be helpful for the prosecution in meeting challenges to competency. Part of the initial interview should seek to determine if the child or person of limited mental capacity understands the need to tell the truth. The competency background of the witness should be conducted by interviewing persons, such as parents, caregivers, teachers, or doctors, who know the witness and can attest to their mental capacity and their ability to understand questions and communicate their answers.The actual interview of both children and persons of low mental capacity are a delicate and time-consuming process. They must be conducted in a manner that is both suited to the maturity level of the witness, and structured using non-leading questions to elicit answers. In cases where it is possible, investigators with specialized training in this type of interviewing should be utilized. That said, in the first instance, at the scene of an event, it is important for the responding investigator to understand the special considerations that apply to this type of witness in consideration of their evidence. The goal in these cases is to determine how much weight can be attributed to the evidence being provided by witnesses. An investigator may determine that the evidence of a witness is credible and can be used in the development of forming reasonable grounds or, alternately, they may find that the credibility of the witness cannot be established, and the evidence cannot be used in the development of reasonable grounds to take action.</li>
</ol>
<h1>Topic 6: The Truthfully Incorrect Witness</h1>
As much as witnesses are a critical component of the criminal investigation process, they can also become a critical threat to the accuracy and integrity of evidence gathering. This sometimes occurs in an anomaly where an apparently credible, independent witness tells their version of events and they are significantly wrong in what they say they observed. Unlike cases where a witness is motivated to intentionally fabricate or exaggerate their account of events, the truthfully incorrect witness has no malicious intent and will provide their version of the events with a genuine belief that what they are saying is true and accurate. This type of witness is an independent observer with no motivation to lie, and as such the weight of their testimony can carry significant influence for the investigator’s reasonable grounds to believe and eventually carry significant probative value for proof beyond a reasonable doubt in the court. For investigators, the truthfully incorrect witness can become a paradox capable of misleading the outcome of the investigation resulting in a guilty suspect going free or an innocent suspect being arrested and charged. This anomaly of truthfully incorrect witnesses is an issue that investigators must remain mindful of. Witnesses are human and humans are fallible. Even for a witness who appears to be independent and credible, there remains a need to scrutinize and fact check the witness’s version of events against the known physical evidence and the accounts of other witnesses.

The importance of the investigator being mindful of a truthfully incorrect witness cannot be emphasized too strongly. In 1996, for example, the National Institute of Justice in the United States released a report concerning the implications of eyewitness testimony and false memories, and in it, reported that 90% of all DNA exoneration cases defendants were wrongly convicted upon the false memories of eyewitnesses (Brainerd, 2005). More recently, Smarlarz and Wells (2015), citing <em>The Innocence Project,</em> noted that eye-witness testimony was used to convict innocent people in over 70% of DNA exoneration cases. More recently yet, Rose and Beck (2016) note that eyewitness testimony accounts for more wrongful convictions than anything else. Research has shown that false memories in eye witnesses can be created in a number of ways, including through leading questions, reports from others, contact with other people, suggestions, a witness’ own expectations, the expectations of others, other social pressures, and media (Bennett, 2015; Allen, 1991). It has also been established that witness recall can be affected by stress (Morgan et al, 2004) and by alcohol (Oorsouw et al, 2015) in complicated ways.
<h1>Topic 7: Dominant Witness Influence and Conformity</h1>
One of the negative dynamics that can occur in an investigation where there are multiple witnesses is the contamination or influence of witness statements by a dominant witness. This influence can occur when witnesses to an event have not been separated before any interactions or conversations have occurred between the witnesses. These dynamics are possible in almost all cases, and an investigator must always be mindful that this potential exists. It is also possible that a dominant witness will boldly and sometimes aggressively state their version of the events, which can cause other less confident or less sophisticated witnesses to question their own perspective. In such cases, a less dominant witness may change their version of the events or even omit observations to conform to what the dominant witness stated.

Most susceptible to this kind of influence are very young witnesses, elderly witnesses, or witnesses who have timid personalities. On some occasions, where there is an imbalance of power or status in a personal relationship, or even in a subordinate organizational relationship, witnesses may conform to the more powerful witness out of fear of repercussions or hope of favour. In some cases, the dominant witness has a vested interest in having their version of the events stated their way, and the dominant influence towards the other witnesses is intentional and implicitly threatening in its tone.

In cases where witnesses have interacted prior to being interviewed, each witness should be interviewed in seclusion from the others. Witnesses should be asked if they have discussed the event with anyone else or heard anyone else’s version of what happened. They should be cautioned and encouraged to disregard anyone else’s version of events and limit their version to their own account of what was seen and heard during the event.
<h1>Topic 8: Uncooperative Witnesses</h1>
One of the many unpleasant dynamics of criminal activity is when the police attend the scene of a crime and witnesses, or even victims, refuse to cooperate with investigators. Sometimes, these uncooperative persons are part of the criminal lifestyle and are not willing or interested in cooperating in the justice system. The only strategy for police in these cases is to gather as much forensic evidence as possible in relation to the event and to seek charges where sufficient evidence can be found.

Although these uncooperative witnesses may believe they are not required to participate in the criminal justice system, it is entirely possible to <em>subpoena</em> an apparent witness to attend court to be questioned regarding the criminal event they witnessed. If that witness refuses to answer questions in court, it is possible for the judge to find them in contempt of the court and to sentence them accordingly. That said, this rarely happens.
<h1>Topic 9: Conducting Witness Interviews</h1>
Arriving at a crime scene, investigators are often confronted with a cast of characters who may be victims, witnesses, or suspects in the matter to be investigated. In the case of an active event, where immediate in-depth interviews are not possible, it is important to:
<ol>
 	<li>Conduct immediate <em>field interviews</em> of each subject at the scene;</li>
 	<li>Do an immediate preliminary classification of persons found at the scene as victims, witnesses, or suspects; and</li>
 	<li>Take appropriate measures to separate the persons found at the scene for the purpose of physical security and protection of future testimony from cross-contamination of witness accounts and conformity.</li>
</ol>
<h1>Topic 10: The Field Interview</h1>
Attending the scene of an event, the first immediate field interview may be as simple as asking an apparent victim or a probable witness, “What happened here?" This simple question serves several purposes for the investigator. First, it shows that the investigator is not making any investigative assumptions based on what is visible to him or her at first glance. With this question, the person being asked is prompted to supply their own version of the event, as they saw it. This pure version will assist the investigator in developing a picture of the event, and it will provide a context allowing the investigator to classify the speaker as a victim, witness, suspect, or an uninvolved party.

If the person the investigator questioned turns out to be the perpetrator, and the investigator has no other evidence that suggests this person should be a suspect, any statement made by that person would likely be considered a spontaneous utterance and may be admitted in evidence without a <em>voir dire</em>. For example, consider a situation where an investigator arrives at the scene of a street fight where a man has been fatally stabbed. The investigator asks one of the men standing nearby, “What happened here?” and the man immediately says, “I killed him and he deserved it.” This statement would be considered a spontaneous utterance and would likely be admitted as evidence without the usual <em>voir dire</em>. Once this self-incriminating statement has been made, the suspect would need to be immediately arrested and provided with the Charter warning and caution before any further statements could be pursued through additional questioning. Clearly, once a suspect is identified, they can no longer be considered as a witness.

If no one is immediately identifiable as a suspect at the scene of an event, it is reasonable for the investigator to proceed with classifying the persons present as possible witnesses. As discussed earlier in this chapter, to classify the witnesses, the investigator must consider the nature of the evidence that the witness can provide:
<ul>
 	<li>Direct evidence of the eyewitness, which is evidence of seeing the criminal event occurring and perhaps even identifying the suspect; or</li>
 	<li>Circumstantial evidence of the corroborative witness, which is indirect evidence of events, physical evidence, timelines, and spatial relationships that can assist the court in reaching a logical presumption of how the crime occurred and who was responsible.</li>
</ul>
Interviewing a witness is not just a simple matter of hearing their version of the events. There are many factors that can come into play in determining how credible a witness is. Following the initial field interview, and once the event is under control, it is important to take the witness’ formal statement at the earliest available opportunity. Taking the witness statement should be conducted using the best technology available given the circumstances. If audio and or video recording devices are not available, or obtaining them would cause an unreasonable delay in getting the witness statement, a written statement should be taken. No matter how the witness statement is recorded, it should be the goal of the investigator to obtain the best, uninfluenced, and unbiased version of events from a witness.

Like the threat of conformity being induced by a dominant witness, a witness can also be influenced by leading questions asked by an investigator. Some witnesses are so eager to assist in solving the crime that they will attempt to guess the answer to a leading question instead of admitting that they do not know the answer. The caution here is to avoid asking leading questions. Leading questions are questions that a witness might be able to infer the answer by the nature of the wording. An example of a leading question would be:
<blockquote>“Did you see Larry pick up the revolver and shoot Bill in the head?”</blockquote>
This leading double question can be answered yes or no, and it also supplies the witness with a significant amount of information that the witness can infer about the details of the event. These may be details that they would not have previously known. From this question, the witness could infer that Bill was shot in the head, the weapon used was a revolver, the suspect in the shooting was Larry, and the revolver was picked up from somewhere. A better and more appropriate initiation of the statement would be: “Did you witness an event today? Tell me what you saw."

Although this open-ended approach to statement taking is more time consuming, the investigator at least knows that they are not planting any ideas or words to influence the witness’ account of the event. Taking a statement in this manner is known as taking a pure version statement. A pure version statement needs to be the witness’s best, uninterrupted narration of the events, as they recall it. As the witness recounts their best memory of the event, the investigator must resist the temptation to intervene and ask clarifying questions on the points being revealed. Clarifying questions like the question used to start an interview can be leading and can influence the witness’ statement.

As the witness recounts their pure version of the events, the investigator should be taking notes on points to be clarified once the entire statement is completed. Those questions should remain as open-ended as possible. So, if the witness has stated in their pure version of events, “I walked into the room and that is when I saw the shooting happen,” the clarifying question should be an open-ended prompt, such as, “You said you saw a shooting happen, tell me more about that."

There are many different techniques and strategies for witness interviewing that cannot be addressed in this short book as part of an introduction to investigations. The best advice for new investigators for the interviewing of a witness is learning to be patient and allow the witness to tell their story in their own time and in their own way. Avoid the human tendency of trying to assist and interact with the speaker by asking questions, filling in the blanks, and clarifying things while the story is being related. The more effective interview technique is one where the witness can exhaust their memory and relate the events to the best of their ability without interference and the contaminating influence of questions that might derail their train of thought.

As discussed earlier, it sometimes happens that a witness or a reporting victim will turn out to be the perpetrator of a crime. In these cases, allowing the person to provide their full uninterrupted statement can produce incriminating indicators or even evidence of involvement. There is a tendency for criminals who fabricate their report of a crime to make sure they are adding information in their statement that helps eliminates them as a suspect. This can include unsolicited alibis for their whereabouts and their activities at the time of the reported event. When a witness supplies this type of information without being prompted, it can be an indicator of personal involvement in the criminal event. Any such voluntary explanations of personal activities should be recorded carefully and closely scrutinized to confirm the validity of facts. Follow up questions to unsolicited explanations should include seeking the names of independent witnesses who might be able to corroborate the witnesses account.

In the case where an investigator suspicious that a reporting witness or victim may be the perpetrator of the crime, there is no obligation to reveal that suspicion until evidence exists that allows the investigator to form reasonable grounds for belief. If further investigation determines that the statement is a fabrication, this may be sufficient circumstantial evidence to require a warning for at least the offence of mischief for making the false report. In such circumstances, a Charter warning and caution are appropriate before additional questioning is undertaken.
<h2>Taking the Witness Statement</h2>
The written, audio, or video statement of a witness taken by a police investigator will become the permanent record of events as seen by that witness. The police investigator will use the content of that statement as a reference document in the construction of search warrants and in support of reasonable grounds for belief to lay an arrest. The crown prosecutor will use the statement to construct their case for presentation to the court and for pre-trial disclosure of the evidence to the defence counsel. The statement will serve as a document from which the witness may refresh their memory of events to provide accurate testimony to the court.

Considering the foregoing list of uses, the witness statement needs to be as accurate and complete as possible. The standard format used to begin a witness statement is as follows:

<em>This is the statement of <span style="text-decoration: underline;"><strong>witness’s full name</strong></span> taken on <span style="text-decoration: underline;"><strong>date and time</strong></span> at<span style="text-decoration: underline;"><strong> location where taken</strong></span> by </em><strong><span style="text-decoration: underline;"><em>name of person taking or recording the statement</em></span>.</strong>

At the conclusion of the statement, it must be signed by the witness. If the statement is audio and or video recorded, the foregoing preamble needs to be used to start the statement, and once the statement is transcribed, the witness should sign the hard copy transcription.
<h2>Witness Identification of a Suspect — Photo Lineups and Live Lineups</h2>
Beyond taking a statement, one of the most common forms of obtaining information from a witness is the practice of having witnesses identify a suspect through the viewing of photographs or photo lineups. This kind of after the fact identification of a suspect will be subjected to scrutiny when it is presented in court. Strict protocols must be followed to demonstrate that the process was conducted in a fair and unbiased fashion. Under no circumstances would an investigator ever present the witness with only a single photograph or a single lineup suspect and ask if this is the suspect. Additionally, under no circumstances should an investigator ever state that the suspect is one of the persons in the lineup.

In the practice of presenting photo lineups, the photos are arranged in a series of eight pictures or more that are permanently mounted into a series of numbered windows of a special photo lineup file folder.

[caption id="attachment_36" align="aligncenter" width="791"]<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/04/image7-4-791x1024.jpg" alt="Sample photo lineup. Long description available." class="wp-image-36 size-large" width="791" height="1024" /> <a href="#photol">[Long Description]</a>[/caption]The suspect’s photograph is one of the eight pictures and the remaining seven photos are called "distractor photos." To be fair, these distractor photos need to be reasonably similar to the suspect photo in terms of gender, age, race, head hair, facial hair, and glasses. When the photo lineup is presented to the witness, there should be instruction by the investigator that the suspect of the investigation may or may not be in this photo lineup (i.e., "Please look at all the photos carefully and only select the number of a photo if you are certain it is the suspect you saw at the time of the event").

Like photo lineups, live persons may be used to conduct a suspect identification or a suspect in custody. These live lineups are more difficult to create because they require the cooperation of the suspect and if the suspect does something during the viewing that could draw attention to him; it could prejudice the lineup process. As with the photo lineup, the distractor subjects need to be selected to be fairly similar to the suspect; however, unlike photo lineups, the live lineup requires the additional elements of ensuring that everyone is of similar height, weight, body shape, and dress. You cannot put the suspect dressed in a shirt and tie into a lineup with distractors wearing blue jeans and tee shirts.

Another means of suspect identification is permitting the witness to page through volumes of criminal file photos that are part of the local police photo collection. This technique is sometimes used when there are no identifiable suspects and the witness is reasonably certain that they will recognize the face of the suspect if they see it again. The negative aspects of this strategy are that it can take a great deal of time, and a witness can sometimes become confused by the process and overloaded with the viewing of too many faces, causing an eventual loss of confidence in making a proper identification.
<h1>Summary</h1>
This chapter examined the broad range of issues that must be considered by an investigator in relation to the collection of information and evidence from witnesses to a crime. These issues range from the way witness evidence is classified and validated to the way witnesses are assessed and evaluated to determine their ability to give evidence and the credibility of the evidence they give.

The chapter illustrated the processes required for proper witness management during investigations. These task processes of witness identification, classification, credibility assessment, and proper interviewing practices in statement taking are all components of witness management that demonstrate professional standards applied by a criminal investigator.
<div class="textbox textbox--exercises"><header class="textbox__header">
<p class="textbox__title">Study Questions</p>

</header>
<div class="textbox__content">
<ol>
 	<li>What is a collaborative witness?</li>
 	<li>What is an independent witness?</li>
 	<li>Can an accused person be compelled to testify regarding a crime they have been involved in?</li>
 	<li>Are all persons considered competent to testify?</li>
 	<li>What is witness credibility assessment?</li>
 	<li>What concerns should an investigator have about dominant witnesses?</li>
 	<li>What should an investigator do in the case of an active event where immediate in-depth interviews are not possible?</li>
 	<li>Is it possible to have a witness statement in something other than written form?</li>
 	<li>What are two negative aspects of having a witness attempting to identify a suspect by paging through volumes of criminal file photos?</li>
</ol>
</div>
</div>
<h1>Long Descriptions</h1>
<strong id="photol">Photo lineup long description:</strong> A sample document asking the public to identify a suspect in a criminal investigation. Head shots of eight young men of similar age are numbered. Below, the document says, "The person that the police are seeking to identify in their investigation <span style="text-decoration: underline;">may or may not</span> be one of the persons in the photo lineup above. If you positively recognize one of the photographs above as the person you saw, please write the number of that photograph in the space below." Below, it says, "I recognize the person shown in photo #[blank]," and below that is space for "any comment regarding your observation" and the signature of the witness.

A disclaimer at the bottom says "Photos illustrated in this mock photo lineup are student photographs and have been kindly provided with the cooperation and consent of Law Enforcement Studies students and Bachelor of Law Enforcement Studies students from the Justice Institute of British Columbia." <a href="#attachment_36">[Return to Photo lineup]</a>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>90</wp:post_id>
		<wp:post_date><![CDATA[2017-05-08 16:20:44]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-05-08 20:20:44]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-7-witness-management]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>3</wp:post_parent>
		<wp:menu_order>7</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[727]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_export]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 7: Witness Management]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_candela_citation]]></wp:meta_key>
		<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 8: Crime Scene Management</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-8-crime-scene-management/</link>
		<pubDate>Mon, 08 May 2017 20:38:20 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=chapter&#038;p=93</guid>
		<description></description>
		<content:encoded><![CDATA[<div class="textbox">

<em>“Crime scene management, and evidence management as a critical part of that, must be learned and incorporated into the investigator's toolkit.”</em>

</div>
Crime scene management skills are an extremely significant task component of investigation because evidence that originates at the crime scene will provide a picture of events for the court to consider in its deliberations. That picture will be composed of witness testimony, crime scene photographs, physical exhibits, and the analysis of those exhibits, along with the analysis of the crime scene itself. From this chapter, you will learn the task processes and protocols for several important issues in crime scene management. These include:
<ol>
 	<li>Note taking</li>
 	<li>Securing a crime scene</li>
 	<li>Evidence management</li>
 	<li>Scaling the investigation to the event</li>
</ol>
<h1>Topic 1: Note Taking</h1>
Although other documents will be created by the investigator to manage the crime scene, no other document will be as important to the investigator as the notebook. The notebook is the investigator’s personal reference for recording the investigation.

Many variations of police notebooks have emerged over the years. The court will sometimes even accept police notes that have been made on a scrap of paper if that was the only paper available at the time. However, beyond extreme circumstances, in operational investigations, the accepted parameters of a police notes and notebooks are:
<ul>
 	<li>A book with a cover page that shows the investigators name, the date the notebook was started, and the date the notebook was concluded</li>
 	<li>Sequential page numbers</li>
 	<li>A bound booklet from which pages cannot be torn without detection</li>
 	<li>Lined pages that allow for neat scripting of notes</li>
 	<li>Each entry into the notebook should start with a time, date, and case reference</li>
 	<li>Blank spaces on pages should not be left between entries and, if a blank space is left, it should be filled with a single line drawn through the space or a diagonal line drawn across a page or partial page space</li>
 	<li>Any errors made in the notebook should only be crossed out with a single line drawn through the error, and this should not be done in a manner that makes the error illegible</li>
</ul>
In court, the investigator’s notebook is their best reference document. When testifying, the court will allow an investigator to refer to notes made at the time to refresh their memory of events and actions taken. When an investigator’s notebook is examined by the court, notes consistent with the investigator’s testimony provide the court with a <em>circumstantial assurance or truthfulness</em> that the evidence is accurate and truthful (McRory, 2014). Alternately, if critical portions of the investigation are not properly recorded or are missing from the notebook, those portions of the evidence will be more closely scrutinized by the defence. The court may give those unrecorded facts less weight in its final deliberations to decide proof beyond a reasonable doubt.

For an investigator, good notes are an overview of the things seen/heard and the actions taken. A chronology of notes demonstrates the investigator’s mental map of the facts that led to forming reasonable grounds for an arrest and charges. Court cases are often extended by adjournments, appeals, or suspects evading immediate capture. This can extend the time between the investigation and the trial by several years. In these protracted cases, it becomes critical for the investigator to have detailed notes that accurately reflect their investigation to trigger their memory of the facts.

As important as the notebook is, note taking skills are often an underemphasized aspect of police training. Most police investigators develop their personal skills and note taking strategies through on the job experience and in the “trial by fire” of cross examination in court. This void in the training of note taking skills is likely due to the broad range of circumstances under which note taking needs to take place and because it is impossible to anticipate what facts will become important in every possible variation of circumstances. Thus, some combination of training, common sense, and experience will come into play for investigators to become proficient in recognizing what to record in their notebook.

The concept of "notes made at the time of an event is a rather misleading definition and requires some explanation. In an ideal world, an investigator would be able to proceed through an investigation with an open notebook and record each fact and each observation of events as they transpire. Of course, the way events unfold is dynamic and unpredictable. Circumstances often require an investigator to be fully engaged in efforts to bring a situation under control, while protecting the life and safety of persons. There is no place for an open notebook in such cases and the investigator is clearly not taking any notes at that time, but will do so after the event is under control, and as soon as it is practical to do so. Although the typical reference in court is to <em>notes made at the time</em>, in actuality, they are notes made as soon as practical under the unique circumstances of the event.

The courts do accept the operational dynamics that exists for investigators, and it sometimes becomes a question at trial to know when the notes were actually composed. As such, an investigator should always be prepared to answer this question. Having a note in the notebook regarding the time when the writing of notes was and finished acts as a reference to demonstrate awareness and attention to this issue.

Another issue related to notes made at the time is the dilemma of facts that were overlooked and then recalled after the initial notes have been completed. The human memory does have its limitations and flaws. On occasion, an investigator will complete the initial draft of their notes, and, at some later time may suddenly recall a point that was missed. On such occasions, returning to the pages of notes made at the time and attempting to insert the recalled facts is not an acceptable practice. The proper way to record these later recollections of fact is to immediately start a new note page, using the current time and date, make a reference to the previous case-notes, previous time, date, and page number, and record the newly recalled fact or facts. These kinds of recalled facts and late entries will be closely examined by defence counsel, and it can sometimes be helpful if the investigator can also make note of the fact or circumstances that led to the recollection of the additional information. Anyone who has ever participated in a critical incident, where life and safety have taken priority, can tell you that once the event is under control, investigators can be seen writing intently to document their recollection of the events.

The following strategies are recommended as a general guide to note taking:
<ol>
 	<li>Start notes by creating a big picture perspective and then move from the general to the more specific observations. In this big picture, you are creating a perspective of the facts that you have been made aware of to begin an investigation. These big picture facts become the starting point of your mental map of events, and these facts will be the framework to begin thinking about offence recognition and forming reasonable grounds to believe and take action.</li>
 	<li>In more specific terms, and to the extent it is possible, begin recording all dates, times, and descriptions of persons, places, and vehicles as they emerge. You may, in fact, have already started a page in your notebook where some exact times, addresses, licence plate numbers, names or persons, and perhaps even blurted statements from a suspect have been jotted down. It is acceptable to use these key pieces of jotted information already recorded to enlarge your detailed notes at the end of the event in a more complete fashion.</li>
 	<li>Record the identities of persons encountered and how the identity of each person was verified. For example: Witness Jane Doe (DOB: 8 May 64) 34345-8 St Anywhere BC Photo drivers licence ID</li>
 	<li>Record all statements made by witnesses and victims to reflect an accurate account of the information being conveyed. It is often not possible to record every statement made verbatim in notes, and, in most cases, it is not necessary. Today, technology makes it possible to digitally record the verbatim account being provided by a witness or a victim. But, merely digitally recording a statement is not sufficient, since statements will frequently form considerations in establishing reasonable grounds for belief to take action. Recording the critical details being conveyed will provide a written record of the facts considered to form reasonable grounds for belief.</li>
 	<li>If a person is a suspect or is a person who may become a suspect, make every effort to record any statements made by that person verbatim. Suspects will often be found at the scene of a crime posing as a witness or even as a victim. Accurately recording the initial statements made by such a person can produce evidence of guilt in the form of statements that are provably false or even incriminating.</li>
</ol>
It is the personal responsibility of each investigator to document their personal perception and recollection of the event they are witnessing, as it unfolds. In cases where investigators have collaborated on an agreed version of events and authored their notes to reflect those agreed upon facts, the notes are no longer the personal recollection of that investigator and, as such, may be scrutinized as being a collective version of events aimed at producing evidence that does not reflect a true account of the facts as they were witnessed by each individual investigator.

The practice of collaborating and making collective notes is sometimes called “boxing of notes” — this practice can be discovered by defence when the individual notebooks of investigators are identical or close to identical in format and content. The practice of boxing of notes has been identified as one of the flaws in investigative practice that can lead to miscarriages of justice (Salhany, 2008). As such, collaboration between investigators when making notes should be avoided. If, at any point, there is a collaboration to return to an issue together and re-examine physical evidence to clarify the point for each investigator, that collaborative effort should be noted as part of the note making of each investigator.

Despite this caution regarding the collective production of notes, there are occasions where a collective note making process is used and is accepted as reasonable. This occurs during large scale operations involving many participants, sometimes coordinated by an Emergency Operations Command Center. In these cases, there is a need for the command centre participants to be completely engaged in handling the event, which may extend over periods of hours or days. The practice of each participant waiting until the protracted event has been concluded to make their individual notes would be impractical and potentially inaccurate. In these cases, it is now accepted operational practice to assign one person in the command centre to act as the collective maker-of-notes to substitute for individual note-taking. The note maker in these situations is known as “The Scribe.” For the persons in the command centre to be aware of the notes being made, the Scribe does not make notes into a typical notebook. In such cases, the notes are made onto large pieces of flipchart paper and, as each sheet of notes is completed, it is posted onto the wall of the command centre where each participant can reference the content of the notes and verify the accuracy of the notes. At the end of the operation, the collective pages of notes are photographed and the note pages are saved by the scribe as an exhibit. Each page is often initialled by the participants. Under this process, each participant in the command centre may adopt these notes as a reference document for court purposes.
<h1>Topic 2: Integrity of the Crime Scene</h1>
As part of crime scene management, protecting the integrity of the crime scene involves several specific processes that fall under the <strong>Tasks </strong>category of the <strong>STAIR</strong> Tool. These are tasks that must be performed by the investigator to identify, collect, preserve, and protect evidence to ensure that it will be accepted by the court. These tasks include:
<p style="padding-left: 60px;">a) Locking down the crime scene</p>
<p style="padding-left: 60px;">b) Setting up crime scene perimeters</p>
<p style="padding-left: 60px;">c) Establishing a path of contamination</p>
<p style="padding-left: 60px;">d) Establishing crime scene security</p>
When an investigator arrives at a crime scene, the need to protect that crime scene becomes a requirement as soon as it has been determined that the criminal event has become an inactive event and the investigator has switched to a strategic investigative response. As you will recall from the Response Transition Matrix, it is sometimes the case that investigators arrive at an active event in tactical investigative response mode. In these cases their first priority is to protect the life and safety of people, the need to protect the crime scene and its related evidence is a secondary concern. This is not to say that investigators attending in tactical investigative response mode should totally ignore evidence, or should be careless with evidence if they can protect it; however, if evidence cannot be protected during the tactical investigative response mode, the court will accept this as a reality.

As soon as the event transitions to an inactive event with a strategic investigative response, the expectations of the court, regarding the protection of the crime scene and the evidence, will change. This change means that there is an immediate requirement for the investigator to take control of and lock down that crime scene.
<h2>a) Locking Down the Crime Scene</h2>
Very often, when the change to strategic investigative response is recognized, first responders and witnesses, victims, or the arrested suspect may still be inside the crime scene at the conclusion of the active event. All these people have been involved in activities at the crime scene up to this point in time, and those activities could have contaminated the crime scene in various ways. Locking down the crime scene means that all ongoing activities inside the crime scene must stop, and everyone must leave the crime scene to a location some distance from the crime scene area. Once everyone has been removed from the crime scene, a physical barrier, usually police tape, is placed around the outside edges of the crime scene. Defining of the edges of the crime scene with tape is known as establishing a <em>crime scene perimeter</em>. This process of isolating the crime scene inside a perimeter is known as locking down the crime scene.
<h2>b) Crime Scene Perimeter</h2>
The crime scene perimeter defines the size of the crime scene, and it is up to the investigator to decide how big the crime scene needs to be. The size of a crime scene is usually defined by the area where the criminal acts have taken place. This includes all areas where the suspect has had any interaction or activity within that scene, including points of entry and points of exit. The perimeter is also defined by areas where the interaction between the suspect and a victim took place. In some cases, where there is extended interaction between a suspect and a victim over time and that activity has happened over a distance or in several areas, the investigator may need to identify one large crime scene, or several smaller crime scene areas to set crime scene perimeters. Considering the three stages of originating evidence, an investigator may find that pre-crime or post-crime activity requires the crime scene perimeter to surround a larger area, or there maybe even be an additional separate crime scene that needs to be considered.

For some crime scenes where there are natural barriers, such as buildings with doorways, it is easy to create a crime scene perimeter defining access. This becomes more complicated in outdoor venues or large indoor public venues, where fencing and barricades may be needed along with tape markers to define the perimeters.

Once the crime scene perimeter has been established and lock down has taken place, it becomes necessary to ensure that no unauthorized persons cross that perimeter. Typically, and ideally, there will only be one controlled access point to the crime scene, and that point will be at the entry point for the <em>path of contamination</em>.
<h2>c) Path of Contamination</h2>
It is not possible to eliminate all potential contamination of a crime scene. We can only control and record ongoing contamination with a goal to avoid damaging the forensic integrity of the crime scene and the exhibits. Once a crime scene has been cleared of victims, witnesses, suspects, first responders, and investigators, it is necessary to record, in notes or a statement from each person, what contamination they have caused to the scene. The information being gathered will document what evidence has been moved, what evidence has been handled, and by whom. With this information, the investigator can establish a baseline or status of existing contamination in the crime scene. If something has been moved or handled in a manner that has contaminated that item before the lock down, it may still be possible to get an acceptable analysis of that item if the contamination can be explained and quantified.

As an example, sometimes in cases of serious assaults or even murders, paramedics have been present at the scene treating injured persons. When this treatment is happening, non-suspect-related DNA transfer between persons and exhibits can occur. Determining those possibilities is one of the first steps in establishing the level of existing contamination at the time of lock down.

With everyone now outside the crime scene and the perimeter locked down, the next step is to establish a designated pathway where authorized personnel can re-enter the crime scene to conduct their investigative duties. This pathway is known as a <em>path of contamination</em> and it is established by the first investigator to re-enter the crime scene after it has been locked down. Prior to re-entering, this first investigator will take a photograph showing the proposed area where the path of contamination will extend, and then, dressed in the sterile crime scene apparel, the investigator will enter and mark the floor with tape to designate the pathway that others must follow. In creating this pathway, the first investigator will avoid placing the pathway in a location where it will interfere with apparently existing evidence and will place it only where it is required to gain a physical view of the entire crime scene. As other investigators and forensic specialists enter the crime scene to perform their duties, they will stay within the path of contamination and, when they leave the path to perform a specific duty of investigation or examination, they will record their departure from the path and will be prepared to demonstrate their departure from the pathway and explain any new contamination caused by them, such as dusting for fingerprints or taking exhibits.
<h2>d) Crime Scene Security</h2>
At the same time the crime scene is being defined with perimeter tape, it is also necessary to establish a security system that will ensure that no unauthorized person(s) enters the crime scene and causes contamination. For this purpose, a crime scene security officer is assigned to regulate the coming and going of persons from that crime scene. For the assigned security officer, this becomes a dedicated duty of guarding the crime scene and only allowing access to persons who have authorized investigative duties inside the crime scene. These persons might include:
<ul>
 	<li>Forensic specialists</li>
 	<li>Search team members</li>
 	<li>Assigned investigators, and/or</li>
 	<li>The coroner in the case of a sudden death investigation</li>
</ul>
To maintain a record of everyone coming and going from the crime scene, a document, known as a “Crime Scene Security Log,” is established, and each authorized person is signed in as they enter and signed out as they depart the scene with a short note stating the reason for their entry. Any unauthorized person who enters or attempts to enter a crime scene should be challenged by the crime scene security officer, and, if that person refuses to leave, they can be arrested, removed from the scene, and charged for obstructing a police officer.

The assigned security officer is responsible for creating and maintaining the Crime Security Log, which can take various forms. In short term, small scale investigations, it may only require a single page in the security officer’s note book; however, in a large scale, long term investigation, the log could include volumes of pages under the care of several assigned security officers working in shifts. Whatever the scale or format, the security log records who attended the scene, when they attended, why they were there, and when they left the scene. An example of a crime scene security log is shown in the following example.

[caption id="attachment_139" align="alignnone" width="791"]<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/CRIME-SCENE-SECURITY-LOG-791x1024.jpg" alt="Crime scene security log. Long description available." class="wp-image-139 size-large" width="791" height="1024" /> <a href="#cssl">[Long Description]</a>[/caption]
<h1>Topic 3: Evidence Management</h1>
As we have already learned in the <strong>STAIR</strong> tool, analysis is the process that must occur to establish connections between the victims, witnesses, and suspects in relation to the criminal event. The crime scene is often a nexus of those events and consequently, it requires a systematic approach to ensure that the evidence gathered will be acceptable in court.

Exhibits, such as blood, hair, fibre, fingerprints, and other objects requiring forensic analysis, may illustrate spatial relationships through evidence transfers. Other types of physical evidence may establish timelines and circumstantial indications of motive, opportunity, or means. All evidence within the physical environment of the crime scene is critically important to the investigative process. At any crime scene, the two greatest challenges to the physical evidence are <em>contamination</em> and loss of <em>continuity.</em>
<h2>Contamination of Evidence</h2>
Contamination is the unwanted alteration of evidence that could affect the integrity of the original exhibit or the crime scene. This unwanted alteration of evidence can wipe away original evidence transfer, dilute a sample, or deposit misleading new materials onto an exhibit. Just as evidence transfer between a suspect and the crime scene or the suspect and the victim can establish a circumstantial connection, contamination can compromise the analysis of the original evidence transfer to the extent that the court may not accept the analysis and the inference that the analysis might otherwise have shown.

Contamination can take place in any number of ways including:
<ul>
 	<li>Police or other first responders interfering with evidence during a tactical investigative response</li>
 	<li>Suspects interfering with the crime scene to cover up or remove evidence</li>
 	<li>Victims or witnesses handling evidence</li>
 	<li>Animals, including pets, causing unwanted transfer of evidence or even removal of evidence through contact or consumption</li>
 	<li>Weather-related contamination due to rain, wind, or snow diluting or washing away evidence, or</li>
 	<li>Crime scene investigators failing to follow proper crime scene management procedures and causing contamination of exhibits or cross-contamination between exhibits during their investigation</li>
</ul>
Contamination is a fact of life for investigators, and any crime scene will have some level of contamination before the scene becomes an inactive event and the police can lock down the location. While issues of life and safety are at risk, the court will accept that some contamination is outside the control of the investigator. That tolerance for controlling contamination changes significantly once the crime scene is locked down and is under control. Once the scene has been locked down, crime scene management procedures <strong>must</strong> be put in place. Crime scene contamination presents three challenges for investigators, namely:
<ol>
 	<li>Preventing contamination when possible,</li>
 	<li>Controlling ongoing contamination, and</li>
 	<li>Recording the known contamination that has taken place</li>
</ol>
In regards to the phrase “control ongoing contamination,” the word "control" is used because investigators cannot eliminate ongoing contamination, they can only seek to control it. This practice of identifying and recording the known contamination is necessary, and even if contamination has taken place, identifying and explaining that contamination may salvage the analysis of exhibits that have been contaminated.

During the critical period between the lockdown of the crime scene and obtaining a warrant to search the crime scene, investigators need to consider the possibilities for ongoing contamination. If reasonable grounds exist to believe that evidence of the crime will be damaged or destroyed by some threat of contamination, the investigator has the authority, under exigent circumstances, to re-enter that crime scene without a warrant to take the necessary steps to stop or prevent contamination and protect the evidence.

The very act of entering the crime scene to collect evidence, and the process of evidence collection, are forms of contamination. The goal in controlling ongoing contamination is to avoid damaging the forensic integrity of the crime scene and its associated exhibits. It is this goal that makes crime scene management procedures essential to the investigative process.
<h2>Loss of Continuity</h2>
Like controlling contamination, establishing and maintaining continuity of evidence are protocols that protect the integrity of that evidence. For any evidence to be accepted by the court, the judge must be satisfied that the exhibit presented is the same item that was taken from the crime scene. Evidence must be presented to demonstrate “the chain of continuity,” which tracks every exhibit from the crime scene to the courtroom.

The evidence to show continuity will come from the investigator testifying that the exhibit being presented is the same exhibit that was seized at the crime scene. This testimony is supported by the investigator showing the court their markings on the exhibit or its container. These markings will include the time, date, and investigator initials, as well as a notebook entry showing the time, date, and place when the item was transported and locked away in the main exhibit holding locker. This evidence is further supported by an Exhibit Log that shows the exhibit as part of the crime scene evidence detailing where at the crime scene it was found, by whom it was found, and the supporting initials of anyone else who handled that exhibit from the crime scene continuously to the main exhibit locker. Any process where that exhibit is removed from the main exhibit locker for examination or analysis must be similarly tracked and documented with the initials, time, and date of any other handlers of the item. Any person who has handled the exhibit must be able to take the stand providing testimony that maintains the chain of continuity of the exhibit. These are simple processes yet critical. If they are not followed rigorously, it can result in the exclusion of exhibits based on lost continuity.
<h2>Attention to Originating Stages of Evidence</h2>
One of the big dilemmas in crime scene management is determining where the criminal event happened or where the event extended to. Making these determinations provides the investigator with the locations where evidence of the crime may be found. This is often not a simple matter of just attending one location or thinking about the criminal event in just a single timeframe. In the investigative process, there are three possible stages of time where evidence can originate. These are the pre-crime stage, the criminal event stage, and the post-crime stage.

These three stages of crime can also mean there could be other locations outside the immediately crime scene area where criminal activities might have also taken place and evidence might be found. The point to remember about the originating stages of evidence is that each of these stages provides possibilities for collecting evidence that could connect the suspect to the crime. When considering theory development or making an investigative plan, each of these stages of the criminal event should be considered.
<ol>
 	<li><strong>The Pre-Crime Stage</strong> occurs when evidence of preparation or planning can be found during the investigation. It can include notes, research, drawings, crime supplies or pre-crime contact with the victim or accomplices. Sometimes items of pre-crime origin, such as hair and fibre, will be later discovered at the crime scene creating an opportunity to link the suspect back to the crime</li>
 	<li><strong>The Criminal Event Stage</strong> is when the most interaction takes place between the criminal and the victim, or the criminal and the crime scene. During these interactions, the best possibilities for evidence transfer occur. Even the most careful criminals have been known to leave behind some trace of their identity in the form of fingerprints, shoe prints, glove prints, tire marks, tool impressions, shell casings, hair or fibre, or DNA.</li>
 	<li><strong>The Post-Crime Stage</strong> occurs when the suspect is departing the crime scene. When leaving the crime scene, suspects have been known to cast off items of evidence that can be recovered and examined to establish their identity. This post-crime period is also the stage where the suspect becomes concerned with cleaning up the scene. As much as a suspect may attempt to clean up, evidence transfers from the crime scene are often overlooked. These can range from hair and fibre on clothing to shards of glass on shoes. Frequently found post-crime are proceeds of the crime. These are often identifiable articles of stolen property with unique marks, victim DNA, serial numbers, or sometimes even trophies that the criminal takes as a keepsake.</li>
</ol>
[caption id="attachment_94" align="aligncenter" width="1024"]<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-07-1024x636.png" alt="The originating stages of evidence. Long description available." class="wp-image-94 size-large" width="1024" height="636" /> <a href="#tosoe">[Long Description]</a>[/caption]Evidence does not always appear as a fully formed piece of information that offers an immediate connection or an inference to implicate a suspect. It often comes together as fragments of fact in timelines, spatial relationships, and evidence transfers between the originating stages of evidence constructing circumstantial pictures to demonstrate the suspect’s identity, the fact pattern of the crime, opportunity, means, or motive and intent.
<h2>Enhancing the Value of Evidence Recovered</h2>
Pieces of physical evidence often referred to as exhibits, have investigative values at two different levels for investigators. At the first level each physical exhibit has a face value represented by what it is and where it exists within the context of the crime scene. For example a bloody shoeprint found on the floor of a crime scene tells us that someone transferred evidence of blood onto their shoe from a source and walked in a particular direction within the crime scene. These are first level interpretations of evidence that we can reconstruct with our own observations. At the second level this same bloody shoeprint may be subjected to forensic examinations that could provide additional information. For example analysis of the shoeprint pattern, size, and accidental characteristics may allow a positive match to the shoe of a suspect, or the blood may be examined to match the DNA of a victim or other originating source. Both these first level and second level values can greatly assist in creating a reconstruction and interpretation of what happened at the crime scene.

Physical exhibits that need to be examined, seized, and documented at any crime scene are a major concern for investigators. As mentioned earlier, one of the big challenges for investigators is to identify and document all of the available evidence and information. This raises the important questions of what will become evidence and what is going to be important?

When the suspect and the fact-pattern are not immediately apparent, how does an investigator determine which items within the crime scene need to be considered and taken as possible evidence? There are some general practices that can be followed, but a guiding principle of evidence collection followed by most experienced investigators is to err on the side of caution. More is always better than less. To assist in deciding what could possibly become relevant, investigators need to consider:
<ul>
 	<li>Items that the suspect may have touched or interacted with</li>
 	<li>Items that a victim may have touched or interacted with</li>
 	<li>Items that the suspect may have brought to the crime scene</li>
 	<li>Items that may have passed between the suspect and the victim</li>
 	<li>Items that the suspect may have taken from the crime scene</li>
 	<li>Items that the suspect may have discarded while departing the crime scene</li>
</ul>
Once the crime scene examination has been completed, and the crime scene has been unsecured and abandoned as an open area, returning to collect forgotten evidence is often not possible. It is better to collect everything that could possibly be relevant or could become relevant.

In terms of searching for evidence, once the crime scene has been locked down and secured, the crime scene itself needs to be considered as the first big exhibit. As the first big exhibit, it needs to be subjected to documentation using photography, video recording, measurements, and diagrams. Within this first big exhibit, other smaller and possibly-related exhibit may be discovered. What items are found and where may show spatial relationships of interaction demonstrating proof to support a sequence of events. This physical evidence will become the benchmark of known facts that investigators can use to verify the stories of victims and witnesses, or even the alibi of a possible suspect. Physical evidence at both level-one and level-two becomes the known facts upon which theories of events may be developed and tested. <em>Any item could be considered evidence if it demonstrates a spatial relationship relative to the place, the people, or the times, relative to the criminal event.</em>

<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/Img-08-1024x924.png" alt="A crime case is made up of the suspects, timelines, victims, witnesses and physical evidence." class="aligncenter wp-image-95 size-large" width="1024" height="924" />

The very first step at this point is securing and documenting the crime scene. It is helpful for investigators to recognize that a crime scene is not just a location where exhibits are found, but the crime scene should be considered as a single big exhibit unto itself. Not only will individual exhibits within the crime scene have value as evidence, the spatial relationships between exhibits in the scene may speak as circumstantial evidence to the overall event.

To secure the crime scene as the first big exhibit, investigators will conduct a complete walk-through on the path of contamination completely photographing and videotaping the entire crime scene. This first process is very helpful in demonstrating the exact state of the crime scene prior to things being moved for forensic examination. This should happen immediately after lock down and it will become a snapshot demonstrating the existing spatial relationships at that point in time.
<h2>Creating a Field Sketch and Crime Scene Diagram</h2>
The next step is to document the crime scene as either a field sketch or a crime scene diagram. Either of these can be done to illustrate the physical dimensions and notable characteristics of the crime scene. The difference between the Field Sketch and the Crime Scene Diagram is that the sketch, as implied by the name, is a quick rough depiction of the event. The field sketch, like notes in an investigator’s notebook, serves as a memory aid. The crime scene diagram is a more formal representation of the same information, but is composed to scale using the assistance of the field sketch and measurements. In either of these drawings of the crime scene similar core information will be represented.
<ul>
 	<li>If it is a building, it will show the address of the location, entries, exits, windows, the position of rooms, the position of furniture, and the location of all exhibits relative to the crime.</li>
 	<li>In an outdoor crime scene, establishing and documenting the location of the scene becomes more complex. The geographic location of an outdoor scene needs to be established relative to some known geographic location, such as a roadway intersection, a mile-marker, or even by way of fixing of GPS coordinates of latitude and longitude to a permanent fixed object at the crime scene. In some cases, such as a large open field, where no permanent fixed objects are available, it may become necessary to place a fixed object like a steel survey pin to mark a fixed point at the crime scene.</li>
 	<li>After the initial diagram features are completed and evidence is collected within the crime scene, each of those exhibits will be shown on the diagram with an exhibit number. That number will be cross referenced to the exhibit log that will be completed by an assigned exhibit custodian as part of the crime scene management team. This process of showing each exhibit as a number eliminates the need to clutter the diagram with written description of each exhibit found. In some cases, where there are many exhibits, writing the description of each exhibit onto the diagram would make it unreadable, cluttered, and confusing.</li>
 	<li>In addition to existing features and evidence at the crime scene, the diagram will also show the location of the path of contamination that has been established and the external perimeter of the crime scene.</li>
 	<li>As part of accepted protocols, these diagrams are always drawn with an orientation to North at the top of the diagram, and all writing on the diagram is oriented in one direction, namely east to west</li>
</ul>
<h2>The Exhibit Log</h2>
As part of the evidence management process, establishing the first link in the chain of continuity occurs when the crime scene is secured and the assigned exhibit custodian records of the exhibits that have been identified at the scene is created. These items are recorded in a document called an “Exhibit Log” or an “Exhibit Ledger.” This Exhibit Log or Ledger shows an assigned number for each exhibit that is identified and seized. It shows where at the scene the exhibit was located, and the number of that exhibit is place in the corresponding location in the crime scene diagram.

The Exhibit Log shows who seized the exhibit and when it was turned over to the exhibit custodian. The Exhibit Log also shows a time and date when the exhibit was placed into the main secure exhibit storage locker. When the exhibits are taken to court, the court will only accept the exhibits if the secured chain of continuity can be shown to be guarded and unbroken. If an exhibit custodian were to stop and leave the exhibits unguarded in a vehicle or left the exhibit in the office while attending to another matter – that would break the chain of continuity. The following document is an example of a common Exhibit Log Document.

[caption id="attachment_140" align="alignnone" width="791"]<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/05/EXHIBIT-LOG-791x1024.jpg" alt="Sample exhibit log. Long description available." class="wp-image-140 size-large" width="791" height="1024" /> <a href="#exhlog">[Long Description]</a>[/caption]Evidence at a crime scene is generally found in two forms. One is evidence of witnesses who can provide their observations of the criminal event. The other is physical items of evidence that can be examined, analyzed, and interpreted to illustrate facts about the criminal event. Each of these forms of evidence present some similar concerns for investigators, and each requires some specific considerations to best search for, collect, and preserve the information that exists.
<h2>Searching for Witness Evidence</h2>
Identifying and interviewing the witnesses to a criminal event can be as simple as speaking to persons who have remained at the scene of the crime to give statements. Alternately, it can be as difficult as identifying and tracking down a person who saw something or heard something that was part of the criminal event, but they are not even aware that what they saw or heard was important, or they do wish to cooperate with the police.

The process searching for witnesses starts at the crime scene itself. This search will include not only identifying and interviewing the persons who are immediately present, but also determining who else might have been present during the pre-crime and post-crime stages of the event.
<ul>
 	<li>Often, witnesses remaining at the crime scene can assist in identifying other witnesses who were present and have since departed.</li>
 	<li>CCTV security cameras can sometimes assist in identifying other witnesses who were present.</li>
 	<li>Identifying the vehicles parked in proximity to the crimes scene or returning to the crime scene on subsequent days around the time of the crime can assist in identifying a witness whose normal course of activities may have previously put them in the area at the time of the crime.</li>
</ul>
In addition to these witness search strategies, another process known as canvassing for witnesses can also be employed. Canvassing is a strategy of conducting door-to-door inquiries in the immediate area of the crime to determine if anything was seen or heard by neighbours. Canvassing can also take the form of structured media releases to request persons with knowledge of the criminal event to come forward. Whatever witness identification strategies are used, time is of the essence. Memories fade and people under normal circumstances only retain day-to-day recollection of unremarkable events for a limited time. Identifying and speaking to the witness, and receiving their best recollection of the events, will be discussed in the chapter on witness management; however, witness evidence can make or break the investigation, and it must be collected quickly, accurately, and effectively.
<h2>Searching for and Identifying Physical Evidence</h2>
Earlier in this book, we described physical evidence as the buried treasure for investigators and critical when it comes to verifying or discounting various versions of an event in court. Physical evidence is something tangible that the court can examine and consider in making connections and determining proof beyond a reasonable doubt. In contrast, witness evidence does not have a physical quality that the court can observe. It requires the court to accept the perception and interpretation of events being provided by a person and, as such, the court cannot evaluate witness evidence with the same confidence of verification that it uses when considering physical evidence.

In our sub-section on Originating Stages of Evidence, we looked at the timeframes and alternate crime scene venues where evidence of a crime may be found. Now, we are going to consider the physical evidence that investigators should think about when evaluating what might constitute an item of physical evidence. We will consider how evidence can be searched for, how it should be collected, when it should be collected, and how it should be preserved. These processes present several challenges:
<ol>
 	<li><strong>Physical evidence can be transient or time sensitive.</strong> As part of the big picture search in the first instance, the investigator must be conscious of physical evidence that needs to be immediately recorded and documented.</li>
 	<li><strong>Physical evidence can be concealed and may not be easily visible.</strong> Walking onto a crime scene in the first instance, it would be unrealistic for an investigator to believe they will immediately see all the physical evidence that needs to be collected. Items of physical evidence can exist in many forms and discovering their existence is a matter of careful examination of the entire scene. The idea of conducting a big picture search first allows the investigator to not only discover the immediately apparent items, but also for a survey of the crime scene to determine areas where the small scale and more detailed search might be productive.
<ul>
 	<li>Doors and windows: open, locked, or unlock can be relevant to time and means of entry or exit from the scene</li>
 	<li>Condition of room lighting: turned on or off can suggest the lighting conditions at the time of the crime</li>
 	<li>Status of appliances in use at the scene can indicate certain activities</li>
 	<li>Last activation of electronic devices can narrow timelines of activity</li>
 	<li>Ambient crime scene temperature and body temperature can be relevant in relation to time of death and the progress <em>rigor mortis</em> or decomposition</li>
</ul>
</li>
 	<li><strong>The immediate value of an item may not be visible at first glance.</strong> Moving from the big picture search to identify items in the smaller scale search, investigators can conduct a detailed grid search of the crime scene to locate items that may be very small or are concealed by other objects. These grid searches can be useful in breaking down the crime scene into smaller search areas to make sure that no area goes unexamined. Along with this detailed search for small or concealed items, the investigator needs to consider enlisting the assistance of forensic specialists to search for items that may require enhanced examination and analysis beyond the bounds of regular human senses and perception. For example, the use of black light can reveal body fluid or stains, and latent fingerprints can become visible after fuming or the application of special powder. In most major criminal cases, forensic specialists will be available to assist in conducting the detailed crime scene search. Every investigator must be proficient in recognizing when to utilize of these forensic tools.</li>
 	<li><strong>The size or nature of an item of evidence may make it impossible to seize or preserve.</strong> Among the challenges of gathering evidence at a crime scene are:
<ul>
 	<li>Some exhibits are too big to be physically seized and brought to court. As previously noted, the entire crime scene and the inherent spatial relationships of objects within that scene could be considered as one big exhibit that needs to be shown to the court. This big crime scene exhibit is captured and can be presented to the court by way of video recording, photographs, crime scene diagram, or using a sample of smaller exhibits within the scene itself.</li>
 	<li>Some exhibits are perishable and impractical to seize and preserve for court. A good example would be the evidence of the dead body in a murder case. The body itself would be impractical to bring to court. It is considered adequate to have photographic evidence and certificates of analysis on pathology samples.</li>
 	<li>Some exhibits are transient in nature and cannot be permanently seized and preserved for court. For example, ambient room temperature or lighting status at the crime scene needs to be preserved by photographs and measurements in that moment of time and subsequently presented to the court as photographs and readings by the attending investigator.</li>
</ul>
</li>
 	<li><strong>The collection of certain evidence can cause cross-contamination to other exhibits.</strong> A major consideration in the collection of any evidence at a crime scene is to ensure that evidence with any potential for cross-contamination is handled in a manner that takes precautions against this occurring. In most cases, at major crime scenes, physical evidence is collected by forensic experts. However, this does not preclude the need for investigators to understand the dangers of cross-contamination and the precautions required to prevent it. This is particularly true when it comes to the collection of bodily substances where DNA might be collected. DNA analysis is now so advanced that even a small trace of DNA material can be transferred by the careless or inadvertent handling of one exhibit to the next. This cross-contamination can be avoided or prevented by the practice of handling only one exhibit at a time, marking that exhibit, placing into a secure container, and decontaminating the investigator by changing gloves and discarding any item could have come into contact with the previous exhibit. Despite the assurance that forensic specialists will normally attend a crime scene for evidence collection, it is possible that an investigator at the scene will be forced to handle a number of exhibits to protect that evidence from some type of environmental damage or other security threat.</li>
</ol>
<h1>Topic 4: Scaling the Investigation to the Event</h1>
Not every crime scene is a major event that requires an investigator to call out a team and undertake the crime scene and evidence management processes that have been described in this book. Often, for minor crimes, a single investigator will be alone at the crime scene and will engage in all the roles described, albeit on a far smaller scale. When this process is being undertaken by a single investigator on a smaller scale, the issues of diagram, security log, and exhibit log may be limited to data and illustrations in the notebook of the investigator.

It is important to stress that each of the tasks below needs to be considered and addressed for every crime scene investigation, no matter how big or how small. Specifically:
<ul>
 	<li>The crime scene must be secured, preserved, and recorded until evidence is collected</li>
 	<li>Existing contamination must be considered and recorded</li>
 	<li>Cross-contamination must be prevented</li>
 	<li>Exhibits must be identified, preserved, collected, and secured to preserve the chain of continuity.</li>
</ul>
Large scale or small scale, all these issues must be considered, addressed, and recorded to satisfy the court that the crime scene and the evidence were handled correctly.
<h1>Summary</h1>
In this chapter, we have discussed the critical issues of crime scene management, evidence identification, evidence location, evidence collection, evidence protection, and proper documentation. These are the most important skills that an investigator can learn and incorporate into their investigative toolkit. As much as these tasks may seem simplistic, ritualistic, and mundane, they are the very foundation of a criminal investigation, and without this foundation of proper evidence practices in place, the case will collapse when it comes to court.

There is a great opportunity on a day-to-day basis for new investigators to begin practicing the protocols of crime scene management on a smaller scale investigating crimes such as break and entry and lower level assaults. Once these skills of crime scene management and evidence management are learned and incorporated into daily practice, they will become the procedural norm and will form the essential operational habits for proper and professional investigative practice.
<h1>Long Descriptions</h1>
<strong id="cssl">Crime scene security log long description:</strong> A blank crime scene security log. It has spaces to write down the name of the assigned scene security officer, the date, the police department investigating the scene, the file number, and the crime scene location. It also has a table with several rows to record everyone who has attended the crime scene. The table has spaces for name and rank, initials, date/time in, date/time out, duties on crime scene, and contamination caused. <a href="#attachment_139">[Return to Crime scene security log]</a>

<strong id="tosoe">The originating stages of evidence long description:</strong> A chart showing what happens at the different originating stages of evidence. The three stages are:
<ul>
 	<li>Pre-crime stage
<ul>
 	<li>Planning</li>
 	<li>Notes</li>
 	<li>Research</li>
 	<li>Crime supplies</li>
</ul>
</li>
 	<li>Criminal event stage
<ul>
 	<li>Most transfer of physical evidence</li>
 	<li>Suspect to Victim</li>
 	<li>Victim to Suspect</li>
 	<li>Suspect to Scene</li>
</ul>
</li>
 	<li>Post-crime stage
<ul>
 	<li>Avoiding apprehension</li>
 	<li>Casts-off evidence</li>
 	<li>Evidence of clean-up</li>
 	<li>Transfer takeaway</li>
 	<li>Proceeds of the crime</li>
</ul>
</li>
</ul>
<a href="#attachment_94">[Return to The originating stages of evidence]</a>

<strong id="exhlog">Exhibit log long description:</strong> A sample exhibit log. There is room to write the name of the assigned exhibit custodian, the date, the file number, and the location. There is a table with several rows for writing about the exhibits from a crime scene. There are spaces for the exhibit number, description, who the exhibit was seized by, the date/time, the location, when the exhibit was turned over to the exhibit custodian, and the date/time secured. <a href="#attachment_140">[Return to Exhibit log]</a>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>93</wp:post_id>
		<wp:post_date><![CDATA[2017-05-08 16:38:20]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-05-08 20:38:20]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-8-crime-scene-management]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>3</wp:post_parent>
		<wp:menu_order>8</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[727]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_export]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 8: Crime Scene Management]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_candela_citation]]></wp:meta_key>
		<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 9: Interviewing, Questioning, and Interrogation</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-9-interviewing-questioning-and-interrogation/</link>
		<pubDate>Fri, 12 May 2017 18:51:58 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=chapter&#038;p=100</guid>
		<description></description>
		<content:encoded><![CDATA[<div class="textbox">

<em>“Understanding the correct processes and legal parameters for interviewing, questioning, and interrogation, can make the difference between having a suspect’s confession accepted as evidence by the court or not.”</em>

</div>
In this chapter, we will examine the interviewing, questioning, and interrogation of suspects as information gathering techniques police use to aid them in investigations. In modern day policing, interviewing, questioning, and interrogation techniques are measured, objective, and ethical. They are aimed at the goal of discovering the truth; not just getting a confession to a crime. This is a contrast to earlier times of policing, when techniques called the “third degree” sometimes involved threats, intimidation, coercion, and even physical violence. Fortunately, these “third degree” techniques were identified in the United States by the Wickersham Commission in 1931, as being unlawful police practices that caused false confessions and miscarriages of justice, where suspects were sometimes wrongfully convicted and imprisoned (Head, 2010).

Emerging from this, police forces across North America, who were using the “third degree” techniques to varying extents, started moving towards less oppressive and less aggressive methods of interrogating suspects (Gubrium, 2002).

While there has been a significant evolution to more objective and ethical practices, the courts still remain vigilant in assessing the way police interview, question, and interrogate suspects during criminal investigations. The courts expect police to exercise high standards using practices that focus on the rights of the accused person, and minimize any physical or mental anguish that might cause a false confession. In meeting these expectations, the challenges of suspect questioning and interrogation can be complex, and many police agencies have trained interrogators and polygraph operators who undertake the interrogation of suspects for major criminal cases. But not every investigation qualifies as a major case, and frontline police investigators are challenged to undertake the tasks of interviewing, questioning, and interrogating possible suspects daily. The challenge for police is that the questioning of a suspect and the subsequent confession can be compromised by flawed interviewing, questioning, or interrogation practices. Understanding the correct processes and the legal parameters can make the difference between having a suspect’s confession accepted as evidence by the court or not. With the above in mind, this chapter will focus on several salient issues, including:
<ol>
 	<li>The progression from interviewing to questioning to interrogating, and how this progression relates to investigative practices</li>
 	<li>The junctures that demonstrate the need to change from interviewing a witness to questioning a detained suspect to interrogating an arrested suspect</li>
 	<li>The issues of physical and mental distress, and how to avoid the perception of officer-induced distress during an interrogation</li>
 	<li>The seven elements to review to prepare an interrogation plan</li>
 	<li>The five common reasons arrested suspects waive their right to silence and provide statements and confessions</li>
 	<li>The interrogation strategies to initiate statements using the motivations within the five common reasons</li>
 	<li>The three types of false confessor and strategies to deal with false confessions</li>
 	<li>The additional rights of young offenders and practices required to meet the investigative obligations under Canada’s <em>Youth Criminal Justice Act</em></li>
 	<li>Ancillary offence recognition</li>
</ol>
<h1>Topic 1: Interviewing – Questioning – Interrogating</h1>
Police investigations can be dynamic, and the way events unfold and evidence is revealed can be unpredictable. This premise also holds true for interviewing, questioning, interrogating suspects. Players in a criminal event may be revealed as suspects at different stages of the investigation. To properly secure and manage the statement evidence that is gained during interactions with suspects or possible suspects, it is important for investigators to understand the actions that should be taken at each stage, while remembering that interviewing, questioning, and interrogating are terms that refer to separate stages in the process of gathering verbal responses from a suspect or a possible suspect. But each stage is different in relation to when and how the information gathering process can and should occur. The differences between these three stages needs to be defined in the mind of the investigator since they will move through a process of first interviewing, then questioning, and finally interrogating a suspect. When this progression occurs, the investigator needs to recognize the changing conditions and take the appropriate actions at the correct junctures to ensure that, if a confession is obtained, it will be admissible at trial. Given this, let us examine the operational progression of these three stages and identify the circumstances that make it necessary to switch from one stage to the next.

<strong>Interviewing</strong> a possible suspect is the first stage and the lowest level of interaction. In fact, the person is not even definable as a suspect at this point. As pointed out in our chapter on witness management, suspects often report criminal events while posing as witnesses or even victims of the crime. The investigator receiving a statement report from such a person may become suspicious that they are not being truthful; however, until those suspicions are confirmed by evidence that meets the test of forming reasonable grounds for belief, the investigator may continue to talk to this possible suspect without providing any Section 10 Charter or cautions. There is a unique opportunity at that point to gather the poser’s version of events, including any untrue statements that may afford an opportunity to later investigate and demonstrate a possible fabrication, which is by itself a criminal offence. The transition point for an investigator to move from interviewing a witness or victim to detaining and questioning the person as a possible suspect should occur when real evidence is discovered giving the investigator reasonable grounds to suspect that the person is involved in the event. Discovering real evidence and gaining "reasonable grounds to suspect" creates an obligation for the investigator to stop interviewing the person who then becomes a suspect. At this point, the person is a suspect a should be detained for the suspected offence and provided the appropriate Section 10 Charter and Statement Caution before proceeding with the questioning of the suspect.

<strong>Questioning</strong> a suspect is the next level of interaction. For a suspect to be questioned, there will be some type of circumstantial evidence that allows the investigator to detain that suspect. In our previous scenario of the young man found at 3AM standing under the tree in a residential area at the boarder of an industrial complex one block away from the building where a break-in was confirmed to have taken place, that young man was properly detained, chartered, and warned for the investigation of the break-in. However, there was no immediate evidence that could link him to that actual crime at that point. He was only suspected by the circumstantial evidence of time, conduct, and proximity to the event. He was obligated to provide his name and identification. If he had tried to leave, he could have been arrested for obstructing a police officer in the execution of duty. The investigator at the scene of that incident would have questioned this suspect, and by his rights under the <em>Canadian Charter of Rights and Freedoms</em>, the suspect would not be obliged to answer questions.

This right to not talk does not preclude the investigator from asking questions, and the investigator should continue to offer the suspect an opportunity to disclose information that may be exculpatory and enable the investigator to eliminate that person as a suspect in the crime being investigated. As an example of this, again, consider our young man who was detained when found standing under the tree near a break-in. If that man had answered the question what are you doing here by stating that he lived in the house just across the street, and when he heard the break-in alarm, he came outside to see what was happening, this would greatly reduce suspicion against the young man once this statement was confirmed. Subsequent confirmation by a parent in the home that they had heard him leave when the alarm sounded could eliminate him as a suspect and result in his release.

<strong>Interrogation</strong> is the most serious level of questioning a suspect, and interrogation is the process that occurs once reasonable grounds for belief have been established, and after the suspect has been placed under arrest for the offence being investigated. Reasonable grounds for belief to make such an arrest require some form of direct evidence or strong circumstantial evidence that links the suspect to the crime. Of course, where an arrest is made, the suspect will be provided with their charter rights and the police caution, as per the following:
<blockquote>
<h5>Charter Warnings</h5>
Section 10(a)

"I am arresting/detaining you for: (State reason for arrest/detention, including the offence and provide known information about the offence, including date and place.)"

Section 10(b)

"It is my duty to inform you that you have the right to retain and instruct Counsel in private, without delay. You may call any lawyer you want. There is a 24-hour telephone service available which provides a legal aid duty lawyer who can give you legal advice in private. This advice is given without charge and the lawyer can explain the Legal Aid Plan to you. If you wish to contact a legal aid duty lawyer, I can provide you with the telephone number.

Do you understand?

Do you want to call a lawyer?" <span>(Canadian Charter, 1982, s 10(a,b))</span>
<h5><strong>Police Warning</strong></h5>
"You are not obliged to say anything, but anything you do say may be given in evidence." (Transit Police, 2015)

If the suspect has already had communication with the police in relation to the offence being investigated, they should be provided with the secondary caution. This secondary caution serves to advise the accused person that, even if they have previously made a statement, they should not be influenced by that to make further statements.
<h5>Secondary Police Warning</h5>
"(Name), you are detained with respect to: (reason for detainment). If you have spoken to any police officer (including myself) with respect to this matter, who has offered you any hope of advantage or suggested any fear of prejudice should you speak or refuse to speak with me (us) at this time, it is my duty to warn you that no such offer or suggestion can be of any effect and must not influence you or make you feel compelled to say anything to me (us) for any reason, but anything you do say may be used in evidence" (Transit Police, 2015).</blockquote>
Once the accused has been afforded the opportunity to speak with a lawyer, the caution obligations of the police to the accused have been met, and the suspect may be questioned with respect to their involvement in the offence. These cautions and warnings may sound like a great deal of effort aimed at discouraging a suspect from saying anything at all to the police, and, in many cases that is the result. However, if the cautions are properly administered, and the opportunities to speak with counsel are properly provided, a major obstacle to the admission of any future statements has been satisfied.

Interrogation generally takes place in the formal environment of an interview room and is often tape-recorded or video-recorded to preserve the details of what was said. A video recording is the preferred means because it accurately represents the environment of the interview room in which the interrogation was conducted. In challenging the processes of an interrogation where a statement has been made by an accused, defence counsel will look for anything that can be pointed to as an oppressive environment or threatening conduct by the investigator. Within the appropriate bounds of maintaining an environment of safety and security, the investigator should make every effort to demonstrate sensitivity to these issues.

Seating in the room should be comfortable and balanced for face to face contact. The investigator should not stand over the suspect or walk around the room behind the suspect while conducting the interview. More than one investigator in the room with the suspect can be construed as being oppressive and should be avoided. The suspect should be offered a beverage or food if appropriate and should be told that a bathroom is available for their needs upon request. The demeanour of the investigator should be non-aggressive and calm, demonstrating an objective professional tone as a seeker of the truth. Setting a non-aggressive tone and establishing an open rapport with the suspect is not only beneficial to demonstrate a positive environment to the court, it also helps to create a positive relationship of openness and even trust with the suspect. This type of relationship can be far more conducive to gaining cooperation towards a statement or even a confession.

Prior to beginning the actual interrogation, the investigator should prepare an interrogation plan by:
<ol>
 	<li>Reviewing the suspect’s profile, criminal record, and past investigations</li>
 	<li>Reviewing the full details of the existing investigation to date</li>
 	<li>Determining the elements of the offence that will need to be proved</li>
 	<li>Determining if sufficient evidence has already been obtained to submit a <em>prima facia </em>case to Crown</li>
 	<li>Examining evidence that demonstrates motive, opportunity, and means</li>
 	<li>Determining what evidence was located and considered in forming reasonable grounds to arrest the suspect</li>
 	<li>What physical evidence has been found that may yet be analyzed to prove the suspect’s involvement</li>
</ol>
Preparing the interrogation plan can assist the investigator in developing a strategy to convince the suspect to answer questions or confess to the crime. Those uninitiated to the process of interrogation might wonder why anyone would possibly choose to answer questions or confess when they have been provided with their <em>Charter of Rights and Freedoms</em> and the standard caution that they are not obliged to say anything, and anything they do say may be used as evidence. There are several reasons that can motivate or persuade a suspect to answer questions or confess. Statements or confessions are often made despite the warnings that would seemingly deter anyone from saying anything. These reasons include:
<ul>
 	<li>Wishing to exonerate oneself,</li>
 	<li>Attempting deception to outsmart the system,</li>
 	<li>Conscience,</li>
 	<li>Providing an explanation to minimize one’s involvement in the crime, or</li>
 	<li>Surrender in the face of overwhelming evidence.</li>
</ul>
Investigators who are familiar with these reasons and motivations can utilize them in assessing their suspect and developing a strategy for their interrogation plan.
<h2>Exoneration</h2>
After making an arrest, an objective investigator must always be prepared to hear an explanation that will challenge the direct evidence or the assumptions of the circumstantial evidence that led to the reasonable grounds for belief to make that arrest. The best reason an arrested suspect can be offered to answer questions is to be exonerated from the crime. It is possible, and it does occur, that persons are arrested for a crime they have not committed. Sometimes, they are wrongly identified and accused by a victim. Other times, they are incriminated by a pattern of circumstantial evidence that they can ultimately explain. The interrogation following the arrest is an opportunity for the suspect to put their version of events on the record, and to offer an alternate explanation of the evidence for investigators to consider. Exoneration is not just an interrogation strategy; it is the duty of an objective investigator to offer a suspected person the opportunity of make an explanation of the evidence that led to their arrest. This can be initiated by offering the suspect the proposition, “This is the evidence that led to your arrest. If there is an alternate explanation for this evidence, please tell me what that is." In some cases, the statements made by the suspect will require additional investigation and confirmation of facts to verify the exoneration. Conducting these investigations is also the duty of an objective investigator.
<h2>Deception to Outsmart the System</h2>
Some experienced criminals or persons who have committed well-planned crimes believe that they can offer an alternate explanation for their involvement in the criminal event that will exonerate them as a suspect. An investigator may draw answers from this type of suspect by offering the same proposition that is offered for exoneration. This is the opportunity for a suspect to offer an alibi or a denial of the crime and an alternate explanation or exonerating evidence. It can be very difficult for a suspect to properly explain away all the evidence. Looking at the progression of the event, an interrogator can sometimes ask for additional details that the suspect cannot explain. The truth is easier to tell because it happened, and the facts will line up. In contrast, a lie frequently requires additional lies to support the untrue statement. Examining a statement that is believed to be untrue, an interrogator can sometimes ask questions that expose the lies behind the original lie.
<h2>Conscience</h2>
As much as the good guys versus the bad guys' concept of criminal activity is commonly depicted in books and movies, experienced investigators can tell you that people who have committed a criminal offence often feel guilt and true regret for their crime. This is particularly true of persons who are first-time offenders and particularly young offenders who have committed a crime against a person.

Suspects fitting this category may be identified by their personal profile, which typically includes no criminal record, no police record or limited police record of prior investigations, evidence of poor planning, or evidence of emotional/spontaneous actions in the criminal event.

Suspects who fit this profile may be encouraged to talk by investigators who have reviewed the effect that the criminal act has had on the victim or the victim’s family. Following this review of victim impact, the investigator can accentuate the suspect’s lack of past criminal conduct, while making the observation that the suspect probably feels really bad about this. Observing the suspect during this progression, a suspect affected by guilt will sometimes exhibit body language or facial expressions of concern or remorse. Responses, such as shoulders slumping, head hung down, eyes tearing up, or avoiding eye contact, can indicate the suspect is ashamed and regretful of the crime. Observing this type of response, an investigator may move to a theme of conversation that offers the suspect the opportunity to clear their conscience by taking responsibility for their actions and apologizing or by taking some other action to right the wrong that has been done.
<h2>Explanation to Minimize Involvement</h2>
Suspects who have been arrested will sometimes be willing to provide an additional explanation of their involvement or the events to reduce their level of culpability or blame for the crime. In cases where multiple suspects have been arrested for a crime, one of those suspects may wish to characterize their own involvement as peripheral, sometimes as being before the fact or after the fact involvement. Examples of this would be a person who left the door unlocked for a break-in to take place or merely driving the getaway car. These less involved suspects hope to gain a reduced charge or even be reclassification as a witness against their co-accused. In such cases, where multiple suspects are arrested, the investigator can initiate this strategy by offering the proposition, “If you have only a limited or minimal level of involvement in this crime, you should tell me about that now.”
<h2>Surrender to Overwhelming Evidence</h2>
The arrested suspect in a criminal investigation waiting in custody for interrogation has plenty to think about. Even the most experienced criminals will be concerned about how much evidence the police have for proving their connection to the crime. In the process of presenting a suspect with the opportunity to address the evidence that has been collected, an additional strategy can sometimes be engaged where there is a large volume of incriminating evidence or undeniable direct evidence, such as eyewitnesses or strong forensic evidence for circumstantial connections of the suspect to the crime. In such cases, if the interrogator can reveal the evidence in detail to the suspect, this disclosure may result in the suspect losing hope and making a confession to the crime. Although this tendency to surrender to overwhelming evidence may seem illogical, it does happen. Sometimes, this surrender has more to do with conscience and shame of the crime, but other times, the offender has just lost the energy to resist what they perceive to be a hopeless fight. As counter intuitive as this may seem, research has found that the suspect's perception of the strength of police evidence is one of the most important factors influencing their decision to confess to police (Gudjonsson &amp; Petursson, 1991). More recent research has shown that the stronger the evidence, the more likely a suspect was to confess (Gudjonsson, 2015 ).
<h1>Topic 2: Dealing with False Confessions</h1>
As noted at the beginning of this chapter, the goal of ethical interviewing, questioning, and interrogation is to elicit the truth, and the truth can include statements that are either inculpatory confessions of guilt or exculpatory denial of involvement in a crime. Whenever an investigator has interrogated a suspect, and a confession of guilt has been obtained, that investigator needs to take some additional steps to ensure that the confession can be verified as truthful before it goes to court. These additional steps are required because, although the investigator has not used any illegal or unethical techniques, the court will still consider whether the accused, for some reason, has confessed to a crime they did not commit. A skilled defence lawyer will often present arguments alleging that psychological stresses of guilt or hopelessness from exposure to overwhelming evidence have been used to persuade a suspect to confess to a crime they did not commit. In such cases, it is helpful for the court to hear any additional statements made by the accused, such as those that reveal that the suspect had direct knowledge of the criminal event that could only be known to the criminal responsible.

In police investigations, there are many details of the criminal event that will be known to the police through their examination of the crime scene or through the interview with witnesses or victims. These details can include the actual way the crime was committed, such as the sequence of events, the tools used in the crime; or the means of entry, path of entry/exit, along with other obscure facts that could only be known by the actual perpetrator. There are opportunities in a crime scene examination for the investigator to observe one or more unique facts that can be withheld as “hold back evidence.” This hold back evidence is not made part of reports or media release, and is kept exclusively to test for false confessions. Confessing to the crime is one thing, but confessing to the crime and revealing intimate details is much more compelling to the court. Regardless of the effort and care that investigators take to not end up with a false confession, they still occur, and there are some more common scenarios where false confessions happen. It is important for an investigator to consider these possibilities when a confession is obtained. These situations are:
<ol>
 	<li><em>The confessor was enlisted to take the blame</em> — On occasions where persons are part of organized crime, a person of lower status within the group is assigned or sacrificed to take the blame for a crime in place of a person of higher status. These organizational pawns are usually persons with a more minor criminal history or are a young offender, as they are likely to receive a lesser sentence for the offence.</li>
 	<li><em>The Sacrificial Confessor </em>— Like the confessor enlisted in an organized criminal organization, there is another type of sacrificial confessor; the type who steps forward to take the blame to protect a friend or loved one. These are voluntary confessors, but their false confession can be exposed by questioning the confessor about the hold back details of the event.</li>
 	<li><em>The Mentally Ill False Confessor </em>— This type of false confessor are encountered when there is significant media attention surrounding a crime. As Pickersgill (2015) noted, an innocent person may voluntarily provide a false confession because of a pathological need for notoriety or the need to self-punish due to guilt over an unrelated past offences. Additionally, those suffering from psychosis, endogenous depression, and Munchausen Syndrome may falsely confess to a crime they did not commit (Abed, 2105)<strong><em>. </em></strong>As with other false confessors, these people can be discovered using hold back detail questioning.</li>
</ol>
<h1>Topic 3: Interviewing, Questioning, and Interrogating Young Offenders</h1>
Over the past century, with the <em>Juvenile Delinquents Act</em> (1908), the <em>Young Offenders Act</em> (1984), and the <em>Youth Criminal Justice Act</em> (2003), there has been an increased recognition in Canada of the need to treat young offenders differently than their adult counterparts. Recognizing the special needs of youth, each of these acts moved to treat young offenders less punitively and with a greater attention to rehabilitation. Further, under the <em>Youth Criminal Justice Act</em> (<em>YCJA</em>), young offenders are regarded as a special category of suspect, and some very strict rules apply to the process of arresting, questioning, or interrogating a young offender. For instance, the <em>YCJA</em> requires the notification and inclusion of parents or guardians in situations where a youth is being subjected to action for an investigation or a charge for an offence. As well, any young persons must have their Charter Rights explained by the investigator with language appropriate to their age and level of understanding. This means that the officer must talk with and assess an accused youth to determine their ability to understand their rights before taking their statement.

The officer’s process of assessment will be questioned and examined by the court before any statement made by a youth is admitted as evidence. During this examination, the court will determine from the evidence whether the youth fully understood the rights being explained to them. An officer presenting evidence of having conducted a proper assessment of an accused youth should have notes reflecting the conversations and specific observations of the youth’s responses to satisfy the court that adequate efforts were made to ensure that the youth did understand their rights. Good evidence of understanding can be achieved by asking the youth to repeat, summarize, or paraphrase their understanding of the rights that were explained to them.

In addition to the right to instruct counsel, as afforded to any adult under the <em>Canadian Charter of Rights and Freedoms</em>, a youth must also be afforded the additional right of being given a reasonable opportunity to consult with a parent or, in the absence of a parent, an adult relative or any other appropriate adult chosen by the young person, as long as that person is not a co-accused or under investigation for the same offence.

Further, in addition to this right, there is also an obligation on the police investigator to provide independent notice to the parent of a detained young person as soon as possible. The requirement for notice to the parent is a separate obligation for police, and it requires specific notification of (a) the name of the young person, (b) the charge against the young person, and (c) a statement that the young person has the right to be represented by counsel. If a parent is not available to receive this notice, it may be given to a person whom the investigator deems appropriate. In the case of some young people, this could be an older sibling, an adult caregiver, or, for those in the care of Social Services, a social worker in charge of the young person care. In any case, these requirements and others specific to young offenders are spelled out under Sec 146 of the <em>Youth Criminal Justice Act</em>:
<blockquote>Youth Criminal Justice Act (Section 146)

(1) Subject to this section, the law relating to the admissibility of statements made by persons accused of committing offences applies in respect of young persons.

(2) No oral or written statement made by a young person who is less than eighteen years old, to a peace officer or to any other person who is, in law, a person in authority, on the arrest or detention of the young person or in circumstances where the peace officer or other person has reasonable grounds for believing that the young person has committed an offence is admissible against the young person unless
<p style="padding-left: 30px;">(a) the statement was voluntary;</p>
<p style="padding-left: 30px;">(b) the person to whom the statement was made has, before the statement was made, clearly explained to the young person, in language appropriate to his or her age and understanding, that</p>
<p style="padding-left: 60px;">(i) the young person is under no obligation to make a statement,</p>
<p style="padding-left: 60px;">(ii) any statement made by the young person may be used as evidence in proceedings against him or her,</p>
<p style="padding-left: 60px;">(iii) the young person has the right to consult counsel and a parent or other person in accordance with paragraph (c), and</p>
<p style="padding-left: 60px;">(iv) any statement made by the young person is required to be made in the presence of counsel and any other person consulted in accordance with paragraph (c), if any, unless the young person desires otherwise;</p>
<p style="padding-left: 30px;">(c) the young person has, before the statement was made, been given a reasonable opportunity to consult</p>
<p style="padding-left: 60px;">(i) with counsel, and</p>
<p style="padding-left: 60px;">(ii) with a parent or, in the absence of a parent, an adult relative or, in the absence of a parent and an adult relative, any other appropriate adult chosen by the young person, as long as that person is not a co-accused, or under investigation, in respect of the same offence; and(d) if the young person consults a person in accordance with paragraph (c), the young person has been given a reasonable opportunity to make the statement in the presence of that person.</p>
(3) The requirements set out in paragraphs (2)(b) to (d) do not apply in respect of oral statements if they are made spontaneously by the young person to a peace officer or other person in authority before that person has had a reasonable opportunity to comply with those requirements.

(4) A young person may waive the rights under paragraph (2)(c) or (d) but any such waiver
<p style="padding-left: 30px;">(a) must be recorded on video tape or audio tape; or</p>
<p style="padding-left: 30px;">(b) must be in writing and contain a statement signed by the young person that he or she has been informed of the right being waived.</p>
(5) When a waiver of rights under paragraph (2)(c) or (d) is not made in accordance with subsection (4) owing to a technical irregularity, the youth justice court may determine that the waiver is valid if it is satisfied that the young person was informed of his or her rights, and voluntarily waived them.

(6) When there has been a technical irregularity in complying with paragraphs (2)(b) to (d), the youth justice court may admit into evidence a statement referred to in subsection (2), if satisfied that the admission of the statement would not bring into disrepute the principle that young persons are entitled to enhanced procedural protection to ensure that they are treated fairly and their rights are protected.

(7) A youth justice court judge may rule inadmissible in any proceedings under this Act a statement made by the young person in respect of whom the proceedings are taken if the young person satisfies the judge that the statement was made under duress imposed by any person who is not, in law, a person in authority.

(8) A youth justice court judge may in any proceedings under this Act rule admissible any statement or waiver by a young person if, at the time of the making of the statement or waiver,
<p style="padding-left: 30px;">(a) the young person held himself or herself to be eighteen years old or older;</p>
<p style="padding-left: 30px;">(b) the person to whom the statement or waiver was made conducted reasonable inquiries as to the age of the young person and had reasonable grounds for believing that the young person was eighteen years old or older; and</p>
<p style="padding-left: 30px;">(c) in all other circumstances the statement or waiver would otherwise be admissible.</p>
(9) For the purpose of this section, a person consulted under paragraph (2) (c) is, in the absence of evidence to the contrary, deemed not to be a person in authority. (Government of Canada, 2015)</blockquote>
<h1>Topic 4: Ancillary Offence Recognition</h1>
Criminal acts can be complex and persons committing crimes can be devious. For every law prohibiting a criminal act, there are those who seek to avoid prosecution or to subvert the law completely. Criminal law has evolved into the current model to reflect the different types of crimes that are possible, and this evolution now includes laws known as ancillary offences. For an investigator, part of the investigative skill set is learning to recognize the evidence and fact patterns that constitute these ancillary criminal acts. These offences include:
<ul>
 	<li>Conspiracy to commit an offence</li>
 	<li>Attempting to commit an offence</li>
 	<li>Being an accessory after the fact to an offence</li>
 	<li>Aiding and abetting an offence</li>
 	<li>Counselling a person to commit an offence</li>
 	<li>Compounding an indictable offence</li>
</ul>
For any of these offences, an investigator needs to be aware of the types of information and evidence that will support these charges. Sometimes an investigation will identify a suspect participant where there appears to be a nexus of involvement to the crime, but that nexus is not sufficient evidence of a criminal act to support an arrest or a charge. In these cases, an ancillary offence may be appropriate.
<h2>Conspiracy to Commit an Offence</h2>
A conspiracy to commit any offence requires an agreement between two or more persons to commit a criminal act.
<blockquote><strong>Conspiracy Offence Criminal Code of Canada</strong>

<span style="color: initial; font-size: 1.0em; text-align: justify;">(1) Except where otherwise expressly provided by law, the following provisions apply in respect of conspiracy:</span>
<p style="padding-left: 30px;">(a) every one who conspires with any one to commit murder or to cause another person to be murdered, whether in Canada or not, is guilty of an indictable offence and liable to a maximum term of imprisonment for life;</p>
<p style="padding-left: 30px;">(b) every one who conspires with any one to prosecute a person for an alleged offence, knowing that he did not commit that offence, is guilty of an indictable offence and liable</p>
<p style="padding-left: 60px;"> (i) to imprisonment for a term not exceeding ten years, if the alleged offence is one for which, on conviction, that person would be liable to be sentenced to imprisonment for life or for a term not exceeding fourteen years, or</p>
<p style="padding-left: 60px;">(ii) to imprisonment for a term not exceeding five years, if the alleged offence is one for which, on conviction, that person would be liable to imprisonment for less than fourteen years;</p>
(c) every one who conspires with any one to commit an indictable offence not provided for in paragraph (a) or (b) is guilty of an indictable offence and liable to the same punishment as that to which an accused who is guilty of that offence would, on conviction, be liable; and

(d) every one who conspires with any one to commit an offence punishable on summary conviction is guilty of an offence punishable on summary conviction. (Dostal, 2012)</blockquote>
The offence that is being conspired upon is called the “target offence,” and that offence does not need to be carried out to constitute the offence of conspiracy. All that is required to establish the offence of conspiracy is evidence that two or more persons conspired together and formed a common intent to commit the targeted offence.

As an interesting side note to the conspiracy charge: if two persons conspire together to commit any offence outside of Canada and that offence would be an offence if committed in Canada, they may be charged with conspiracy (Government of Canada, 2017). In other words, two persons may conspire in Canada to commit a murder in the United States, and, even if that murder is not committed, they could be charged with conspiracy to commit murder.

Conspiracy opens the door to many possibilities where persons not otherwise chargeable may be held accountable for their part in a criminal act or in a proposed criminal act.

Consider the situation where an armed robbery of a bank occurs and three suspects flee the scene as police respond. The last suspect to exit the bank, William Tooslow, is stopped and arrested by police responding to the alarm, but the other two suspects escape. As the investigation proceeds, no additional evidence is found to identify the two robbers who escaped, but searches of Mr. Tooslow’s cell phone reveal book messages and emails with another male, Iben Faster, where plans to rob this bank were clearly being made over the past week.

Although there is not enough evidence to place Mr. Faster in the bank at the time of the robbery, he could still be charged with conspiracy to commit armed robbery, while Mr. Tooslow is charged with the actual offence of armed robbery. During an interrogation, a suspect may attempt to minimize their involvement in the crime and admit only to participating in making the plan. An investigator needs to recognize that this is still a chargeable offence.
<h2>Attempting to Commit an Offence</h2>
Like conspiracy, attempting to commit an offence does not require that the offence is committed.
<blockquote><strong>Attempts – Criminal Code of Canada</strong>
<p style="padding-left: 30px;">24. (1) Every one who, having an intent to commit an offence, does or omits to do anything for the purpose of carrying out the intention is guilty of an attempt to commit the offence whether or not it was possible under the circumstances to commit the offence. (Dostal, 2012)</p>
</blockquote>
Unlike conspiracy, attempting to commit an offence only requires one person planning the crime to commit the target offence. For the offence of attempting to commit an offence to be completed, there must be evidence to show that the accused went past the point of mere planning and did something or omitted to do something in the furtherance of their plan. This attempting to commit provision can be a useful strategic tool for investigators because it provides the option to intervene before an offence in the planning stage takes place.

Consider the scenario where a suspect, Franky Yapsalot, tells a friend that he is planning to do a home invasion at the residence of a wealthy local businessman on Saturday night. The friend informs to the police and investigators conduct surveillance on Mr. Yapsalot. On Saturday night, Mr. Yapsalot is observed wearing dark clothing and gloves and gets into his car with a sawed off shotgun. As he drives into the residential area of the businessman’s home, police stop his car and make the arrest. In this case, sufficient evidence would exist to make a charge of attempted break and enter with intent to commit an indictable offence.

The offence of attempting to commit an offence can sometimes allow police to take effective enforcement action and intervene before the target offence occurs, without endangering the proposed victim of the planned offence. At the interrogation stage of an investigation, a suspect wanting to minimize his culpability may admit to sufficient planning and action to make out the offence of attempting to commit.
<h2>Being an Accessory After the Fact to an Offence</h2>
Accessory after the fact is another offence where a person can be charged with participating in a crime, even if they were not directly involved in planning or carrying out the primary offence.
<blockquote><strong>Accessory after the fact – Criminal Code of Canada</strong>

23. (1) An accessory after the fact to an offence is one who, knowing that a person has been a party to the offence, receives, comforts or assists that person for the purpose of enabling that person to escape. (Dostal, 2012)</blockquote>
A person can be charged as an “accessory after-the-fact” to an offence, if evidence is discovered to show that they knew that another person had committed the primary offence and they received, comforted, or assisted that person to enable them to escape justice. An example of this offence could be where a person receives a phone call from a friend asking to be transported and hidden away after escaping from prison. If the friend complies with this request, they would become an accessory after the fact to the offence of escaping lawful custody.
<h2>Counselling a Person to Commit an Offence</h2>
In this type of ancillary crime, the person providing the counselling becomes a party to the offence if it is committed.
<blockquote><strong>Person counselling offence – <em>Criminal Code of Canada</em></strong>

22. (1) Where a person counsels another person to be a party to an offence and that other person is afterwards a party to that offence, the person who counselled is a party to that offence, notwithstanding that the offence was committed in a way different from that which was counselled.

<strong>Idem</strong>

(2) Every one who counsels another person to be a party to an offence is a party to every offence that the other commits in consequence of the counselling that the person who counselled knew or ought to have known was likely to be committed in consequence of the counselling.

<strong>Definition of “counsel”</strong>

(3) For the purposes of this Act, “counsel” includes procure, solicit or incite.
R.S., 1985, c. C-46, s. 22; R.S., 1985, c. 27 (1st Supp.), s. 7. (Dostal, 2012)</blockquote>
Like conspiracy and aiding/abetting, it is not necessary for the person providing the counselling to participate in the offence, and the offence does not even need to be committed following the exact instruction of the counsellor. A condition to this offence is that the counsellor will only be a party if they knew or should have known that the other person was likely to commit that crime in consequence of the counselling. An interrogator recognizing this offence would seek to draw out admissions of what the counselling suspect knew or should have known about the likelihood of the perpetrator committing the offence.
<h2>Parties to an Offence</h2>
The ancillary offence of being a party to an offence, under section 21(1) of the Criminal Code is also often referred to as aiding and abetting.
<blockquote><strong>Parties to offence – <em>Criminal Code of Canada</em></strong>
21. (1) Every one is a party to an offence who
<p style="padding-left: 60px;">(a) actually commits it;</p>
<p style="padding-left: 60px;">(b) does or omits to do anything for the purpose of aiding any person to commit it; or</p>
<p style="padding-left: 60px;">(c) abets any person in committing it.</p>
<strong>Common intention</strong>

(2) Where two or more persons form an intention in common to carry out an unlawful purpose and to assist each other therein and any one of them, in carrying out the common purpose, commits an offence, each of them who knew or ought to have known that the commission of the offence would be a probable consequence of carrying out the common purpose is a party to that offence. R.S., c. C-34, s. 21. (Dostal, 2012)</blockquote>
Aiding and abetting is different from other ancillary offences in that it does not become a separate charge from the primary offence. In the cases of conspiracy, counselling, and accessory after the fact, persons are charged with those ancillary offences; however, in the case of aiding and abetting an offence, the person is charged with the primary offence. So, where evidence shows that a person purchased the weapons to enable an armed robbery to take place, that person would be charged under the section for armed robbery proper.
<h1>Summary</h1>
In this chapter, we have defined the stages and discussed the issues surrounding the investigative tasks of interviewing, questioning, and interrogating suspects in criminal investigations. We have also called attention to the specific change obligations that must be recognized and responded to by an investigator as the investigation progresses. In terms of the interrogation of suspects, this chapter examined the process of developing an interrogation plan by considering the variety of motivations that might cause a suspect to make a confession to a crime, and the additional protections afforded to youth was also discussed. In this chapter’s final section, definitions and examples of hybrid ancillary offences was presented, as was the need to interrogate suspects and investigate for additional evidence in support of proving the unique elements of ancillary offences, if they have occurred.
<div class="textbox textbox--exercises"><header class="textbox__header">
<p class="textbox__title">Study Questions</p>

</header>
<div class="textbox__content">
<ol>
 	<li>At what point would an investigator move from interviewing a person to questioning them?</li>
 	<li>At what point would an investigator move from questioning a suspect to interrogating them?</li>
 	<li>What are three common scenarios where an investigator is likely to come across a false confession?</li>
 	<li>What are two ways in which young offenders must be treated differently than adults by an investigator in the process of questioning them about involvement in a crime?</li>
 	<li>What are six examples of ancillary offences that investigators need to be aware of?</li>
 	<li>What evidence must be provided to show that a person can be charged with being an “accessory after the fact”?</li>
 	<li>How is “aiding and abetting” different from other ancillary offences?</li>
</ol>
</div>
</div>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>100</wp:post_id>
		<wp:post_date><![CDATA[2017-05-12 14:51:58]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-05-12 18:51:58]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-9-interviewing-questioning-and-interrogation]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>3</wp:post_parent>
		<wp:menu_order>9</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[727]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_export]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 9: Interviewing, Questioning and Interrogation]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_candela_citation]]></wp:meta_key>
		<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 10: Forensic Sciences</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-10-forensic-sciences/</link>
		<pubDate>Fri, 12 May 2017 19:12:40 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=chapter&#038;p=104</guid>
		<description></description>
		<content:encoded><![CDATA[<div class="textbox">

<em>“Knowledge of forensic tools and services provides the investigator with the ability to recognize and seize on evidence opportunities that would not otherwise be possible.”</em>

</div>
In this chapter, we examine various forensic sciences and the application of forensic sciences as practical tools to assist police in conducting investigations. The chapter is not intended to be a comprehensive dissertation of the forensic sciences available. Rather, it is intended to be an overview to demonstrate the broad range of forensic tools available. As we noted in Chapter 1, it is not necessary for an investigator to be an expert in any of the forensic sciences; however, it is important to have a sound understanding of forensic tools to call upon appropriate experts to deploy the correct tools when required. The forensic analysis topics covered in this chapter include:
<ol>
 	<li>Physical Matching</li>
 	<li>Fingerprint Matching</li>
 	<li>Hair and fibre analysis</li>
 	<li>Ballistic Analysis</li>
 	<li>Blood Spatter Analysis</li>
 	<li>DNA Analysis</li>
 	<li>Forensic Pathology</li>
 	<li>Chemical Analysis</li>
 	<li>Forensic Anthropology</li>
 	<li>Forensic Entomology</li>
 	<li>Forensic Odontology</li>
 	<li>Forensic Engineering</li>
 	<li>Criminal Profiling</li>
 	<li>Geographic Profiling</li>
 	<li>Forensic Data Analysis</li>
 	<li>Forensic Document Analysis</li>
 	<li>Forensic Identification Sections</li>
 	<li>Crime Detection Laboratories</li>
</ol>
Various types of physical evidence can be found at almost any crime scene. The types of evidence and where it is found can assist investigators to develop a sense of how the crime was committed. Tool marks where a door was forced open can indicate a point of entry, shoe prints can show a path of travel, and blood stains can indicate an area where conflict occurred. Each of these pieces of physical evidence is a valuable exhibit capable of providing general information about spatial relationships between objects, people, and events. In addition, the application of forensic examination and analysis could turn any of these exhibits into a potential means of solving the crime.
<h1>Topic 1: Physical Matching</h1>
If we think back to the example in Chapter 1 where the Bow Street Runners (McCrery, 2013) made a physical match from the torn edges of one piece of wadding paper to the original sheet from which it was torn, we can appreciate that physical matching is a forensic technique that can be applied, to some extent, by the investigator personally viewing and studying details of the evidence. At this level, physical matching can be used by investigators to do on site analysis of evidence. That said, the more sophisticated aspects of physical matching do require the expertise of a person trained in the techniques to form and articulate an opinion that the court will accept as expert evidence.

During a crime investigation, physical matching is typically conducted on items, such as fingerprints, shoe prints, tire prints, glove prints, tool impressions, broken glass, plastic fragments, and torn edges of items, such as paper, tape, or cloth. In these physical matchings, there are two levels of examination that are typically considered; an examination for <em>class characteristics</em> and an examination for <em>accidental characteristics</em>.
<h2>Level One — The Examination of the Item for Class Characteristics</h2>
Determining class characteristics takes place in relation to items, such as shoe prints, tire prints, glove prints, and tool impressions. At the first level of examination, these items can be classified and sorted based on type, make, model, size, and pattern. For example, if a shoe print is found at the scene of a crime and is determined to be a left shoe of a size 9, Nike brand, Air Jordan model, running type shoe with a wavy horizontal sole pattern, these class characteristics collectively provide a description of the suspect's shoe based on five defined descriptors.

In turn, these class characteristics may allow the investigators to narrow their focus to suspects having that class description of shoe. It is not a positive identification of the shoe to any particular suspect, but it does allow the potential elimination of suspects who wear different sizes, brands, and sole patterns of running shoe. Using this Level One examination, an investigator at the crime scene may find a suspect shoe print showing a distinct size and sole pattern. If a suspect with a matching size and sole pattern is found near the crime scene, this Level One observation would provide strong circumstantial evidence to assist in forming reasonable grounds to suspect that this person was involved in this crime.

A Level Two examination may be able to produce a conclusive match. Positive identification requires this next level of examination, namely the examination for accidental characteristics.
<h2>Level Two — Accidental Characteristics</h2>
Accidental characteristics are the unique marks and features that develop on any item resulting from wear and tear. Looking back at the Nike Air Jordan Running Shoe, to make a positive match of a suspect's shoe to the impression found at the crime scene, the crime scene impression would be examined for nicks, gouges, and wear patterns typically present on a worn shoe. These features would then be compared to a rolled impression of a suspect's shoe, and if the same nicks, gouges, and wear patterns could be shown in all the same locations on the suspect's shoe, a positive match could be made.

This Level Two method of comparison for things, such as shoes prints, tire prints, glove prints, and tool impressions, is the practice for physical matching. Investigators can often use these physical matchings to link the suspect back to the crime scene or the victim. Finding a suspect in possession of a shoe, a tire, or a tool that is a positive match to an impression at the criminal event is a powerful piece of circumstantial evidence.

With items, such as broken glass and plastic fragments, the process of physical matching requires significantly greater levels of expertise. At Level One, these items are first matched for general characteristics, such as material colour and thickness; however, the process for making the comparison of broken edges requires microscopic examination and photographic overlay comparison of broken edge features to demonstrate a positive match. For investigators, these kind of comparisons can be called upon where there is broken glass at a crime scene and fragments of glass have been found on a suspect's clothing, or in cases where glass or plastic fragments are left at the scene of a hit-and-run car crash and a suspect vehicle is found with damage that includes similarly broken items. Glass fracture analysis can also be used to demonstrate which side of a piece of glass received the impact that caused the fracture. This can be a helpful tool in confirming or challenging a version of events, such as insurance fraud, break-in reports, and motor vehicle crashes where the damage has been exaggerated or staged. Glass fracture analysis can also be used to demonstrate the sequence and order in which a series of bullets have passed through the glass of a window. This can be helpful for an investigator to establish the origin location of the shooter, and, in cases of a drive-by shooting, the direction of travel.
<h1>Topic 2: Fingerprint Matching</h1>
The forensic science of fingerprints has a longstanding history in policing. Fingerprints have been accepted as being individually unique to each person. The courts frequently accept positive fingerprint matches conducted by an expert witness, as proof of identity beyond a reasonable doubt (Jain, 2010).

Prior to the modern advent of DNA analysis and biometric scanning technologies for positive identification, fingerprints and dental record x-rays were the only truly positive means of making a conclusive identification.

Fingerprints are unique patterns of lines and ridges that exist on the areas of our hands and fingertips, known as the plantar surfaces. These unique patterns have been classified in categories and features since the late 1800’s (Dass, 2016). The various categories and features allow each digit of a person's fingers to be catalogued in a searchable system or database. These unique categories and features do not change throughout a person’s life, unless they are subjected to damage through physical injury or intentional abrasion. The impressions of our fingerprints are often left on items we touch because the oils our bodies produce act like an invisible ink adhering to smooth surfaces we touch, thus transferring these fingerprint impressions to those surfaces. These virtually invisible image transfers are commonly called latent fingerprints, and they are easily made visible on most surfaces through the application of coloured fingerprinting powder that adheres to the oils left by our fingers. The powder sticking to the oil reveals the image of lines and ridges that make up the fingerprint. It is also possible for a fingerprint impression to be exposed on surfaces, such as plastic, dry paper, or paint though a process of chemical fuming that reacts with the oils of the fingerprint changing their colour, thereby exposing the image. Fingerprints are sometimes also visible when they are transferred to an object because the finger has some foreign material on it, such as ink or blood. Other forms of visible fingerprints can be found as an actual moulded impression of the fingerprint when a person touches a malleable surface, such as clay or cheese.

The unique lines and ridges of an unknown fingerprint can be searched in a database of known criminal fingerprints for identification. Today, this type of search is done electronically using a biometric scanning process known as <em>Automated Fingerprint Identification System</em> (AFIS). For smaller partial prints, identification of a suspect requires sorting through possible suspects and conducting specific searches of print characteristics to make a match. If the person who left the print does not have a criminal record or their fingerprints are not on file, the only way a comparison can be made is to obtain a set of fingerprint impressions from that person. When this is done, the print examination will be conducted by a trained fingerprint expert who will search the print to establish as many points of comparison between the suspect print and the known-print as possible. The general accepted standard for accepting a match is to find ten points of comparison.

The location and identification of a suspect’s fingerprint at the scene of a crime, or on some crime-related object, is strong circumstantial evidence from which the court can draw the inference that the suspect is, in some way, connected to the crime. The investigative challenge of finding a suspect's print is to eliminate other possible ways that the print may have been left at the scene, other than through involvement in the crime.
<h1>Topic 3: Hair and Fibre Analysis</h1>
In considering once again “Locard's Theory of Evidence Transfer," <span>(Petherick, 2010</span>) it was suggested that a person cannot be at the scene of a crime without leaving something behind, and cannot leave the scene of a crime without taking something with them. Exhibits of hair and fibre fit support this theory well. As humans, we are constantly shedding materials from our bodies and our clothing. We enter a room and we leave behind strands of hair that fall from our heads, oily impressing of our fingerprints as we touch objects, and fibres of our clothing materials. As we leave a room, we take away hairs from other occupants of the room or fibres from the carpet and furniture adhering to our clothing. The analysis of hair and fibre, although not an exact science, can provide corroborative evidence. Hair samples can be compared taking a shed sample at the crime scene to the hair from a suspect to establish a similarity within a limited degree of certainty. If the hair happens to have been pulled out and still has root tissue, there is a possibility for more positive identification using DNA analysis. Somewhat more identifiable than hair samples, fibre samples can often be narrowed down to make a higher probability comparison using microscopic examination for size, colour, and type between an unknown sample and control sample.
<h1>Topic 4: Ballistic Analysis</h1>
Given the number of gun-related crimes, the understanding of ballistic analysis is important for investigators. Ballistics is the study of all things that are launched into flight, how they are launched, and how they fly. In most cases, investigators find themselves dealing with several common types of firearms.
<ol>
 	<li>Handguns as either semi-automatic pistols or revolvers</li>
 	<li>Long rifles that are single shot bolt action, automatic, or semi-automatic</li>
 	<li>Shotguns that are breach loading or chambered pump action</li>
</ol>
There are techniques in ballistic science that address the unique aspects of firearms and bullets. Because ballistic comparisons seek to determine if a particular gun was the originating source of an unknown bullet or cartridge casing, this examination process is sometimes referred to as ballistic fingerprinting. The analogy being that if a particular gun touched a particular bullet or cartridge-casing, it will leave behind some unique identifiable marks or a ballistic fingerprint.
<h2>Ballistic Fingerprints</h2>
When a modern day firearm is being loaded to fire, the cartridge loaded into the gun is composed of several components. The bullet portion of the cartridge is tightly pressed into a brass tube, called the casing. At the bottom of this brass casing is a round, flat base slightly larger than the casing, and this base prevents the casing from sliding completely into the cartridge chamber of the gun when being loaded. On the bottom of this flat base of the cartridge is the primer. When the trigger is pulled, the primer is the portion of the cartridge that will be struck by the firing pin of the gun. When struck, the primer ignites the gun powder contained inside the brass casing with an explosion that causes the bullet to leave the casing, travel down the gun barrel, and exit the gun.

Each of the components of the cartridge casing can be examined forensically and comparisons can be made to suspect guns. In some instances, it is possible to determine if a cartridge has been fired from the chamber of a specific gun. This can be done by examining the unique and identifiable marks left by four aforementioned components of the gun. Like the process of physical matching, this is also a two-level process.

<strong>At Level One</strong>, cartridges are classified by the calibre, which is the size of the bullet, the maker of the cartridge, and the primer location; either a centre-fire or a rim-fire cartridge on the cartridge base.

For ballistic purposes, guns are classified by their calibre, chambering and ejector mechanisms, and firing pin, namely either centre-fire or rim-fire. Eliminations of suspect weapons can often be made at Level One. For instance, a .38 calibre bullet removed from a crime scene cannot have been fired from a .22 calibre weapon. Or, that same .38 calibre bullet showing marks from an ejector mechanism could not have been fired from a .38 calibre revolver that does not have an ejector mechanism.

<strong>At Level Two</strong>, the more decisive ballistic fingerprint comparisons are often made using the following methods:
<ol>
 	<li>Striations Matching;</li>
 	<li>Chamber Markings;</li>
 	<li>Firing-Pin Comparison; and</li>
 	<li>Ejector markings.</li>
</ol>
&nbsp;
<ol>
 	<li><strong>Striations Matching.</strong> Bullets fired from either a handgun or long rifle, other than a shotgun, fire a single projectile each time. This fired projectile is a lead or lead-composite bullet. When fired, this bullet travels down the barrel of the gun and begins to spin because the inside of the gun barrel has been intentionally machined with long gently turning grooves, called rifling. These grooves catch the soft-lead sides of the bullet spinning it like a football, and this spinning makes the bullet travel more straight and true to the target. As a result of these grooves designed into gun barrels, every bullet fired will arrive at its target with markings etched into the bullet material from contact with the grooves in the barrel. These etched markings are call <em>striations</em>, and they are uniquely identifiable back to the gun they were fired from. For an investigator, these striations create an opportunity to match the bullet to the gun that fired it. Recovered bullets can be recovered and compared to test bullets fired from a suspected gun. When striations of a recovered bullet are compared to known samples fired from a suspected gun, a side-by-side microscopic technique is used to match striation markings. An expert ballistic examiner can sometimes identify and illustrate matches in the striations to make a positive match.</li>
 	<li><strong>Cartridge Chamber Markings</strong><em><em>. </em></em>When a cartridge is loaded into the chamber of a gun, the shiny brass casing comes into contact with the hard steel sides of the chamber. This chambering of the cartridge can leave unique and identifiable scratch marks on the side of the casing. A cartridge casing ejected or unloaded from a weapon and left at the crime scene can sometimes be matched to the suspect gun by comparing these markings.</li>
 	<li><strong>Firing Pin Comparison.</strong> When the firing pin of any gun strikes the primer on the bottom of a cartridge, it leaves an indentation mark. This firing pin indentation can sometimes be matched to the firing pin of a suspect weapon. This requires microscopic examination that looks for the unique characteristics of the firing pin that become impressed into the soft metal of the primer when the firing contact happens.</li>
 	<li><strong>Ejector Mechanism Markings. </strong>Methods for loading and unloading weapons have evolved considerably due to different gun designs. The simplest guns allow the user to open the breach of the gun exposing the cartridge chamber to manually insert the cartridge and close the breach to make ready for firing. There is no ejector mechanism for these guns, so there will be no ejector marks left on the base of a cartridge when it is unloaded from the weapon. Other guns have a variety of different ejector methods, including ejectors that catch the base of the cartridge casing to physically pull it from the breach and eject them away from the gun. In cases where a gun does have an ejector mechanism, these mechanisms leave very distinct and unique marks on the soft brass cartridge base. These markings can sometimes be compared and matched back to the ejector of a suspect weapon. With this broad variety of ballistic comparison techniques, an investigator has a significant number of tools that can be deployed and strategies that can be engaged to assist in matching a bullet to the gun that fired it. Considering these tools, the cartridge casing left at the scene of a shooting can be as important as a bullet removed from the body of a shooting victim. An investigator needs to keep this in mind when seizing cartridge casings as evidence. Great care needs to be exercised to document the location where each individual casing was found, and to preserve each casing in a manner that does not degrade the possible markings that could enable a match to be made. Damage can be done by placing casings into a common bag where they can rub against each other causing more characteristics and obliterating existing marks.</li>
</ol>
<h2>Trajectory Analysis</h2>
In addition to the ballistic fingerprinting examinations, another area of ballistic science is known as trajectory analysis. The trajectory of a bullet is the path it travels from the time it leaves the barrel of the gun to the point where it finally loses the propulsion energy of the gunpowder and comes to rest. The flight of a bullet can be very short, as in the case of a point blank shooting, where a victim is shot at very close range, or it can be very distant where the target is one mile away or more, as in the case in some sniper shootings.

When the bullet is travelling a longer distance, it travels that distance in an arched path or trajectory of travel as it is pulled towards the ground by gravity. When the bullet arrives at its destination, it will have a distinct angle of entry into the target. This angle of entry can sometimes be calculated as trajectory to estimate the geographic location of the originating shot. In cases where a bullet passes through several objects, such as two walls of a house, the trajectory of the bullet can be used to determine where the shooter was located. In cases of drive-by shootings, for example, where several shots are fired, the pattern of trajectories can show if the shooter was moving and, if so, demonstrate the direction of travel.
<h1>Topic 5: Blood Spatter Analysis</h1>
Blood spatter analysis, also known as blood stain pattern analysis, is a relatively new forensic specialty. The purpose of this analysis is to determine the events of a crime where blood has been shed. This is accomplished through the careful examination of how blood is distributed inside the crime scene. Studies have shown that when blood is released during an attack, certain patterns of distribution can be expected (National Science Forensic Technology Center, 2012). For instance, a person being struck with a baseball bat will begin to bleed, and blood will be distributed in a droplet spatter pattern in the direction of the strike behind the victim. These droplets of blood will have a direction of travel that will be indicated by the directional slide of each droplet as the bat hits objects in its path. Blood from the victim adhering to the bat can also be distributed when the bat is on the upstroke for the next strike. This blood will be distributed in an upward directional slide pattern, for example, up a wall, onto a ceiling, or behind the attacker. Calculations of how many strikes were made may become evident from the tracking of multiple streams of droplets behind the victim and behind the attacker. Given this developing science, blood spatter analysis can be useful in criminal event reconstruction.
<h1>Topic 6: DNA Analysis</h1>
DNA, or deoxyribonucleic acid, is a molecule that holds the genetic blueprint used in the development, functioning, and reproduction of all living organisms. As such, it carries the unique genetic information and hereditary characteristics of the cells from which living organism are formed. Except for identical twins, the DNA profile of each living organism is unique and distinct from other organisms of the same species. There are some rare cases where one person may carry two distinct types of DNA, known as Chimera (Rogers, 2016) where paternal twin embryo merge during gestation, or in cases where a bone marrow transplant enables the production of the marrow donor DNA in the recipient’s blood. In these rare cases, a person may test for two distinct DNA profiles for different parts of their body.

In human beings, DNA comparison can enable high probability matches to be made between discarded bodily substances and the person from whom those substances originated. Bodily substances containing cellular material, such as blood, semen, seminal fluid, saliva, skin, and even hair root tissue can often be compared and matched back to its original owner with high statistical probabilities of comparison (Lindsey, 2003). Sometimes, even very old bodily substances, such as dried blood, dried saliva, or seminal stains, can be analyzed for a DNA profile. The introduction of DNA analysis has allowed investigators for advocates to re-examine historical evidence and exonerate persons wrongfully convicted and imprisoned for criminal offences (Macrae, 2015).

DNA is a very powerful tool for investigators and can be considered anytime discarded bodily material is found at a crime scene. Even very small amounts of material can yield enough material for DNA comparison. Importantly, DNA data-banks of known criminals and unsolved crimes are now becoming well established in North America (Royal Canadian Mounted Police, 2006). When a person is convicted of certain criminal offences, DNA is collected and submitted to these databases.
<h1>Topic 7: Forensic Pathology</h1>
Forensic Pathology is the process of determining the cause of death by examining the dead body during an autopsy. An autopsy generally takes place in the pathology department of a hospital. In the case of a suspicious death or a confirmed homicide, police investigators will be present at an autopsy to gather information, take photographs, and seize exhibits of a non-medical nature, such as clothing, bullet fragments, and items that might identify the body. These items would include personal documents, fingerprints, and DNA samples.

During an autopsy, a forensic pathologist dissects the body carefully examining, documenting, and analyzing the body parts to determine the cause of death. In the first stage of an autopsy, the pathologist examines the body for external injuries and indicators of trauma that may provide a cause of death. In this first stage of examination, the pathologist will make an estimate of the time-of-death by observing evidence of four common <em>post-mortem</em> (after-death) indicators. These are body temperature, the degree of rigor mortis, post-mortem lividity, and progress of decomposition.
<h2>Body Temperature</h2>
<em>Algor Mortis</em> is the scientific name given to the loss of body temperature after death which can sometimes be used to estimate the time of death (Guharaj, 2003). This is a viable technique in cases where the body is being examined within 24 hours following death. This method of estimating time of death can vary significantly dependent upon many possible variables, such as:
<ul>
 	<li>Ambient room temperature being within a normal range of approximately 22<span>°</span> Celsius</li>
 	<li>Pre-death body temperature of the victim not being elevated by illness or exertion</li>
 	<li>Thickness of clothing that might insulate the body temperature escape</li>
 	<li>The temperature and conductivity of the surface the body was located on that could artificially increase or decrease temperature loss</li>
</ul>
Considering a normal body temperature of 37° Celsius at the time of death, it can be estimated that the body will cool at a rate of 1° – 1.5° Celsius per hour. This calculation is known as the <em>Glaister Equation (</em><span class="s1">De Saram, Webster, &amp; Kathirgamatamby, 1956). </span>So, taking an internal rectal temperature and subtracting that from 37° Celsius will provide an estimate of the number of hours that have passed since the time of death. For example, a dead body with a measured temperature of 34° Celsius would provide a time range of 3 to 4.5 hours since the time of death.
<h2>Rigor Mortis</h2>
<em>Rigor mortis</em> is a term used to describe the stiffening of the body muscles after death. A dead body will go from a flaccid or limp muscle condition to one where all the muscles become contracted and stiff causing the entire body to become constricted into a fixed position. After being in a constricted and fixed position, the muscles eventually become flaccid again (Advameg, Inc., 2017). In normal room temperatures, this stiffening of muscles and the relaxing again has a predictable time progression of approximately 36 hours. In this progression, the stiffening of muscles will take approximately 12 hours, the body will remain stiff for 12 hours and will progressively become flaccid again over the next 12 hours.

Stiffening of muscles begins with the small muscles of the hands and face during the first 2 to 6 hours, and then progresses into the larger muscle groups of the torso, arms, and legs over the next 6 to 12 hours. These are general rules; however, the rate of rigor mortis can be different for infants, persons with extreme muscle development, or where extensive muscle activity precedes death, such as a violent struggle (Cox, 2015).

In determining the time of death in average environmental temperatures, Cox (2015) recommended that:
<ol>
 	<li>If the body feels warm and is flaccid, it has been dead for less than 3 hours</li>
 	<li>If the body feels warm and is stiff, it has been dead for 3 to 8 hours</li>
 	<li>If the body feels cold and stiff, it has been dead for 8 to 36 hours</li>
 	<li>If the body feels cold and is flaccid, it has been dead more than 36 hours</li>
</ol>
<h2>Post-Mortem Lividity</h2>
Post-mortem lividity refers to a discoloration or staining of the skin of a dead body as the blood cells settle to the lowest part of the body due to gravity. This discoloration will occur across the entire lower side of a body; however, in places where parts of the body are in contact with the floor or another solid object, the flesh compresses and staining will not occur in that area. The staining is a reddish-purple colouring, and it starts to become visible within 1 hour of death, and become more pronounced within 4 hours. Within the first 4 hours, lividity stains are not fixed and, if the body is moved, the blood products will shift and stain the part of the body that has become lower. In most cases, these stains become fixed between 12 and 24 hours. As such, they can be viewed as an indicator of how the body was left at the time of death. Importantly, if a body is found with post-mortem lividity stains not at the lowest point in the body, it can be concluded that the body has been moved or repositioned after the 12 to 24 hour stain setting period (Cox, 2015).
<h2>Decomposition</h2>
This is the final indicator a pathologist can look at to estimate the time of death. Sometimes, dead bodies are not discovered in time to use body temperature, rigor mortis, or early lividity indicators to estimate a more exact time of death. In these cases, assessing the progress of decomposition becomes important. Decomposition starts as soon as the body ceases to be alive. Subject to environmental conditions of extreme heat or cold, the readable signs of decomposition will become apparent 36 to 48 hours after death (EnkiVillage, 2017). These signs include bloating of the body and a marbling discoloration of the skin in a spider web pattern along surface blood vessels. As the body continues to decay, the skin surface will open and body fluids will begin to seep out. In advanced stages of decomposition, the body is often no longer identifiable by facial recognition, and DNA testing or dental records become the tools to determine identity. At very advanced stages of decomposition, flies and maggots begin to emerge, and the number of life cycles of the maggot-to-fly can be estimated by a forensic entomologist to provide the amount of time that has passed since these insect life cycles began.

Once these preliminary examinations have been made, the pathologist will cut the corpse open to conduct a detailed internal examination of each organ to look for signs of trauma, disease, or external indicators that might explain the cause of death, such as water in lungs or toxins in blood.
<h2>Causes of Death</h2>
There are a wide range of possible causes of death and pathologists are trained to look for these indicators, gather the evidence, and develop an expert opinion regarding the cause of death. Causes of death can include:
<ul>
 	<li>Laceration or Stabbing</li>
 	<li>Shooting</li>
 	<li>Blunt force trauma</li>
 	<li>Asphyxiation</li>
 	<li>Toxic substances</li>
 	<li>Electrocution</li>
 	<li>Depriving necessities of life</li>
</ul>
In cases of laceration or stabbing, wounds are inflicted by a sharp weapon or pointed object. The pathologist will attempt to determine if the death was caused by damaging a vital organ or by blood loss. The distinction here is that a person may be cut or stabbed in a way that causes them to bleed to death, which will be indicated to the pathologist by only a small amount of blood remaining in the body. Alternately, a laceration or stab wound may penetrate the heart, lungs, or the brain in a way that causes the organ to stop functioning and causes death. In these cases, the pathologist will make a determination and render an opinion of fatal organ damage.

In cases of stabbing, the pathologist can sometimes illustrate the entry point of the wound and trace the wound path to determine an angle of entry indicating how the stab wound was inflicted. The size, depth, and width of the wound may indicate the size and type of weapon used to create the injury. Similarly, examining the characteristics of the wound can provide information to allow the pathologist to offer an expert opinion on the direction of a laceration or cut wound by illustrating the start point and the termination point. This information can be helpful for investigators in reconstructing or confirming the actual actions and weapons used in a criminal event.

In cases of shooting, the pathologist will make a determination of whether death was caused by the fatal destruction of a vital organ or by blood loss. Recovery of a bullet or fragments of a bullet from inside the body can be helpful in ballistic analysis. Examining the entry wound can sometimes indicate the distance from which the wound was inflicted. In cases of point blank or direct contact shootings, gunshot (burned gun powder) residue will be present at the entry point of the wound. As with stab wounds, the pathway that the bullet travelled from the entry point into the body to where it came to rest can sometimes be identified by a pathologist to determine the angle of entry. For investigators, this information can be helpful in reconstructing the criminal event and determining the location of the shooter. In cases of self-inflicted gunshot wounds, a point blank entry point and a bullet path indicating a logical weapon position in the hand of the victim can provide some confirmation or contradiction of the self-inflicted wound theory.

In cases of blunt force trauma, the pathologist will look for indications of organ destruction or massive internal bleeding causing death. Blunt force trauma can be inflicted in many ways, such as massive sudden trauma from a fall from a great height, or a high-speed car crash that can immediately damage the brain, the heart, or the lungs to the point where they cease to function resulting in death. Other blunt force traumas, such as a strike to the head with a weapon, may not immediately cause death, but result in massive bleeding and internal accumulation of blood that can cause death. In cases of head injuries pathologists will sometimes be able to determine the contact point where the injuries were inflicted, and they will be able to point to the <em>contre coupe</em> injury effect, which happens when the head is struck on one side and the brain is so traumatically moved inside the skull that it also become damaged on the opposite side and bleeding occurs at the top of the brain. This bleeding inside the skull can sometimes cause death.

In a similar effect, Shaken Baby Syndrome (SBS), (Elsevier, 2016) occurs when an infant child is violently shaken by a person and the baby's brain moves back and forth traumatically inside the skull causing bruising and sometimes fatal bleeding at the front and back of the brain. An examination by the pathologist for the contact points and internal bleeding can provide valuable clues to the manner in which the blunt force trauma was inflicted. According to An Investigator’s Manual for Shaken Baby Syndrome, studies indicate that SBS is the leading cause of death in children under two years of age and research studies the United Kingdom and the United States indicate that SBS may occur each year in as many as 24 to 30 per 100,000 children under two years of age (Smith, 2010).

In cases of asphyxiation, a pathologist will look for indicators of how the body was deprived of oxygen. Several common means include strangulation, suffocation, smoke inhalation, or drowning. For strangulation, the pathologist will look for bruising around the neck inflicted by choking hands or by a ligature. A ligature is any item, such as a rope or a belt, which could be used to restrict breathing and stop oxygenated blood going to the brain, thus causing death. If a ligature has been used and removed, it will leave a distinct abrasion line. If a dead body is found with a ligature in place, investigators should take great care to not untie the ligature, but cut it off of the victim, as this allows the ligature size to be measured and compared to the size of the neck to determine the amount of breathing that was restricted. Once the ligature is removed from a dead body, a distinct ligature mark or a groove in the flesh will sometimes be visible.

To determine strangulation, the pathologist will examine the eyes of the victim for the presence of small ruptured blood vessel that appear as red spots on the white of the eyeball. These spots are known as petechial hemorrhage, and will often be visible in victims of strangulation (Jaffe, 1994).

Suffocation as a cause of asphyxiation occurs when a victim's breathing is stopped by an object, such as a pillow or a plastic bag, which restricts the ability of a victim to breath, thus causing death. Unlike strangulation, suffocation has fewer indicators of violent trauma. Suffocation deaths are sometimes accidental and are harder for pathologist to conclusively determine. The presence of a suffocation device at the scene of the death is sometimes a first clue to this cause. Other contributing causes can be the limited ability of a victim to remove the device that accidentally obstructs their breathing, as may be found with a very young child, a handicapped person, or a frail elderly victim.

Another unique type of asphyxiation death is Auto Erotic Asphyxia (AEA). This occurs when a person is attempting to enhance their sexual arousal or pleasure while masturbating and apply self-strangulation with a ligature device. Their goal in AEA is not suicide but rather to reach a state of extreme oxygen deprivation and euphoria at the time of orgasm. This strategy can go wrong when the individual passes out and their ligature does not release causing continued strangulation and death. These cases can resemble suicide; however, they are really death by misadventure because the victim had no intent to kill themselves. AEA can sometimes be distinguished from suicide by the existence of apparent masturbation, pornography at the scene, and ligature devices that have releasable controls.

In cases where asphyxiation is caused by smoke inhalation, a pathologist can find signs of soot blackening in the lungs and, if the air containing the smoke was sufficiently hot, the lungs will also show signs of burn trauma. Because arson is sometimes used as a means of disguising a homicide, finding a dead body in a burning building, and not finding signs of smoke in the lungs, is a red flag for possible death by homicide.

In cases where asphyxiation is caused by drowning, a pathologist will find signs of water present in the lungs. If there is a question as to the location of the drowning, it is possible to have a diatom test conducted on the victim’s tissue. If the victim was drowned in fresh water, the diatom material, which is microscopic algae, will have migrated from the water in the lungs to the blood and tissue of the victim. These microscopic algae are species unique to a particular body of water. Diatom material found in a victim’s lungs should match the diatom sample from the water where the body was found. If it does not match, this suggests that the victim drowned elsewhere.

In cases of toxic substances, a pathologist will test the stomach contents, the blood, eye fluid known as vitreous humor, and tissue samples from various organs in the body for poisons, drug overdose, the ingestion of toxic chemicals, or toxic gas inhalation. Any of these substances can cause death if ingested or inhaled in sufficient quantities.

In cases of electrocution, a person dies because of an electrical current passing through their body that stops the heart. A pathologist will look for signs to confirm that a current passed through the body, including contact burns where a person has touched a source of power that entered their body and existed to a grounding point. This grounding point is often at the ground through the feet, but can be through a shorter contact pathway, if another hand or part of the body was in contact with a grounded object. Burns will also be visible where the electrical current exited the body.

Cases where the necessities of life have been deprived generally occur where there is a dependent relationship between a caregiver and a victim. The victims in these cases are typically very young or very elderly persons who are unable to take care of their own needs. These cases often take place over and extended periods of time and may include other types of physical neglect or abuse. Failing to provide necessities of life is such a significant issue that the Criminal law in Canada makes provision for this as an offence.
<blockquote><strong>Duty of persons to provide necessaries</strong>

<strong>215</strong> (1) Everyone is under a legal duty
<p style="padding-left: 30px;">(a) as a parent, foster parent, guardian or head of a family, to provide necessaries of life for a child under the age of sixteen years;</p>
<p style="padding-left: 30px;">(b) to provide necessaries of life to their spouse or common-law partner; and</p>
<p style="padding-left: 30px;">(c) to provide necessaries of life to a person under his charge if that person</p>
<p style="padding-left: 60px;">(i) is unable, by reason of detention, age, illness, mental disorder or other cause, to withdraw himself from that charge, and</p>
<p style="padding-left: 60px;">(ii) is unable to provide himself with necessaries of life.</p>
<strong>Marginal note: Offence</strong>

(2) Every one commits an offence who, being under a legal duty within the meaning of subsection (1), fails without lawful excuse, the proof of which lies on him, to perform that duty, if
<p style="padding-left: 30px;">(a) with respect to a duty imposed by paragraph (1)(a) or (b),</p>
<p style="padding-left: 60px;">(i) the person to whom the duty is owed is in destitute or necessitous circumstances, or</p>
<p style="padding-left: 60px;">(ii) the failure to perform the duty endangers the life of the person to whom the duty is owed, or causes or is likely to cause the health of that person to be endangered permanently; or</p>
<p style="padding-left: 30px;">(b) with respect to a duty imposed by paragraph (1)(c), the failure to perform the duty endangers the life of the person to whom the duty is owed or causes or is likely to cause the health of that person to be injured permanently. <span>(Justice Laws Canada, 2017)</span></p>
<strong>Marginal note: Punishment</strong>

(3) Every one who commits an offence under subsection (2)
<p style="padding-left: 30px;">(a) is guilty of an indictable offence and liable to imprisonment for a term not exceeding five years; or</p>
<p style="padding-left: 30px;">(b) is guilty of an offence punishable on summary conviction and liable to imprisonment for a term not exceeding eighteen months. (Justice Laws Canada, 2017)</p>
</blockquote>
If the death of a person is found to be the result of failing to provide the necessities of life, the responsible caregiver can ultimately be charged with criminal negligence causing death.
<h1>Topic 8: Chemical Analysis</h1>
There are a wide range of chemicals and usages that can be used in the commission of a crime or found at the scene of a crime. In addition to general chemical analysis, there are several sub-areas for analysis in cases of:
<ul>
 	<li>Accelerants used in the crime of arson;</li>
 	<li>Explosive analysis in cases of conventional crimes and terrorism;</li>
 	<li>Toxic chemicals and biological agents used in cases of murder, industrial negligence, and terrorism;</li>
 	<li>Drug analysis in the cases of trafficking and drug overdoses;</li>
 	<li>Gunshot residue analysis; and</li>
 	<li>Analysis and chemical matching of paint transfer in cases of hit and run motor vehicle crashes.</li>
</ul>
<h1>Topic 9: Forensic Archaeology</h1>
Relatively new in the forensic world, forensic archaeology is the use of archaeological methods by experts to exhume crimes scenes, including bodies. These forensic experts are trained to methodically excavate and record their dig. They document the recovery of artifacts (evidence), such as human remains, weapons, and other buried items, that may be relevant to the criminal event. Forensic archaeologists will often work in concert with other forensic experts in DNA, physical matching, forensic entomology, and forensic odontology in the examination of evidence.
<h1>Topic 10: Forensic Entomology</h1>
Forensic entomology is a very narrow field of forensic science that focuses on the life cycle of bugs. When a dead body has been left out in the elements and allowed to decompose, the investigative challenge is not only to identify the body, but to establish the time of death. Once a body has decomposed, the process of determining time of death can be aided by a forensic entomologist. As discussed in a previous chapter, these experts look at the bugs that live on a decomposing body through the various stages of their life cycle. From these life-cycle calculations, scientists are sometimes able to offer and estimate relative time of death.
<h1>Topic 11: Forensic Odontology</h1>
To paraphrase the description provided by Dr. Leung (2008), forensic odontology is essentially forensic dentistry and includes the expert analysis of various aspects of teeth for the purposes of investigation. Since the advent of dental x-rays, dental records have been used as a reliable source of comparison data to confirm the identity of bodies that were otherwise too damaged or too decomposed to identify through other means. The development of DNA and the ability to use DNA in the identification of badly decomposed human remains has made identity through dental records less critical. That said, even in a badly decomposed or damaged corpse, teeth can retain DNA material inside the tooth, allowing it to remain a viable source of post-mortem DNA evidence (Gaytmenn, 2003).

Beyond the identification of dead bodies, forensic odontology can sometimes also provide investigators with assistance in confirming the possible identity of a suspect responsible for a bite mark. This comparison is done by the examination and photographic preservation of the bite mark on a victim or an object, and the subsequent matching of the details in that bite mark configuration to a dental mould showing the bite configuration of a known suspect’s teeth. Although bite mark comparison has been in practice for over fifty years there remain questions to the reliability for exact matching of an unknown bite mark to a suspect (Giannelli, 2007).
<h1>Topic 12: Forensic Engineering</h1>
Forensic engineering is a type of investigative engineering that examines materials, structures, and mechanical devices to answer a wide range of questions. Often used in cases of car crashes, forensic engineers can often estimate the speed of a vehicle by examining the extent of damage to a vehicle. They can also match damage between vehicles and road surface to determine the point of impact and speed at the time of impact. Many police agencies now have specialized traffic personnel trained in accident analysis and accident reconstruction. These officers utilize a variety of forensic engineering techniques to examine and document the dynamics of car crashes to establish how and why a crash occurred.

In cases of building collapses, forensic engineers can conduct analyzes to determine the cause of a structural failure and, in the case of an intention explosion, such as in acts of terrorism, this can point to the location of the planted explosive device. The investigative possibilities for forensic engineering are too extensive to elaborate here, but if damage to a building, an object, or a piece of equipment poses an investigative question, the tools of forensic engineering should be used to seek answers.
<h1>Topic 13: Criminal Profiling</h1>
Criminal profiling, also referred to as psychological profiling, is the study of criminal conduct to develop the most likely social and psychological profile of the person who may have committed the crime based on the actions of known criminals who have committed that same type of crime in the past (Royal Canadian Mounted Police, 2015). Criminal profiling draws on information from many sources, including historical criminal statistics of known criminals. Additionally, other information is collected about violent criminals and their <em>modus operandi</em>. This kind of information can shed light on details, such as preferences for luring victims, taking trophies, abduction methods, bondage preference, torture methods, means of killing, and displaying a dead body after death. With information and specific data collected from a wide assortment of offenders, psychological profilers work with investigators to examine the details of a criminal investigation, and, based upon the known historical criminal conduct data, they determine probable descriptors and characteristics that might be expected in a current suspect’s profile.

For investigators, this kind of profiling can be helpful in focusing the investigation on the most likely persons. As an extension of these profiling techniques, a database known as <strong><em>Violent Crime Linkage Analysis System (ViCLAS)</em></strong> has been in place in Canada since the 1990s. This system documents the criminal conduct of convicted violent offenders and sex offenders, as well as certain unsolved cases, with a goal of documenting crime types and criminal conduct into a searchable database where unsolved crimes can be linked to offenders with matching profiles. According to the ViCLAS system web page, “Since the implementation of ViCLAS across the country, the database continues to swell with cases. As of April 2007, there were approximately 300,000 cases on the system and over 3,200 linkages have been made thus far” (Royal Canadian Mounted Police, 2015). Criminal profiling provides a valuable tool for sorting and prioritizing suspects identified for further investigation. In some cases, a new suspect may even be identified through the existing data within the ViCLAS database.
<h1>Topic 14: Geographic Profiling</h1>
Geographic profiling is similar to psychological profiling in that it seeks to focus on the possible conduct of an unknown criminal based on the data collected from the known past criminal conduct of others. Unlike psychological profiling, geographic profiling is focused specifically on where a suspect might reside relative to the location where his or her crimes are currently being committed.

In the late 1980’s, police Detective Inspector Kim Rossmo developed a mathematical formula that began the evolution in the new forensic science of geographic profiling. Dr. Rossmo validated his mathematical formula from his observation that criminals generally seemed to live within an identifiable proximity to the chosen locations where they committed their crimes (Rossmo, 1987). Applying this method, when a criminal is suspected of committing a series of offences, it is possible to have the locations of those offences examined by a geographic profiler to estimate where that suspect most likely resides. This assessment can be helpful in searching for and identifying new suspects by prioritizing suspects based on the location of their residence relative to the identified area with the highest probability for a suspect to be found.
<h1>Topic 15: Forensic Data Analysis</h1>
In today’s digital world, criminal conduct frequently includes evidence in the form of digital data. The collection of data from cellular phones as proof of a criminal conspiracy, or the message tracking of images passed in the distribution of child pornography, all require significant levels of specialized technological knowledge to collect, preserve, and analyze the exhibits. Some crimes, such as identity theft and the subsequent fraudulent misappropriation of funds, are almost entirely digital data crimes, and they cross over several fields of technological expertise. It is now incumbent upon ordinary investigators to understand the basics of how to preserve digital evidence, and to know when and if digital evidence may be present. An ordinary investigator without forensic data skills and qualifications should never attempt to recover digital data evidence without help. The destruction of evidence would be like an untrained investigator trying to lift fingerprints at a crime scene.
<h1>Topic 16: Forensic Document Analysis</h1>
Forensic document analysis is typically done by certified forensic document examiners working as independent contractors or as employees within the service of government funded crime detection laboratories. Most often tasked within the scope of fraud investigations, these specialists examine items, such as wills, land titles, contracts, deeds, seals, stamps, bank checks, identification cards, handwritten documents and documents from photocopiers, fax machines, and printers. These documents are often examined to authenticate them as genuine or unaltered original documents where an allegation of misrepresentation or fraud has been made. Original signatures are also sometimes called into question, and these examiners can make a determination of authenticity by comparing the signature sample to samples known to be genuine. Forensic experts are also called upon to analyze threatening letters, ransom letters, or hold-up notes to make a connection to an identified suspect.
<h1>Topic 17: Forensic Identification Sections</h1>
Forensic identification sections are the frontline forensic specialists typically working within their own police agency. Usually, these specialists are experienced police officers who have taken forensic training in photography, fingerprint examination, physical matching, evidence collection, and crime scene management to work within this type of section. The daily work of forensic identification sections involves attending crime scenes, and conducting a variety of examinations using special fingerprint dusts, chemical fuming agents, and ultraviolet light sources to uncover impressions of fingerprint, shoeprints, tool marks or even body fluid stains not visible to the naked eye. Once the stain or the image of a forensic impression is found, these specialists can record, preserve, and recover the exhibit using photography and specialized tools for lifting the exhibit from a surface or removing the entire imprinted surface as an exhibit.
<h1>Topic 18: Crime Detection Laboratories</h1>
Crime Detection Laboratories, such as the RCMP labs across Canada, provide a range of specialties, including;
<ul>
 	<li><strong>Biology</strong> — Comparison of the suspect’s and victim’s body fluids and hair; most often DNA analysis</li>
 	<li><strong>Chemistry</strong> — Identifying non-biological substances found at a crime scene, such as paint, glass, liquids, fuels, and explosive substances</li>
 	<li><strong>Toxicology</strong> — The examination of body fluids to determine the level of alcohol present in the body, and providing expert opinions in relation to the extent of intoxication</li>
 	<li><strong>Documents Examination</strong> — The analysis of documents to determine authenticity for fraud allegations. Can also provide handwriting comparison</li>
 	<li><strong>Firearms Ballistics </strong>— Matching shells, casing, and fired bullets to a weapon and making a determination of bullet trajectory</li>
 	<li><strong>Tool mark examination</strong> — Matching tool impressions to an originating suspect tool</li>
</ul>
Scientists hired to work in these crime detection laboratories require a four year specialized degree in the field of their choice. Once hired, they undergo an understudy period of 12 to 18 months in a laboratory with an expectation that they will become proficient enough in their chosen field to achieve expert qualification from the court. This expert status will allow them, on a case-by-case basis, to render expert opinion evidence on their examination of forensic exhibits.

For an investigator wishing to engage the services of the Crime Detection Laboratory, it is necessary to complete a request for analysis of the exhibit they wish to have examined and deliver that exhibit, either in person or by double registered mail, directly to the Crime Detection Laboratory to ensure continuity of the exhibit. Once examined, the analyst will return the exhibit again either by calling for a personal pick up or by double registered mail along with a certificate of analysis detailing the result of the examination. The certificate of analysis can become an exhibit for disclosure to the defence in a criminal case, and, if uncontested, will be accepted by the court as evidence. If contested, the Crime Detection Laboratory Scientist will be called to attend court and provide testimony of the examination and the results as an expert witness. They are generally cross examined by the defence to validate their expert qualifications and analyzes.
<h1>Summary</h1>
This chapter outlined a wide variety of forensic tools and services available for criminal investigators. For any investigator, knowledge of forensic tools and services provides him/her with the ability to recognize and seize on evidence opportunities that would not otherwise be possible. The picture of physical evidence found at any crime scene only has face value as a collection of objects to be viewed and considered in their existing connection to the event. Analysis of those same objects using forensic tools can add significant information, making a circumstantial connection between the players and the event, and adding new insights. Forensic analysis can make the difference between solving a crime and it becoming a cold case.
<div class="textbox textbox--exercises"><header class="textbox__header">
<p class="textbox__title">Study Questions</p>

</header>
<div class="textbox__content">
<ol>
 	<li>In terms of a physical matching, what is the difference between a Level One and a Level-Two examination?</li>
 	<li>How are latent fingerprints made visible?</li>
 	<li>What is the difference between a Level One and Level Two ballistics examination?</li>
 	<li>What is blood spatter analysis?</li>
 	<li>What are four common post-mortem indicators considered in an autopsy?</li>
 	<li>How else can a pathologist be helpful to police besides being able to speak to cause of death?</li>
 	<li>What is forensic archaeology?</li>
 	<li>What is forensic entomology?</li>
 	<li>What is criminal profiling?</li>
 	<li>What is ViCLASS?</li>
</ol>
</div>
</div>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>104</wp:post_id>
		<wp:post_date><![CDATA[2017-05-12 15:12:40]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-05-12 19:12:40]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-10-forensic-sciences]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>3</wp:post_parent>
		<wp:menu_order>10</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[727]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_export]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 10: Forensic Sciences]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_candela_citation]]></wp:meta_key>
		<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 11: Summary</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-11-summary/</link>
		<pubDate>Fri, 12 May 2017 19:15:42 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=chapter&#038;p=106</guid>
		<description></description>
		<content:encoded><![CDATA[The goal of this book has been to provide a new student of investigation with an overview of the skills required by a criminal investigator. As an introduction to criminal investigation, this overview has intentionally avoided delving into many areas of specialized criminal investigation. Some of these areas of investigation, such as financial crime, criminal profiling, and computer crime, are so unique and focused, that they cannot be adequately summarized here. That said, persons seeking to move into these specialized areas of investigation are well served to properly learn the core skill that are presented here.

This book has outlined the task skills and thinking skills required to guide the process of investigation. Presented here as a structured investigative model, the STAIR tool brings together the task skills relating to gathering, preserving, and documenting evidence with the thinking skills of analysis, theory development, investigation and fact validation. This structured system is intended to help new investigators achieve a personal awareness of their own investigative thinking, and create their own mental map for an investigative process that can be followed, documented, repeated, and enhanced through professional experience.

In the past, learning the necessary investigative skills and thinking were expected to evolve and develop in a model where the learner received basic police training, and was then exposed to progressively more complex investigations. This allowed the investigator to evolve their-own mental map for a functional investigative process. In this traditional learning model, investigators were expected to make mistakes and learn from their mistakes to evolve their personal learning of the investigative process. Often under the guidance of mentors and field trainers, good criminal investigators developed their skills and reach high levels of professionalism and competency. This book is not intended to take issue with the traditional learning model, but to suggest a means where new investigators are provided a thinking perspective and tools that enable them to enhance their learning process in ways other than exclusively through personal experience.

The intent of this book has been to provide readers with a head start in their investigative learning process by discussing the need to be aware of their own thinking process and to create a mental map. The <strong>STAIR</strong> tool has been developed to provide a guide to this mental mapping process. In doing so, this book discussed criminal law, witness management, interviewing and interrogation, crimes scene management, and forensic sciences. Many of these topics are sufficiently complex that entire books have been written about them. In this book, the treatment of these topics has been intentionally introductory to provide the reader with a basic awareness of each topic in its specific relationship to the criminal investigative process. As a very broad overview of these key issues, the new investigator will only have a generalist understanding of these topics and can use this book to assist them in evolving their ongoing learning in a self-directed mode relative to their perceived needs as the complexities of their new investigations might demand.
<h1>Investigative Learning Going Forward</h1>
Many topics relative to investigative practices have not been covered as part of the core knowledge requirements for a new investigator. These topics include:
<ol>
 	<li>Major Case Management</li>
 	<li>Informant and confidential source management</li>
 	<li>Undercover investigations</li>
 	<li>Specialized team investigations</li>
</ol>
While we cannot consider these topics in any depth, it will important for the new investigator to at least know about them with respect to more advanced practices of criminal investigation.
<h1>Topic 1: Major Case Management</h1>
A contemporary practice for the handling of major criminal investigations involving multiple jurisdictions, multiple investigative agencies, and often serial criminal events, Major Case Management is a system designed to achieve order, cooperation, and information sharing between police agencies. In Canada, creating and adopting the practices of Major Case Management was driven by the 1995/1996 report and Commission of Inquiry recommendations of Justice Archie Campbell examining the various police agency investigations into the activities of Paul Bernardo, who was a serial rapist and murderer whose activities between 1987 and 1992 included the rape or sexual assault of at least eight women in the areas of Scarborough, Peel, and St Catharines, Ontario, and the murder of three women in St. Catharines and Burlington, Ontario (Campbell, 1996). To quote directly from the Campbell’s report:
<blockquote>The Bernardo case, like every similar investigation, had its share of human error. But this is not a story of human error or lack of dedication or investigative skill. It is a story of systemic failure.

It is easy, knowing now that Bernardo was the rapist and the killer, to ask why he was not identified earlier for what he was. But the same questions and the same problems have arisen in so many other similar tragedies in other countries.

Virtually every interjurisdictional serial killer case including Sutcliffe (the Yorkshire Rapist) and Black (the cross-border child killer) in England, Ted Bundy and the Green River Killer in the United States and Clifford Olsen in Canada, demonstrate the same problems arise and the same questions. And always the answer turns out to be the same – systemic failure. Always the problems turn out to be the same, the mistakes the same, and the systemic failures the same.

What is needed is a system of case management for major interjurisdictional serial predator investigations. As system that corrects the defects demonstrated by this and so many similar cases.

A case management system is based on co-operation, rather than rivalry, among law enforcement agencies. A case management system is needed that depends on specialized training, early recognition of linked offences, co-ordination of interdisciplinary and forensic resources, and some simple mechanisms to ensure unified management, accountability and co-ordination when serial predators cross police borders. (Campbell, 1996)</blockquote>
From the recommendations of the Campbell Report, the Canadian Police College in Ottawa, Ontario took a leadership role in working with police agencies and investigators from across Canada to develop a major case management system and training that would address the concerns raised by the Campbell report. The major case management system allows for the creation of case specific major case management teams when it is determined that a serious criminal investigation crosses jurisdictional boundaries. In this system, the major case management team operates as an autonomous case specific unit, led by a command group comprised of a team commander, a primary investigator, and a file coordinator. In this structure, the team is staffed with experienced investigative personnel from each of the partner agencies, and no single partner agency has control over the conduct of the investigation.

Partner agencies receive reports on the investigative progress and provide their collective input to the team through contact with only the team commander. The major case management team handles the specific case, receiving all evidence and incoming information through the file coordinator as TIPS and each TIP is assigned by the primary investigator for follow up by the investigators on the team. The team follows a strict regime of daily information sharing through a process of daily briefings, and all team members are encouraged to share their investigative progress and to assist in the creation and development of investigative strategies. New or inexperienced investigators are not assigned to duties as part of a Major Case Management team. Being selected to participate as an investigator on one of these team means that your investigative skills have reached the point where you can be counted on to perform at a very high level.
<h1>Topic 2: Informant and Confidential Source Management</h1>
Informants and confidential sources often provide police investigators with information to solve a single crime or to investigate a criminal organization. In court cases, such as R vs Basi (2009), the courts have recognized that confidential informants are a critical tool for effective police work. Given this, the court provides privilege for the police and Crown to not reveal the identity of a source in court, particularly in cases where that privilege has been asked for by the source and agreed to by the police as a condition of providing information (Dostal, 2012).

Even with the condition of anonymity, experienced source handlers know that if their informant participates in the criminal event as an agent of the police, the source can be classified by the courts as an “agent provocateur,” and may not claim the privilege of anonymity. These complexities of confidentiality make source and informant management a very sensitive matter. Failure to manage the informant or their information properly can result in the identity of the person being revealed with the risk of deadly consequences or having to put the informant into a witness protection program.

The field of informant management and protection requires trust building and communication skills that will be effective with persons who are part of the criminal community. This is sometimes achieved by using discretion, not pursuing the more minor criminal activities of an informant, or even trading away certain criminal charges against the informant in exchange for specific information on a more serious crime. These strategies can be very delicate, and often require the collaboration with Crown Prosecutors in cases where the administration of justice may be compromised by an investigator acting independently.

A new investigator would not become involved in these higher level informant management cases, but could start building the framework and network of street-level contacts to learn the skills of informant management. The first stages of building the skill set to manage informants and confidential sources starts with learning to have non-judgemental conversations with members of the criminal community. When persons in the criminal community see a police investigator as fair, friendly, and approachable, this opens the door for the investigator to approach those contacts for specific inquiries when an occasion presents itself.
<h1>Topic 3: Undercover Investigations</h1>
An undercover investigation is the practice of a police officer posing as someone other than a police officer for the purpose of collecting evidence of criminal activity that would otherwise be difficult to acquire. The possible personas of the undercover investigator are almost limitless and can range from posing as a person seeking to purchase drugs from local traffickers to impersonating a vulnerable elderly citizen in a park to capture a purse snatcher preying on the elderly. There are also deep undercover strategies that may include establishing a longer term identity with the purpose of infiltrating a criminal organization or a dissident political group to gain internal intelligence of organizational activities, culture, and membership.

Police investigators often find undercover strategies successful because criminal activity can be witnessed firsthand, and admissions of guilt made to undercover operators by criminals can be admitted to court without the need of the usual <em>voir dire</em> to test for admissibility. When conducting undercover operations, investigators must be careful to ensure that their presence and communication with the suspect is not the catalyst that causes that person to initiate a crime or carry through with a crime they would not otherwise have done. If these dynamics of initiating the crime occur, a defence of entrapment can sometimes be made on behalf of the accused person. New investigators may be given the opportunity to participate in minor undercover roles fairly early in their careers, and these can be valuable learning experiences.
<h1>Topic 4: Specialized Team Investigations</h1>
The urbanization of communities and the evolution of fields of specialized policing have created new opportunities for officers. Where it was once the case that a police officer was expected to be a generalist capable of working across a wide range of policing fields, the level of expertise now expected in many fields is such that specialized investigative teams have become the norm. Specialized investigative duties now include:
<ul>
 	<li>Forensic Identification Section</li>
 	<li>Traffic Analyst and Accident Reconstruction Units</li>
 	<li>Criminal intelligence and Crime Analysis</li>
 	<li>Criminal and Geographic Crime Profiling</li>
 	<li>Polygraph section and specialized interview teams</li>
 	<li>Computer Crime Analysts and Data Recovery</li>
 	<li>Organized Crime Sections</li>
 	<li>Gang Crime Unit</li>
 	<li>Integrated Homicide Investigation Teams</li>
 	<li>Dedicated Surveillance Units</li>
 	<li>Community Policing Teams</li>
</ul>
For a new investigator, each of these specialities offers an area and a direction where they may decide to direct their career, and it is not uncommon for a police officer to move through several specialized sections over the course of their policing career. What each of these specialized teams does have in common is that investigators on these teams have all achieved the level of basic investigative task skills and thinking skills required to make them a valuable asset to their team and their organization.

As new investigators continue to develop their investigative knowledge applying the task skills and thinking skills presented in this book, it is important to remember that practice and experience are critical components of the ongoing investigative learning. Many police organizations have carefully developed field training programs where new recruits are challenged to engage and demonstrate investigative skills within a set schedule of tasks to complete the compulsory training.

Once this set schedule is completed, it is then incumbent upon the new investigator to become a more self-directed learner. In most policing organizations the path to ongoing investigative duties and the associated experience and skills development that come with those duties, is only available to those who actively seek that experience.

The secret to continued development as an investigator is a simple one; become a self-directed learner and seek out investigative experience and learning at any and all levels available. These work experiences may seem mundane and tedious at times, but every witness interviewed, every search completed, each piece of evidence properly collected and marked, every report written, and every experience testifying in court, is part of the ongoing experience and learning.]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>106</wp:post_id>
		<wp:post_date><![CDATA[2017-05-12 15:15:42]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-05-12 19:15:42]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-11-summary]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>3</wp:post_parent>
		<wp:menu_order>11</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[727]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_export]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 11: Summary]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_candela_citation]]></wp:meta_key>
		<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>References</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/references/</link>
		<pubDate>Wed, 26 Jul 2017 21:20:27 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=chapter&#038;p=182</guid>
		<description></description>
		<content:encoded><![CDATA[<p class="p1"><span class="s1">Abed, R. (2105, November 14). <i>Irish Journal of Psychological Medicine, 12.</i> Retrieved from http://journals.cambridge.org/action/displayAbstract?fromPage=online&amp;aid=9001896&amp;fileId=S0790966700002007</span></p>
<p class="p1"><span class="s1">Allen, R. J. (1991). The Nature of Judicial Proof. <i>Cardozo Law Review</i>, 373-422 .</span></p>
<p class="p1"><span class="s1">Arcaro, G. (2009). <i>Criminal Investigations: Forming Reasonable Grounds</i> (Fifth ed.). Toronto, Ontario: Emond Montgomery Publications Limited.</span></p>
<p class="p1"><span class="s1">Bennett, M. (2015). <i>Unspringing the witness memory and demeanour trap: What every judge and jury needs to know about cognitive psychology and witness credibility.</i> Wahington: American University of Law.</span></p>
<p class="p1"><span class="s1">Brainerd, C. J., &amp; Reyna, V. F. (2005). <em>The Science of False Memory.</em> Oxford, UK: Oxford Universtiy Press. </span></p>
<p class="p1"><span class="s1">Britannica, E. O. (2015). <i>DNA Chemical Compound </i>. Retrieved from Enclyclopedia Britannica: https://www.britannica.com/science/DNA</span></p>
<p class="p1"><span class="s1">Byrnes, T. (2015). <i>Professional Criminals of America (1886)</i>. Retrieved from Online at Archive.org: https://archive.org/details/cu31924096989177</span></p>
<p class="p1"><span class="s1"></span><span class="s1">Campbell, J. A. (1996). <i>Bernardo Investigation Review.</i> Toronto: Solicitor General and Minister of Correctional Services.</span></p>
<p class="p1"><span class="s1">Cox, W. A. (2015). Early Postmortem Changes<i>.</i> Retrieved from forensicmd.files.wordpress.com</span></p>
<p class="p1"><span class="s1">Dass, S. C. (2016). Classification of Fingerprints. Retrieved from Department of Statistics &amp; Probabilities: https://www.cse.msu.edu/~cse802/Papers/802_FPClassification.pdf</span></p>
<p class="p1"><span class="s1">De Saram, G.S.W., Webster, G., Kathirgamatamby, N. (1956). Post-Mortem Temperature and the Time of Death. <i>Crim. L. Criminology &amp; Police Science</i>, 46.</span></p>
<p class="p1"><span class="s1">Dostal, P. (2012). <i>Accessory After the Fact</i>. Retrieved January 15, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Accessory_After_the_Fact</span></p>
<p class="p1"><span class="s1">Dostal, P. (2012). <i>Attempts</i>. Retrieved January 15, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Attempts</span></p>
<p class="p1"><span class="s1">Dostal, P. (2012). <i>Conspiracy (Offence)</i>. Retrieved January 15, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Conspiracy_(Offence)</span></p>
<p class="p1"><span class="s1">Dostal, P. (2012). <i>Counselling</i>. Retrieved January 15, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Counselling</span></p>
<p class="p1"><span class="s1">Dostal, P. (2012). <i>Informer Privilege</i>. Retrieved January 16, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Informer_Privilege</span></p>
<p class="p1"><span class="s1">Dostal, P. (2012). <i>Parties to an Offence</i>. Retrieved January 15, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Parties_to_an_Offence</span></p>
<p class="p1"><span class="s1">Dostal, P. (2012). <i>Principled Exception to Hearsay</i>. Retrieved January 12, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Principled_Exception_to_Hearsay</span></p>
<p class="p1"><span class="s1">Dostal, P. (2012). <i>Principles of Fundamental Justice</i>. Retrieved January 20, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Principles_of_Fundamental_Justice</span></p>
<p class="p1"><span class="s1">Elsevier, B. (2016). <i>Coup contrecoup injury</i>. Retrieved January 27, 2017, from Science Direct: http://www.sciencedirect.com/topics/page/Coup_contrecoup_injury</span></p>
<p class="p1"><span class="s1">Advamag, Inc. (2017). <i>Rigor Mortis and Other Postmortem Changes</i>. Retrieved January 16, 2017, from Encyclopedia of Death and Dying: http://www.deathreference.com/Py-Se/Rigor-Mortis-and-Other-Postmortem-Changes.html</span></p>
<p class="p1"><span class="s1">EnkiVillage. (2017). <i>How Long Does It Take for a Body to Decompose?</i> Retrieved January 16, 2017, from EnkiVillage: http://www.enkivillage.com/how-long-does-it-take-for-a-body-to-decompose.html#affix-section-3</span></p>
<p class="p1"><span class="s1">Fookes, S. A. (1973). Patrol Sergeant. (A. GEHL, Interviewer)</span></p>
<p class="p1"><span class="s1">Gaytmenn, R. S. D. (2003). Quantification of forensic DNA from various regions of human teeth. <i>Journal of Forensic Science, 48</i>(3), 622-625.</span></p>
<p class="p1"><span class="s1">Gecker, R. A. (1989). The Doctrine of Necessity and Its Parameters. <i>Marquette Law Review</i>, 1 - 39 Volume 73 Article 1.</span></p>
<p class="p1"><span class="s1">Giannelli, P. C. (2007). <i>Faculty Publications Paper 153</i>. Retrieved Janauary 27, 2017, from Case Western University School of Law: http://scholarlycommons.law.case.edu/faculty_publications/153</span></p>
<p class="p1"><span class="s1">Gibson, D. (2014). <i>The Kennedy Assassination Cover-up.</i> New York City, NY: Kroshka Books .</span></p>
<p class="p1"><span class="s1">Goff, L. (2015). <i>Early post-mortem changes and stages of decomposition.</i> Retrieved from www.academia.dk Springer Science+Business Media B.V. 2009: www.academia.dk/BiologiskAntropologi/.../post-mortem-changes.pdf</span></p>
<p class="p1"><span class="s1">Government of British Columbia. (2015, Nov 27). <i>British Columbia Police Act.</i> Retrieved from www.qp.gov.bc.c: http://www.qp.gov.bc.ca/police/ec36700.htm#34</span></p>
<p class="p1">Government of Canada. (2015, November 13). <i>Canada Evidence Act</i>. Retrieved from http://laws.justice.gc.ca/en/C-5/</p>
<p class="p1"><span class="s1">Government of Canada. (2015). <i>Youth Criminal Justice.</i> Retrieved from Justice Laws Website - Youth Criminal Justice: http://laws-lois.justice.gc.ca/eng/acts/Y-1.5/page-57.html#h-49</span></p>
<p class="p1"><span class="s1">Government of Canada. (2015). <i>Your Guide to the Canadian Charter of Rights and Freedoms</i>. Retrieved from http://www.pch.gc.ca/eng/1356631760121/1356631904950</span></p>
<p class="p1"><span class="s1">Government of Canada. (2017). <i>Canada Evidence Act (R.S.C., 1985, c. C-5)</i>. Retrieved January 23, 2017, from http://laws-lois.justice.gc.ca/eng/acts/C-5/</span></p>
<p class="p1"><span class="s1">Government of Canada. (2017, January 14). <i>Conspiracy</i>. Retrieved January 11, 2017, from http://laws-lois.justice.gc.ca/eng/acts/C-46/section-465.html</span></p>
<p class="p1"><span class="s1">Gubrium, J. F., &amp; Holstein, J. A. (2002). <i>Handbook of Interview Research: Context and Method.</i> Thousand Oaks: Sage Publications Inc.</span></p>
<p class="p1"><span>Gudjonsson, G. H., &amp; Petursson, H. (1991). Custodial interrogation: Why do suspects confess and how does it relate to their crime, attitude and personality?. </span><i>Personality and Individual Differences</i><span>, </span><i>12</i><span>(3), 295-306.</span></p>
<p class="p1"><span class="s1">Guharaj, P. V. (2003). <i>Forensic Medicine 2nd Edition.</i> Hyderabad: Longman Orient: Sangam Books Ltd.</span></p>
<p class="p1"><span class="s1">Head, T. A. (2010). <i>Crime and Punishment in America.</i> New York, NY: Infobase Publishing.</span></p>
<p class="p1"><span class="s1">Henry, E. R. (1900). Classification and Uses of Fingerprints. <i>Routledge</i>.</span></p>
<p class="p1"><span class="s1">Hill v Hamilton-Wentworth Regional Police Services Board, 2007 SCC 41</span></p>
<p class="p1"><span class="s1">Hitchcock, T. S. (2015, June 05). The Proceedings of the Old Bailey, 1674-1913<i>.</i> Retrieved from www.oldbaileyonline.org/static/Policing.jsp</span></p>
<p class="p1"><span class="s1">Irwin Law. (n.d.). <i>Prima facie case</i>. Retrieved January 14, 2017, from The Canadian Online Legal Dictionary: https://www.irwinlaw.com/cold/prima_facie_case</span></p>
<p class="p1"><span class="s1">Jaffe, F. A. (1994). Petechial Hemorrhages: A Review of Pathogenesis. <i>The American Journal of Forensic Medicine and Pathology</i>, 203-207.</span></p>
<p class="p1"><span class="s1">Jain, A. F. (2010). Fingerprint Matching. <i>Biometrics</i>, 36-44.</span></p>
<p class="p1"><span class="s1">Justice Canada. (2017, January 14). <i>Rules of Evidence in Canada</i>. Retrieved January 14, 2017, from Canada Evidnce Act: http://laws.justice.gc.ca/en/C-5/</span></p>
<p class="p1"><span class="s1">Justice Department Canada. (2017, January 02). <i>Rules of Evidence</i>. Retrieved from http://laws.justice.gc.ca/en/C-5/</span></p>
<p class="p1"><span class="s1">Justice Laws Canada. (2017). <i>Duty of persons to provide necessaries</i>. Retrieved January 16, 2017, from http://laws-lois.justice.gc.ca/eng/acts/C-46/section-215.html</span></p>
<p class="p1"><span class="s1">Kaufman, <span>F., &amp; Morin, G. P. (1998). </span><i>The Commission on Proceedings Involving Guy Paul Morin: Report</i><span>. Ministry of the Attorney General.</span></span><span style="font-size: 14pt">Legal Information Institute. </span></p>
<p class="p1">Lindsey, S., Hertwig, R., &amp; Gigerenzer, G. (2003). Communicating Statistical DNA Evidence, 43 Jurimetrics J. 147-163.</p>
<p class="p1"><span class="s1">MacCallum, E. P. (2008). <i>Report of the Commission of Inquiry into the Wrongful Conviction of David Milgaard.</i> Regina, SK: Saskatchewan Government.</span></p>
<p class="p1"><span class="s1">MacDonell, J. (1820). <i>Report of State Trials Volume 1.</i> London: The State Trial Committee.</span></p>
<p class="p1"><span class="s1">Macrae, M. (2015). <i>Is the Science of DNA Wrongful Conviction-Proof?</i> Retrieved January 17, 2017, from Innocence Canada: https://www.aidwyc.org/dna/</span></p>
<p class="p1"><span class="s1">McCrery, N. (2013). <i>Silent Witnesses.</i> London: Random House Books.</span></p>
<p class="p1"><span class="s1">McRory, S. (2014). Introduction to Criminal Process for Inspector. <i>Compliance Assurance Learning and Development Program</i>, 43. Edmonton, AB: Alberta Energy Regulator.</span></p>
<p class="p1"><span class="s1">Morgan, C. H. (2004). Accuracy of eyewitness memory for persons encountered during exposure to highly intense stress. <i>International Journal of Law and Psychiatry</i>, 265-279.</span></p>
<p class="p1"><span class="s1">National Science Forensic Technology Center. (2012). A Simplified Guide To Bloodstain Pattern Analysis. <em>National Science Forensic Technology Center</em>. Retrieved January 15, 2017, from www.forensicsciencesimplified.org/blood/BloodstainPatterns.pdf</span></p>
<p class="p1"><span class="s1">Oorsouw, K. M. (2015). Alcohol intoxication impairs memory and increases suggestibility for a mock crime: a filed study. <i>Applied Cognitive Psychology, 29</i>, 293-501.</span></p>
<p class="p1"><span class="s1">Oppal, W. (2013). <i>The report of the mission women commission of inquiry.</i> British Columbia Government.</span></p>
<p class="p1"><span class="s1">Pennington, M. (1999). Miscarriages of Justice: A call for continued research focusing on reforming the investigative process. <i>Journal of Forensic Practice</i>, <em>13</em>, 61-71.</span></p>
<p class="p1"><span class="s1">Petherick, W. A. (2010). <i>Forensic Criminology.</i> London: Elsevier Academic Press.</span></p>
<p class="p1"><span class="s1">Police Executive Research Forum. (2014). The Police Response to Active Shooter Incidents. <em>Critical Issues in Policing Series</em>, 1-46.</span></p>
<p class="p1"><span class="s1">R v Abernathy, 2002 BCCA 8</span></p>
<p class="p2"><span class="s1">R v Basi, <span class="s3">2009 SCC 52, [2009] 3 SCR 389</span></span></p>
<p class="p2">R v Beare, 1988 2 SCR 387</p>
<p class="p1">R v Beaudry<span>, [2007] 1 SCR 190, 2007 SCC 5</span></p>
<p class="p1">R v Briscoe<em>, </em>2010 <span>SCC 13, [2010] 1 SCR 411</span></p>
<p class="p1">R v Ferguson, 1996 BCCA 342</p>
<p class="p1"><span class="s1">R v Gagnon, 2006 MBCA X at 13 </span></p>
<p class="p1"><span class="s1">R v Godoy, 1999 1 SCR 311</span></p>
<p class="p1">R v Graham, 1974<span> S.C.R. 206</span></p>
<p class="p1"><span class="s1">R v Grant, 2009 SCC 32 </span></p>
<p class="p1">R v Khan, 1990 2 SCR 531</p>
<p class="p1">R v Kowlyk, 1998 2 SCR 59</p>
<p class="p1"><span class="s1">R v Lifchus, 1997 3 SCR 320 </span></p>
<p class="p1">R v Mann, 2004 3 SCR 59</p>
<p class="p1"><span class="s1">R v Perka, 1984 2 SCR 232</span></p>
<p class="p1">R v Schell, 2004<span> 188 CCC (3d) 254 (ABCA)</span></p>
<p class="p1"><span class="s1">R v Smith, 1992 2 SCR 915</span></p>
<p class="p1"><span class="s1">R v Starr, 2000 2 S.C.R. 144 </span></p>
<p class="p1"><span class="s1">R v Steinberg, 1931 SCR 421</span></p>
<p class="p1"><span class="s1">R v Stinchcombe, 1991 3 SCR 326 </span></p>
<p class="p1"><span class="s1">R v Storrey, 1990 1 SCR 241 </span></p>
<p class="p1">R v Terrence, 1983 1 SCR 357</p>
<p class="p1">R v Walsh<span>, </span>1978<span> 48 CCC (2d) 199 (</span>ONCA)</p>
<p class="p1"><span class="s1">R v Woodcock, 1789 168 E.R. 352 (K.B.) </span></p>
<p class="p1"><span class="s1">Reith, C. (1943). Preventive Principle of Police. <i>Journal of Criminal Law and Criminology</i>, <em>34</em>, 206-209.</span></p>
<p class="p1"><span class="s1">Resnick, H. S., Kilpatrick, D. G., Dansky, B. S., Saunders, B. E., &amp; Best, C. L. (1993). Prevalence of civilian trauma and posttraumatic stress disorder in a representative national sample of women. <i>Journal of Consulting and Clinical Psychology</i>, 984-991.</span></p>
<p class="p1">Rex v. Burdett,<span> </span>1820<span> 4 B. &amp; Aid</span></p>
<p class="p1"><span class="s1">Rogers, K. (2016). <i>Chimera Genetics</i>. Retrieved from Encyclopedia Britanica: https://www.britannica.com/topic/chimera-genetics</span></p>
<p class="p1"><span class="s1">Rose, C. &amp; Beck, V. (2009). Eyewitness accounts: False facts, false memories, and false identification. <i>Journal of Crime and Justice, 39</i>(2), 243-263.</span></p>
<p class="p1"><span class="s1">Rossmo, D. K. (1987). <i>Geographic Profiling Target Patterns of Serial Murderers.</i> Burnaby: Simon Fraser University.</span></p>
<p class="p1"><span class="s1">Rossmo, D. K. (2009). <i>Criminal Investigative Failures.</i> Bocal Raton: CRC Press Taylor &amp; Fransis Group.</span></p>
<p class="p1"><span class="s1">Royal Canadian Mounted Police. (2006, September 01). <i>National DNA Data Bank</i>. Retrieved January 16, 2017, from http://www.rcmp-grc.gc.ca/nddb-bndg/index-accueil-eng.htm</span></p>
<p class="p1"><span class="s1">Royal Canadian Mounted Police. (2015, Nov 27). <i>Criminal Investigative Analysis .</i> Retrieved from http://www.rcmp-grc.gc.ca/tops-opst/bs-sc/crim-profil-eng.htm</span></p>
<p class="p1"><span class="s1">Salhany, R. (2008). <i>Taman Inquiry into the Investigation and Prosecution of Derek Harvey-Zenk.</i> Winnipeg: Government of Manitoba.</span></p>
<p class="p1">Sansregret v The Queen<span>, 1985 </span>1 SCR 570</p>
<p class="p1"><span>Savino, J. O., Turvey, B. E., &amp; Freeman, J. L. (2011). </span><i>Rape investigation handbook</i><span>. Waltham: Academic Press - an imprint of Elsevier.</span></p>
<p class="p1"><span class="s1">Sebetic, E. (1950). <i>Marquette Law Review 128.</i> Retrieved from http://scholarship.law.marquette.edu/mulr/vol34/iss2/6</span></p>
<p class="p1"><span class="s1">Shah, A. K. (2008). Heuristics Made Easy: An Effort-Reduction Framework. <i>Psychological Bulletin, <span>134</span></i>(2)<i><span>, </span></i>207-22.<i><span> </span></i>doi: 10.1037/0033-2909.134.2.207</span></p>
<p class="p1"><span>Smalarz, L., &amp; Wells, G. L. (2015). Contamination of eyewitness self-reports and the mistaken-identification problem. </span><i>Current Directions in Psychological Science</i><span>, </span><i>24</i><span>(2), 120-124.</span></p>
<p class="p1"><span class="s1">Smith, C. (2010). Shaken Baby Syndrome - An Investigator's Perspective<i>.</i> Abbotsford: University of the Fraser Valley.</span></p>
<p class="p1"><span class="s1">Sopinka, J. (1999). <i>The Law of Evidence in Canada 2nd ed.</i> Toronto, Ontario: LexisNexis Canada.</span></p>
<p class="p1"><span>Streets, M. D., &amp; Gerald, M. (1990). The homicide witness and victimization; PTSD in civilian populations: a literature review. </span><i>Jefferson Journal of Psychiatry</i><span>, </span><i>8</i><span>(1), 12.</span></p>
<p class="p1"><span class="s1">Taber, K. (2006). Beyond Constructivism: the Progressive Research Programme into Learning Science. <i>Studies in Science Education, 42</i>, 125-184.</span></p>
<p class="p1"><span class="s1">Thomas, S. A. (2000). <i>JonBenet: Inside the Ramsey Murder Investigation.</i> New York, NY: St Maritn's Paperback.</span></p>
<p class="p1"><span class="s1">Thompson, R. (2013, September 11). <i>Hearsay and Exceptions to Hearsay Rule.</i> Retrieved from https://library.lawsociety.sk.ca/inmagicgenie/documentfolder/EFLP3.PDF</span></p>
<p class="p1">Transit Police (2015, November 14). <i>Police Warnings - Transit Police.</i> Retrieved from www.transitpolice.bc.ca</p>
<p class="p1"><span class="s1">Varney, C. A. (2009). Procedural Fairness. <i>13th Annual Competition Conference of the International Bar Association</i>. Fiesole, Italy: Antitrust Division United States Department of Justice.</span></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>182</wp:post_id>
		<wp:post_date><![CDATA[2017-07-26 17:20:27]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-07-26 21:20:27]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[references]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>3</wp:post_parent>
		<wp:menu_order>12</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[120]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_export]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_candela_citation]]></wp:meta_key>
		<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 13: Risk Management Planning</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-13-risk-management-planning/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:31 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-13-risk-management-planning/</guid>
		<description></description>
		<content:encoded><![CDATA[
<div class="chapter-13:-risk-management-planning">
<div class="textbox textbox--learning-objectives"><header class="textbox__header">
<p class="textbox__title">Learning Objectives</p>

</header>
<div class="textbox__content">
<p class="import-Normal"><strong>Learning Objectives</strong></p>

<ul>
 	<li>Identify and prioritize risks to the project plan.</li>
 	<li>Identify elements of risk management.</li>
 	<li>Develop a risk response plan.</li>
</ul>
</div>
</div>
&nbsp;
<p class="import-Normal">Even the most carefully planned project can run into trouble. No matter how well you plan, your project can always encounter&nbsp;unexpected problems. Team members get sick or quit, resources that you were depending on turn out to be unavailable, even the weather can throw you for a loop (e.g., a snowstorm). So does that mean that you’re helpless against unknown problems? No! You can use risk planning to identify potential problems that could cause trouble for your project, analyze how likely they&nbsp;are to&nbsp;occur, take action to prevent the risks you can avoid, and minimize the ones that you can’t.</p>
<p class="import-Normal">A risk is any uncertain event or condition that might affect your project. Not all risks are negative. Some events (like finding an easier way to do an activity) or conditions (like lower prices for certain materials) can help your project. When this happens, we call it an opportunity; but it’s still handled just like a risk.</p>
<p class="import-Normal">There are no guarantees on any project. Even the simplest activity can turn into unexpected problems. Anything that might occur to&nbsp;change the outcome of a project activity, we call that a risk. A risk can be an event (like a snowstorm) or it can be a condition (like an important part being unavailable). Either way, it’s something that may or may not happen …but if it does, then it will force you to change the way you and your team work on the project.</p>
<p class="import-Normal">If your project requires that you stand on the edge of a cliff, then there’s a risk that you could fall. If it’s very windy out or if the ground is slippery and uneven, then falling is more likely (Figure 13.1).</p>
<p class="import-Normal"><img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image46-1.jpg" width="571.062257217848px" height="261px" alt="image"><a class="rId284">&nbsp;</a></p>
<p class="import-Normal">Figure 13.1 Risk Management Options<br style="clear: both">Illustration from Barron &amp; Barron Project Management for Scientists and Engineers, <a class="rId285">http://cnx.org/content/col11120/1.4/</a><a class="rId286">&nbsp;</a></p>
<p class="import-Normal">When you’re planning your project, risks are still uncertain: they haven’t happened yet. But eventually, some of the risks that you plan for do happen, and that’s when you have to deal with them. There are four basic ways to handle a risk.</p>

<ol>
 	<li><strong>Avoid:</strong> The best thing you can do with a risk is avoid it. If you can prevent it from happening, it definitely won’t hurt your project. The easiest way to avoid this risk is to walk away from the cliff, but that may not be an option on this project.</li>
 	<li><strong>Mitigate</strong>: If you can’t avoid the risk, you can mitigate it. This means taking some sort of action that will cause it to do as little damage to your project as possible.</li>
 	<li><strong>Transfer:</strong> One effective way to deal with a risk is to pay someone else to accept it for you. The most common way to do this is to buy insurance.</li>
 	<li><strong>Accept:</strong> When you can’t avoid, mitigate, or transfer a risk, then you have to accept it. But even when you accept a risk, at least you’ve looked at the alternatives and you know what will happen if it occurs. If you can’t avoid the risk, and there’s nothing you can do to reduce its impact, then accepting it is your only choice.</li>
</ol>
<p class="import-Normal">By the time a risk actually occurs on your project, it’s too late to do anything about it. That’s why you need to plan for risks from the beginning and keep coming back to do more planning throughout the project.</p>
<p class="import-Normal">The risk management plan tells you how you’re going to handle risk in your project. It documents how you’ll assess risk, who is responsible for doing it, and how often you’ll do risk planning (since you’ll have to meet about risk planning with your team throughout the project). Some risks are technical, like a component that might turn out to be difficult to use. Others are external, like changes in the market or even problems with the weather.</p>
<p class="import-Normal">It’s important to come up with guidelines to help you figure out how big a risk’s potential impact could be. The impact tells you how much damage the risk would&nbsp;cause to your project. Many&nbsp;projects classify impact on a scale from minimal to severe, or from very low to very high. Your risk management&nbsp;plan should give you a scale to help figure out the probability of the risk. Some risks are very likely; others aren’t.</p>

<h2><a></a>Risk Management Process</h2>
<p class="import-Normal">Managing risks on projects is a process that includes risk assessment and a mitigation strategy for those risks. <em>Risk assessment</em> includes both the identification of potential risk and the evaluation of the potential impact of the risk. A <strong>risk mitigation plan</strong> is designed to eliminate or minimize the impact of the <strong>risk events</strong>—occurrences that have a negative impact on the project. Identifying risk is both a creative and a disciplined process. The creative process includes brainstorming sessions where the team is asked to create a list of everything that could go wrong. All ideas are welcome at this stage with the evaluation of the ideas coming later.</p>

<h3><a></a>Risk Identification</h3>
<p class="import-Normal">A more disciplined process involves using checklists of potential risks and evaluating the likelihood that those events might happen on the project. Some companies and industries develop risk checklists based on experience from past projects. These checklists can be helpful to the project manager and project team in identifying both specific risks on the checklist and expanding the thinking of the team. The past experience of the project team, project experience within the company, and experts in the industry can be valuable resources for identifying potential risk on a project.</p>
<p class="import-Normal">Identifying the sources of risk by category is another method for exploring potential risk on a project. Some examples of categories for potential risks include the following:</p>

<ul>
 	<li class="import-Normal" style="text-indent: 23.95pt">Technical</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Cost</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Schedule</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Client</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Contractual</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Weather</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Financial</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Political</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Environmental</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">People</li>
</ul>
<p class="import-Normal">You can use the same framework as the work breakdown structure (WBS) for developing a <strong>risk breakdown structure (RBS)</strong>. A risk breakdown structure organizes the risks that have been identified into categories using a table with increasing levels of detail to the right.&nbsp;The people category can be subdivided into different types of risks associated with the people. Examples of people risks include the risk of not finding people with the skills needed to execute the project or the sudden unavailability of key people on the project.</p>

<h4><a></a>Example: Risks in John’s Move</h4>
<p class="import-Normal">In John’s move, John makes a list of things that might go wrong with his project and uses his work breakdown structure as a guide. A partial list for the planning portion of the RBS is shown in Figure 13.2.</p>
<p class="import-Normal"><img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image47-1.jpg" width="633px" height="334.866666666667px" alt="image"><a class="rId288">&nbsp;</a></p>
<p class="import-Normal">Figure 13.2 Risk Breakdown Structure (RBS)<br style="clear: both">Source: <a class="rId289">http://pm4id.org/11/2/</a><a class="rId290">&nbsp;</a></p>
<p class="import-Normal">The result is a clearer understanding of where risks are most concentrated. This approach helps the project team identify known risks, but can be restrictive and less creative in identifying unknown risks and risks not easily found inside the&nbsp;WBS.</p>

<h3><a></a>Risk Evaluation</h3>
<p class="import-Normal">After the potential risks have been identified, the project team then evaluates each&nbsp;risk based on the probability that a risk event&nbsp;will occur and the potential loss associated with it. Not all risks are equal. Some risk events are more likely to happen than others, and the cost of a risk can vary greatly. Evaluating the risk for probability of occurrence and the severity or the potential loss to the project is the next step in the risk management process.</p>
<p class="import-Normal">Having criteria to determine high-impact risks can help narrow the focus on a few critical risks that require mitigation. For example, suppose high-impact risks are those that could increase the project costs by 5% of the conceptual budget or 2% of the detailed budget. Only a few potential risk events meet these criteria. These are the critical few potential risk events that the project management team should focus on when developing a project risk mitigation or management plan. Risk evaluation is about developing an understanding of which potential risks have the greatest possibility of occurring and can have the greatest negative impact on the project (Figure 13.3). These become the critical few.</p>
<p class="import-Normal"><img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image48-1.jpg" width="641.985406824147px" height="407px" alt="image"><a class="rId292">&nbsp;</a></p>
<p class="import-Normal">Figure 13.3 Risk and Impact<br style="clear: both">Source: <a class="rId293">http://pm4id.org/11/2/</a><a class="rId294">&nbsp;</a></p>
<p class="import-Normal">There is a positive correlation—both increase or decrease together—between project risk and project complexity. A project with new and emerging technology will have a high-complexity rating and a correspondingly high risk. The project management team will assign the appropriate resources to the technology managers to ensure the accomplishment of project goals. The more complex the technology, the more resources the technology manager typically needs to meet project goals, and each of those resources could face unexpected problems.</p>
<p class="import-Normal">Risk evaluation often occurs in a workshop setting. Building on the identification of the risks, each risk event is analyzed to determine the likelihood of occurrence and the potential cost if it did occur. The likelihood and impact are both rated as high, medium, or low. A risk mitigation plan addresses the items that have high ratings on both factors—likelihood and impact.</p>

<h4><a></a>Example: Risk Analysis of Equipment Delivery</h4>
<p class="import-Normal">A project team analyzed the risk of some important equipment not arriving at&nbsp;the project on time. The team identified three pieces of equipment that were critical to the project and would significantly increase costs if they were late in arriving. One of the vendors, who was selected to deliver an important piece of equipment, had a history of being late on other projects. The vendor was good and often took on more work than it could deliver on time. This risk event (the identified equipment arriving late) was rated as high likelihood with a high impact. The other two pieces of equipment were potentially a high impact on the project but with a low probability of occurring.</p>
<p class="import-Normal">Not all project managers conduct a formal risk assessment on a&nbsp;project. One reason, as found by David Parker and Alison Mobey in their phenomenological study of project managers, was a low understanding of the tools and benefits of a structured analysis of project risks (2004). The lack of formal risk management tools was also seen as a barrier to implementing a risk management program. Additionally, the project manager’s personality and management style play into risk preparation levels. Some project managers are more proactive and develop elaborate risk management programs for their projects. Other managers are reactive and are more confident in their ability to handle unexpected events when they occur. Yet others are risk averse, and prefer to be optimistic and not consider risks or avoid taking risks whenever possible.</p>
<p class="import-Normal">On projects with a low-complexity profile, the project manager may informally track items that may be considered risk items. On more complex projects, the project management team may develop a list of items perceived to be higher risk and track them during project reviews. On projects of even&nbsp;greater complexity, the process for evaluating risk is more formal with a risk assessment meeting or series of meetings during the life of the project to assess risks at different phases of the project. On highly complex projects, an outside expert may be included in the risk assessment process, and the risk assessment plan may take a more prominent place in the project implementation&nbsp;plan.</p>
<p class="import-Normal">On complex projects, statistical models are sometimes used to evaluate risk because there are too many different possible combinations of risks to calculate them one at a time. One example of the statistical model used on projects is the Monte Carlo simulation, which simulates a possible range of outcomes by trying many different combinations of risks based on their likelihood. The output from a Monte Carlo simulation provides the project team with the probability of an event occurring within a range and for combinations of events. For example, the typical output from a Monte Carlo simulation may indicate&nbsp;a 10% chance that one of the three important pieces of equipment will be late and that the weather will also be unusually bad after the equipment arrives.</p>

<h3><a></a>Risk Mitigation</h3>
<p class="import-Normal">After the risk has been identified and evaluated, the project team develops a risk mitigation plan, which is a plan to reduce the impact of an unexpected event. The project team mitigates risks in various&nbsp;ways:</p>

<ul>
 	<li class="import-Normal" style="text-indent: 23.95pt">Risk avoidance</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Risk sharing</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Risk reduction</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Risk transfer</li>
</ul>
<p class="import-Normal">Each of these mitigation techniques can be an effective tool in reducing individual risks and the risk profile of the project. The risk mitigation plan captures the risk mitigation approach for each identified risk event and the actions the project management team will take to reduce or eliminate the risk.</p>
<p class="import-Normal"><strong>Risk avoidance</strong> usually involves developing an alternative strategy that has a higher probability of success but usually at a higher cost associated with accomplishing a project task. A common risk avoidance technique is to use proven and existing technologies rather than adopt new techniques, even though the new techniques may show promise of better performance or lower costs. A project team may choose a vendor with a proven track record over a new vendor that is providing significant price incentives to avoid the risk of working with a new vendor. The project team that requires drug testing for team members is practicing risk avoidance by avoiding damage done by someone under the influence of drugs.</p>
<p class="import-Normal"><strong>Risk sharing</strong> involves partnering with others to share responsibility for the risky activities. Many organizations that work on international projects will reduce political, legal, labor, and others risk types associated with international projects by developing a joint venture with a company located in that country. Partnering with another company to share the risk associated with a portion of the project is advantageous when the other company has expertise and experience the project team does not have. If a&nbsp;risk event does occur, then the partnering company absorbs some or all of the negative impact of the event. The company will also derive some of the profit or benefit gained by a successful project.</p>
<p class="import-Normal"><strong>Risk reduction</strong> is an investment of funds to reduce the risk on a project. On international projects, companies will often purchase the guarantee of a currency rate to reduce the risk associated with fluctuations in the currency exchange rate. A project manager may hire an expert to review the technical plans or the cost estimate on a project to increase the confidence in that plan and reduce the project risk. Assigning highly skilled project personnel to manage the high-risk activities is another risk-reduction method. Experts managing a high-risk activity can often predict problems and find solutions that prevent the activities from having a negative impact on the project. Some companies reduce risk by forbidding key executives or technology experts to ride on the same airplane.</p>
<p class="import-Normal"><strong>Risk transfer</strong> is a risk reduction method that shifts the risk from the project to another party. The purchase of insurance on certain items is a risk-transfer method. The risk is transferred from the project to the insurance company. A construction project in the Caribbean may purchase hurricane insurance that would cover the cost of a hurricane damaging the construction site. The purchase of insurance is usually in areas outside the control of the project team. Weather, political unrest, and labor strikes are examples of events that can significantly impact the project and that are outside the control of the project team.</p>

<h3><a></a>Contingency Plan</h3>
<p class="import-Normal">The project risk plan balances the investment of the mitigation against the benefit for the project. The project team often develops an alternative method for accomplishing a project goal when a risk event has been identified that may frustrate the accomplishment of that goal. These plans are called contingency plans. The risk of a truck drivers’ strike may be mitigated with a contingency plan that uses a train to transport the needed equipment for the project. If a critical piece of equipment is late, the impact on the schedule can be mitigated by making changes to the schedule to accommodate a late equipment delivery.</p>
<p class="import-Normal">Contingency funds are funds set aside by the project team to address unforeseen events that cause the project costs to increase. Projects with a high-risk profile will typically have a large contingency budget. Although the amount of contingency allocated in the project budget is a function of the risks identified in the risk analysis process, contingency is typically managed as one line item in the project budget.</p>
<p class="import-Normal">Some project managers allocate the contingency budget to the items in the budget that have high risk rather than developing one line item in the budget for contingencies. This approach allows the project team to track the use of contingency against the risk plan. This approach also allocates the responsibility to manage the risk budget to the managers responsible for those line items. The availability of contingency funds in the line item budget may also increase the use of contingency funds to solve problems rather than finding alternative, less costly solutions. Most project managers, especially on more complex projects, manage contingency funds at the project level, with approval of the project manager required before contingency funds can be used.</p>

<h2><a></a>Project Risk by Phases</h2>
<p class="import-Normal">Project risk is dealt with in different ways depending on the phase of the project.</p>

<h3><a></a>Initiation</h3>
<p class="import-Normal">Risk is associated with things that are unknown. More things are unknown at the beginning of a project, but risk must be considered in the initiation phase and weighed against the potential benefit of the project’s success in order to decide if the project should be chosen.</p>

<h4><a></a>Example: Risks by Phase in John’s Move</h4>
<p class="import-Normal">In the initiation phase of his&nbsp;move, John considers the risk of events that could affect the whole project. Lets assume that John’s move is not just about changing jobs, but also a change of cities. This would certainly incur more risks for the project.&nbsp; He identifies the following risks during the initiation phase that might have a high impact and rates the likelihood of their happening from low to high.</p>

<ul>
 	<li>His new employer might change his mind and take back the job offer after he’s given notice at his old job: <em>Low.</em></li>
 	<li>The current tenants of his apartment might not move out in time for him to move in by the first day of work at the new job: <em>Medium</em>.</li>
 	<li>The movers might lose his furniture: <em>Low.</em></li>
 	<li>The movers might be more than a week late delivering his furniture: <em>Medium.</em></li>
 	<li>He might get in an accident driving from Chicago to Atlanta and miss starting his job: <em>Low.</em></li>
</ul>
<p class="import-Normal">John considers how to mitigate each of the risks.</p>
<p class="import-Normal" style="text-indent: 23.95pt">During his job hunt, John had more than one offer, and he is confident that he could get another job, but he might lose deposit money on the apartment and the mover. He would also lose wages during the time it took to find the other job. To mitigate the risk of his new employer changing his mind, John makes sure that he keeps his relationships with his alternate employers cordial and writes to each of them thanking for their consideration in his recent interviews.</p>
<p class="import-Normal" style="text-indent: 23.95pt">John checks the market in Atlanta to determine the weekly cost and availability of extended-stay motels.</p>

<ul>
 	<li>John checks the mover’s contract to confirm that they carry insurance against lost items, but they require the owner to provide a detailed list with value estimates and they limit the maximum total value. John decides to go through his apartment with his digital camera and take pictures of all of his possessions that will be shipped by truck and to keep the camera with him during the move so he has a visual record and won’t have to rely on his memory to make a list. He seals and numbers the boxes so he can tell if a box is missing.</li>
 	<li>If the movers are late, John can use his research on extended-stay motels to calculate how much it would cost. He checks the moving company’s contract to see if they compensate the owner for late delivery, and he finds that they do not.</li>
 	<li>John checks the estimated driving time from Chicago to Atlanta using an Internet mapping service and gets an estimate of 11 hours of driving time. He decides that it would be too risky to attempt to make the drive by himself in one day, especially if he&nbsp;didn’t&nbsp;leave until after the truck was packed. John plans to spend one night on the road in a motel to reduce the risk of an accident caused by driving while too tired.</li>
</ul>
<p class="import-Normal">John concludes that the medium-risks can be mitigated and the costs from the mitigation would be acceptable in order to get a new job.</p>

<h3><a></a>Planning Phase</h3>
<p class="import-Normal">Once the project is approved and it moves into the planning stage, risks are identified with each major group of activities. A risk breakdown structure (RBS) can be used to identify increasing levels of detailed risk analysis.</p>

<h4><a></a>Example: Risk Breakdown Structure for John’s Move</h4>
<p class="import-Normal"><img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image49-1.jpg" width="661px" height="439px" alt="image"><a class="rId296">&nbsp;</a></p>
<p class="import-Normal">Figure 16.4 Risk Breakdown Structure (RBS) for Packing John’s Apartment<br style="clear: both">Source: <a class="rId297">http://pm4id.org/11/3/</a><a class="rId298">&nbsp;</a></p>
<p class="import-Normal">John decides to ask Dion and Carlita for their help during their first planning meeting to identify risks, rate their impact and likelihood, and suggest mitigation plans. They concentrate on the packing phase of the move. They fill out a table of risks, as shown in Figure 16.4.</p>

<h3><a></a>Implementation&nbsp;Phase</h3>
<p class="import-Normal">As the project progresses and more information becomes available to the project team, the total risk on the project typically reduces, as activities are performed without loss. The risk plan needs to be updated with new information and risks checked off that are related to activities that have been performed.</p>
<p class="import-Normal">Understanding where the risks occur on the project is important information for managing the contingency budget and managing cash reserves. Most organizations develop a plan for financing the project from existing organizational resources, including financing the project through a variety of financial instruments. In most cases, there is a cost to the organization to keep these funds available to the project, including the contingency budget. As the risks decrease over the length of the project, if the contingency is not used, then the funds set aside by the organization can be used for other purposes.</p>
<p class="import-Normal">To determine the amount of contingency that can be released, the project team will conduct another risk evaluation and determine the amount of risk remaining on the project. If the risk profile is lower, the project team may release contingency funds back to the parent organization. If additional risks are uncovered, a new mitigation plan is developed including the possible addition of contingency funds.</p>

<h3><a></a>Closeout Phase</h3>
<p class="import-Normal">During the closeout phase, agreements for risk sharing and risk transfer need to be concluded and the risk breakdown structure examined to be sure all the risk events have been avoided or mitigated. The final estimate of loss due to risk can be made and recorded as part of the project documentation. If a Monte Carlo simulation was done, the result can be compared to the predicted result.</p>

<h4><a></a>Example: Risk Closeout on John’s Move</h4>
<p class="import-Normal">To close out the risk mitigation plan for his&nbsp;move, John examines the risk breakdown structure and risk mitigation plan for items that need to be finalized. He makes a checklist to be sure all the risk mitigation plans are completed, as shown in Figure 16.5. Risk is not allocated evenly over the life of the project. On projects with a high degree of new technology, the majority of the risks may be in the early phases of the project. On projects with a large equipment budget, the largest amount of risk may be during the procurement of the equipment. On global projects with a large amount of political risk, the highest portion of risk may be toward the end of the project.</p>
<p class="import-Normal"><img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image50-1.jpg" width="571.2px" height="232.256482939633px" alt="image"><a class="rId300">&nbsp;</a></p>
<p class="import-Normal">Figure 16.5 Closeout of Risk Mitigation Plan for John’s Move<br style="clear: both">Source: <a class="rId301">http://pm4id.org/11/3/</a><a class="rId302">&nbsp;</a></p>

<h2><a></a>References</h2>
<p class="import-Normal">Parker, D., &amp; Mobey, A. (2004).&nbsp;Action Research to Explore Perceptions of Risk in Project Management. <em>International Journal of Productivity and Performance Management 53(</em>1), 18–32.</p>

<table>
<tbody>
<tr class="GridTable4-Accent5-R" style="height: 0">
<td class="GridTable4-Accent5-C" style="background-color: #4bacc6;border: solid #4BACC6 0.5pt">
<div class="GridTable4-Accent5-firstCol">
<div class="GridTable4-Accent5-firstRow">
<h2 class="import-Normal"><a></a>Chapter 13: Key Takeaways</h2>
</div>
</div></td>
</tr>
<tr class="GridTable4-Accent5-R" style="height: 0">
<td class="GridTable4-Accent5-C" style="background-color: #daeef3;border: solid #92CDDC 0.5pt">
<div class="GridTable4-Accent5-band1Horz">
<div class="GridTable4-Accent5-firstCol">
<ul>
 	<li>A risk is any uncertain event or condition that might affect your project. Risk can be negative or positive.</li>
 	<li>The risk management identifies key risks and develops plans to prevent them and/or mitigate their adverse effects.</li>
 	<li>Managing risks on projects is a process that includes risk assessment and a mitigation strategy for those risks.</li>
 	<li>Risk assessment (may be objective or subjective/qualitative or quantitative) includes both the identification of potential risk and the evaluation of the potential impact of the risk.</li>
 	<li>Risk identification involves:</li>
 	<li>Using a checklists to identify potential risks and evaluating the likelihood that those events might happen on the project.</li>
 	<li>Identifying the sources of risk by category exploring potential risk on a project.</li>
 	<li>A Risk Breakdown Structure (RBS) organizes the risks that have been identified into categories using a table with increasing levels of detail to the right.</li>
 	<li>After the potential risks have been identified, the project team then evaluates each risk based on the probability that a risk event will occur and the potential impact - loss associated with it.</li>
 	<li>A risk mitigation plan is designed to eliminate or minimize the impact of the risk events—occurrences that have a negative impact on the project</li>
 	<li>The project team mitigates risks in various ways:</li>
 	<li>Risk avoidance</li>
 	<li>Risk sharing</li>
 	<li>Risk reduction</li>
 	<li>Risk transfer</li>
 	<li>Contingency funds are funds set aside by the project team to address unforeseen events that cause the project costs to increase. Projects with a high-risk profile will typically have a large contingency budget.</li>
 	<li>Project risk is dealt with in different ways depending on the phase of the project.</li>
</ul>
</div>
</div></td>
</tr>
<tr>
<td></td>
</tr>
</tbody>
</table>
<h3></h3>
<h2>Attribution</h2>
<p class="import-Normal">This chapter of <em>Project Management</em> is a derivative copy of&nbsp;<a class="rId303">Project Management for Instructional Designers</a> by Amado, M., Ashton, K., Ashton, S., Bostwick, J., Clements, G., Drysdale, J., Francis, J., Harrison, B., Nan, V., Nisse, A., Randall, D., Rino, J., Robinson, J., Snyder, A., Wiley, D., &amp; Anonymous. (DATE). Project Management for Instructional Designers. Retrieved from <a class="rId304">http://pm4id.org/</a>. licensed under <a class="rId305">Creative Commons Attribution 3.0 Unported.</a></p>
<p class="import-Normal">Contribution from Florence Daddey.<a class="rId306">&nbsp;</a></p>

</div>
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>358</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:31]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:31]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-13-risk-management-planning]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>288</wp:post_parent>
		<wp:menu_order>1</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 14: Procurement Planning and Management</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-14-procurement-planning-and-management/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:33 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-14-procurement-planning-and-management/</guid>
		<description></description>
		<content:encoded><![CDATA[
<div class="chapter-14:-procurement-planning-and-management">
<div class="textbox textbox--learning-objectives"><header class="textbox__header">
<p class="textbox__title">Learning Objectives</p>

</header>
<div class="textbox__content">
<p class="import-Normal"><strong>Learning Objectives</strong></p>

<ul>
 	<li>Justify the need for project procurement management.</li>
 	<li>Develop purchases and acquisitions plans (Procurement plans).</li>
</ul>
</div>
</div>
&nbsp;
<p class="import-Normal">Procurement management follows a logical order. First, you plan what you need to contract; then you plan how you’ll do it. Next, you send out your contract requirements to sellers. They bid for the chance to work with you. You pick the best one, and then you sign the contract with them. Once the work begins, you monitor it to make sure that the contract is being followed. When the work is done, you close out the contract and fill out all the paperwork.</p>
<p class="import-Normal">You need to start with a plan for the whole project. Before doing&nbsp;anything else, you need to think about all of the work that you will contract out for your project. You will want to plan for any purchases and acquisitions. Here’s where you take a close look at your needs to be sure that contracting is necessary. You figure out what kinds of contracts make sense for your project, and you try to define all of the parts of the&nbsp;project that will be contracted out.</p>
<p class="import-Normal">Contract planning is where you plan out each individual contract for the project work. You work out how you’ll&nbsp;manage the contract, what metrics it will need to meet to be considered successful, how you’ll pick a seller, and how you’ll administer the contract once the work is happening.</p>
<p class="import-Normal">The procurement management plan details how the procurement process will be managed. It includes the following information:</p>

<ul>
 	<li>The types of contracts you plan to use and any metrics that will be used to measure the contractors’ performance</li>
 	<li>The planned delivery dates for the work or products you are contracting</li>
 	<li>The company’s standard documents you will use</li>
 	<li>The number of&nbsp;vendors or contractors involved and how they will be managed</li>
 	<li>How purchasing may impact the constraints and assumptions of the project plan</li>
 	<li>The coordination of purchasing lead times with the development of the project schedule</li>
 	<li>The identification of prequalified sellers (if known)</li>
</ul>
<p class="import-Normal">The procurement management plan, like all other management plans, becomes a subsidiary of the project management plan. Some tools and techniques you may use during the procurement planning stage include make-or-buy analysis and definition of the contract type.</p>

<h2><a></a>Make-or-Buy Analysis</h2>
<p class="import-Normal">This means figuring out whether or not you should be contracting the work or doing it yourself. It could also mean deciding whether to build a solution to your problem or buy one that is already available. Most of the same factors that help you make every other major project decision will help you with this one. How much does it cost to build it as opposed to buying it? How will this decision affect the scope of your project? How will it affect the&nbsp;project schedule? Do you have time to do the work and still meet your commitments? As you plan out what you will and won’t contract, you need to think&nbsp;through your reasoning very&nbsp;carefully.</p>
<p class="import-Normal">There are some resources (like heavy equipment) that your company can buy, rent, or lease depending on the situation. You’ll need to examine leasing-versus-buying costs and determine the best way to go forward.</p>

<h2><a></a>Contract Types</h2>
<p class="import-Normal">You should know a little bit about the major kinds of contracts available to you (the client) so that you choose the one that creates the most fair and workable deal for you and the contractor. Some contracts are fixed price: no matter how much time or effort goes into them, the client always pay the same. In Figure 14.1 the cost to the client stays the same, but as more effort is exerted the profit to the contractor goes down. Some are cost reimbursable also called cost plus. This is where the seller charges you for the cost of doing the work plus some fee or rate. Figure 14.2 illustrates this by showing that as efforts increase, costs to the client go up but the contractor’s profits stay the same. The third major kind of contract is time and materials. That’s where the client pays a rate for the time spent working on the project and also pays for all the materials used to do the work. Figure 14.3 shows that as costs to the client go up, so does the profit for the contractor.</p>

<h3><a></a>Fixed-Price Contracts</h3>
<p class="import-Normal">The <strong>fixed-price contract</strong> is a legal agreement between the project organization and an entity (person or company) to provide goods or services to the project at an agreed-on price. The contract usually details the quality of the goods or services, the timing needed to support the project, and the price for delivering goods or services. There are several variations of the fixed-price contract. For commodities and goods and services where the scope of work is very clear and not likely to change, the fixed-price contract offers a predictable cost. The responsibility for managing the work to meet the needs of the project is focused on the contractor. The project team tracks the quality and schedule progress to ensure the contractors will meet the project needs. The risks associated with fixed-price contracts are the costs associated with project change. If a change occurs on the project that requires a change order from the contractor, the price of the change is typically very high. Even when the price for changes is included in the original contract, changes on a fixed-price contract will create higher total project costs than other forms of contracts because the majority of the cost risk is transferred to the contractor, and most contractors will add a contingency to the contract to cover their additional risk.</p>
<p class="import-Normal">&nbsp;<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image51-1.jpg" width="571.133333333333px" height="212px" alt="image"></p>
<p class="import-Normal">Figure 14.1: A fixed-price contract the cost to the client is constant regardless of effort applied or delivery date.<br style="clear: both">Illustration from Barron &amp; Barron Project Management for Scientists and Engineers, <a class="rId308"><span class="import-Hyperlink">http://cnx.org/content/col11120/1.4/</span></a><a class="rId309">&nbsp;</a></p>
<p class="import-Normal">Fixed-price contracts require the availability of at least two or more suppliers that have the qualifications and performance histories that ensure the needs of the project can be met. The other requirement is a scope of work that is most likely not going to change. Developing a clear scope of work based on good information, creating a list of highly qualified bidders, and developing a clear contract that reflects that scope of work are critical aspects of a good fixed-priced contract.</p>
<p class="import-Normal">If the service provider is responsible for incorporating all costs, including profit, into the agreed-on price, it is a <strong>fixed-total-cost contract</strong>. The contractor assumes the risks for unexpected increases in labor and materials that are needed to provide the service or materials and in the materials and timeliness needed.</p>
<p class="import-Normal">The <strong>fixed-price contract with price adjustmen</strong>t is used for unusually long projects that span years. The most common use of this type of contract is the inflation-adjusted price. In some countries, the value of its local currency can vary greatly in a few months, which affects the cost of local materials and labor. In periods of high inflation, the client assumes the risk of higher costs due to inflation, and the contract price is adjusted based on an inflation index. The volatility of certain commodities can also be accounted for in a price-adjustment contract. For example, if the price of oil significantly affects the costs of the project, the client can accept the oil price volatility risk and include a provision in the contract that would allow the contract price adjustment based on a change in the price of oil.</p>
<p class="import-Normal">The <strong>fixed-price contract with incentive fee</strong>&nbsp;provides an incentive for performing on the project above the established baseline in the contract. The contract might include an incentive for completing the work on an important milestone for the project. Often contracts have a penalty clause if the work is not performed according to the contract. For example, if the new software is not completed in time to support the implementation of the training, the contract might penalize the software company a daily amount of money for every day the software is late. This type of penalty is often used when the software is critical to the project and the delay will cost the project significant money.</p>
<p class="import-Normal">If the service or materials can be measured in standard units, but the amount needed is not known accurately, the price per unit can be fixed—a <strong>fixed-unit-price contract</strong>. The project team assumes the responsibility of estimating the number of units used. If the estimate is not accurate, the contract does not need to be changed, but the project will exceed the budgeted cost.</p>
<p class="import-Normal"><img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image52-1.jpg" width="571.134488188976px" height="191px" alt="image"><a class="rId311">&nbsp;</a></p>
<p class="import-Normal">Figure 14.4 Table of Fixed Price Contracts and Characteristics<br style="clear: both">Source: <a class="rId312">http://pm4id.org/9/5/</a><a class="rId313">&nbsp;</a></p>

<h3><a></a>Cost-Reimbursable Contracts</h3>
<p class="import-Normal">In a <strong>cost-reimbursable contract</strong>, the organization agrees to pay the contractor for the cost of performing the service or providing the goods. Cost-reimbursable contracts are also known as <strong>cost-plus contracts</strong>. Cost-reimbursable contracts are most often used when the scope of work or the costs for performing the work are not well known. The project uses a cost-reimbursable contract to pay the contractor for allowable expenses related to performing the work. Since the cost of the project is reimbursable, the contractor has much less risk associated with cost increases. When the costs of the work are not well known, a cost-reimbursable contract reduces the amount of money the bidders place in the bid to account for the risk associated with potential increases in costs. The contractor is also less motivated to find ways to reduce the cost of the project unless there are incentives for supporting the accomplishment of project goals.</p>
<p class="import-Normal"><img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image53-1.jpg" width="601.899317585302px" height="205px" alt="image"><a class="rId315">&nbsp;</a></p>
<p class="import-Normal">Figure 14.2: In a cost-reimbursable or cost-plus contract, the contractor is guaranteed a fee, but the client’s costs can increase based on effort.<br style="clear: both">Illustration from Barron &amp; Barron Project Management for Scientists and Engineers, <a class="rId316">http://cnx.org/content/col11120/1.4/</a><a class="rId317">&nbsp;</a></p>
<p class="import-Normal">&nbsp;Cost-reimbursable contracts require good documentation of the costs that occurred on the project to ensure that the contractor gets paid for all the work performed and to ensure that the organization is not paying for something that was not completed. The contractor is also paid an additional amount above the costs. There are several ways to compensate the contractor.</p>
<p class="import-Normal" style="text-indent: 23.95pt">A <strong>cost-reimbursable contract with a fixed fee</strong> provides the contractor with a fee, or profit amount that is determined at the beginning of the contract and does not change.</p>
<p class="import-Normal" style="text-indent: 23.95pt">A <strong>cost-reimbursable contract with a percentage fee</strong> pays the contractor for costs plus a percentage of the costs, such as 5% of total allowable costs. The contractor is reimbursed for allowable costs and is paid a fee.</p>
<p class="import-Normal" style="text-indent: 23.95pt">A <strong>cost-reimbursable contract with an incentive fee</strong> is used to encourage performance in areas critical to the project. Often the contract attempts to motivate contractors to save or reduce project costs. The use of the cost reimbursable contract with an incentive fee is one way to motivate cost-reduction behaviors.</p>
<p class="import-Normal" style="text-indent: 23.95pt">A <strong>cost-reimbursable contract with award fee</strong> reimburses the contractor for all allowable costs plus a fee that is based on performance criteria. The fee is typically based on goals or objectives that are more subjective. An amount of money is set aside for the contractor to earn through excellent performance, and the decision on how much to pay the contractor is left to the judgment of the project team. The amount is sufficient to motivate excellent performance.</p>
<p class="import-Normal">On small activities that have a high uncertainty, the contractor might charge an hourly rate for labor, plus the cost of materials, plus a percentage of the total costs. This type of contract is called <strong>time and materials (T&amp;M)</strong>. Time is usually contracted on an hourly rate basis and the contractor usually submits time sheets and receipts for items purchased on the project. The project reimburses the contractor for the time spent based on the&nbsp;agreed-on rate and the actual cost of the materials. The fee is typically a percentage of the total cost.</p>
<p class="import-Normal"><img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image54-1.jpg" width="571.133333333333px" height="233px" alt="image"><a class="rId319">&nbsp;</a></p>
<p class="import-Normal">Figure 14.3: In a time-and-materials contract the profit to the contractor increases with increased effort, as does the costs to the client.<br style="clear: both">Illustration from Barron &amp; Barron Project Management for Scientists and Engineers, <a class="rId320">http://cnx.org/content/col11120/1.4/</a><a class="rId321">&nbsp;</a></p>
<p class="import-Normal">&nbsp;T&amp;M&nbsp;contracts are used on projects for work that is smaller in scope and has uncertainty or risk. The project, rather than the contractor, assumes the risk. Since the contractor will most likely include contingency in the price of other types of contracts to cover the high risk, T&amp;M contracts provide lower total cost to the project.</p>
<p class="import-Normal">&nbsp;<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image55-1.jpg" width="611px" height="215px" alt="image"><a class="rId323">&nbsp;</a></p>
<p class="import-Normal">Figure 14.5: Table of cost-reimbursable contracts<br style="clear: both">Source:&nbsp; <a class="rId324">http://pm4id.org/9/5/</a><a class="rId325">&nbsp;</a></p>
<p class="import-Normal">To minimize the risk to the project, the contractor typically includes a not-to-exceed amount, which means the contract can only charge up to the agreed amount. The T&amp;M contract allows the project to make adjustments as more information is available. The final cost of the work is not known until sufficient information is available to complete a more accurate estimate.</p>

<h2><a></a>Progress Payments and Change Management</h2>
<p class="import-Normal">Vendors and suppliers usually require payments during the life of the contract. On contracts that last several months, the contractor will incur significant cost and will want the project to pay for these costs as early as possible. Rather than wait until the end of the contract, a schedule of payments is typically developed as part of the contract and is connected to the completion of a defined amount of work or project milestones. These payments made before the end of the project and based on the progress of the work are called <em>progress payments</em>. For example, the contract might develop a payment schedule that pays for the design of the curriculum, then the development of the curriculum, and then a final payment is made when the curriculum is completed and accepted. In this case there would be three payments made. There is a defined amount of work to be accomplished, a time frame for accomplishing that work, and a quality standard the work must achieve before the contractor is paid for the work.</p>
<p class="import-Normal">Just as the project has a scope of work that defines what is included in the project and what work is outside the project, vendors and suppliers have a scope of work that defines what they will produce or supply to the company. (Partners typically share the project scope of work and may not have a separate scope of work.) Often changes occur on the project that require changes in the contractor’s scope of work. How these changes will be managed during the life of the project is typically documented in the contract. Capturing these changes early, documenting what changed and how the change impacted the contract, and developing a change order (a change to the contract) are important to maintaining the progress of the project. Conflict among team members may&nbsp;arise when changes are not documented or when the team cannot agree on the change. Developing and implementing an effective change management process for contractors and key suppliers will minimize this conflict and the potential negative effect on the project. (Source: <a class="rId326">http://pm4id.org/9/5/</a>)<a class="rId327">&nbsp;</a></p>
<p class="import-Normal">&nbsp;<a></a><strong>Procurement Process</strong></p>
<p class="import-Normal">The project procurement cycle reflects the procurement activities from the decision to purchase the material or service through to the payment of bills and closing of procurement contracts.</p>

<h3><a></a>Procurement Plan</h3>
<p class="import-Normal">After the decision has been made to purchase goods or outsource services, the procurement team develops a plan that includes the following:</p>

<ul>
 	<li>Selecting the appropriate relationships and contract approaches for each type of purchased goods or outsourced service</li>
 	<li>Preparing requests for quotes (RFQs) and requests for proposals (RFPs) and evaluating partnership opportunities</li>
 	<li>Evaluating RFQs, RFPs, and partnerships</li>
 	<li>Awarding and signing contracts</li>
 	<li>Managing quality and timely performance</li>
 	<li>Managing contract changes</li>
 	<li>Closing contracts</li>
</ul>
<p class="import-Normal">Depending on the complexity level of the project, each of these steps can take either hours or sometimes weeks of work to complete. Each of these steps is also included in the project master schedule. The time involved in the procurement cycle can influence the scheduling of critical activities, including the decision to self-perform the work or contract the work to others. The&nbsp;delivery dates for equipment and materials and the work completion dates for contracted works are placed on the project schedule. Any procurement activities that create a project delay or fall on the project critical path may require special attention.</p>

<h3><a></a>Selecting the Contract Approach</h3>
<p class="import-Normal">The technical teams typically develop a description of the work that will be outsourced. From this information, the project management team answers the following questions:</p>

<ul>
 	<li>Is the required work or materials a commodity, customized product or service, or unique skill or relationship?</li>
 	<li>What type of relationship is needed: supplier, vendor, or partnership?</li>
 	<li>How should the supplier, vendor, or potential partner be approached: RFQ, RFP, or personal contact?</li>
 	<li>How well known is the scope of work?</li>
 	<li>What are the risks and which party should assume which types of risk?</li>
 	<li>Does the procurement of the service or goods affect activities on the project schedule’s critical path and how much float is there on those activities?</li>
 	<li>How important is it to be sure of the cost in advance?</li>
</ul>
<p class="import-Normal">The procurement team uses the answers to the first three questions listed above to determine the approach to obtaining the goods or services and the remaining questions to determine what type of contract is most appropriate.</p>
<p class="import-Normal">A key factor in selecting the contract approach is determining which party will take the most risk. The team determines the level of risk that will be managed by the project and what risks will be transferred to the contractor. Typically, the project management team wants to manage the project risk, but in some cases, contractors have more expertise or control that enable them to better manage the risk associated with the contracted work.</p>

<h3><a></a>Soliciting Bids</h3>
<p class="import-Normal">A <strong>solicitation</strong> is the process of requesting a price and supporting information from bidders. The solicitation usually takes the form of either an RFQ or an RFP. Partnerships are pursued and established differently on a case-by-case basis by senior management.</p>

<h3><a></a>Qualifying Bidders</h3>
<p class="import-Normal">Potential bidders are people or organizations capable of providing the materials or performing the work required for the project. On smaller, less complex projects, the parent company typically has a list of suppliers and vendors that have successfully provided goods and services in the past, and the project has access to the performance record of companies on that list. On unique projects, where no supplier lists exist, the project team develops a list of potential suppliers and then qualifies them to become eligible to bid on project work. Eligible bidders are placed on the bidders list and provided with a schedule of when work on the project will be put out for bid.</p>
<p class="import-Normal">The eligibility of a supplier is determined by the ability to perform the work in a way that meets project requirements and demonstrates financial stability. Ability to perform the work includes the ability to meet quality specifications and the project schedule. During times when economic activity is high in a region, many suppliers become busy and stretch their resources. The project team investigates the potential suppliers, before they are included on the bidder’s list, to ensure that they have the capacity and track record to&nbsp;meet deadlines.</p>
<p class="import-Normal">The potential supplier must also be financially stable to be included on the bidders list. A credit check or a financial report from Dun and Bradstreet (D&amp;B)—a well-known provider of financial information about individual companies—will provide the project with information about the potential bidder’s financial status. D&amp;B services include the following:</p>

<ul>
 	<li>D&amp;B proprietary rankings and predictive creditworthiness scores</li>
 	<li>Public filings, including suits, liens, judgments, and UCC (uniform commercial code) filings—standardized financial disclosure documents that conform to the uniform commercial code</li>
 	<li>Company financial statements and history</li>
</ul>
<h3><a></a>Request for Quote</h3>
<p class="import-Normal">An RFQ focuses on price. The type of materials or service is well defined and can be obtained from several sources. The bidder that can meet the project quality and schedule requirements usually wins the contract by quoting the lowest price.</p>

<h3><a></a>Request for Proposal</h3>
<p class="import-Normal">An RFP accounts for price but focuses on meeting the project quality or schedule requirements. The process of developing a proposal in response to an RFP can be very expensive for the bidder, and the project team should not issue an RFP to a company that is not eligible to win the bid.</p>

<h3><a></a>Evaluating Bids</h3>
<p class="import-Normal">Evaluation of bids in response to RFQs for commodity items and services is heavily graded for price. In most cases, the lowest total price will win the contract. The total price will include the costs of the goods or services, any shipping or delivery costs, the value of any warranties, and any additional service that adds value to the project.</p>
<p class="import-Normal">The evaluation of bids based on RFPs is more complex. The evaluation of proposals includes the price and also an evaluation of the technical approach chosen by the bidder. The project team evaluating the proposal must include people with the expertise to understand the technical aspects of the various proposal options and the value of each proposal to the project. On more complex projects, the administrative part of the proposal is evaluated and scored by one team, and the technical aspect of the proposal is evaluated by another team. The project team combines the two scores to determine the best proposal for the project.</p>

<h3><a></a>Awarding the Contract</h3>
<p class="import-Normal">After the project team has selected the bidder that provides the best value for&nbsp;the project, a project representative validates all conditions of the bid and the contract with the potential contractor. Less complex awards, like contracts for printed materials, require a reading and signing of the contract to ensure that the supplier understands the contract terms and requirements of the project schedule. More complex projects require a detailed discussion of the goals, the potential barriers to accomplishing those goals, the project schedule and critical dates, and the processes for resolving conflicts and improving work processes.</p>

<h3><a></a>Managing the Contracts</h3>
<p class="import-Normal">The contract type determines the level of effort and the skills needed to manage the contract. The manager of supplier contracts develops detailed specifications and ensures compliance with&nbsp;these specifications. The manager of vendor contracts ensures that the contractors bidding on&nbsp;the work have the skills and capacity to accomplish the work according to the project schedule and tracks the vendor’s performance against the project needs, supplying support and direction when needed. The manager of partnering arrangements develops alignment around common goals and work processes. Each of these approaches requires different skills and various degrees of effort.</p>
<p class="import-Normal">Items that take a long time to acquire—<strong>long-lead items</strong>—receive early attention by the project leadership. Examples of long-lead items are equipment that is designed and built specifically for the project, curriculum that is created for training a new workforce, and a customized bioreactor for a biotech project. These items might require weeks, months, or&nbsp;years to develop and complete. The project team identifies long-lead items early to begin the procurement activities as soon as possible because those procured through the normal procurement cycle may cause delays in the project.</p>
<p class="import-Normal">After the contract is awarded, the project team tracks the performance of the contractor against performance criteria in the contract and his or her contribution to the performance of the project. Usually,&nbsp;contractors deliver the product or service that meets the quality expectations and supports the project schedule. Typically, there are also one or two contractors that do not perform to project expectations. Some project managers will refer to&nbsp;the contract and use it to attempt to persuade the contractor to improve performance or be penalized. Other project managers will explore with the contractor creative ways to improve performance and meet project requirements. The contract management allows for both approaches to deal with non`-performing contractors, and the project team must assess what method is most likely to work in each situation.</p>
<p class="import-Normal">Managing contractor performance on a project is as important to the overall project outcomes as the work performed by the project team.</p>

<h3><a></a>Logistics and Expediting</h3>
<p class="import-Normal">Equipment and materials that are purchased for use on the project must be transported, inventoried, warehoused, and often secured. This area of expertise is called <em>logistics</em>. The logistics for the project can be managed by the project team or can be included in the RFP or RFQ. On international projects, materials may be imported, and the procurement team manages the customs process. On smaller projects, the logistical function is often provided by the parent company. On larger projects, these activities are typically contracted to companies that specialize in logistical services. On larger, more complex projects, the procurement team will include logistical expertise.</p>
<p class="import-Normal">The project work often depends on materials procured for the project. The delivery of these materials influences the scheduling of the project, and often some materials are needed earlier than normal procurement practices would deliver. On long-lead items, the project schedule is included in the contracting plans and contractors must explain how they will support the project schedule.</p>
<p class="import-Normal">On large, complex projects, critical items might be scheduled for delivery after they are needed on the project. The procurement team then explores ideas with the contractor to expedite the manufacturing or transportation of the equipment or materials. The contract can often place a priority on the fabrication of the equipment and delivery of the equipment to meet the project schedule. The project logistics team can also explore ways of shortening the transportation time.</p>

<h3><a></a><a></a></h3>
<table>
<tbody>
<tr class="GridTable4-Accent5-R" style="height: 0">
<td class="GridTable4-Accent5-C" style="background-color: #4bacc6;border: solid #4BACC6 0.5pt">
<div class="GridTable4-Accent5-firstCol">
<div class="GridTable4-Accent5-firstRow">
<h2 class="import-Normal">Chapter 14: Key Takeaways</h2>
</div>
</div></td>
</tr>
<tr class="GridTable4-Accent5-R" style="height: 0">
<td class="GridTable4-Accent5-C" style="background-color: #daeef3;border: solid #92CDDC 0.5pt">
<div class="GridTable4-Accent5-band1Horz">
<div class="GridTable4-Accent5-firstCol">
<ul>
 	<li>The procurement management plan details how the procurement process will be managed.</li>
 	<li>The procurement management plan, like all other management plans, becomes a subsidiary of the project management plan. Some tools and techniques you may use during the procurement planning stage include make-or-buy analysis and definition of the contract type.</li>
 	<li>There are different types of contracts available to you (the client).</li>
 	<li>The project procurement cycle reflects the procurement activities from the decision to purchase the material or service through to the payment of bills and closing of procurement contracts.</li>
 	<li>Procurement Plan includes the following:</li>
 	<li>Selecting the appropriate relationships and contract approaches for each type of purchased goods or outsourced service</li>
 	<li>Preparing requests for quotes (RFQs) and requests for proposals (RFPs) and evaluating partnership opportunities</li>
 	<li>Evaluating RFQs, RFPs, and partnerships</li>
 	<li>Awarding and signing contracts</li>
 	<li>Managing quality and timely performance</li>
 	<li>Managing contract changes</li>
 	<li>Closing contracts</li>
</ul>
</div>
</div></td>
</tr>
<tr>
<td></td>
</tr>
</tbody>
</table>
<h2>Attribution</h2>
<p class="import-Normal">This chapter of <em>Project Management</em> is a derivative copy of <a class="rId328">Project Management for Instructional Designers</a> by Amado, M., Ashton, K., Ashton, S., Bostwick, J., Clements, G., Drysdale, J., Francis, J., Harrison, B., Nan, V., Nisse, A.,&nbsp;Randall, D., Rino, J., Robinson, J., Snyder, A., Wiley, D., &amp; Anonymous. (DATE). Project Management for Instructional Designers. Retrieved from <a class="rId329">http://pm4id.org/</a> under <a class="rId330">Creative Commons Attribution 3.0 Unported.</a><a class="rId331">&nbsp;</a></p>
<p class="import-Normal"></p>

</div>
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>364</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:33]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:33]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-14-procurement-planning-and-management]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>288</wp:post_parent>
		<wp:menu_order>2</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 15: Communication Planning</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-15-communication-planning/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:35 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-15-communication-planning/</guid>
		<description></description>
		<content:encoded><![CDATA[
<div class="chapter-15:-communication-planning">
<div class="textbox textbox--learning-objectives"><header class="textbox__header">
<p class="textbox__title">Learning Objectives</p>

</header>
<div class="textbox__content">
<h2 class="import-Normal"><strong style="font-family: Tinos, Georgia, serif;font-size: 14pt">Learning Objectives</strong></h2>
<div class="textbox__content">
<ul>
 	<li>Evaluate the importance of good communication in project management</li>
 	<li>Create a communication plan.</li>
</ul>
</div>
</div>
</div>
&nbsp;

&nbsp;
<p class="import-Normal">Communication throughout the project includes within the team and with others outside the team. Communications management is about keeping everybody in the loop. The communications planning process concerns defining the types of information you&nbsp;will&nbsp;deliver, who will receive it, the format for communicating it, and the timing of its release and distribution. It turns out that 90% of a project manager’s job is spent on communication so it’s important to make sure everybody gets the right message at the right time.</p>
<p class="import-Normal">The first step in defining your communication plan is figuring out what kind of communication your stakeholders need from the project so they can make good decisions. This is called the <em>communications requirements analysis</em>. Your project will produce a lot of information; you don’t want to overwhelm your stakeholders with all of it. Your job is to figure out what they feel is valuable. Communicating valuable information doesn’t mean you always paint a rosy picture. Communications to stakeholders may consist of either good news or bad news.&nbsp;The point is that you don’t want to bury stakeholders in too much information but you do want to give them enough so that they’re informed and can make appropriate decisions.</p>
<p class="import-Normal">Communications technology has a major impact on how you keep people in the loop. Methods of communicating can take many forms, such as written reports, conversations, email, formal status reports, meetings, online databases, online schedules, and project websites. You should consider several factors before deciding what methods you’ll choose to transfer information. The timing of the information exchange or need for updates is the first factor. Do you need to procure new technology or systems, or are there systems already in place that will work? The technologies available to you should&nbsp;figure into your plan of how you will keep everyone notified of project status and issues. Staff experience with the technology is another factor. Are there project team members and stakeholders experienced at using this technology, or will you need to train them? Finally, consider the duration of the project and the project environment. Will the technology you’re choosing work throughout the life of the project or will it have to be upgraded or updated at some point? And how does the project team function? Are they located together or spread out across several campuses or locations?</p>
<p class="import-Normal">The answers to these questions should be documented in the communication plan.</p>
<p class="import-Normal">All projects require a&nbsp;sound communication plan, but not all projects will have the same types of com­munication or the same methods for distributing the information. The communication plan documents the types of information needs the stakeholders have, when the information should be distributed, and how the information will be delivered.</p>
<p class="import-Normal">The types of information you will communicate&nbsp;typically include project status, project scope statements and updates, project baseline information, risks, action items, performance measures, project acceptance, and so on. It’s&nbsp;important that the information needs of the stakeholders be determined as early in the planning phase of the project management life cycle as possible so that as you and your team develop project planning documents, you already know who should receive copies of them and how they should be delivered.</p>

<h2><a></a>Types of Communication</h2>
<p class="import-Normal">Completing a complex project successfully requires good communication among team members. If those team members work in the same building, they can arrange regular meetings, simply stop by each other’s office space to get a quick answer, or even discuss a project informally at other office functions. Many projects are performed by teams that interact primarily through electronic communication and are, therefore, called <em>virtual teams</em>. To avoid miscommunication that can harm trust and to include team members in a project culture, the project team needs a plan for communicating reliably and in a timely manner. This planning begins with understanding two major categories of communication.</p>

<h2><a></a>Synchronous Communications</h2>
<p class="import-Normal">If all the parties to the communication are taking part in the exchange at the same time, the communication is <strong>synchronous</strong>. A telephone or Skype conference call is an example of synchronous communication. The following are examples of synchronous communications:</p>

<ul>
 	<li><em>Live meeting:</em>&nbsp;Gathering of team members at the same location</li>
 	<li><em>Conference call:</em>&nbsp;A telephone call in which&nbsp;several people participate</li>
 	<li><em>Audio conference:</em>&nbsp;Like a conference call, but conducted online using software like Skype</li>
 	<li><em>Computer-assisted conference:</em>&nbsp;Audio conference with a connection between computers that can display a document or spreadsheet that can be edited by both parties</li>
 	<li><em>Video conference:</em>&nbsp;Similar to an audio conference but with live video of the participants. Some laptop computers have built-in cameras to facilitate video conferencing</li>
 	<li><em>IM (instant messaging):</em>&nbsp;Exchange of text or voice messages using pop-up windows on the participants’ computer screens</li>
 	<li><em>Texting:</em>&nbsp;Exchange of text messages between mobile phones, pagers, or personal digital assistants (PDAs)—devices that hold a calendar, a contact list, a task list, and other support programs</li>
</ul>
<p class="import-Normal">Modern communication technologies make it possible to assemble project teams from anywhere in the world. Most people work during daylight hours, which can make synchronous meetings difficult if the participants are in different time zones. However, it can be an advantage in some circumstances; for example, if something must be done by the start of business tomorrow, team members in Asia can work on the problem during their normal work hours while team members in North America get some sleep.</p>

<h2><a></a>Remember Time Zones</h2>
<p class="import-Normal">It is important to remember time zones and calculate the difference between yours and your associates’ zones correctly so as not to miss important meetings or deadlines. Cities and countries to the north or south of each other all observe the same local time. Be aware that many well-educated people in the United States and Canada think of South America as directly south of North America.&nbsp; As you can see, South American countries can be up to five&nbsp;time zones east of North America.&nbsp; A helpful site to convert local time to another time zone is <a class="rId332">http://www.timezoneconverter.com/cgi-bin/tzc.tzc</a><a class="rId333">&nbsp;</a></p>

<h2 class="import-Normal"><img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image56-1.png" width="571.2px" height="307.842939632546px" alt="image"><a class="rId335">&nbsp;</a></h2>
<p class="import-Normal">Figure 15.1: World Time Zones.<br style="clear: both">Standard time zones of the world by TimeZonesBoy (<a class="rId336">http://commons.wikimedia.org/wiki/File:Standard_time_zones_of_the_world.png</a>) under the Public Domain</p>
<p class="import-Normal">Time zones are calculated in reference to the time zone of the Royal Observatory in Greenwich, England. The time at that location is Greenwich Mean Time (GMT). More recent references designate it as Coordinated Universal Time (UTC) instead of GMT. The time zones advance from Greenwich in an easterly direction (Figure 15.1). However, at the international dateline (about the midpoint around the world from Greenwich), you subtract the time zone from GMT. To prevent confusion between a.m. and p.m., times are often given using a 24-hour clock. For example, midnight is indicated as 00:00, noon is 12:00 and 1 p.m. is 13:00.</p>

<header class="textbox__header">
<div class="textbox textbox-exercises"><header class="textbox__header">
<p class="textbox__title"><span style="background-color: initial;font-family: Roboto, Helvetica, Arial, sans-serif;font-size: 1em">Example: Conference Call between Toronto and Paris</span></p>

</header>
<div class="textbox__content">
<div class="textbox__content">
<p class="import-Normal">A project manager for a software development project in Toronto is five time zones west of the reference zone, so the time is given as UTC–5 (or GMT–5). If it is noon in the reference zone, it is 7 a.m. (five hours earlier) in Toronto. The manager would like to contact a project team member in Paris, France. Paris is one time zone east of the reference zone (UTC+1 or GMT+1). If it is noon (12:00) in the reference zone, it is 1 p.m. (13:00) in Paris. This means that there is a six-hour difference between Toronto and Paris. If the project manager waits until after lunch to place the call (1 p.m. in Toronto), it will be too late in the day in Paris (7 p.m.) to reach someone.</p>

</div>
</div>
</div>
&nbsp;

<span style="font-family: Roboto, Helvetica, Arial, sans-serif;font-size: 1.2rem;font-weight: bold">Asynchronous Communications</span>

</header>
<p class="import-Normal">Getting a team together at the same time can be a challenge—especially if they are spread out across time zones. Many types of communication do not require that the parties are present at the same time. This type of communication is asynchronous. There are several choices of asynchronous communications.</p>
<a></a><em>Mail and Package Delivery</em>
<p class="import-Normal">Many companies prefer that final contracts are personally signed by an authorized representative of each party to the agreement. If several signatures are required, this can take weeks to get all the signatures if the contracts are transferred by a postal service. If this process is holding up the start of the project, you can use an overnight delivery service to minimize the time spent transferring the documents.</p>
<a></a><em>Fax</em>
<p class="import-Normal">Fax machines have been around a long time and enjoy a high level of trust for transmitting documents accurately. Although it might seem archaic to still use fax transmissions, in many countries a fax of a signed contract is legal, but a computer-scanned image is not.</p>
<a></a><em>Email</em>
<p class="import-Normal">Electronic mail (email) is widely used to coordinate projects and to communicate between team members. It has several valuable characteristics for project management:</p>

<ul>
 	<li>Information can be sent to a list of team members.</li>
 	<li>Messages can be saved to document the process in case of a misunderstanding or miscommunication.</li>
 	<li>Files can be attached and distributed.</li>
</ul>
<h2><a></a><em>Project Blog</em></h2>
<p class="import-Normal">A blog is an online journal that can be private, shared by invitation, or made available to the world. Some project managers keep a journal in which they summarize the day’s challenges and triumphs and the decisions they made. They return to this journal at a later date to review their decision-making process after the results of those decisions are known to see if they can learn from their mistakes. Many decisions in project management are made with incomplete knowledge, and reflecting on previous decisions to develop this decision-making skill is important to growth as a project manager.</p>

<h2><a></a><em>Really Simple Syndication (RSS)</em></h2>
<p class="import-Normal">Some projects are directly affected by external factors such as political elections, economic trends, corporate mergers, technological or scientific breakthroughs, or weather. To keep informed about these factors, you can subscribe to online news sources. A technology that facilitates this process is Really Simple Syndication (RSS). Web pages with RSS news feeds have labeled links.</p>
<p class="import-Normal">If the user clicks on the RSS feed, news from the website is automatically sent to the user’s news reader, such as Google Reader. The news reader can be set to filter the news for key words to limit the stories to those that are relevant to the project.</p>

<h2><a></a>Assessing New Communication Technologies</h2>
<p class="import-Normal">New technologies for communicating electronically appear with increasing frequency. Using a new technology that is unfamiliar to the team increases the technology complexity, which can cause delays and increase costs. To decide if a new technology should be included in a communications plan, seek answers to the following questions (Business Dictionary):</p>

<ul>
 	<li>Does the new communication technology provide a competitive advantage for the project by reducing cost, saving time, or preventing mistakes?</li>
 	<li>Does the project team have the expertise to learn the new technology quickly?</li>
 	<li>Does the company offer support such as a help desk and equipment service for new communication technology?</li>
 	<li>What is the cost of training and implementation in terms of time as well as money?</li>
</ul>
<a></a>Communication Plan Template
<p class="import-Normal">So how do you create a communication plan?</p>

<ol>
 	<li>Identify your stakeholders (to whom)</li>
 	<li>Identify stakeholder expectations (why)</li>
 	<li>Identify communication necessary to satisfy stakeholder expectations and keep them informed (what)</li>
 	<li>Identify time-frame and/or frequency of communication messages (when)</li>
 	<li>Identify how the message will be communicated (the stakeholder’s preferred method) (how)</li>
 	<li>Identify who will communication each message (who)</li>
 	<li>Document items – templates, formats, or documents the project must use for communicating.</li>
</ol>
<p class="import-Normal">Figure 15.2 shows a communication plan template.</p>
<p class="import-Normal"><img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image57-1.jpg" width="494.666666666667px" height="481.333333333333px" alt="image"><a class="rId338">&nbsp;</a></p>
<p class="import-Normal">Figure 15.2&nbsp; Communications Plan Template (<a class="rId339">http://inte5160.wikispaces.com/Communication+Plans</a>) used under CC-BY-SA license (<a class="rId340">http://creativecommons.org/licenses/by-sa/3.0/</a>)</p>

<h2 class="import-Normal"><strong>RACI Chart</strong></h2>
<p class="import-Normal"><span lang="en-CA" xml:lang="en-CA"></span>&nbsp;<span lang="en-CA" xml:lang="en-CA"></span><span lang="en-CA" xml:lang="en-CA">RACI analysis </span><span lang="en-CA" xml:lang="en-CA">is a communication tool which </span><span lang="en-CA" xml:lang="en-CA">describes the tasks and roles that stakeholders take in delivering a project or operating process:</span></p>
<p class="import-Normal"><span style="text-indent: 1em;font-size: 14pt">R – Responsibility (“I get it done”)</span>
<span lang="en-CA" xml:lang="en-CA"></span></p>
<p class="import-Normal"><span lang="en-CA" xml:lang="en-CA"></span><span lang="en-CA" xml:lang="en-CA">A – Accountability (“The buck stops here”)</span></p>
<p class="import-Normal"><span lang="en-CA" xml:lang="en-CA"></span><span lang="en-CA" xml:lang="en-CA">C – Consulted (“I want to be part of the decisions)</span></p>
<p class="import-Normal"><span lang="en-CA" xml:lang="en-CA"></span><span lang="en-CA" xml:lang="en-CA">I – Informed (“I want to know”)</span></p>

<h3 class="import-Normal" style="margin-left: 36pt"><span lang="en-CA" xml:lang="en-CA">Example:&nbsp;</span><span lang="en-CA" xml:lang="en-CA"></span><span lang="en-CA" xml:lang="en-CA">Responsible, Accountable, Consult and Inform chart (RACI Matrix)</span></h3>
<h2 class="import-Normal"><span lang="en-CA" xml:lang="en-CA"></span><span lang="en-CA" xml:lang="en-CA"><img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image58-1.jpeg" width="600px" height="226px" alt="image"></span></h2>
<h2><a></a>Attribution</h2>
<p class="import-Normal">This chapter of <em>Project Management</em> is a derivative copy of&nbsp;<a class="rId343">Project Management for Instructional Designers</a> by Amado, M., Ashton, K., Ashton, S., Bostwick, J., Clements, G., Drysdale, J., Francis, J., Harrison, B., Nan, V., Nisse, A., Randall, D., Rino, J., Robinson, J., Snyder, A., Wiley, D., &amp; Anonymous. (DATE). Project Management for Instructional Designers.&nbsp;Retrieved from <a class="rId344">http://pm4id.org</a>/ licensed under <a class="rId345">Creative Commons Attribution 3.0 Unported</a>and <a class="rId346">Communication Plans</a> by Inte6160 Wiki licensed under <a class="rId347">Creative Commons Attribution 3.0 Unported.</a></p>

<h2 class="import-Normal"><a class="rId348">&nbsp;</a></h2>
<table>
<tbody>
<tr class="GridTable4-Accent5-R" style="height: 0">
<td class="GridTable4-Accent5-C" style="background-color: #4bacc6;border: solid #4BACC6 0.5pt">
<div class="GridTable4-Accent5-firstCol">
<div class="GridTable4-Accent5-firstRow">
<h2 class="import-Normal">Chapter 15: Key Takeaways</h2>
</div>
</div></td>
</tr>
<tr class="GridTable4-Accent5-R" style="height: 0">
<td class="GridTable4-Accent5-C" style="background-color: #daeef3;border: solid #92CDDC 0.5pt">
<div class="GridTable4-Accent5-band1Horz">
<div class="GridTable4-Accent5-firstCol">
<ul>
 	<li>Project communication is a key success factor.</li>
 	<li>Communication throughout the project includes within the team and with others outside the team.</li>
 	<li>The communications planning process concerns defining the types of information you will deliver (Communication Requirement Analysis), who will receive it, the format for communicating it, and the timing of its release and distribution.</li>
 	<li>A good communication plan includes:</li>
 	<li>What needs to be communicated?</li>
 	<li>Who needs to be communicated with?</li>
 	<li>What methods will be used?</li>
 	<li>What frequency?</li>
 	<li>Who within the project will be responsible?</li>
 	<li>Modern communication technologies make it possible to assemble project teams from anywhere in the world.</li>
 	<li>Consider a variety of synchronous and asynchronous options:</li>
 	<li>Synchronous Options - Face to face, international–(remember the time zones), Conference call, Video link, Computer-assisted video conference, IM; texting</li>
 	<li>Asynchronous Options- Courier, mail, E-mail, Fax, Project Blog, RSS, Social media.</li>
 	<li>Consider cultural issues when planning and carrying out project communication.</li>
 	<li>Remember communication is a two-way process, not always “broadcast!”</li>
 	<li>RACI analysis is a communication tool which describes the tasks and roles that stakeholders take in delivering a project or operating process:</li>
</ul>
<p class="import-Normal"></p>

</div>
</div></td>
</tr>
<tr>
<td></td>
</tr>
</tbody>
</table>
<h2></h2>
<p class="import-Normal"></p>

</div>
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>368</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:35]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:35]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-15-communication-planning]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>288</wp:post_parent>
		<wp:menu_order>3</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 16: Working with Individuals and Teams</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-16-working-with-individuals-and-teams/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:35 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-16-working-with-individuals-and-teams/</guid>
		<description></description>
		<content:encoded><![CDATA[
<div class="chapter-16:-working-with-individuals-and-teams">
<div class="textbox textbox--learning-objectives"><header class="textbox__header">
<p class="textbox__title">Learning Objectives</p>

</header>
<div class="textbox__content">
<p class="import-Normal"><strong>Learning Objectives</strong></p>

<ul>
 	<li>Develop personal characteristics that suit project-management duties.</li>
 	<li>Discuss methods for building relationships, influence and trust.</li>
 	<li>Outline the skills required to lead and manage individuals effectively.</li>
 	<li>Outline the skills required to lead and manage project teams effectively.</li>
 	<li>Recognize the value of communication in conflict management, negotiation, facilitation, problem solving, giving and receiving feedback.</li>
 	<li>Manage differences effectively – leading cross functional, cross cultural and virtual projects.</li>
 	<li>Formulate strategies that increase accountability within project teams.</li>
</ul>
</div>
</div>
&nbsp;
<h2>Working with Individuals</h2>
<p class="import-Normal">Working with other people involves dealing with them both logically and emotionally. A successful working relationship between individuals begins with appreciating the importance of emotions and how they relate to personality types, leadership styles, negotiations, and setting goals.</p>

<h3><a></a>Emotional Intelligence</h3>
<p class="import-Normal">Emotions are both a mental and physiological response to environmental and internal stimuli. Leaders need to understand and value their emotions to appropriately respond to the client, project team, and project environment.</p>
<p class="import-Normal">Emotional intelligence includes the following:</p>

<ul>
 	<li class="import-Normal" style="text-indent: 23.95pt">Self-awareness</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Self-regulation</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Empathy</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Relationship management</li>
</ul>
<p class="import-Normal">Emotions are important to generating energy around a concept, building commitment to goals, and developing high-performing teams. Emotional intelligence is an important part of the project manager’s ability to build trust among the team members and with the client. It is an important factor in establishing credibility and an open dialogue with project stakeholders. Emotional intelligence is critical for project managers, and the more complex the project profile, the more important the project manager’s emotional intelligence&nbsp;becomes to project success.</p>

<h3><a></a>Personality Types</h3>
<p class="import-Normal"><em>Personality types</em> refer to the differences among people in such matters as what motivates them, how they process information, how they handle conflict, etc. Understanding people’s personality types is acknowledged as an asset in interacting and communicating with them more effectively. Understanding your personality type as a project manager will assist you in evaluating your tendencies and strengths in different situations. Understanding others’ personality types can also help you coordinate the skills of your individual team members and address the various needs of your client.</p>
<p class="import-Normal">The Myers-Briggs Type Indicator (MBTI) is one of most widely used tools for exploring personal preference, with more than two million people taking the MBTI each year. The MBTI is often referred to as simply the Myers-Briggs. It is a tool that can be used in project management training to develop awareness of preferences for processing information and relationships with other people.</p>
<p class="import-Normal">Based on the theories of psychologist Carl Jung, the Myers-Briggs uses a questionnaire to gather information on the ways individuals prefer to use their perception and judgment. Perception represents the way people become aware of people and their environment. Judgment represents the evaluation of what is perceived. People perceive things differently and reach different conclusions based on the same environmental input. Understanding and accounting for these differences is critical to successful project leadership.</p>
<p class="import-Normal">The Myers-Briggs identifies 16 personality types based on four preferences derived from the questionnaire. The preferences are between pairs of opposite characteristics and include the following:</p>
<p class="import-Normal">Extroversion (E)-Introversion (I)<br style="clear: both">Sensing (S)-Intuition (N)<br style="clear: both">Thinking (T)-Feeling (F)<br style="clear: both">Judging (J)-Perceiving (P)</p>
<p class="import-Normal">Sixteen Myers-Briggs types can be derived from the four dichotomies. Each of the 16&nbsp;types describes a preference: for focusing on the inner or outer world (E-I), for approaching and internalizing information (S-I), for making decisions (T-F), and for planning (J-P). For example, an ISTJ is a Myers-Briggs type who prefers to focus on the inner world and basic information, prefers logic, and likes to decide quickly.</p>
<p class="import-Normal">It is important to note that there is no best type and that effective interpretation of the Myers-Briggs requires training. The purpose of the Myers-Briggs is to understand and appreciate the differences among people. This understanding can be helpful in building the project team, developing common goals, and communicating with project stakeholders. For example, different people process information differently. Extroverts prefer face-to-face meetings as the primary means of communicating, while introverts prefer written communication. Sensing types focus on facts, and intuitive types want the big picture.</p>
<p class="import-Normal">On larger, more complex projects, some project managers will use the Myers-Briggs as a team-building tool during project start-up. This is typically a facilitated work session where team members take the Myers-Briggs and share with the team how they process information, what communication approaches they prefer, and what decision-making preferences they have. This allows the team to identify potential areas of conflict, develop communication strategies, and build an appreciation for the diversity of the team.</p>
<p class="import-Normal">Another theory of personality typing is the DISC method, which rates people’s personalities by testing a person’s preferences in word associations in the following four areas:</p>
<p class="import-Normal" style="text-align: left"><strong>Dominance/Drive</strong>—relates to control, power, and assertiveness<br style="clear: both"><strong>Inducement/Influence</strong>—relates to social situations and communication<br style="clear: both"><strong>Submission/Steadiness</strong>—relates to patience, persistence, and thoughtfulness<br style="clear: both"><strong>Compliance/Conscientiousness</strong>—relates to structure and organization</p>
<p class="import-Normal">Understanding the differences among people is a critical leadership skill. This includes understanding how people process information, how different experiences influence the way people perceive the environment, and how people develop filters that allow certain information to be incorporated while other information is excluded. The more complex the project, the more important the understanding of how people process information, make decisions, and deal with conflict. There are many&nbsp;personality-type tests that have been developed and explore different aspects of people’s personalities. It might be prudent to explore the different tests available and utilize those&nbsp;that are most beneficial for your team.</p>

<h3><a></a>Leadership Styles</h3>
<p class="import-Normal">Leadership style is a function of both the personal characteristics of the leader and the environment in which the leadership must occur, and a topic that&nbsp;several researchers have attempted to understand. Robert Tannenbaum and Warren Schmidt described leaders as either autocratic or democratic (1958). Harold Leavitt described leaders as pathfinders (visionaries), problem solvers (analytical), or implementers (team oriented) (1986). James MacGregor Burns conceived leaders as either transactional (focused on actions and decisions) or transformational (focused on the long-term needs of the group and organization) (1978).</p>
<p class="import-Normal">Fred Fiedler introduced his contingency theory, which is the ability of leaders to adapt their leadership approach to the environment (1971). Most leaders have a dominant leadership style that is most comfortable for them. For example, most engineers spend years training in analytical problem solving and often develop an analytical approach to leadership.</p>
<p class="import-Normal">A leadership style reflects personal characteristics and life experiences. Although a project manager’s leadership style may be predominantly a pathfinder (using Leavitt’s taxonomy), most project managers become problem solvers or implementers when they perceive the need for these leadership approaches. The leadership approach incorporates the dominant leadership style and Fiedler’s contingency focus on adapting to the project environment.</p>
<p class="import-Normal">No particular leadership approach is specifically appropriate for managing a project. Due to the unique circumstances inherent in each project, the leadership approach and the management skills required to be successful vary depending on the complexity profile of the project. However, the Project Management Institute published Shi and Chen’s research that studied project management leadership traits and concluded that good communication skills and the ability to build harmonious relationships and motivate others are essential (2006). Beyond this broad set of leadership skills, the successful leadership approach will depend on the profile of the project. For example, a transactional project manager with a strong command-and-control leadership approach may be very successful on a small software development project or a construction project, where tasks are clear, roles are well understood, and the project environment is cohesive. This same project manager is less likely to be successful on a larger, more complex project with a diverse project team and complicated work processes.</p>
<p class="import-Normal">Matching the appropriate leadership style and approach to the complexity profile of the project is a critical element of project success. Even experienced project managers are less likely to be successful if their leadership approach does not match the complexity profile of the project.</p>
<p class="import-Normal">Each project phase may also require a different leadership approach. During the start-up phase of a project, when new team members are first assigned to the project, the project may require a command-and-control leadership approach. Later, as the project moves into the conceptual phase, creativity becomes important, and the project management takes on a more transformational leadership approach. Most experienced project managers are able to adjust their leadership approach to the needs of the project phase. Occasionally, on very large and complex projects, some companies will bring in different project managers for various phases of a project. Changing project managers may bring the right level of experience and the appropriate leadership approach, but is also disruptive to a project. Senior management must balance the benefit of matching the right leadership approach with the cost of disrupting established relationships.</p>

<div class="textbox textbox-exercises"><header class="textbox__header">
<p class="textbox__title"><span style="font-family: Roboto, Helvetica, Arial, sans-serif;font-size: 1em;background-color: initial">Example: Multinational Textbook Publishing Project</span></p>

</header>
<div class="textbox__content">
<p class="import-Normal">On a project to publish a new textbook at a major publisher, a project manager led a team that included members from partners that were included in a joint venture. The editorial manager was Greek, the business manager was German, and other members of the team were from various locations in the United States and Europe. In addition to the traditional potential for conflict that arises from team members from different cultures, the editorial manager and business manager were responsible for protecting the interest of their company in the joint venture.</p>
<p class="import-Normal">The project manager held two alignment or team-building meetings. The first was a two-day meeting held at a local resort and included only the members of the project leadership team. An outside facilitator was hired to facilitate discussion, and the topic of cultural conflict and organizational goal conflict quickly emerged. The team discussed several methods for developing understanding and addressing conflicts that would increase the likelihood of finding mutual agreement.</p>
<p class="import-Normal">The second team-building session was a one-day meeting that included the executive sponsors from the various partners in the joint venture. With the project team aligned, the project manager was able to develop support for the publication project’s strategy and commitment from the executives of the joint venture. In addition to building processes that would enable the team to address difficult cultural differences, the project manager focused on building trust with each of the team members. The project manager knew that building trust with the team was as critical to the success of the project as the technical project management skills and devoted significant management time to building and maintaining this trust</p>

</div>
</div>
<h3><a></a>Leadership Skills</h3>
<p class="import-Normal">The project manager must be perceived to be credible by the project team and key stakeholders. A successful project manager can solve problems and has a high degree of tolerance for ambiguity. On projects, the environment changes frequently, and the project manager must apply the appropriate leadership approach for each situation.</p>
<p class="import-Normal">The successful project manager must have good communication skills. All project problems are connected to skills needed by the project manager:</p>

<ul>
 	<li class="import-Normal" style="text-indent: 23.95pt">Breakdown in communication represents the lack of communication skills</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Uncommitted team members represents the lack of team-building skills</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Role confusion represents the lack of organizational skills.</li>
</ul>
<p class="import-Normal">Project managers need a large numbers of skills. These skills include administrative skills, organizational skills, and technical skills associated with the technology of the project. The types of skills and the depth of the skills needed are closely connected to the complexity profile of the project. Typically on smaller, less complex projects, project managers need a greater degree of technical skill. On larger, more complex projects, project managers need more organizational skills to deal with the complexity. On smaller projects, the project manager is intimately involved in developing the project schedule, cost estimates, and quality standards. On larger projects, functional managers are typically responsible for managing these aspects of the project, and the project manager provides the organizational framework for the work to be successful.</p>

<h3><a></a>Listening</h3>
<p class="import-Normal">One of the most important communication skills of the project manager is the ability to actively listen. Active listening is placing oneself in the speaker’s position as much as possible, understanding the communication from the point of view of the speaker, listening to the body language and other environmental cues, and striving not just to hear, but to understand. Active listening takes focus and practice to become effective. It&nbsp;enables a project manager to go beyond the basic information that is being shared and to develop a more complete understanding of the information.</p>

<div class="textbox textbox-exercises"><header class="textbox__header">
<p class="textbox__title"><span style="font-family: Roboto, Helvetica, Arial, sans-serif;font-size: 1em;background-color: initial">Example: Client’s Body Language</span></p>

</header>
<div class="textbox__content">
<p class="import-Normal">A client from the Abu Dhabi project visited the VPD to review the progress of the project with the Senior Management Team (SMT). The project manager listened and took notes on the five concerns expressed by the Senior Management Team (SMT).</p>
<p class="import-Normal">The project manager observed that the client’s body language showed more tension than usual. This was a cue to listen very carefully. The project manager nodded occasionally and clearly demonstrated he was listening through his posture, small agreeable sounds, and body language. The project manager then began to provide feedback on what was said using phrases like “What I hear you say is…” or “It sounds like.…” The project manager was clarifying the message that was communicated by the client.</p>
<p class="import-Normal">The project manager then asked more probing questions and reflected on what was said. “It sounds as if it was a very tough board meeting.” “Is there something going on beyond the events of the project?” From these observations and questions, the project manager discovered that the SMT meeting did not go well. The agency had experienced challenges and may require to cuts back the human resources committed for project and an expectation that the project would finish earlier than planned. The project manager also discovered that the client’s relationship with the agency would depend on the success of the project. The project manager asked, “Do you think we will need to do things differently?” They began to develop a plan to address the SMT’ concerns.</p>
<p class="import-Normal">Through active listening, the project manager was able to develop an understanding of the issues that emerged from the SMT meeting and participate in developing solutions. Active listening and the trusting environment established by the project manager enabled the client to safely share information he had not planned on sharing and to participate in creating a workable plan that resulted in a successful project.</p>

</div>
</div>
<p class="import-Normal">In the example above, the project manager used the following techniques:</p>

<ul>
 	<li>Listening intently to the words of the client and observing the client’s body language</li>
 	<li>Nodding and expressing interest in the client without forming rebuttals</li>
 	<li>Providing feedback and asking for clarity while repeating a summary of the information back to the client</li>
 	<li>Expressing understanding and empathy for the client</li>
</ul>
<p class="import-Normal">Active listening was important in establishing a common understanding from which an effective project plan could be developed.</p>

<h3><a></a>Negotiation</h3>
<p class="import-Normal">When multiple people are involved in an endeavor, differences in opinions and desired outcomes naturally occur. Negotiation is a process for developing a mutually acceptable outcome when the desired outcome for each party conflicts. A project manager will often negotiate with a client, team members, vendors, and other project stakeholders. Negotiation is an important skill in developing support for the project and preventing frustration among all parties involved, which could delay or cause project failure.</p>
<p class="import-Normal">Negotiations involve four principles:</p>

<ol>
 	<li>Separate people from the problem. Framing the discussions in terms of desired outcomes enables the negotiations to focus on finding new outcomes.</li>
 	<li>Focus on common interests. By avoiding the focus on differences, both parties are more open to finding solutions that are acceptable.</li>
 	<li>Generate options that advance shared interests. Once the common interests are understood, solutions that do not match with either party’s interests can be discarded, and solutions that may serve both parties’ interests can be more deeply explored.</li>
 	<li>Develop results based on standard criteria. The standard criterion is the success of the project. This implies that the parties develop a common definition of project success.</li>
</ol>
<p class="import-Normal">For the project manager to successfully negotiate issues on the project, he or she should first seek to understand the position of the other party. If negotiating with a client, what is the concern or desired outcome of the client? What are the business drivers and personal drivers that are important to the client? Without this understanding, it is difficult to find a solution that will satisfy the client. The project manager should also seek to understand what outcomes are desirable to the project. Typically, more than one outcome is acceptable. Without knowing what outcomes are acceptable, it is difficult to find a solution that will produce that outcome.</p>
<p class="import-Normal">One of the most common issues in formal negotiations is finding a mutually acceptable price for a service or product. Understanding the market value for a product or service will provide a range for developing a negotiating strategy. The price paid on the last project or similar projects provides information on the market value. Seeking expert opinions from sources who would know the market is another source of information. Based on this information, the project manager can then develop an expected range within the current market from the lowest price to the highest price.</p>
<p class="import-Normal">Additional factors will also affect the negotiated price. The project manager may be willing to pay a higher price to assure an expedited delivery or a lower price if delivery can be made at the convenience of the supplier or if payment is made before the product is delivered. Developing as many options as possible provides a broader range of choices and increases the possibility of developing a mutually beneficial outcome.</p>
<p class="import-Normal">The goal of negotiations is not to achieve the lowest costs, although that is a major consideration, but to achieve the greatest value for the project. If the supplier believes that the negotiations process is fair and the price is fair, the project is more likely to receive higher value from the supplier. The relationship with the supplier can be greatly influenced by the negotiation process and a project manager who&nbsp;attempts to drive the price unreasonably low or below the market value will create an element of distrust in the relationship that may have negative consequences for the project. A positive negotiation experience may create a positive relationship that may be beneficial, especially if the project begins to fall behind schedule and the supplier is in a position to help keep the project on schedule.</p>

<h2><a></a>Conflict Resolution</h2>
<p class="import-Normal">Conflict on a project is to be expected because of the level of stress, lack of information during early phases of the project, personal differences, role conflicts, and limited resources. Although good planning, communication, and team building can reduce the amount of conflict, conflict will still emerge. How the project manager deals with the conflict results in the conflict being destructive or an opportunity to build energy, creativity, and innovation.</p>
<p class="import-Normal">David Whetton and Kim Cameron developed a response-to-conflict model that reflected the importance of the issue balanced against the importance of the relationship (2005). The model presented five responses to conflict:</p>

<ul>
 	<li class="import-Normal" style="text-indent: 23.95pt">Avoiding</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Forcing</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Collaborating</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Compromising</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Accommodating</li>
</ul>
<p class="import-Normal">Each of these approaches can be effective and useful depending on the situation. Project managers will use each of these conflict resolution approaches depending on the project manager’s personal approach and an assessment of the situation.</p>
<p class="import-Normal">Most project managers have a default approach that has emerged over time and is comfortable. For example, some project managers find the use of the project manager’s power the easiest and quickest way to resolve problems. “Do it because I said to” is the mantra for project managers who use forcing as the default approach to resolve conflict. Some project managers find accommodating with the client the most effective approach to dealing with client conflict.</p>
<p class="import-Normal">The effectiveness of a conflict resolution approach will depend on the situation. The forcing approach often succeeds in a situation where a quick resolution is needed, and the investment in the decision by the parties involved is low.</p>

<div class="textbox textbox-exercises"><header class="textbox__header">
<p class="textbox__title"><span style="font-family: Roboto, Helvetica, Arial, sans-serif;font-size: 1em;font-style: italic;background-color: initial">Example: Resolving an Office Space Conflict</span></p>

</header>
<div class="textbox__content">
<p class="import-Normal">Two senior managers both want the office with the window. The project manager intercedes with little discussion and assigns the window office to the manager with the most seniority. The situation was a low-level conflict with no long-range consequences for the project and a solution all parties could accept.</p>

</div>
</div>
<p class="import-Normal">Sometimes office size and location is culturally important, and this situation would take more investment to resolve.</p>

<div class="textbox textbox-exercises"><header class="textbox__header">
<p class="textbox__title"><span style="font-family: Roboto, Helvetica, Arial, sans-serif;font-size: 1em;font-style: italic;background-color: initial">Example: Conflict over a Change Order</span></p>

</header>
<div class="textbox__content">
<p class="import-Normal">In another example, the client rejected a request for a change order because she thought the change should have been foreseen by the project team and incorporated into the original scope of work. The project controls manager believed the client was using her power to avoid an expensive change order and suggested the project team refuse to do the work without a change order from the client.</p>

</div>
</div>
<p class="import-Normal">This is a more complex situation, with personal commitments to each side of the conflict and consequences for the project. The project manager needs a conflict resolution approach that increases the likelihood of a mutually acceptable solution for the project. One conflict resolution approach involves evaluating the situation, developing a common understanding of the problem, developing alternative solutions, and mutually selecting a solution. Evaluating the situation typically includes gathering data. In our example of a change order conflict, gathering data would include a review of the original scope of work and possibly of people’s understandings, which might go beyond the written scope. The second step in developing a resolution to the conflict is to restate, paraphrase, and reframe the problem behind the conflict to develop a common understanding of the problem. In our example, the common understanding may explore the change management process and determine that the current change management process may not achieve the client’s goal of minimizing project changes. This phase is often the most difficult and may take an investment of time and energy to develop a common understanding of the problem.</p>
<p class="import-Normal">After the problem has been restated and agreed on, alternative approaches are developed. This is a creative process that often means developing a new approach or changing the project plan. The result is a resolution to the conflict that is mutually agreeable to all team members. If all team members believe every effort was made to find a solution that achieved the project charter and met as many of the team member’s goals as possible, there will be a greater commitment to the agreed-on solution.</p>

<h2><a></a>Delegation</h2>
<p class="import-Normal">Delegating responsibility and work to others is a critical project management skill. The responsibility for executing the project belongs to the project manager. Often other team members on the project will have a functional responsibility on the project and report to a functional manager in the parent organization. For example, the procurement leader for a major project may also report to the organization’s vice-president for procurement. Although the procurement plan for the project must meet the organization’s procurement policies, the procurement leader on the project will take day-to-day direction from the project manager. The amount of direction given to the procurement leader, or others on the project, is the decision of the project manager.</p>
<p class="import-Normal">If the project manager delegates too little authority to others to make decisions and take action, the lack of a timely decision or lack of action will cause delays on the project. Delegating too much authority to others who do not have the knowledge, skills, or information will typically cause problems that result in delay or increased cost to the project. Finding the right balance of delegation is a critical project management skill.</p>
<p class="import-Normal">When developing the project team, the project manager selects team members with the knowledge, skills, and abilities to accomplish the work required for the project to be successful. Typically, the more knowledge, skills, abilities, and experience a project team member brings to the project, the more that team member will be paid. To keep the project personnel costs lower, the project manager will develop a project team with the level of experience and the knowledge, skills, and abilities to accomplish the work.</p>
<p class="import-Normal">On smaller, less complex projects, the project manager can provide daily guidance to project team members and be consulted on all major decisions. On larger, more complex projects, there are too many important decisions made every day for the project manager to be involved at the same level, and project team leaders are delegated decision-making authority. Larger projects, with a more complex profile will typically pay more because of the need for the knowledge and experience. On larger, more complex projects, the project manager will develop a more experienced and knowledgeable team that will enable the project manager to delegate more responsibility to these team members.</p>

<div class="textbox textbox-exercises"><header class="textbox__header">
<p class="textbox__title"><span style="font-family: Roboto, Helvetica, Arial, sans-serif;font-size: 1em;font-style: italic;background-color: initial">Example: Learning Project in Abu Dhabi</span></p>

</header>
<div class="textbox__content">
<p class="import-Normal">The project to purchase helicopters for the Abu Dhabi Police Force was falling behind schedule, and a new manager was assigned to the design team, which was the one most behind schedule. He was an experienced project manager from Canada with a reputation for meeting aggressive schedules. However, he failed to see that as a culture, Arabians do a great deal more socializing than teams in Canada. The project manager’s communication with the team was then limited because he did not go out and spend time with them, and his team did not develop trust or respect for him. Due to these cultural differences, the project fell further behind, and another personnel change had to be made at a significant cost of time, trust, and money.</p>

</div>
</div>
<p class="import-Normal">The project manager must have the skills to evaluate the knowledge, skills, and abilities of project team members and evaluate the complexity and difficulty of the project assignment. Often project managers want project team members they have worked with in the past. Because the project manager knows the skill level of the team member, project assignments can be made quickly with less supervision than with a new team member with whom the project manager has little or no experience.</p>
<p class="import-Normal">Delegation is the art of creating a project organizational structure with the work organized into units that can be managed. Delegation is the process of understanding the knowledge, skills, and abilities needed to manage that work and then matching the team members with the right skills to do that work. Good project managers are good delegators.</p>

<h2><a></a>Adjusting Leadership Styles</h2>
<p class="import-Normal">Remember that personality traits&nbsp;reflect an individual’s preferences, not their limitations. It is important to understand that individuals can still function in situations for which they are not best suited. It is also important to realize that you can change your leadership style according to the needs of your team and the particular project’s attributes and scope.</p>
<p class="import-Normal">For example, a project leader who is more thinking (T) than feeling (F) (according to the Myers-Briggs model) would need to work harder to be considerate of how team members who are&nbsp;more feeling (F) might react if they were singled out in a meeting because they were behind schedule. If individuals&nbsp;knows their own preferences and which personality types are most successful in each type of project or project phase, they can set goals for improvement in their ability to perform in those areas that are not their natural preference.</p>
<p class="import-Normal">Another individual goal is to examine which conflict resolution styles you are least comfortable and work to improve those styles so that they can be used when they are more appropriate than your default style.</p>

<h2><a></a>Working with Groups and Teams</h2>
<p class="import-Normal"><strong>Team Development and Behavior</strong></p>
<p class="import-Normal">A team is a collaboration of people with different personalities that is led by a person with a favored leadership style. Tuckman model of team development –Forming, Storming, Norming, Performing and Adjourning is an elegant and helpful of explaining team development behavior. The model explains that as the team develop maturity and ability, relationships establish, and the leader changes leadership style. Beginning with a direct style, the leader moves through coaching, then participating, finishing with delegating</p>
<p class="import-Normal">Managing the interactions of the various personalities and styles as a group is an important aspect of project management.</p>

<h3><a></a>Trust</h3>
<p class="import-Normal">Trust is the foundation for all relationships within a project. Without a minimum level of trust, communication breaks down, and eventually the project suffers in the form of costs increasing and schedules slipping. Often, when reviewing a project where the performance problems have captured the attention of upper management, the evidence of problems is the increase in project costs and the slippage in the project schedule. The underlying cause is usually blamed on communication breakdown. With deeper investigation, the communication breakdown is associated with a breakdown in trust.</p>
<p class="import-Normal">On projects, trust is the filter through which we screen information that is shared and the filter we use to screen information we receive. The more trust that exists, the easier it is for information to flow through the filters. As trust diminishes, the filters become stronger and information has a harder time getting through, and projects that are highly dependent on an information-rich environment will suffer from information deprivation.</p>

<h3><a></a>Contracts and Trust Relationships</h3>
<p class="import-Normal">A project typically begins with a charter or contract. A contract is a legal agreement that includes penalties for any behavior or results not achieved. Contracts are based on an adversarial paradigm and do not lend themselves to creating an environment of trust. Contracts and charters are necessary to clearly establish the scope of the project, among other things, but they are not conducive to establishing a trusting project culture.</p>
<p class="import-Normal">A relationship of mutual trust is less formal but vitally important. When a person or team enters into a relationship of mutual trust, each person’s reputation and self-respect are the drivers in meeting the intent of the relationship. A relationship of mutual trust within the context of a project is a commitment to an open and honest relationship. There is nothing that enforces the commitments in the relationship except the integrity of the people involved. Smaller, less complex projects can operate within the boundaries of a legal contract, but larger, more complex projects must develop a relationship of mutual trust to be successful.</p>

<h3><a></a>Types of Trust</h3>
<p class="import-Normal">Svenn Lindskold describes four kinds of trust (1978):</p>

<ul>
 	<li><em>Objective credibility.</em> A personal characteristic that reflects the truthfulness of an individual that can be checked against observable facts.</li>
 	<li><em>Attribution of benevolence</em>. A form of trust that is built on the examination of the person’s motives and the conclusion that they are not hostile.</li>
 	<li><em>Non-manipulative trust</em>. A form of trust that correlates to a person’s self-interest and the predictability of a person’s behavior in acting consistent in that self-interest.</li>
 	<li><em>High cost of lying</em>. The type of trust that emerges when persons in authority raise the cost of lying so high that people will not lie because the penalty will be too high.</li>
</ul>
<h3><a></a>Creating Trust</h3>
<p class="import-Normal">Building trust on a project begins with the project manager. On complex projects, the assignment of a project manager with a high trust reputation can help establish the trust level needed. The project manager can also establish the cost of lying in a way that communicates an expectation and a value for trust on the project. Project managers can also assure that the official goals (stated goals) and operational goals (goals that are reinforced) are aligned. The project manager can create an atmosphere where informal communication is expected and reinforced.</p>
<p class="import-Normal">The informal communication is important to establishing personal trust among team members and with the client. Allotting time during project start-up meetings to allow team members to develop a personal relationship is important to establishing the team trust. The informal discussion allows for a deeper understanding of the whole person and creates an atmosphere where trust can emerge.</p>

<div class="textbox textbox-exercises"><header class="textbox__header">
<p class="textbox__title"><span style="font-family: Roboto, Helvetica, Arial, sans-serif;font-size: 1em;background-color: initial">Example: High Cost of Lying in a Project</span></p>

</header>
<div class="textbox__content">
<p class="import-Normal">On the project in Abu Dhabi, the client was asking for more and more backup to information from the project. The project manager visited the client to better understand the reporting requirements and discovered the client did not trust the reports coming from the project and wanted validating material for each report. After some candid discussion, the project manager discovered that one of the project team members had provided information to the client that was inaccurate. The team member had made a mistake but had not corrected it with the client, hoping that the information would get lost in the stream of information from the project. The project manager removed the team member from the project for two main reasons. The project manager established that the cost of lying was high. The removal communicated to the project team an expectation of honesty. The project manager also reinforced a covenant with the client that reinforced the trust in the information the project provided. The requests for additional information declined, and the trust relationship between project personnel and the client remained high.</p>

</div>
</div>
&nbsp;
<p class="import-Normal">Small events that reduce trust often take place on a project without anyone remembering what happened to create the environment of distrust. Taking fast and decisive action to establish a high cost of lying, communicating the expectation of honesty, and creating an atmosphere of trust are critical steps a project manager can take to ensure the success of complex projects.</p>
<p class="import-Normal">Project managers can also establish expectations of team members to respect individual differences and skills, look and react to the positives, recognize each other’s accomplishments, and value people’s self-esteem to increase a sense of the benevolent intent.</p>

<h3><a></a>Managing Team Meetings</h3>
<p class="import-Normal">Team meetings are conducted differently depending on the purpose of the meeting, the leadership style that is appropriate for the meeting, and the personality types of the members of the team.</p>

<h3><a></a>Action Item Meetings</h3>
<p class="import-Normal">Action item meetings are short meetings to develop a common understanding of what the short-term priorities are for the project, individual roles, and expectations for specific activities. This type of meeting is for sharing, not problem solving. Any problems that emerge from the discussion are assigned to a person, and another meeting is established to address the issue. Action item meetings focus on short-term activities, usually less than a week in duration.</p>
<p class="import-Normal">The action item meeting is fact based and information oriented. It is a left-brain-type focus. The action item meeting has very little dialogue except to ask clarification questions. If discussion is needed or disagreement is not easily resolved, another problem-solving meeting is established to deal with that issue. On smaller topics, that meeting might take place immediately after the action item meeting and only include those people with an interest in the outcome of the discussion.</p>
<p class="import-Normal">The project manager keeps the successful action item meeting short in duration and focused on only those items of information needed for the short-term project plan. The project manager will restate the common understandings of what activities are priorities and who will be responsible for the activities. Often these meetings can include a review of safety procedures or security procedures when these issues are important to the project. The leadership approach to action item meetings focuses on data, actions, and commitments. Although the project manager may observe stresses between project team members or other issues, they are not addressed in this meeting. These are fact-based meetings. If issues begin to arise between people, the project manager will develop other opportunities to address these issues in another forum. Using the Myers-Briggs descriptions, team members who favor thinking more than feeling and judging more than perceiving are more comfortable with this type of meeting.</p>

<h3><a></a>Management Meetings</h3>
<p class="import-Normal">Management meetings are longer in duration and are focused on planning. They are oriented toward developing plans, tracking progress of existing plans, and making adjustments to plans in response to new information.</p>
<p class="import-Normal">These meetings include focused discussion on generating a common understanding of the progress of the existing plan. This discussion is based on quantitative information provided on the progress of the schedule and other data, but the discussion is qualitative in evaluating the data to develop a more complete understanding of the data. The experience and opinions of the project leaders are solicited, and disagreement about meaning of the data is even encouraged to develop a deeper understanding of the data. Through this discussion, a common understanding of the status of the project should emerge, and the project manager invites discussion, invites&nbsp;people to offer their thoughts, and assures that disagreements are positive discussions about interpretation of the information and that disagreements do not become personal.</p>
<p class="import-Normal">Management meetings also focus on developing mid-term goals. For larger, more complex projects, the goals may be monthly or even quarterly. For smaller or less complex projects, weekly goals will provide the focus. The project manager focuses the discussion on the broad priorities for the next period and includes all the functional leaders in the discussion. The goals that emerge from the discussion should represent a common understanding of the priorities of the project for the next term.</p>
<p class="import-Normal">For example, during the early phases of a project, the team is focused on developing a conceptual understanding of the project. A major milestone on complex projects is typically the completion of the conceptual plan. The project manager would lead a discussion on what needs to be accomplished to meet the project milestone and asks what potential barriers exist and what key resources are needed. From the discussion, the project team develops a few key goals that integrate the various functions of the project team and focus the team on priorities.</p>
<p class="import-Normal">The following are some examples of goals during the conceptual phase:</p>

<ul>
 	<li class="import-Normal" style="text-indent: 23.95pt">Developing a list of the procurement long-lead items and defining critical dates</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Developing a human resources plan that identifies critical positions</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Developing and building agreement with the client on the project scope of work.</li>
</ul>
<p class="import-Normal">Each of these goals is measurable and has a time frame specified. They can be developed as positive motivators and will take the project leaders and most of the project team to accomplish. They develop a general understanding of the priorities and are easy to remember.</p>
<p class="import-Normal">Management meetings are a combination of left-brain thinking, which is fact based, and right-brain thinking, which is creative and innovative. Using the Myers-Briggs terminology, team members who prefer feeling over thinking and perceiving over judging can contribute ideas and perspectives on the project that the more fact-oriented members might miss.</p>
<p class="import-Normal">The project manager allows and encourages conversation in developing and evaluating the goals but focuses the discussion on the goals and obstacles. Management meetings take on a different focus during the month. Meetings at the beginning of the month spend time addressing the progress and potential barriers to the goals developed the previous month. During the middle of the month, the project manager leads the team to develop next month’s goals as the team also works on the current month’s goals. Toward the end of the month as the goals for the month are accomplished, the meeting focuses more on the next month, enabling the team to remain goal focused during the life of the project.</p>
<p class="import-Normal">Management meetings are also an opportunity to discover obstacles to goal achievement. The project team reallocates resources or develops alternative methods for accomplishing the goals. As the project team discusses the progress of project goals, the project manager explores possible obstacles and encourages exposing potential problems in achieving goals. The project manager focuses the team on finding solutions and avoids searching for blame.</p>
<p class="import-Normal">The project manager uses a facilitation leadership approach, encouraging the management team to contribute their ideas, and builds consensus on what goals will bring the appropriate focus. The project manager keeps the focus on developing the goals, tracking progress, identifying barriers, and making adjustments to accomplish the management goals. Although there are typically meetings for scheduling and procurement and other meetings where goals are established and problems solved, the management meeting and the goal development process create alignment among the project leadership on the items critical to the project’s success.</p>

<h3><a></a>Leadership Meetings</h3>
<p class="import-Normal">Leadership meetings are held less frequently and are longer in length. These meetings are used by the project manager to reflect on the project, explore the larger issues of the project, and back away from the day-to-day problem solving. The project manager will create a safe environment for sharing thoughts and evaluations of issues that are less data oriented. This is a right-brained, creative meeting that focuses on the people issues of the project: the relationship with the client, vendors, and project team. Team members who favor feeling, perceiving, and intuition often contribute valuable insights in this type of meeting. The team might also share perceptions by upper management and perceptions of the community in which the project is being executed. Where the time frame for action item meetings is in weeks and management meetings is in months, the time frame for leadership meetings is longer and takes in the entire length and impact of the project.</p>
<p class="import-Normal">The project manager’s meeting management skill includes creating the right meeting atmosphere for the team discussion that is needed. For discussions based on data and facts, the project manager creates the action item type meeting. The conversation is focused on sharing information and clarification. The conversation for leadership meetings is the opposite. Discussion is more open ended and focused on creativity and innovation. Because each type of meeting requires a different meeting atmosphere, mixing the purposes of a meeting will make it difficult for the project manager to develop and maintain the appropriate kind of conversation.</p>
<p class="import-Normal">Skilled project managers know what type of meeting is needed and how to develop an atmosphere to support the meeting type. Meetings of the action item type are focused on information sharing with little discussion. They require efficient communication of plans, progress, and other information team members need to plan and execute daily work. Management type meetings are focused on developing and progressing goals. Leadership meetings are more reflective and focused on the project mission and culture.</p>
<p class="import-Normal">These three types of meetings do not cover all the types of project meetings. Specific problem-solving, vendor evaluation, and scheduling meetings are examples of typical project meetings. Understanding what kinds of meetings are needed on the project and creating the right focus for each meeting type is a critical project management skill.</p>

<h3><a></a>Types of Teams</h3>
<p class="import-Normal">Teams can outperform individual team members in several situations. The effort and time invested in developing a team and the work of the team are large investments of project resources, and the payback is critical to project success. Determining when a team is needed and then chartering and supporting the development and work of the team are other critical project management abilities.</p>
<p class="import-Normal">Teams are effective in several project situations:</p>

<ul>
 	<li>When no one person has the knowledge, skills, and abilities to either understand or solve the problem</li>
 	<li>When a commitment to the solution is needed by large portions of the project team</li>
 	<li>When the problem and solution cross project functions</li>
 	<li>When innovation is required</li>
</ul>
<p class="import-Normal">Individuals can outperform teams on some occasions. An individual tackling a problem consumes fewer resources than a team and can operate more efficiently—as long as the solution meets the project’s needs. A person is most appropriate in the following situations:</p>

<ul>
 	<li>When speed is important</li>
 	<li>When one person has the knowledge, skills, and resources to solve the problem</li>
 	<li>When the activities involved in solving the problem are very detailed</li>
 	<li>When the actual document needs to be written (Teams can provide input, but writing is a solitary task.)</li>
</ul>
<p class="import-Normal">In addition to knowing when a team is appropriate, the project manager must also understand what type of team will function best.</p>

<h3><a></a>Functional Teams</h3>
<p class="import-Normal">A functional team refers to the team approach related to the project functions. The engineering team, the procurement team, and the project controls team are examples of functional teams within the project. On a project with a low complexity profile that includes low technological challenges, good team member experience, and a clear scope of work, the project manager can utilize well-defined functional teams with clear expectations, direction, and strong vertical communication.</p>

<h3><a></a>Cross-Functional Teams</h3>
<p class="import-Normal">Cross-functional teams address issues and work processes that include two or more of the functional teams. The team members are selected to bring their functional expertise to addressing project opportunities.</p>

<h3><a></a><a></a>Problem-Solving Teams</h3>
<p class="import-Normal">Problem-solving teams are assigned to address specific issues that arise during the life of the project. The project leadership includes members that have the expertise to address the problem. The team is chartered to address that problem and then disband.</p>

<h2><a></a>Qualitative Assessment of Project Performance</h2>
<p class="import-Normal">Project managers should provide an opportunity to ask such questions as “What is your gut feeling about how the project going?” and “How do you think our client perceives the project?” This creates the opportunity for reflection and dialogue around larger issues on the project. The project manager creates an atmosphere for the team to go beyond the data and search for meaning. This type of discussion and reflection is very difficult in the stress of day-to-day problem solving.</p>
<p class="import-Normal">The project manager has several tools for developing good quantitative information—based on numbers and measurements—such as the project schedules, budgets and budget reports, risk analysis, and goal tracking. This quantitative information is essential to understanding the current status and trends on the project. Just as important is the development of qualitative information—comparisons of qualities—such as judgments made by expert team members that go beyond the quantitative data provided in a report. Some would label this the “gut feeling” or intuition of experienced project managers.</p>
<p class="import-Normal">The Humm Factor is a survey tool developed by Russ Darnall to capture the thoughts of project participants. It derived its name from a project manager who always claimed he could tell you more by listening to the hum of the project than reading all the project reports. “Do you feel the project is doing the things it needs to do to stay on schedule?” and “Is the project team focused on project goals?” are the types of questions that can be included in the Humm Factor. It is distributed on a weekly or less frequent basis depending on the complexity profile of the project. A project with a high level of complexity due to team-based and cultural issues will be surveyed more frequently.</p>
<p class="import-Normal">The qualitative responses are converted to a quantitative value as a score from 1 to 10. Responses are tracked by individuals and the total project, resulting in qualitative comparisons over time. The project team reviews the ratings regularly, looking for trends that indicate an issue may be emerging on the project that might need exploring.</p>

<div class="textbox textbox-exercises"><header class="textbox__header">
<p class="textbox__title"><span style="font-family: Roboto, Helvetica, Arial, sans-serif;font-size: 1em;font-style: italic;background-color: initial">Example: Humm Survey Uncovers Concerns</span></p>

</header>
<div class="textbox__content">
<p class="import-Normal">On the project in Abu Dhabi the project surveyed the project leadership with a Humm Survey each week. The Humm Factor indicated an increasing worry about the schedule beginning to slip when the schedule reports indicated that everything was according to plan. When the project manager began trying to understand why the Humm Factor was showing concerns about the schedule, he discovered an apprehension about the performance of a critical project supplier. When he asked team members, they responded, “It was the way they answered the phone or the hesitation when providing information—something didn’t feel right.”</p>
<p class="import-Normal">The procurement manager visited the supplier and discovered the company was experiencing financial problems and had serious cash flow problems. The project manager was able to develop a plan to help the supplier through the period, and the supplier eventually recovered. The project was able to meet performance goals. The Humm Factor survey provided a tool for members of the project team to express concerns that were based on very soft data, and the project team was able to discover a potential problem.</p>
<p class="import-Normal">Another project team used the Humm Factor to survey the client monthly. The completed surveys went to a person who was not on the project team to provide anonymity to the responses. The responses were discussed at the monthly project review meetings, and the project manager summarized the results and addressed all the concerns expressed in the report. “I don’t feel my concerns are being heard” was one response that began increasing during the project, and the project manager spent a significant portion of the next project review meeting attempting to understand what this meant. The team discovered that as the project progressed toward major milestones, the project team became more focused on solving daily problems, spent more time in meetings, and their workday was becoming longer. The result was fewer contacts with the clients, slower responses in returning phone calls, and much fewer coffee breaks where team members could casually discuss the project with the client.</p>

</div>
</div>
&nbsp;
<p class="import-Normal">The result of the conversation led to better understanding by both the project team and client team of the change in behavior based on the current phase of the project and the commitment to developing more frequent informal discussion about the project.</p>

<h2><a></a>Creating a Project Culture</h2>
<p class="import-Normal">Project managers have a unique opportunity during the start-up of a project. They create a project culture, something organizational managers seldom have a chance to do. In most organizations, the corporate or organizational culture has developed over the life of the organization, and people associated with the organization understand what is valued, what has status, and what behaviors are expected. Edgar Schein identified three distinct levels in organizational culture:</p>

<ol>
 	<li class="import-Normal" style="text-indent: 23.95pt">Artifacts and behaviours</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Espoused values</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Assumptions</li>
</ol>
<p class="import-Normal">Artifacts are the visible elements in a culture and they can be recognized by people not part of the culture.&nbsp; Espoused values are the organization’s stated values and rules of behavior.&nbsp; Shared basic assumptions are the deeply embedded, taken-for-granted behaviors that are usually unconscious, but constitute the essence of culture.</p>

<h3><a></a>Characteristics of Project Culture</h3>
<p class="import-Normal">A project culture represents the shared norms, beliefs, values, and assumptions of the project team. Understanding the unique aspects of a project culture and developing an appropriate culture to match the complexity profile of the project are important project management abilities.</p>
<p class="import-Normal">Culture is developed through the communication of:</p>

<ul>
 	<li class="import-Normal" style="text-indent: 23.95pt">The priority</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">The given status</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">The alignment of official and operational rules</li>
</ul>
<p class="import-Normal">Official rules are the rules that are stated, and operational rules are the rules that are enforced. Project managers who align official and operational rules are more effective in developing a clear and strong project culture because the project rules are among the first aspects of the project culture to which team members are exposed when assigned to the project.</p>

<h4><a></a><a></a>Example: Creating a Culture of Collaboration</h4>
<p class="import-Normal">A project manager met with his team prior to the beginning of an instructional design project. The team was excited about the prestigious project and the potential for career advancement involved. With this increased competitive aspect came the danger of selfishness and backstabbing. The project leadership team told stories of previous projects where people were fired for breaking down the team efforts and often shared inspirational examples of how teamwork created unprecedented successes—an example of storytelling. Every project meeting started with teambuilding exercises—a ritual—and any display of hostility or separatism was forbidden—taboo—and was quickly and strongly cut off by the project leadership if it occurred.</p>
<p class="import-Normal">Culture guides behavior and communicates what is important and is useful for establishing priorities. On projects that have a strong culture of trust, team members feel free to challenge anyone who breaks a confidence, even managers. The culture of integrity is stronger than the cultural aspects of the power of management.</p>

<h2><a></a>Innovation on Projects</h2>
<p class="import-Normal">The requirement of innovation on projects is influenced by the nature of the project. Some projects are chartered to develop a solution to a problem, and innovation is a central ingredient of project success. The lack of availability of education to the world at large prompted the open education movement, a highly innovative endeavor, which resulted in the textbook you are now reading. Innovation is also important to developing methods of lowering costs or shortening the schedule. Traditional project management thinking provides a trade-off between cost, quality, and schedule. A project sponsor can typically shorten the project schedule with an investment of more money or a lowering of quality. Finding innovative solutions can sometimes lower costs while also saving time and maintaining the quality.</p>
<p class="import-Normal">Innovation is a creative process that requires both fun and focus. Stress is a biological reaction to perceived threats. Stress, at appropriate levels, can make the work environment interesting and even challenging. Many people working on projects enjoy a high-stress, exciting environment. When the stress level is too high, the biological reaction increases blood flow to the emotional parts of the brain and decreases the blood flow to the creative parts of the brain, making creative problem solving more difficult. Fun reduces the amount of stress on the project. Project managers recognize the benefits of balancing the stress level on the project with the need to create an atmosphere that enables creative thought.</p>

<h3><a></a>Example: Stress Managed on a Website Design Project</h3>
<p class="import-Normal">When a project manager visited the team tasked with designing the website for a project, she found that most of the members were feeling a great deal of stress. As she probed to find the reason behind the stress, she found that in addition to designing, the team was increasingly facing the need to build the website as well. As few of them had the necessary skills, they were wasting time that could be spent designing trying to learn building skills. Once the project manager was able to identify the stress as well as its cause, she was able to provide the team with the support it needed to be successful.</p>
<p class="import-Normal">Exploring opportunities to create savings takes an investment of time and energy, and on a time-sensitive project, the project manager must create the motivation and the opportunity for creative thinking.</p>

<table>
<tbody>
<tr class="GridTable4-Accent5-R" style="height: 0">
<td class="GridTable4-Accent5-C" style="background-color: #4bacc6;border: solid #4BACC6 0.5pt">
<div class="GridTable4-Accent5-firstCol">
<div class="GridTable4-Accent5-firstRow">
<h2 class="import-Normal">Chapter 16: Key Takeaways</h2>
</div>
</div></td>
</tr>
<tr class="GridTable4-Accent5-R" style="height: 0">
<td class="GridTable4-Accent5-C" style="background-color: #daeef3;border: solid #92CDDC 0.5pt">
<div class="GridTable4-Accent5-band1Horz">
<div class="GridTable4-Accent5-firstCol">
<ul>
 	<li>Working with other people involves dealing with them both logically and emotionally.</li>
 	<li>A successful working relationship between individuals begins with appreciating the importance of emotions and how they relate to personality types, leadership styles, negotiations, and setting goals.</li>
 	<li>Personality types refer to the differences among people in such matters as what motivates them, how they process information, how they handle conflict, etc. Understanding people’s personality types is acknowledged as an asset in interacting and communicating with them more effectively.</li>
 	<li>Understanding your personality type as a project manager will assist you in evaluating your tendencies and strengths in different situations. Understanding others’ personality types can also help you coordinate the skills of your individual team members and address the various needs of your client.</li>
 	<li>Leadership style is a function of both the personal characteristics and life experiences of the leader and the environment in which the leadership must occur.</li>
 	<li>No particular leadership approach is specifically appropriate for managing a project. Due to the unique circumstances inherent in each project, the leadership approach and the management skills required to be successful vary depending on the complexity profile of the project.</li>
 	<li>The successful project manager must have good communication skills and other skills. These skills include administrative skills, organizational skills, and technical skills associated with the technology of the project. The types of skills and the depth of the skills needed are closely connected to the complexity profile of the project.</li>
 	<li>One of the most important communication skills of the project manager is the ability to actively listen. It enables a project manager to go beyond the basic information that is being shared and to develop a more complete understanding of the information.</li>
 	<li>Negotiation is a process for developing a mutually acceptable outcome when the desired outcome for each party conflicts. A project manager will often negotiate with a client, team members, vendors, and other project stakeholders.</li>
 	<li>How the project manager deals with the conflict results in the conflict being destructive or an opportunity to build energy, creativity, and innovation.</li>
 	<li>Delegating responsibility and work to others is a critical project management skill.</li>
 	<li>If individuals knows their own preferences and which personality types are most successful in each type of project or project phase, they can set goals for improvement in their ability to perform in those areas that are not their natural preference.</li>
 	<li>The project manager must have the skills to evaluate the knowledge, skills, and abilities of project team members and evaluate the complexity and difficulty of the project assignment.</li>
 	<li>Managing the interactions of the various personalities and styles as a group is an important aspect of project management.</li>
 	<li>The project manager has several tools for developing good quantitative information—based on numbers and measurements—such as the project schedules, budget reports, risk analysis, and goal tracking. This quantitative information is essential to understanding the current status and trends on the project. Equally important is the development of qualitative information—such as judgments made by expert team members which goes beyond the quantitative data provided in a report.</li>
 	<li>A project culture represents the shared norms, beliefs, values, and assumptions of the project team. Understanding the unique aspects of a project culture and developing an appropriate culture to match the complexity profile of the project are important project management abilities.</li>
</ul>
</div>
</div></td>
</tr>
<tr>
<td></td>
</tr>
</tbody>
</table>
<h3></h3>
<h2>References</h2>
<p class="import-Normal">Burns, J.M. (1978).&nbsp;<em>Leadership.&nbsp;</em>New York: Harper &amp; Row.</p>
<p class="import-Normal">Fiedler, F.E. (1971). Validation and Extension of the Contingency Model of Leadership Effectiveness. <em>Psychological Bulletin,</em> <em>76(</em>2), 128–48.</p>
<p class="import-Normal">Leavitt, H. (1986). <em>Corporate Pathfinders.&nbsp;</em>New York: Dow-Jones-Irwin and Penguin Books.</p>
<p class="import-Normal">Lindskold, S. (1978). Trust Development, the GRIT Proposal, and the Effects of Conciliatory Acts on Conflict and Corporation. <em>Psychological Bulletin</em> <em>85</em>(4), 772–93.</p>
<p class="import-Normal">Shi, Q., &amp; Chen, J. (2006). <em>The Human Side of Project Management: Leadership Skills.</em>&nbsp;Newtown Square, PA: Project Management Institute, Inc.</p>
<p class="import-Normal">Tannenbaum, R., &amp; Schmidt, W. (1958). How to Choose a Leadership Pattern. <em>Harvard Business Review 36</em>, 95–101.</p>
<p class="import-Normal">Whetton, D., &amp; Cameron, K. (2005). <em>Developing Management Skills.&nbsp;</em>Upper Saddle River, NJ: Pearson Education.</p>

<h2>Attribution</h2>
<p class="import-Normal">This chapter of <em>Project Management</em> is a derivative copy of <a class="rId349">Project Management</a> by <a class="rId350">Merrie Barron and Andrew Barron</a> licensed under <a class="rId351">Creative Commons Attribution 3.0 Unported</a>,&nbsp;<a class="rId352">Project Management/PMBOK/Human Resources Management</a> and&nbsp;<a class="rId353">Development Cooperation Handbook/How do we manage the human resources of programmes and projects?/Manage the Project Team</a>&nbsp;by Wikibooks licensed under <a class="rId354">Creative Commons Attribution-Share Alike 3.0</a>, <a class="rId355" href="http://en.wikipedia.org/wiki/Resource_management">Resource Management</a> and <a class="rId356">Resource Leveling</a> by Wikipedia licensed under <a class="rId357">Creative Commons Attribution-Share Alike 3.0</a>, <a class="rId358">Resource Management</a>,&nbsp;and&nbsp;<a class="rId359">Project Management for Instructional Designers</a> by Amado, M., Ashton, K., Ashton, S., Bostwick, J., Clements, G., Drysdale, J., Francis, J., Harrison, B., Nan, V., Nisse, A.,&nbsp;Randall, D., Rino, J., Robinson, J., Snyder, A., Wiley, D., &amp; Anonymous. (DATE). Project Management for Instructional Designers. Retrieved from http://pm4id.org/ under <a class="rId360">Creative Commons Attribution 3.0 Unported</a>and http://en.wikipedia.org/wiki/Edgar_Schein.</p>
<p class="import-Normal"></p>

</div>
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>369</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:35]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:35]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-16-working-with-individuals-and-teams]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>288</wp:post_parent>
		<wp:menu_order>4</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 17: Project Implementation Overview</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-17-project-implementation-overview/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:35 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-17-project-implementation-overview/</guid>
		<description></description>
		<content:encoded><![CDATA[
<div class="chapter-17:-project-implementation-overview">
<div class="textbox textbox--learning-objectives"><header class="textbox__header">
<p class="textbox__title">Learning Objectives</p>

</header>
<div class="textbox__content">
<p class="import-Normal"><strong>Learning Objectives</strong></p>

<ul>
 	<li>Outline the importance of managing project progress.</li>
 	<li>Create effective project monitoring and control systems.</li>
 	<li>Examine how work is controlled and monitored during execution and implementation phase.</li>
 	<li>Design and create useful and targeted control reports.</li>
 	<li>Manage a project change and control its rate of change.</li>
</ul>
</div>
</div>
<p class="import-Normal">Planning, monitoring, and controlling a project progress is an ongoing project management responsibility. From the very beginning of a project, a project manager must decide the type of data that needs to be collected, the analyses the data will undergo, and the formats in which pertinent information will be reported.</p>
<p class="import-Normal">A project is a system and information keeps systems moving. To be successful you need to create an information system that gives the project manager and others the information they need to make informed, timely decisions that will keep project performance close to the plan. Type of information required includes:</p>
<p class="import-Normal"><strong>Feedback</strong></p>

<ul>
 	<li>Information about progress</li>
 	<li>Suggests need to adjust after outcome measured</li>
 	<li>E.g. Status reports</li>
</ul>
<p class="import-Normal"><strong>Feedforward</strong></p>

<ul>
 	<li>Information about choices (options)</li>
 	<li>Adjustments made prior to implementing</li>
 	<li>E.g. Risk and communication analysis.</li>
</ul>
<p class="import-Normal">Both types of information are useful and necessary for success. Feedback is required to assess actual performance but it may be too late to adjust. Feedforward protects the project from surprises and may reduce turbulence when changes are necessary.</p>
<p class="import-Normal">Project managers can design monitoring and controlling systems specially targeted for schedule performance, work-effort, and expenditures. Monitoring and managing scope creep and project change are two overarching control responsibilities.</p>
<p class="import-Normal">After you have carefully planned your project, you will be ready to start the project implementation phase, the third phase of the project management life cycle. The implementation phase involves putting the project plan into action. It’s here that the project manager will coordinate and direct project resources to meet the objectives of the project plan. As the project unfolds, it’s the project manager’s job to direct and manage each activity, every step of the way. That’s what happens in the implementation phase of the project life cycle: you follow the plan you’ve put together and handle any problems that come up.</p>

<h2>Implementation Phase</h2>
<p class="import-Normal">The implementation phase is where you and your project team actually do the project work to produce the deliverables. The word “deliverable” means anything your project delivers. The deliverables for your project include all of the products or services that you and your team are performing for the client, customer, or sponsor, including all the project management documents that you put together.</p>
<p class="import-Normal">The steps undertaken to build each deliverable will vary depending on the type of project you are undertaking, and cannot therefore be described here in any real detail. For instance engineering and telecommunications projects will focus on using equipment, resources, and materials to construct each project deliverable, whereas computer software projects may require the development and implementation of software code routines to produce each project deliverable. The activities required to build each deliverable will be clearly specified within the project requirements document and project plan.</p>
<p class="import-Normal">Your job as project manager is to direct the work, but you need to do more than deliver the results. You also need to keep track of how well your team performs. The implementation&nbsp;phase keeps the project plan on track with careful monitoring and control processes to ensure the final deliverable meets the acceptance criteria set by the customer. This phase is typically where approved changes are implemented.</p>
<p class="import-Normal">Most often, changes are identified by&nbsp;looking at performance and quality control data. Routine performance and quality control measurements should be evaluated on a regular basis throughout the implementation phase. Gathering reports on those measurements will help you determine where the problem is and recommend changes to fix it.</p>

<h2><a></a>Change Control</h2>
<p class="import-Normal">When you find a problem, you can’t just make a change, because it may be&nbsp;too expensive or&nbsp;take too long to do. You will need to look at how it affects the triple constraint (time, cost, scope) and how it&nbsp;impacts project quality. You will then have to figure out if it is worth making the change.&nbsp;If you evaluate the impact of the change and find that it won’t have an impact on the project triple constraint, then you can make the change without going through change control. Change control is a set of procedures that lets you make changes in an organized way.</p>
<p class="import-Normal">Any time you need to make a change to your plan, you must&nbsp;start with a change request. This is a document that either you or the person making the request must complete. Any change to your project must&nbsp;be documented so you can figure out what needs to be done, by when, and by whom.</p>
<p class="import-Normal">Once the change request is documented, it is submitted to a change control board. A change control board is a group of people who consider changes for approval. Not every change control system has a board but most do. The change request could also be submitted to the project sponsor or management for review and approval. Putting the recommended changes through change control will help you evaluate the impact and update all the necessary documents. Not all changes are approved, but if the changes are approved, you send them back to the team to put them in place.</p>
<p class="import-Normal">The implementation phase uses the most project time and resources, and as a result, costs are usually the highest during this&nbsp;phase. Project managers also experience the greatest conflicts over schedules in this phase. You may find as you are monitoring your project that the actual time it is taking to do the scheduled work is longer than the amount of time planned.</p>
<p class="import-Normal">When you absolutely have to meet the date and you are running behind, you can sometimes find ways to do activities more quickly by adding more resources to critical path tasks. That’s called <em>crashing</em>. Crashing the schedule means adding resources or moving them around to to bring the project back into line with the schedule. Crashing <strong>always</strong> costs more and doesn’t always work. There’s no way to crash a schedule without raising the overall cost of the project. So, if the budget is fixed and you don’t have any extra money to spend, you can’t use this technique.</p>
<p class="import-Normal">Sometimes you’ve got two activities planned to occur in sequence, but you can actually do them at the same time. This is called <em>fast tracking</em> the project. On a software project, you might do both your user acceptance testing (UAT) and your functional testing at the same time, for example. This is pretty risky. There’s a good chance you might need to redo some of the work you have done concurrently. Crashing and fast tracking are schedule compression tools. Managing a schedule change means keeping all of your schedule documents up to date. That way, you will always be comparing your results to the correct plan.</p>

<h2>Status Reporting</h2>
<p class="import-Normal">After data has been collected and analyzed, it needs to be reported in some form. Project reports provide senior management and project teams an opportunity to see whether a project is on track and to determine whether they should do something differently to ensure the projects meet their goals. The fundamental characteristics of a good reporting system includes:</p>
<p class="import-Normal">Timely, complete and accurate reports</p>

<ul>
 	<li>Not too costly</li>
 	<li>Readily acceptable to team and sponsor</li>
 	<li>Containing pertinent information only.</li>
 	<li>Warns of pending problems (feedforward)</li>
 	<li>Easy to understand – short and concise</li>
</ul>
<p class="import-Normal">In general project managers should avoid periodic reports except in those cases in which the flow of data is periodic. Reports issued routinely – every day, week, month, or quarter- generally do not get read. Instead, let a project’s milestones, scope changes, problems, and the project teams’s need for information dictate the timing of reports.</p>
<p class="import-Normal"><strong>Types of Status Reports</strong></p>

<ul>
 	<li>Performance/progress reports –These reports indicate the physical progress to date. The report might include information about procurement, delivery and usage.</li>
 	<li>Status reports – These reports identify where we are today and use the information from the performance reports to calculate Schedule Variances (SV) and Cost Variances (CV).</li>
 	<li>Projection Reports- The reports provide forward-looking projections and emphasize where the project will end up.</li>
 	<li>Exception Reports – These reports identify exceptions, problems, or situations that exceed the threshold limits on such items as variances, cash flows, resources assigned etc.</li>
</ul>
<p class="import-Normal">After the deliverables have been physically constructed and accepted by the customer, a phase review is carried out to determine whether the project is complete and ready for closure.</p>

<h2><a></a>Attribution</h2>
<p class="import-Normal">This chapter of <em>Project Management</em> is a derivative copy of <a class="rId361">Project Management</a> by <a class="rId362">Merrie Barron and Andrew Barron</a> licensed under <a class="rId363">Creative Commons Attribution 3.0 Unported.</a></p>
<p class="import-Normal">Contribution by Florence Daddey</p>

<table>
<tbody>
<tr class="GridTable4-Accent5-R" style="height: 0">
<td class="GridTable4-Accent5-C" style="background-color: #4bacc6;border: solid #4BACC6 0.5pt">
<div class="GridTable4-Accent5-firstCol">
<div class="GridTable4-Accent5-firstRow">
<p class="import-Normal">Chapter 17: Key Takeaways</p>

</div>
</div></td>
</tr>
<tr class="GridTable4-Accent5-R" style="height: 0">
<td class="GridTable4-Accent5-C" style="background-color: #daeef3;border: solid #92CDDC 0.5pt">
<div class="GridTable4-Accent5-band1Horz">
<div class="GridTable4-Accent5-firstCol">
<ul>
 	<li>Feedback and feedforward information are useful and necessary for project success. Project reporting should not be driven by regularity.</li>
 	<li>The implementation phase involves putting the project plan into action. It’s here that the project manager</li>
 	<li>Project reports provide senior management and project teams an opportunity to see whether a project is on track and to determine whether they should do something differently to ensure the projects meet their goals.</li>
</ul>
<p class="import-Normal"></p>

</div>
</div></td>
</tr>
<tr>
<td></td>
</tr>
</tbody>
</table>
<p class="import-Normal"></p>

</div>
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>370</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:35]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:35]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-17-project-implementation-overview]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>288</wp:post_parent>
		<wp:menu_order>5</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 18: Project Completion</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-18-project-completion/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:35 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-18-project-completion/</guid>
		<description></description>
		<content:encoded><![CDATA[
<div class="chapter-18:-project-completion">
<div class="textbox textbox--learning-objectives"><header class="textbox__header">
<p class="textbox__title">Learning Objectives</p>

</header>
<div class="textbox__content">
<p class="import-Normal"><strong>Learning Objectives</strong></p>

<ul>
 	<li>Discuss the value of the project completion phase.</li>
 	<li>Evaluate a finished project.</li>
 	<li>Write end of project reports.</li>
 	<li>Document project work for future learning.</li>
</ul>
</div>
</div>
<p class="import-Normal">Every project needs to end and that’s what project completion is all about in the last phase of the project life cycle. The whole point of the project is to deliver what you promised. By delivering everything you said you would, you make sure that all stakeholders are satisfied and all acceptance criteria have been met. Once that happens, your project can end.</p>
<p class="import-Normal">Project completion is often the most neglected phase of the project life cycle. Once the project is over, it’s easy to pack things up, throw some files in a drawer, and start moving right into the initiation phase of the next project. Hold on. You’re not done yet.</p>
<p class="import-Normal">The key activities in project completion are&nbsp;gathering project records;&nbsp;disseminating information to formalize acceptance of the product, service, or project; and performing project closure. As the project manager, you will need to review project documents to make certain they are up-to-date. For example, perhaps some scope change requests were implemented that changed some of the characteristics of the final product. The project information you are collecting during this phase should reflect the characteristics and specifications of the final product. Don’t forget to update your resource assignments as well. Some team members will have come and gone over the course of the project. You need to double-check that all the resources and their roles and responsibilities are noted.</p>
<p class="import-Normal">Once the project outcomes are documented, you’ll request formal acceptance from the stakeholders or customer. They’re interested in knowing if the product or service of the project meets the objectives the project set out to accomplish. If your documentation is up-to-date, you’ll have the project results at hand to share with them.</p>

<h2><a></a>Contract Closure</h2>
<p class="import-Normal">Contracts come to a close just as projects come to a close. Contract closure is concerned with completing and settling the terms of the contracts let for the project. It supports the project completion process because the contract closure process determines if the work described in the contracts was completed accurately and satisfactorily. Keep in mind that not all projects are performed under contract so not all projects require the contract closure process. Obviously, this process applies only to those phases, deliverables, or portions of the project that were performed under contract.</p>
<p class="import-Normal">Contract closure updates the project records, detailing the final results of the work on the project. Contracts may have specific terms or conditions for completion. You should be aware of these terms or conditions so that project completion isn’t held up because you missed an important detail. If you are administering the contract yourself, be sure to ask your procurement department if there are any special conditions that you should be aware of so that your project team doesn’t inadvertently delay contract project closure.</p>
<p class="import-Normal">One of the purposes of the contract closure process is to provide formal notice to the seller,&nbsp;usually in written form, that the deliverables are acceptable and satisfactory or have been rejected. If the product or service does not meet the expectations, the vendor will need to correct the problems before you issue a formal acceptance notice. Before the contract is closed, any minor items that need to be repaired or completed are placed on a <em>punch list</em>, which is a list of all the items found by the client or team&nbsp;or&nbsp;manager that still remain to be done. Hopefully, quality audits have been performed during the course of the project, and the vendor was given the opportunity to make corrections earlier in the process than the closing phase. It’s not a good idea to wait until the very end of the project and then spring all the problems and issues on the vendor at once. It’s much more efficient to discuss problems with your vendor as the project progresses because it provides the opportunity for correction when the problems occur.</p>
<p class="import-Normal">The project team will then work on all of the items on the punch list, building a small schedule to complete the remaining work. If the number of items on the punch list is too large or the amount of work is significant, the project team continues to work on the project. Once the punch list becomes smaller, the project manager begins closing down the project, maintaining only enough staff and equipment to support the team that is working on the punch list.</p>
<p class="import-Normal">If the product or service does meet the project’s expectations and is acceptable, formal written notice to the seller is required, indicating that the contract is complete. This is the formal acceptance and closure of the contract. It’s your responsibility as the project manager to document the formal acceptance of the contract. Many times the provisions for formalizing acceptance and closing the contract are spelled out in the contract itself.</p>
<p class="import-Normal">If you have a procurement department handling the contract administration, they will expect you to inform them when the contract is complete and will in turn follow the formal procedures to let the seller know the contract is complete. However, you will still note the contract completion in your copy of the project records.</p>

<h3><a></a>Releasing the Project Team</h3>
<p class="import-Normal">Releasing project team members is not an official process. However, it should be noted that at the conclusion of the project, you will release your project team members, and they will go back to their functional managers or get assigned to a new project. You will want to keep their managers, or other project managers, informed as you get closer to project completion, so that they have time to adequately plan for the return of their employees. Let them know a few months ahead of time what the schedule looks like and how soon they can plan on using their employees on new projects. This gives the other managers the ability to start planning activities and scheduling activity dates.</p>

<h3><a></a>Final Payments</h3>
<p class="import-Normal">The final payment is usually more than a simple percentage of the work that remains to be completed. Completing the project might involve fixing the most difficult problems that are disproportionately expensive to solve, so the final payment should be large enough to motivate the vendor to give the project a high priority so that the project can be completed on time.</p>
<p class="import-Normal">If the supplier has met all the contractual obligations, including fixing problems and making repairs as noted on a punch list, the project team signs off on the contract and submits it to the accounting department for final payment. The supplier is notified that the last payment is final and completes the contractual agreement with&nbsp;the project.</p>

<h3><a></a>Post-Project Evaluations</h3>
<p class="import-Normal">Before the team is dissolved and begins to focus on the next project, a review is conducted to capture the lessons that can be learned from this project, often called a <strong>lessons-learned meeting</strong> or document. The team explores what went well and captures the processes to understand why they went well. The team asks if the process is transferable to other projects. The team also explores what did not go well and what people learned from the experience. The process is not to find blame, but to learn.</p>
<p class="import-Normal">Quality management is a process of continual improvement that includes learning from past projects and making changes to improve the next project. This process is documented as evidence that quality management practices are in use. Some organizations have formal processes for changing work processes and integrating the lessons learned from the project so other projects can benefit. Some organizations are less formal in the approach and expect individuals to learn from the experience and take the experience to their next project and share what they learned with others in an informal way. Whatever type of approach is used, the following elements should be evaluated and the results summarized in reports for external and internal use.</p>

<h3><a></a>Trust and Alignment Effectiveness</h3>
<p class="import-Normal">The project leadership reviews the effect of trust—or lack of trust—on the project and the effectiveness of alignment meetings at building trust. The team determines which problems might have been foreseen and mitigated and which ones could not have been reasonably predicted. What were the cues that were missed by the team that indicated a problem was emerging? What could the team have done to better predict and prevent trust issues?</p>

<h3><a></a>Schedule and Budget Management</h3>
<p class="import-Normal">The original schedule of activities and the network diagram are compared to the actual schedule of events. Events that caused changes to the schedule are reviewed to see how the use of contingency reserves and float mitigated the disruption caused by those events. The original estimates of contingency time are reviewed to determine if they were adequate and if the estimates of duration and float were accurate. These activities are necessary for the project team to develop expertise in estimating schedule elements in future projects—they are not used to place blame.</p>
<p class="import-Normal">A review of budget estimates for the cost of work scheduled is compared to the actual costs. If the estimates are frequently different from the actual costs, the choice of estimating method is reviewed.</p>

<h3><a></a>Risk Mitigation</h3>
<p class="import-Normal">After the project is finished, the estimates of risk can be reviewed and compared to the events that actually took place. Did events occur that were unforeseen? What cues existed that may have allowed the team to predict these events? Was the project contingency sufficient to cover unforeseen risks? Even if nothing went wrong on this project, it is not proof that risk mitigation was a waste of money, but it is useful to compare the cost of avoiding risk versus the cost of unexpected events to understand how much it cost to avoid risk.</p>

<h3><a></a>Procurement Contracts</h3>
<p class="import-Normal">The performance of suppliers and vendors is reviewed to determine if they should still be included in the list of qualified suppliers or vendors. The choice of contract for each is reviewed to determine if the decision to share risk was justified and if the choice of incentives worked.</p>

<h3><a></a>Customer Satisfaction</h3>
<p class="import-Normal">Relationships with the client are reviewed and decisions about including the client in project decisions and alignment meetings are discussed. The client is given the opportunity to express satisfaction and identify areas in which project communication and other factors could be improved. Often a senior manager from the organization interviews the client to develop feedback on the project team performance.</p>
<p class="import-Normal">A general report that provides an overview of the project is created to provide stakeholders with a summary of the project. The report includes the original goals and objectives and statements that show how the project met those goals and objectives. Performance on the schedule and budget are summarized and an assessment of client satisfaction is provided. A version of this report can be provided to the client as a stakeholder and as another means for deriving feedback.</p>

<h3><a></a>Senior Management</h3>
<p class="import-Normal">The report to senior management contains all the information provided to the stakeholders in a short executive summary. The report identifies practices and processes that could be improved or lessons that were learned that could be useful on future projects.</p>

<h3>Types of Closing Reports</h3>
<p class="import-Normal">Capturing lessons learned from a project experienced should be part of every close down operation. Project participants should convene to identify what went right and what went wrong. They should make a list of their successes, their mistakes, their unjustified assumptions, and the things that could have been done better. This should be stored with the rest of the other documents.</p>
<p class="import-Normal">As stated earlier every project is different and depending of the complexities and project requirements four types closing reports may be produced for different purposes:</p>
<p class="import-Normal"><strong>Project Evaluation and Review Report:</strong> Prepared by the core project team. Purpose is to compare results to commitment, to identify lessons learned, to refined project management processes.</p>
<p class="import-Normal"><strong>A</strong><strong>udit Report</strong>: A project audit is a more formal final review of a project by a group outside the project team. This is a special type of evaluation. It involves a thorough examination of the management of the project, its methodology and procedures, its records, properties, inventories, budgets, expenditures, progress.</p>
<p class="import-Normal"><strong>Final Report:</strong> The final report is not another evaluation report though the audit and evaluation reports may have a role in it. It is prepared by the project manager (reflections) and should contain the following 5 areas of discussions: Project performance, administrative management performance, project organizational structure, project management techniques and team work.</p>
<p class="import-Normal"><strong>Post Implementation Audit</strong><strong>:</strong> Post-Implementation Audit is scheduled if appropriate in 6-12months. It involves an evaluation of the project goals and activities as measured against project plans.</p>

<h3><a></a>Archiving of Document</h3>
<p class="import-Normal">The documents associated with the project must be stored in a safe location where they can be retrieved for future reference. Signed contracts or other documents that might be used in tax reviews or lawsuits must be stored. Organizations will have legal document storage and retrieval policies that apply to project documents and must be followed. Some project documents can be stored electronically.</p>
<p class="import-Normal">Care should be taken to store documents in a form that can be recovered easily. If the documents are stored electronically, standard naming conventions should be used so documents can be sorted and grouped by name. If documents are stored in paper form, the expiration date of the documents should be determined so they can be destroyed at some point in the future. The following are documents that are typically archived:</p>

<ul>
 	<li class="import-Normal" style="text-indent: 23.95pt">Charter documents</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Scope statement</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Original budget</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Change documents</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">DPCI ratings</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Manager’s summary—lessons learned</li>
 	<li class="import-Normal" style="text-indent: 23.95pt">Final DPCI rating</li>
</ul>
<table>
<tbody>
<tr class="GridTable4-Accent5-R" style="height: 0">
<td class="GridTable4-Accent5-C" style="background-color: #4bacc6;border: solid #4BACC6 0.5pt">
<div class="GridTable4-Accent5-firstCol">
<div class="GridTable4-Accent5-firstRow">
<h2 class="import-Normal">&nbsp;Chapter 18: Key Takeaways</h2>
</div>
</div></td>
</tr>
<tr class="GridTable4-Accent5-R" style="height: 0">
<td class="GridTable4-Accent5-C" style="background-color: #daeef3;border: solid #92CDDC 0.5pt">
<div class="GridTable4-Accent5-band1Horz">
<div class="GridTable4-Accent5-firstCol">
<ul>
 	<li>Evaluate project performance on the basis of chartered objectives or deliverables and adherence to schedule and cost.</li>
 	<li>Project documentation creates a record for future learning.</li>
 	<li>Complete end of project reports.</li>
 	<li>Different types of project reports and depends on the complexities of the project and requirements.</li>
 	<li>Project evaluation and review report</li>
 	<li>Final repot</li>
 	<li>Audit report</li>
 	<li>Post implementation report</li>
 	<li>The documents associated with the project must be stored in a safe location where they can be retrieved for future reference.</li>
 	<li>Use a closedown meeting to make the formal end of the project, to celebrate successes, to recounts lessons and to thank the team.</li>
</ul>
</div>
</div></td>
</tr>
<tr>
<td></td>
</tr>
</tbody>
</table>
<h2><a></a>Attribution</h2>
<p class="import-Normal">This chapter of <em>Project Management</em> is a derivative copy of <a class="rId364">Project Management</a> by <a class="rId365">Merrie Barron and Andrew Barron</a> licensed under <a class="rId366">Creative Commons Attribution 3.0 Unported</a>and&nbsp;<a class="rId367">Project Management for Instructional Designers</a> by Amado, M., Ashton, K., Ashton, S., Bostwick, J., Clements, G., Drysdale, J., Francis, J., Harrison, B., Nan, V., Nisse, A., Randall, D., Rino, J., Robinson, J., Snyder, A., Wiley, D., &amp; Anonymous. (DATE). Project Management for Instructional Designers. Retrieved from <a class="rId368">http://pm4id.org/</a>. Licensed under a <a class="rId369">Creative Commons Attribution NonCommercial ShareAlike (BY-NC-SA) license</a>.</p>
<p class="import-Normal"></p>

</div>
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>371</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:35]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:35]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-18-project-completion]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>288</wp:post_parent>
		<wp:menu_order>6</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 19 Celebrate!</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-19-celebrate/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:36 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-19-celebrate/</guid>
		<description></description>
		<content:encoded><![CDATA[
<div class="chapter-19-celebrate!">
<h2><a></a>Adrienne Watt</h2>
<p class="import-Normal">The project team should celebrate their accomplishments, and the project manager should officially recognize their efforts, thank them for their participation, and officially close the project. A celebration helps team members formally recognize the project’s end and brings closure to the work they’ve done. It also encourages them to remember what they’ve learned and start thinking about how their experiences will benefit them and the organization during the next project.</p>
<p class="import-Normal"><img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image59-1.jpg" width="286.666666666667px" height="321.333333333333px" alt="image"><a class="rId371">&nbsp;</a></p>
<p class="import-Normal">Figure 19.1: Celebrate! Your project is over… at least until the next one.<br style="clear: both">Photo from Barron &amp; Barron Project Management for Scientists and Engineers, http://cnx.org/content/col11120/1.4/</p>

<h2><a></a>Attribution</h2>
<p class="import-Normal">This chapter of <em>Project Management</em> is a derivative copy of Project Management by Merrie Barron and Andrew Barron licensed under <a class="rId372">Creative Commons Attribution 3.0 Unported.</a><a class="rId373">&nbsp;</a></p>

</div>
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>373</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:36]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:36]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-19-celebrate]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>288</wp:post_parent>
		<wp:menu_order>7</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 20: Reflections and Employability Skills</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-20-reflections-and-employability-skills/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:36 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-20-reflections-and-employability-skills/</guid>
		<description></description>
		<content:encoded><![CDATA[
<div class="chapter-20:-reflections-and-employability-skills">
<h3></h3>
<h3>It’s important to reflect regularly on the skills you have, and on the skills you are gaining through your educational experiences. In this project management course you have the opportunity to deepen and sharpen some of these skills. Your future will most likely involve application forms, cover letters, resumes, personal statements, and job interviews. In all of these scenarios, you’ll be expected to identify the skills and strengths you can offer, as well as examples of when you used or displayed those skills.</h3>
<h3>Review the Employability Skills 2000+which are the employability skills attitudes and behaviors you need to participate and progress in today’s dynamic world of work. Applying these skills will help you enter, stay in and progress in the world of work. These skills are consistent with the JIBC Core Competencies.</h3>
<h3>Conference Board of Canada - <a class="rId374"><span class="import-Hyperlink">http://www.conferenceboard.ca/topics/education/learning-tools/employability-skills.aspx</span></a></h3>
<h3></h3>
<p class="import-Normal"><img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image60-1.jpg" width="609px" height="373px" alt="image"></p>
<p class="import-Normal"></p>

</div>
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>375</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:36]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:36]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-20-reflections-and-employability-skills]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>288</wp:post_parent>
		<wp:menu_order>8</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>About the Authors</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/about-the-authors__trashed/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:36 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/about-the-authors/</guid>
		<description></description>
		<content:encoded><![CDATA[
<div class="about-the-authors">
<p class="import-Normal"><strong>Adrienne Watt</strong> holds a Computer Systems Diploma (BCIT), a Bachelors in Technology (BCIT) and a Master’s in Business Administration (City University).</p><p class="import-Normal">Since 1989, Adrienne has worked as an educator and gained extensive experience developing and delivering business and technology curriculum to post-secondary students. During that time she ran a successful software development business. In the business she worked as an IT Professional in a variety of senior positions including Project Manager, Database Designer, Administrator and Business Analyst. Recently she has been exploring a wide range of technology related tools and processes to improve delivery methods and enhance learning for her students. </p><p class="import-Normal"><strong>Florence Daddey</strong> has an interdisciplinary background and holds a Bachelor of Arts in Economics, a Postgraduate Diploma in Adult Education, and a Masters of Business Administration. Florence has over 20 years’ experience in teaching, curriculum development and program management in post-secondary education. In her role as a senior instructional designer at the JIBC, she has worked on many projects across the institute and coordinates faculty development activities. She teaches on the Law Enforcement Diploma Studies program (LESD), Bachelor of Law Enforcement Studies (BLES) and Emergency and Security Management Studies (BESMS) program. Her research interest includes pedagogical approaches to curriculum and learning designs for different learning environments - face-to-face, online and blended.</p><p class="import-Normal">Previously, Florence was an instructional designer at Thompson Rivers University-Open Learning and British Columbia Open University. She spent 11 years as a faculty member at Bromley College of Further and Higher Education (Kent) and Greenwich Community College (Woolwich) in England UK.</p><p class="import-Normal">&nbsp;</p>
</div>
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>376</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:36]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:36]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[about-the-authors__trashed]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>288</wp:post_parent>
		<wp:menu_order>9</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_desired_post_slug]]></wp:meta_key>
		<wp:meta_value><![CDATA[about-the-authors]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 1: Introduction</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-1/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:06 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-1/</guid>
		<description></description>
		<content:encoded><![CDATA[
<div class="textbox shaded"><em>“A good investigator needs to be conscious of his or her-own thinking, and that thinking needs to be an intentional process.”</em></div>
It is too bad we can not just provide you with a basic template to follow every time you needed to conduct a criminal investigation; but it is not that simple. Criminal investigations can be imprecise undertakings, often performed in reaction to unpredictable and still-evolving events with incomplete information to guide the process. As such, it is impossible to teach or learn a precise methodology that can be applied in every case. Still, there are important concepts, legal rules, and processes that must be respected in every investigation. This book outlines these concepts, rules, and processes with the goal of providing practical tools to ensure successful investigative processes and investigative practices. Most importantly, this book informs you on how to approach the investigative process using “investigative thinking”. In this first chapter, we set the foundation for the book by calling attention to five important topics:
<ol>
 	<li>Criminal investigation as a thinking process</li>
 	<li>The need to think through the process</li>
 	<li>Towards modern-day investigation</li>
 	<li>The path to becoming an investigator</li>
 	<li>Understanding the investigative mind</li>
</ol>
<h2>Topic 1: Criminal Investigation as a Thinking Process</h2>
Criminal investigation is a multi-faceted, problem-solving challenge. Arriving at the scene of a crime, an officer is often required to rapidly make critical decisions, sometimes involving life and death, based on limited information in a dynamic environment of active and still evolving events. After a criminal event is over, the investigator is expected to preserve the crime scene, collect the evidence, and devise an investigative plan that will lead to the forming of reasonable grounds to identify and arrest the person or persons responsible for the crime. To meet these challenges, police investigators, through training and experience, learn investigative processes to develop investigative plans and prioritize responses.

In this book, these investigative responses, information analyses, and plan-making skills are broken out using illustrations of both tactical and strategic investigative thinking. The aim of the book is to guide you into the structured practices of tactical investigative response and strategic investigative thinking.

Criminal investigation is not just a set of task skills, it is equally a set of thinking skills. To become an effective investigator, these skills need to be consciously understood and developed to the point where they are deliberately engaged to work through the problem-solving process that is criminal investigation. Trained thinking and response can be difficult to adapt into our personal repertoires because we are all conditioned to be much less formal and less evidence driven in our everyday thinking. Still, as human beings, we are all born investigators of sorts. As Taber (2006) pointed out in his book, <em>Beyond Constructivism</em>, people constantly construct knowledge, and, in our daily lives, we function in a perpetual state of assessing the information that is presented to us. Interpreting the perceptions of what we see and what we hear&nbsp;allows us reach conclusions about the world around us&nbsp;(Taber, 2006). Some people are critically analytical and want to see evidence to confirm their beliefs, while others are prepared to accept information at face value until they are presented facts that disprove their previously held beliefs. Either strategy is generally acceptable for ordinary people in their everyday lives.
<h2>Topic 2: The Need to Think Through the Process</h2>
Diametrically opposing the analysis processes of everyday people, in the role of a police investigator, the process of discovering, interpreting, and determining the validity of information is different and this difference is critical. As an investigator, it is no longer sufficient to use the strategies that ordinary people use every day. Instead, it is incumbent on investigators to critically assess all the information they encounter because every investigation is an accountable process in which the investigator is not just making a determination about the validity and truth of the information for personal confirmation of a belief. Rather, the police investigator is responsible and empowered under the law to make determinations that could significantly affect the lives of those being investigated as well as the victims of crime.

The investigator’s interpretation of information and evidence commonly requires answers to many questions that can lead critical of decisions, actions, and outcomes, such as:
<ul>
 	<li>What must be done to protect the life and safety of persons?</li>
 	<li>Should force, up to and including deadly force, be used to resolve a situation?</li>
 	<li>Who will become the focus or subject of a criminal investigation?</li>
 	<li>What is the best plan to apprehend the person or persons responsible for a criminal act?</li>
 	<li>Will someone be subjected to a search of their person or of their home?</li>
 	<li>Will someone be subjected to detention or arrest and questioning for a criminal act?</li>
 	<li>Will someone have a criminal charge sworn against them?</li>
 	<li>Will someone be subjected to a criminal trial?</li>
 	<li>Will someone’s liberty as a free person be at risk?</li>
 	<li>Will justice be served?</li>
 	<li>Will the community be protected?</li>
</ul>
Significant to these possible outcomes, the investigator must always be ready to explain their thinking and actions to the court. For example, when an investigator is asked by a court, “How did you reach that conclusion to take your chosen course of action?”, an investigator must be able to articulate their thinking process and lay out the facts and evidence that were considered to reach their conclusions and form the reasonable grounds for their actions and their investigative decision-making process. For an investigator speaking to the court, this process needs to be clear and validated through the articulation of evidence-based thinking and legally justifiable action. Thinking must illustrate an evidence-based path to forming reasonable grounds for belief and subsequent action. Thinking must also demonstrate consideration of the statutory law and case law relevant to the matter being investigated.

Considering this accountability to outcomes, it is essential for police investigators to have both the task skills and the thinking skills to collect and analyze evidence at a level that will be acceptable to the criminal justice system. Investigation is the collection and analysis of evidence. To be acceptable to the court, it must be done in a structured way that abides by&nbsp;the legal rules and the appropriate processes of evidence collection. Additionally, it must be a process the investigator has documented and can recall and articulate in detail to demonstrate the validity of the investigation.

Obviously, it is not possible for someone to remain in a constant state of vigilance where they are always critically assessing, documenting, and determining the validity of every piece of information they encounter. However, when on duty, it is frequently necessary for a police investigator to do this. For a police investigator, this needs to be a conscious process of being mentally engaged and “switched on” to a more vigilant level of information collection, assessment, and validation while on duty. A police investigator must master this higher and more accountable level of analytical thinking for both tactical and strategic investigative response. The “switched on” police investigator must:
<ul>
 	<li>Respond appropriately to situations where they must protect the life and safety of persons</li>
 	<li>Gather the maximum available evidence and information from people and locations</li>
 	<li>Recognize the possible offence or offences being depicted by the fact pattern</li>
 	<li>Preserve and document all evidence and information</li>
 	<li>Critically analyze all available information and evidence</li>
 	<li>Develop an effective investigative plan</li>
 	<li>Strategically act by developing reasonable grounds to either identify and arrest those responsible for criminal acts, or to eliminate those who are wrongfully suspected</li>
</ul>
Most traditional police training provides new officers with many hours of instruction in the task skills of investigation. However, the learning of investigative thinking skills is expected to develop through field experience, learning from mistakes, and on the job mentoring. This learning does not always happen effectively, and the public expectations of the justice system are evolving in a model where there is little tolerance for a mistake-based learning.

The criminal investigation of serious crimes has always drawn a substantial level of interest, concern, and even apprehensive fascination from the public, the media, and the justice system. Police actions and investigations have been chronicled and dissected by commissions of inquiry and the media. &nbsp;From the crimes of the serial killers like Paul Bernardo (Campbell, 1996), and Robert Pickton (Oppal, 2013) to the historical wrongful convictions of David Milgaard (MacCallum, 2008) and Guy Paul Morin (Kaufman, 1998), true life crimes are scrutinized and the investigations of those crimes are examined and critically assessed.

When critiquing past investigations, the same types of questions are frequently asked:
<ul>
 	<li>Is it possible that the wrong person was arrested or convicted?</li>
 	<li>Is it possible that other persons were involved?</li>
 	<li>Were all the possible suspects properly eliminated?</li>
 	<li>Was information properly shared among police agencies?</li>
 	<li>Did the investigators miss something?</li>
 	<li>Was all the evidence found?</li>
 	<li>Was the evidence properly interpreted?</li>
 	<li>Were the investigative theories properly developed and followed to the correct conclusion?</li>
 	<li>Was tunnel vision happening and misdirecting the investigation?</li>
</ul>
Today, transparency throughout the criminal justice system and public disclosure of evidence through investigative media reports make it much easier for the public and the media to examine the investigative process. Public and media access to information about police investigative techniques and forensic tools has created an audience that is more familiar and sophisticated about police work. The ability of both social&nbsp;and traditional&nbsp;media to allow public debate has created a societal awareness where a higher standard for the investigation of serious crimes is now an expectation.

One only needs to look at the historical and contemporary judicial reviews and public inquiries to appreciate that there is an expectation for police investigators and police organizations to maintain and demonstrate a high level of competency. In a judicial review, it is often too late if an investigator discovers that they have pursued the wrong theory or they have failed to analyze a piece of critical information or evidence. These situations can be career-altering&nbsp;or even career-ending. A good investigator needs to be conscious of his or her-own thinking, and that thinking needs to be an intentional process.
<h2>Topic 3: Towards Modern-Day Investigation</h2>
Today, criminal investigation is a broad term encompassing a wide range of specialities that aim to determine how events occurred, and to establish an evidence-based fact pattern to prove the guilt or innocence of an accused person in a criminal event. In some cases, where a person is found committing the criminal act and apprehended at the scene, the criminal investigation is not a complex undertaking. However, in cases where the criminal event is discovered after the fact, or when the culprit is not readily apparent, the process of criminal investigation becomes more complex and protracted.

Although in both cases the criminal investigator must follow practices of identifying, collecting, recording, and preserving evidence; in the case of the unknown suspect, additional thinking skills of analysis, theory development, and validation of facts must be put to work.

The craft of criminal investigation has been evolving since the birth of modern policing in the mid-1700s when the Chief Magistrate of Bow Street, Henry Fielding, organized a group of volunteer plainclothes citizens and tasked them to attend the scenes of criminal events and investigate crimes. This group became known as the Bow Street Runners. Their existence speaks to an early recognition that attending a crime scene to gather information was a timely and effective strategy to discover the truth of what happened (Hitchcock, 2015).

From these early investigators, one of the first significant cases using forensic evidence-based investigation was recorded. To summarize the account by McCrery (2013) in his book <em>Silent Witness</em>; in one notable recorded case in 1784, the Bow Street Runners removed a torn piece of paper wadding from a bullet wound in the head of a murder victim who had been shot at point-blank range. In this early era of firearms, flintlock muskets and pistols required muzzle loading. To muzzle load a weapon, gunpowder would be poured down the barrel of the weapon, and then a piece of “wadding paper” would be tamped into place on top of the gunpowder using a long metal rod. The wadding paper used in this loading process was merely a piece of thick dry paper, usually torn from a larger sheet of paper kept by the shooter to reload again for the next shot. The musket ball bullet would be pushed down the barrel on top of the wadding paper. When the gun was fired, the wadding paper would be expelled by the exploding gunpowder, thus pushing the lead ball-bullet out of the barrel as a deadly projectile. This loading process required the shooter to be in possession of dry gunpowder, wadding paper, and musket balls to reload and make the weapon ready to fire. The Bow Street Runners considered this weapon loading practice and knew their shooter might be in possession of wadding paper. Upon searching their prime suspect, they did find him in possession of that kind of paper and, in a clever forensic innovation for their time, they physically matched the torn edges of wadding paper found in the victim’s wound to a larger sheet of wadding paper found in the pocket of their suspect. From this evidence, the accused was convicted of murder (McCrery, 2013).

This use of forensic physical matching is an example of circumstantial forensic evidence being used to link a suspect to an offence. This type of early forensic evidence also illustrates the beginnings of what exists today as a broad variety of forensic sciences to aid investigators in the development of evidence. This is also the beginning of forensic evidence being recognized as an investigative tool. In 1892, not long after the Bow Street Runners investigation, Sir Francis Galton published his book on the study of fingerprints. In 1900, Galton’s work was used by Sir William Henry who developed and implemented the Henry System of fingerprint classification, which is the basis of the fingerprint classifications system still in use today (Henry, 1900).

Only a few years earlier, in 1886, the use of photography for the first Rogues Gallery of criminal photographs was implemented by the New York City Police Department. This first Rogues Gallery was an organized collection of photographs of known criminals taken at the time of their most recent conviction for a crime (Byrnes, 2015). Prior to this organized collection of criminal photos, facial characteristics on wanted posters had been limited to sketch artists' renderings. With the advances evolving in photography, having the ability to preserve an actual picture of the suspect’s face amounted to a significant leap forward. With this innovation of photography, the use of mugshots and photographic identification of suspects through facial recognition began to evolve.

These early forensic innovations in the evolution of criminal investigation (such as physical matching, fingerprint identification, and facial recognition systems) demonstrate a need for investigators to develop the knowledge and skills to locate and utilize physical evidence that enables circumstantial links between people, places, and events to prove the facts of criminal cases. Physical evidence is the buried treasure for criminal investigators. Physical evidence can be collected, preserved, analyzed, and used in court to establish a fact. Physical evidence can be used to connect an accused to their victim or used at a crime scene to establish guilt or innocence. Forensic evidence may prove a point in fact that confirms or contradicts the alibi of an accused, or one that corroborates or contradicts the testimony of a witness.

Another significant development in forensic evidence from the 1800s started with the work of French criminal investigator Alphonse Bertillon who developed the Bertillon system of recording measurements of physical evidence (Petherick, 2010). One of Bertillon's students, Dr. Edmond Locard, a medical doctor during the First World War, went on to further Bertillon's work with his own theory that a person always leaves some trace of themselves at a crime scene and always takes some trace of the crime scene with them when they leave. This theory became known as “Locard's Exchange Theory” (Petherick, 2010). To this day, Locard’s theory forms the foundational concepts of evidence transfer theory.

Today, the ability of forensic experts to identify suspects and to examine physical evidence has increased exponentially when compared to early policing. Scientific discoveries in a wide range of disciplines have contributed to the development and evolution of forensic specialities in physical matching, chemical analysis, fingerprints, barefoot morphology, odontology, toxicology, ballistics, hair and fibre, biometric analysis, entomology, and, most recently, DNA analysis.

Many of these forensic science specialties require years of training and practice by the practitioner to develop the necessary level of expertise whereby the courts will accept the evidence of comparisons and subsequent expert conclusions. Obviously, it is not possible for a modern-day investigator to become a proficient practitioner in all of these specialties. However, the modern-day investigator must strive to be a forensic resource generalist with an understanding of the tools available and must be specialist in the deployment of those tools to build the forensic case.

In a criminal investigation, there is often a multitude competing possibilities guiding the theory development of how a criminal incident occurred with circumstantial links pointing to who committed the crime. Competing theories and possibilities need to be examined and evaluated against the existing facts and physical evidence. Ultimately, only strong circumstantial evidence in the form of physical exhibits, testimony from credible witnesses, or a confession from the accused may satisfy the court beyond a reasonable doubt. Critically, the quality of an investigation and the competency of the investigators will be demonstrated through the manner in which that evidence was located, preserved, analyzed, interpreted, and presented.

In the past, police officers generally took their primary roles as first responders and keepers of the peace. Criminal investigation was only a limited component of those duties. Now, given the accessibility to a wide range of effective forensic tools, any police officer, regardless of their assignment, could find themselves presented with a scenario that requires some degree of investigative skill. The expectation of police investigators is that they be well-trained with the knowledge and skills to respond and investigate crime. These skills will include:
<ul>
 	<li>Critical Incident Response</li>
 	<li>Interpretation of criminal law and offence recognition</li>
 	<li>Crime scene management</li>
 	<li>Evidence identification and preservation</li>
 	<li>Engaging forensic tools for evidence analysis</li>
 	<li>Witness assessment and interviewing</li>
 	<li>Suspect questioning and interrogation</li>
 	<li>Case preparation and documentation</li>
 	<li>Evidence presentation in court</li>
</ul>
In addition to these task skills of process and practice, investigators must also have strategic analytical thinking skills for risk assessment and effective incident response. They must have the ability to apply deductive, inductive, and quantitative reasoning to examine evidence and form reasonable grounds to identify and arrest suspects.

Engaging these higher-level thinking skills is the measure of expertise and professionalism for investigators. As our current justice system continues to change and evolve, it relies more and more on information technology and forensic science. With this evolution, the need for investigators to demonstrate higher levels of expertise will continue to grow.
<h2>Topic 4: The Path to Becoming an Investigator</h2>
For many people, their idea of what an investigator does is based on what they see, hear, and read in the media, movies, TV, and books. These depictions characterize personas ranging from dysfunctional violent rebels fighting for justice by their own rules, to by-the-book forensic investigators who get the job done clinically using advanced science and technology. The truth is,&nbsp;good investigation and real-life investigators are unlikely to make a captivating fictional script. Professional investigators and competent investigation is about the tedious processes of fact-finding and sorting through evidence and information. It is about eliminating possibilities, validating events, and recording evidence, all the while engaging in an intentional process of thinking, analyzing, and strategically working towards predetermined goals; not to mention extensive note taking and report writing.

Sometimes, new police investigators are, at first, deluded by fictional representations, only to find out, by experience, that the real job, although having moments of action, satisfaction, and excitement, is more about hard work and deliberate attention to detail.

Another common misnomer about the job is the conception that investigation is the exclusive domain of a police officer. Although this may have been true in the earlier evolution of the investigative craft, it has become much less the case today. This change is a result of the enactment of many regulatory compliance statutes that require investigative knowledge, skills, and thinking. Compliance investigators maintain adherence to regulated activities which often involve legal compliance for industries where non-compliance can pose significant risks that threaten the lives and safety of people or the environment. These regulated activities are often responsibilities of the highest order. What starts as a regulatory violation can escalate into criminal conduct. The investigative skills of compliance investigators and inspectors must be capable of meeting the same tests of competency as the police.

Not just anyone can become an investigator. There are certain personal traits that tend to be found in good investigators. Among these traits are:
<ul>
 	<li>Being passionate about following the facts to discover the truth, with a goal of contributing to the process of justice</li>
 	<li>Being detail-oriented and observant of the facts and the timelines of events</li>
 	<li>Being a flexible thinker, avoiding tunnel vision, and being capable of concurrently examining alternate theories while objectively using evidence as the measure to confirm or disconfirm validity of theories</li>
 	<li>Being patient and capable of maintaining a long-term commitment to reaching a conclusion</li>
 	<li>Being tenacious and not allowing setbacks and false leads to deter continued efforts</li>
 	<li>Being knowledgeable and skilled at the tasks, process, and procedure while respecting legal authorities and the limitations to take action</li>
 	<li>Being self-aware of bias and intuitive responses, and seeking evidence to support gut-feelings</li>
 	<li>Being trained in the processes of critical thinking that provide reliable analysis of evidence that can later be described and articulated in reports and court testimony</li>
</ul>
Considering this list of traits, we can appreciate that good investigators are people with particular attitudes, aptitudes, and intentional thinking processes. These traits&nbsp;all form part of the investigative mindset. Although you cannot teach someone to be passionate about discovering the truth, anyone who has these&nbsp;traits can work towards developing and refining their other traits and skills to become an investigator. Developing the mindset is a learning journey, and the first step of this journey is to become intentionally aware of and engaged in your own thinking processes.

Toward this point, the investigator must always be mindful of the proposition of Shah and Oppenheimer (2008) in their book <em>Heuristics Made Easy - An Effort Reduction Framework</em>. Shah and Opprenheimer remind us that people have learned to become quick thinkers using mental short cuts, known as heuristics, in an effort to make decisions quickly and problem solve the challenges we encounter. They offer the proposition that heuristics reduce work in decision-making by giving the user the ability to scrutinize a few signals and/or alternative choices in decision-making, thus diminishing the work of retrieving and storing information in memory. This streamlines the decision-making process by reducing the amount of integrated information necessary in making the choice or passing judgment (Shah, 2008).

In this book, we will point out that these heuristic shortcuts are often instinctive or intuitive reactions, as opposed to well-reasoned, evidence-based responses. Although they may serve us well in our everyday thinking, they must be monitored and recognized for their short-falls when we are required to investigate matters where the outcomes are critical.

To achieve the investigative mindset and be an objective investigator, it is important to be aware of the heuristic shortcuts and other negative investigative tendencies that can become obstacles to successful outcomes. For example, a good investigator needs to be focussed on the objective of solving the case and making an arrest in a timely manner, but becoming too focussed can lead to “tunnel vision”, which is the single-minded focus on a favorite suspect or theory to the extent that other suspects or alternate theories are ignored. Moreover, a good investigator needs to take responsibility and be accountable for the outcomes of the investigation; however, taken to the extreme, this can lead to an investigator taking complete ownership of the investigation to the exclusion of allowing the ideas of others to provide guidance and influence. Finally, a good investigator needs to be careful about how much information is shared with others. However, excessive secrecy can inhibit information sharing with those who might contribute to the successful conclusion of the case.

Thinking as an objective investigator, it is often necessary to consider and evaluate several competing theories or possibilities of how a crime was committed and who the suspect may be. Often, new investigators, or those uninitiated to the objective mindset, will focus on a favorite theory of events or a favorite suspect, and rush to be first to reach the conclusion and to make the arrest. There is a trap in shortcuts and the focused rush to make a fast arrest. In this trap, other viable suspects and theories are too quickly ignored or discarded. This sometimes leads to investigations being derailed by “tunnel vision”. Worse yet, tunnel vision can lead to the misinterpretation of evidence, ultimately leading to charges against an innocent person, while the guilty remain undiscovered.

To summarize the observations made by Kim Rossmo (2009) in his book on criminal investigative failures, tunnel vision and lost objectivity have been part of the findings in many public inquiries. Commissioners at public inquiries have concluded that, at times, investigators relentlessly pursue a favourite suspect. Sometimes an alternate suspect should have been apparent, or exculpatory evidence was present that should have caused the investigators to stop and re-evaluate their favorite suspect, but tunnel vision had set in and the objective investigative mindset had been lost (Rossmo, 2009).

Similarly and not totally unrelated to tunnel vision, other negative thinking responses also come into play, and can be observed in the behaviors of case ownership and excessive secrecy. It may seem that an investigator taking ownership for his or her investigation, and maintaining some degree of secrecy in the management of case related information, is completely acceptable and perhaps even desirable. However, as happens with any human behavior, it can negatively influence the outcome of investigations. Information appropriately shared with the right people can often reveal connections that contribute to the evidence of a case, and investigators must remain open to this appropriate sharing. Many negative examples can be found where a police investigator, or even an investigative team, adopted the attitude that the conduct of an investigation is their own exclusive domain (Campbell, 1996). With that exclusive ownership, no one else is entitled or allowed to participate, and relevant information that needs to be shared with others can be jealously guarded. Opportunities are missed for other investigators to see details that could connect a similar fact pattern or make the connection to a viable suspect.
<h2>Topic 5: Understanding the Investigative Mindset</h2>
When we talk about the investigative mindset, in part, we are talking about the self-awareness and the organizational-awareness to avoid negative outcomes. Once learned and practiced, this awareness can be a safety net against destructive investigative practices (i.e. tunnel vision, case ownership, and excessive secrecy). Criminal investigation can require complex thinking where the investigator must assess and determine the validity of information and evidence to guide the investigative process. This thinking strives to move from a position of mere suspicion to one of reasonable grounds for belief to make an arrest and ultimately articulate evidence upon which the court can make a finding of guilt beyond a reasonable doubt. This is a conscious process of gathering and recording information, and thinking analytically to form reasonable grounds for belief supporting defendable actions of arrest and charges. From this conscious process, the investigator in court can articulate a mental map to describe how they derived their conclusions.

As we proceed towards learning the investigative thinking process, keep in mind that:
<ul>
 	<li>Investigative thinking is disciplined thinking, and investigators must be consciously aware of and consciously in control of their own thinking</li>
 	<li>This is a process of being intentionally engaged at a high level of analytical thinking</li>
 	<li>This thinking process is strategically focussed, prioritizing investigative plans and actions to achieve outcomes</li>
 	<li>Developing a mental map, the investigator deliberately selects a path of the investigation will follow. He or she travels that path with the knowledge that the outcomes of the investigation will only be accepted by the court if the rationale for the path taken can be recalled accurately and articulated in detail</li>
</ul>
<h2><strong>Summary</strong></h2>
In this chapter, we have identified the investigative thinking processes as being distinctly different from the thinking processes used by most people in their everyday lives. The critical responsibilities that exist for police investigators in conducting their duties demand that investigators learn to think and respond in a structured and accountable manner. To this end, we have illustrated some of the common negative thinking processes that investigators must avoid, and we have looked at the traits and values that need to be pursued to become a criminal investigator. We have described structured and accountable thinking as the means to achieve an investigative mindset. You will find that investigative thinking and the investigative mindset are a theme throughout this book.
<div class="textbox exercises">
<h3 itemprop="educationalUse">Study Questions</h3>
<ol>
 	<li>Provide two reasons why it is very important for a police investigator to routinely critically assess all of the information they encounter.</li>
 	<li>Provide two reasons why evidence gathered as part of an investigation must be collected in a structured way.</li>
 	<li>What do we mean when we say that an investigator must be “switched on”?</li>
 	<li>In a single sentence, summarize “Locard’s Exchange Theory”<span>(Petherick, 2010)</span>.</li>
 	<li>List seven characteristics commonly found in good investigators.</li>
 	<li>What are the skills a modern-day officer must achieve to respond to events and investigate crimes?</li>
 	<li>What is the first step in developing an investigative mindset?</li>
 	<li>What is the level of forensic knowledge that a modern-day investigator must achieve to become an effective investigator?</li>
 	<li>Why must police investigators be mindful of the heuristic shortcuts discussed by Shaw and Oppenheimer (2008)?</li>
 	<li>In addition to heuristic shortcuts, what are the other three negative investigative tendencies that can become obstacles to successful investigative outcomes?</li>
 	<li>Why must investigators be mindful of excessive secrecy?</li>
</ol>
</div>
&nbsp;
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>396</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:06]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:06]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-1]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>395</wp:post_parent>
		<wp:menu_order>1</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
										<category domain="chapter-type" nicename="standard"><![CDATA[Standard]]></category>
						<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 1: Introduction]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Authors</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/authors/</link>
		<pubDate>Mon, 24 Apr 2017 17:44:22 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/authors/</guid>
		<description></description>
		<content:encoded><![CDATA[<!-- Here be dragons.-->]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>8</wp:post_id>
		<wp:post_date><![CDATA[2017-04-24 13:44:22]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-04-24 17:44:22]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[authors]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[page]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														</item>
					<item>
		<title>Cover</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/</link>
		<pubDate>Mon, 24 Apr 2017 17:44:22 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/cover/</guid>
		<description></description>
		<content:encoded><![CDATA[<!-- Here be dragons.-->]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>9</wp:post_id>
		<wp:post_date><![CDATA[2017-04-24 13:44:22]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-04-24 17:44:22]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[cover]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[page]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														</item>
					<item>
		<title>Table of Contents</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/table-of-contents/</link>
		<pubDate>Mon, 24 Apr 2017 17:44:22 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/table-of-contents/</guid>
		<description></description>
		<content:encoded><![CDATA[<!-- Here be dragons.-->]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>10</wp:post_id>
		<wp:post_date><![CDATA[2017-04-24 13:44:22]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-04-24 17:44:22]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[table-of-contents]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[page]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														</item>
					<item>
		<title>Book Information</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/?metadata=book-information</link>
		<pubDate>Mon, 24 Apr 2017 17:44:23 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?metadata=book-information</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>17</wp:post_id>
		<wp:post_date><![CDATA[2017-04-24 13:44:23]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-04-24 17:44:23]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[book-information]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>1</wp:menu_order>
		<wp:post_type><![CDATA[metadata]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
										<category domain="license" nicename="cc-by-nc"><![CDATA[CC BY-NC (Attribution NonCommercial)]]></category>
		<category domain="contributor" nicename="darryl-plecas"><![CDATA[Darryl Plecas]]></category>
		<category domain="contributor" nicename="rod-gehl"><![CDATA[Rod Gehl]]></category>
						<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[103]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Introduction to Criminal Investigation: Processes, Practices and Thinking]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_language]]></wp:meta_key>
		<wp:meta_value><![CDATA[en-ca]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_cover_image]]></wp:meta_key>
		<wp:meta_value><![CDATA[https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2017/08/cover.jpg]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_copyright_year]]></wp:meta_key>
		<wp:meta_value><![CDATA[2017]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_book_license]]></wp:meta_key>
		<wp:meta_value><![CDATA[cc-by-nc]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Introduction to Criminal Investigation]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_about_50]]></wp:meta_key>
		<wp:meta_value><![CDATA[Introduction to Criminal Investigation, Processes, Practices, and Thinking, as the title suggests, is a teaching text describing and segmenting criminal investigations into its component parts to illustrate the craft of criminal investigation.  Delineating criminal investigation within the components of task-skills and thinking-skills, this book describes task-skills such incident response, crime scene management, evidence management, witness management, and forensic analysis, as essential foundations supporting the critical thinking-skills of offence validation and theory development for the creation of effective investigative plans aimed at forming reasonable grounds for belief.   The goal of the text is to assist the reader in forming their own structured mental map of investigative thinking practices.]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_publisher]]></wp:meta_key>
		<wp:meta_value><![CDATA[Justice Institute of British Columbia]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_publisher_city]]></wp:meta_key>
		<wp:meta_value><![CDATA[New Westminster, BC]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_publication_date]]></wp:meta_key>
		<wp:meta_value><![CDATA[1501545600]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_onsale_date]]></wp:meta_key>
		<wp:meta_value><![CDATA[1501545600]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_audience]]></wp:meta_key>
		<wp:meta_value><![CDATA[adult]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_custom_copyright]]></wp:meta_key>
		<wp:meta_value><![CDATA[<em>Introduction to Criminal Investigation: Processes, Practices and Thinking</em> by Rod Gehl and Darryl Plecas is, unless otherwise noted, released under a <a class="external-link" href="https://creativecommons.org/licenses/by-nc/4.0/" rel="nofollow">Creative Commons Attribution 4.0 International (CC BY-NC)</a> license. This means you are free to copy, retain (keep), reuse, redistribute, remix, and revise (adapt or modify) this textbook but not for commercial purposes.

Under this license, anyone who revises this textbook (in whole or in part), remixes portions of this textbook with other material, or redistributes a portion of this textbook, may do so without gaining the author’s permission providing they properly attribute the textbook or portions of the textbook to the author as follows:

<em>Introduction to Criminal Investigation: Processes, Practices and Thinking</em> by Rod Gehl and Darryl Plecas is used under a <a class="external-link" href="https://creativecommons.org/licenses/by-nc/4.0/" rel="nofollow">CC BY-NC 4.0 </a>International license.

Additionally, if you redistribute this textbook (in whole or in part) you must retain the below statement,

Download this book for free at <a class="external-link" href="http://open.bccampus.ca/" rel="nofollow"> </a><a class="external-link" href="https://pressbooks.bccampus.ca/criminalinvestigation/" target="_blank" rel="nofollow noopener">https://pressbooks.bccampus.ca/criminalinvestigation/</a>

as follows:
<ol>
 	<li>digital format: on every electronic page</li>
 	<li>print format: on at least one page near the front of the book</li>
</ol>
To cite this textbook using APA, for example, follow this format:

Gehl, Rod &amp; Plecas, Darryl. (2016). <em>Introduction to Criminal Investigation: Processes, Practices and Thinking</em>. New Westminster, BC: Justice Institute of British Columbia.

&nbsp;]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_copyright_holder]]></wp:meta_key>
		<wp:meta_value><![CDATA[Rod Gehl]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_authors]]></wp:meta_key>
		<wp:meta_value><![CDATA[rod-gehl]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_authors]]></wp:meta_key>
		<wp:meta_value><![CDATA[darryl-plecas]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_keywords_tags]]></wp:meta_key>
		<wp:meta_value><![CDATA[crime]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_bisac_subject]]></wp:meta_key>
		<wp:meta_value><![CDATA[SOC004000  SOCIAL SCIENCE / Criminology]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Acknowledgements</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/front-matter/acknowledgements/</link>
		<pubDate>Mon, 24 Apr 2017 18:17:30 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=front-matter&#038;p=19</guid>
		<description></description>
		<content:encoded><![CDATA[The authors wish to thank Dr. Gary Bass (LLD Honorary and Senior Research Fellow, Simon Fraser University and Retired RCMP Deputy Commissioner West), Inspector Steven McCartney (Program Director, BC Police Academy), Dr. Tim Croisdale (Associate Professor, California State University), Dr. Yvon Dandurand (School of Criminology and Criminal Justice, UFV,  and Fellow, International Centre for Criminal Law Reform and Criminal Justice Policy), Steven Gehl (Sergeant, RCMP Forensic Identification Section, Retired) Robert Gehl (Inspector, Victoria Police Department, Retired), Stuart K. Wyatt, (BA, MA, Asc Forensic Identification Officer, Retired), for their very helpful reviews of earlier drafts of the manuscript. They are also very grateful to Dr. Irwin Cohen (Senior University Research Chair (RCMP) and Director of the Centre for Public Safety and Criminal Justice Research, University of the Fraser Valley) for work in editing the manuscript. Finally, the authors wish to thank Dr. Tannis Morgan (Associate Director, Office of Applied Research and Graduate Studies, JIBC) for her guidance and facilitation of JIBC assistance in publication, Krista Lambert (Instructional Designer, JIBC, CTLI) for her assistance in graphics and manuscript formatting for this book, and to Stephanie Hipkin (JIBC graduate) for her collaboration in copyediting the final draft.]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>19</wp:post_id>
		<wp:post_date><![CDATA[2017-04-24 14:17:30]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-04-24 18:17:30]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[acknowledgements]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>2</wp:menu_order>
		<wp:post_type><![CDATA[front-matter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
										<category domain="front-matter-type" nicename="acknowledgements"><![CDATA[Acknowledgements]]></category>
						<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[120]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_export]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_candela_citation]]></wp:meta_key>
		<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Foreword</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/front-matter/foreword/</link>
		<pubDate>Fri, 30 Jun 2017 21:09:45 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=front-matter&#038;p=124</guid>
		<description></description>
		<content:encoded><![CDATA[I am honoured to have been asked to write the foreword for this important book, written by an accomplished police officer in collaboration with a prominent Canadian criminologist.

Rod Gehl began his career with the Royal Canadian Mounted Police, and went on to have a highly successful career retiring as an Inspector with the Abbotsford Police Department, one of the most respected departments in Canada.   Since retirement Rod has continued to use his investigative expertise providing advice to government and teaching at the Justice Institute of British Columbia.

Now, coming together with Dr. Darryl Plecas, University of the Fraser Valley Professor Emeritus and former RCMP Research Chair, Rod has completed this book which speaks to the operational application of the criminal investigation, processes, practices, and thinking.

Having known Rod professionally for over 22 years, he has my respect and that of our colleagues for his capacity in mastering the investigative processes as well as for his policing leadership. The breadth of his expertise in Major Case Management uniquely qualifies him to have written this book. This introduction to criminal investigation fills a void in the literature and will benefit police officers starting their careers in virtually all aspects of what is important to learn to be effective in policing, It not only speaks to the investigative processes but also the day to day work that policing involves.

More importantly, the underlying theories, processes, practices and thinking skills remain relevant throughout the career of a police officer and therefore this book will be of value to both new recruits and seasoned police officers.

The underlying themes of integrity, diligence, investigative thinking, tenacity, respect, and striving to do the best that one can do at all times, are just as important at the end of a policing career as they are at the beginning. I therefore see this book as having an enduring value to police officers at all levels and stages of their careers, and I am pleased to fully endorse it as such.

&nbsp;

Gary D. Bass (Rtd.)
Deputy Commissioner Canada West
Royal Canadian Mount Police]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>124</wp:post_id>
		<wp:post_date><![CDATA[2017-06-30 17:09:45]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-06-30 21:09:45]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[foreword]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>3</wp:menu_order>
		<wp:post_type><![CDATA[front-matter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
										<category domain="front-matter-type" nicename="foreword"><![CDATA[Foreword]]></category>
						<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[727]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_export]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_candela_citation]]></wp:meta_key>
		<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[_wp_old_slug]]></wp:meta_key>
		<wp:meta_value><![CDATA[foreward]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Accessibility Statement</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/front-matter/accessibility-statement/</link>
		<pubDate>Thu, 01 Aug 2019 17:11:54 +0000</pubDate>
		<dc:creator><![CDATA[kqzheng]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=front-matter&#038;p=228</guid>
		<description></description>
		<content:encoded><![CDATA[BCcampus Open Education believes that education must be available to everyone; this means supporting the creation of free, open, and accessible educational resources. We are actively committed to increasing the accessibility and usability of the textbooks we produce.
<h1>Accessibility features of the web version of this resource</h1>
The <a href="https://pressbooks.bccampus.ca/criminalinvestigation/">web version of the <em>Introduction to Criminal Investigation: Processes, Practices and Thinking</em></a> includes the following features:
<ul>
 	<li>It as been optimized for people who use screen-reader technology:
<ul>
 	<li>all content can be navigated using a keyboard</li>
 	<li>links, headings, tables use proper markup</li>
 	<li>all images have text descriptions</li>
</ul>
</li>
 	<li>It includes an option to increase font size. (See tab on top right of screen titled, “Increase Font Size.”)</li>
</ul>
<h1>Other file formats available</h1>
In addition to the web version, this book is available in a number of file formats including PDF, EPUB (for eReaders), MOBI (for Kindles), and various editable files. Here is a link to where you can <a href="https://pressbooks.bccampus.ca/criminalinvestigation/">download this book in another file format</a>. Look for the Download this book drop-down menu to select the file type you want.

If you are using a print copy of this textbook, you can find the web addresses for all websites mentioned in this book in the back matter.
<h1>Known accessibility issues and areas for improvement</h1>
There are no known accessibility issues at this time.
<h1>Let us know if you are having problems accessing this book</h1>
If any of the above accessibility issues are stopping you from accessing the information in this textbook, please contact us to let us know and we will get it fixed. If you discover any other issues, please let us know of those as well.

Please include the following information:
<ul>
 	<li>The location of the problem by providing a web address or page description</li>
 	<li>A description of the problem</li>
 	<li>The computer, software, browser, and any assistive technology you are using that can help us diagnose and solve your issue
e.g., Windows 10, Google Chrome (Version 65.0.3325.181), NVDA screen reader</li>
</ul>
You can contact us through the following form: <a href="https://open.bccampus.ca/reporting-an-open-textbook-error/">Report an Open Textbook Error</a>
<h1>Help us improve the accessibility of our resources</h1>
Are you interested in helping us make more of our textbooks accessible? If you have Pressbooks experience, a basic knowledge of web accessibility guidelines, and some time your are willing to volunteer, we would love some help as we have a number of textbooks that need remediation work. <a href="https://open.bccampus.ca/contact-us/">Contact us</a>.

<strong>This statement was last updated on August 1, 2019.
</strong>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>228</wp:post_id>
		<wp:post_date><![CDATA[2019-08-01 13:11:54]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2019-08-01 17:11:54]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[accessibility-statement]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>1</wp:menu_order>
		<wp:post_type><![CDATA[front-matter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[727]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Introduction</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/front-matter/introduction/</link>
		<pubDate>Fri, 21 Aug 2020 16:24:07 +0000</pubDate>
		<dc:creator><![CDATA[ctli]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/front-matter/introduction/</guid>
		<description></description>
		<content:encoded><![CDATA[
People have been undertaking projects since the earliest days of organized human activity. The hunting parties of our prehistoric ancestors were projects. Large complex projects such as the pyramids and the Great Wall of China were&nbsp;also projects. Even something as simple as creating a dinner is considered a project. We use the term “project” frequently in our daily conversations. This book covers the basics of project management. This includes the process of initiation, planning, execution, control, and closeout that all projects share.
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>287</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 12:24:07]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 16:24:07]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[introduction]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>5</wp:menu_order>
		<wp:post_type><![CDATA[front-matter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 2: Some Important Basic Concepts</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-2-some-important-basic-concepts-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:06 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-2-some-important-basic-concepts-2/</guid>
		<description></description>
		<content:encoded><![CDATA[
<div class="textbox shaded"><em>“There are many legal rules, concepts, principles, doctrines, and protocols investigators must be attentive to as they work through an investigation, and each must be incorporated into their thinking process.”</em></div>
It would be impossible to properly appreciate the investigative process without first establishing an understanding of the real-life forum in which it occurs. That forum is the criminal justice system and in particular, the court system. The investigative process also exists within the statutory rules of law, including the Canadian <em>Charter of Rights and Freedoms</em>, and case law rulings adjudicated by the courts. Considering the existence of these conditions, obligations, and case law rules, there are many terms and concepts that an investigator needs to understand to function appropriately and effectively within the criminal justice system. The purpose of this chapter is to introduce some of the basic legal parameters and concepts of criminal justice within which the criminal investigation process takes place. These include:
<ol>
 	<li>Fundamental justice and the <em>Charter of Rights and Freedoms</em>
2. Roles of the judges, the prosecutors, the defence, and the police in the justice system
3. The burden of proof
4. Belief beyond a reasonable doubt
5. Reasonable grounds for belief
6. Proof within a balance of probabilities
7. The adversarial system
8. Statutory law
9. Common law (Case law)
10. <em>Actus Reus</em> and <em>Mens Rea</em>
11. <em>Prima facie case</em>, elements of the offence, and the information
12. Duty to investigate and use of discretion
13. Arrest and detention of a suspect</li>
</ol>
<h2>Topic 1: Fundamental Justice and the <em>Charter of Rights and Freedoms</em></h2>
Criminal justice systems exist to protect society using a broad range of laws and regulations designed to define, control, and prohibit unacceptable behaviour and conduct. The behaviour and conduct to be prohibited or controlled can range from criminal acts of terrorism and murder, to infractions of a minor nature, such as exceeding the speed limit or watering one’s lawn outside of permitted time periods. These laws and regulations can result in a variety of sentences, restrictions, and interventions to personal freedom or penalties against offenders. In Canada, penalties can range from life imprisonment with no parole eligibility for 25 years, to fines, probation, or a warning. As a core principle in the application of any of these laws, there are strong social values that reflect the expectations of citizens who live under the protection of the laws. Citizens expect and demand that the law be enforced and administered fairly and in a manner that respects their rights and freedoms as individuals. This expectation most particularly pertains to any person suspected of or charged with an offence.

These values and expectations of fairness have origins dating back to ancient Rome and of English common law, which eventually defined the principles of “natural justice”, now more commonly referred to in Canada as “fundamental justice” (Dostal, 2012h)<strong>.</strong>

At the core of these principles of “natural justice” or “fundamental justice”, some basic operational imperatives have been established to guide the outcomes of the justice system and ensure fundamental justice for persons charged for an offence. For example, one&nbsp;who alleges an offence to have taken place must prove it, the person accused of an offence has the right to see the evidence against them, the person accused has the right to answer to the charge and provide a defense, the trier of fact (i.e. most commonly a judge) must not be biased, and the trier of fact must base their decision upon evidence and must articulate the evidence considered when the decision is handed down. Further entrenching these principles of “fundamental justice”, the <em>Canadian Charter of Rights and Freedoms</em> Sections 7 -14 was enacted into law in 1982, replacing the existing<em> Canadian Bill of Rights </em>(Government of Canada, 2015).

Excerpt from <em>Charter of Rights and Freedoms</em><span>&nbsp;Sections 7-14, "Legal Rights":&nbsp;</span>
<blockquote>
<p style="padding-left: 30px">7. Everyone has the right to life, liberty and security of the person and the right not to be deprived thereof except in accordance with the principles of fundamental justice.</p>
<p style="padding-left: 30px">8. Everyone has the right to be secure against unreasonable search or seizure.</p>
<p style="padding-left: 30px">9. Everyone has the right not to be arbitrarily detained or imprisoned.</p>
<p style="padding-left: 30px">10. Everyone has the right on arrest or detention</p>
<p style="padding-left: 60px">(a)&nbsp;to be informed promptly of the reasons therefor;</p>
<p style="padding-left: 60px">(b)&nbsp;to retain and instruct counsel without delay and to be informed of that right; and</p>
<p style="padding-left: 60px">(c)&nbsp;to have the validity of the detention determined by way of&nbsp;habeas corpusand to be released if the detention is not lawful.</p>
<p style="padding-left: 30px">11. Any person charged with an offence has the right</p>
<p style="padding-left: 60px">(a)&nbsp;to be informed without unreasonable delay of the specific offence;</p>
<p style="padding-left: 60px">(b)&nbsp;to be tried within a reasonable time;</p>
<p style="padding-left: 60px">(c)&nbsp;not to be compelled to be a witness in proceedings against that person in respect of the offence;</p>
<p style="padding-left: 60px">(d)&nbsp;to be presumed innocent until proven guilty according to law in a fair and public hearing by an independent and impartial tribunal;</p>
<p style="padding-left: 60px">(e)&nbsp;not to be denied reasonable bail without just cause;</p>
<p style="padding-left: 60px">(f)&nbsp;except in the case of an offence under military law tried before a military tribunal, to the benefit of trial by jury where the maximum punishment for the offence is imprisonment for five years or a more severe punishment;</p>
<p style="padding-left: 60px">(g)&nbsp;not to be found guilty on account of any act or omission unless, at the time of the act or omission, it constituted an offence under Canadian or international law or was criminal according to the general principles of law recognized by the community of nations;</p>
<p style="padding-left: 60px">(h)&nbsp;if finally acquitted of the offence, not to be tried for it again and, if finally found guilty and punished for the offence, not to be tried or punished for it again; and</p>
<p style="padding-left: 60px">(i)&nbsp;if found guilty of the offence and if the punishment for the offence has been varied between the time of commission and the time of sentencing, to the benefit of the lesser punishment.</p>
<p style="padding-left: 30px">12. Everyone has the right not to be subjected to any cruel and unusual treatment or &nbsp;punishment.</p>
<p style="padding-left: 30px">13. A witness who testifies in any proceedings has the right not to have any incriminating evidence so given used to incriminate that witness in any other proceedings, except in a prosecution for perjury or for the giving of contradictory evidence.</p>
<p style="padding-left: 30px">14. A party or witness in any proceeding who does not understand or speak the language in which the proceedings are conducted or who is deaf has the right to the assistance of an interpreter&nbsp;(Government of Canada, 2015).</p>
</blockquote>
As demonstrated by these eight explicit sections of the charter, any person accused of a crime has a significant level of protection from being presumed guilty or from being treated unfairly by the justice system because of an accusation.

In the criminal justice system, police investigators are very often the first point of contact and they hold a primary obligation to respect the rights and freedoms afforded by the <em>Canadian</em> <em>Charter of Rights and Freedoms</em>. The steps that must be taken by an investigator to ensure that the rights and freedoms are protected and the principles of fundamental justice are followed will be outlined in detail later in this book.
<h2>Topic 2:&nbsp;The Role of the Judge, the Prosecutor, the Defence, and the Police</h2>
As operational players within the criminal justice system, judges, crown prosecutors, defense lawyers, and police all contribute to the process of “natural justice” or “fundamental justice”. Each of these participants has specific and independent roles to play and duties to perform. For example, the role of the police investigator is to gather information, physical evidence, and witness evidence to form the reasonable ground that a particular suspect committed an offence. Once these reasonable grounds for belief have been formed, the evidence can be presented to the Crown Prosecutor to determine if a charge should be laid. The role of the crown prosecutor is to examine the evidence gathered by police investigators. If charges are laid, the crown prosecutor presents that evidence to a judge who will determine the guilt or innocence of the accused based upon the test of proof beyond a reasonable doubt. The role of the defence counsel is to represent the accused through examination of the evidence presented, testing the strength of the evidence presented, and challenging the reasonable grounds for belief. The defence’s goal is to demonstrate that the test of proof beyond a reasonable doubt has not been met.

Many are the occasions where police have identified and arrested the correct suspect, but the evidence collected in their investigation was rejected by the court because procedural rules were not properly applied. These kinds of cases, lost to errors in process or in misunderstanding of the rules, provide valuable lessons for the police investigator who failed; but sadly, they are a disappointing and a negative experience for the victim of the crime and the public who expect investigators to always get it right.
<h2>Topic 3: The Burden of Proof</h2>
For a police investigator, it is important to understand that matters under investigation can end up being presented in a criminal or civil court of law. Each of these court venues requires and applies a different burden of proof to the evidence presented. It is entirely possible that a police investigator will be called to present evidence of their investigation in either type of court. For instance, it is possible in cases, such as a motor vehicle crash, that the evidence collected by the police for a criminal court charge of Impaired Driving or Dangerous Driving could be used in a civil court trial where an injured victim sues the impaired driver for damages resulting from their injuries or the loss of their vehicle.

The criminal court is the one most commonly encountered by police investigators. These courts hear cases investigated under the Criminal Code and under Federal, Provincial, and Municipal Statues. Cases can cover offences ranging from personal and property offences to those covered under Municipal Statutes. For criminal courts, judges or judges and juries use the burden of proof described as “proof beyond a reasonable doubt” to determine if they will convict or acquit an accused person. Civil courts take responsibility for making decisions in relation to matters where one party is seeking a non-criminal judgement, damages, or a decision against another party. These can be cases related to personal injury cases, contractual disputes, divorce proceedings, and contested wills or estates. In these cases, the parties involved are referred to as the plaintiff and the defendant. The plaintiff is the party that initiates the civil court action, and the defendant is the party against whom the civil action is filed. In these civil actions, the burden of proof considered by the court is described as “proof within a balance of probabilities”. This is a much lesser test than proof beyond a reasonable doubt as the court seeks to determine, on the balance of probabilities, which side is most likely correct.
<h2>Topic 4: Proof Beyond a Reasonable Doubt</h2>
Proof beyond a reasonable doubt is the standard measure of proof that the criminal court will apply when determining if evidence presented by the prosecution is sufficient to convict the person charged with an offence. If the evidence is sufficient, and the burden of proof has been satisfied, the court may convict the accused. In these cases, the onus to prove all the elements of the charge rests completely with the prosecution. The accused person is not required to prove that they are innocent.

The Supreme Court of Canada has outlined the concept of proof beyond a reasonable doubt suggesting that it should be explained to juries as follows:
<blockquote>The standard of proof beyond a reasonable doubt is inextricably intertwined with that principle fundamental to all criminal trials, the presumption of innocence (<em>R v Lifchus</em>, 1997).
<ul>
 	<li>The burden of proof rests on the prosecution throughout the trial and never shifts to the accused.</li>
 	<li>A reasonable doubt is not a doubt based upon sympathy or prejudice, and instead, is based on reason and common sense.</li>
 	<li>Reasonable doubt is logically connected to the evidence or absence of evidence.</li>
 	<li>Proof beyond a reasonable doubt does not involve proof to an absolute certainty. It is not proof beyond any doubt, nor is it an imaginary or frivolous doubt.</li>
 	<li>More is required than proof that the accused is probably guilty. A jury which concludes only that the accused is probably guilty must acquit.</li>
</ul>
The Supreme Court of Canada emphasized in <em>R v Starr</em>, that an effective way to explain the concept is to tell the jury that proof beyond a reasonable doubt "falls much closer to absolute certainty than to proof on a balance of probabilities." It is not enough to believe that the accused is probably guilty, or likely guilty. Proof of probable guilt, or likely guilt, is not proof beyond a reasonable doubt (R v Starr, 2000).</blockquote>
It is important for investigators to understand that “proof beyond a reasonable doubt” is a different test from what they are required to meet when considering the value of evidence during their investigation. Later in this book, we will examine the importance of collecting, documenting, and properly preserving as much evidence as possible to assist the court reaching their belief beyond a reasonable doubt.
<h2>Topic 5: Reasonable Grounds to Believe</h2>
Reasonable grounds to believe, sometimes referred to as reasonable and probable grounds to believe, is the test a police investigator must apply when considering the evidence to exercise their powers during the investigation of an offence. Establishing reasonable grounds to believe that a person is responsible for an offence allows the investigator to exercise powers that are provided under the criminal code. These are the powers to arrest with or without a warrant, the power to search and seize evidence with or without a warrant, and the power to swear an information against a person once reasonable grounds to believe have been established.

Forming reasonable grounds for belief is a subjective thinking process. It is arguably the most important thinking processes an investigator will undertake. It is a thinking process based upon the consideration of information, evidence, and facts the investigator has collected during their investigation. These reasonable grounds for belief must be based upon the investigator’s assessment of the information and evidence available to them at the time the decision to act is made. Evidence of guilt discovered after an action (such as when an arrest or a search has taken place) cannot be used to retroactively justify that action of arrest or search. As such, when the court considers if the investigator was correct and justified in forming reasonable grounds to believe based upon the evidence available at the time of the action, the judge will think about the nature of the evidence the investigator has described in their testimony.

Justice Cory in<em> R v Storrey</em> (1990) provided a very common sense deliberation to be applied in determining if the investigator had reasonable grounds to believe:
<blockquote>The Criminal Code requires that an arresting officer must subjectively have reasonable and probable grounds on which to base the arrest. Those grounds must, in addition, be justifiable from an objective point of view. <em>That is to say, a reasonable person placed in the position of the officer must be able to conclude that there were indeed reasonable and probable grounds for the arrest</em><strong>.</strong> On the other hand, the police need not demonstrate anything more than reasonable and probable grounds. Specifically they are not required to establish a prima facie case for conviction before making the arrest. (<em>R v Storrey,</em> 1990)</blockquote>
Reasonable grounds to believe is a very important concept for an investigator to understand, and it must not be confused with the more onerous test of “proof beyond a reasonable doubt” (R v Starr, 2000), which is the test the court will use in weighing the evidence to determine if a conviction for the offence is justified. Confusing these two levels of belief is an error sometimes made by investigators, and it can cause an investigator to hesitate because they do not believe they have reached the adequate level of belief to take action.

It is fortunate that this lesser level of belief, reasonable grounds<strong><em>,</em></strong> is available for police investigators because it requires that police articulate only a subjective belief in the information and evidence available to them at the time of their investigation. It allows police investigators to form reasonable grounds of belief based on physical evidence they have seen, records they have reviewed, and hearsay information acquired from witnesses. In situations where time is of the essence to protect life and safety, protect evidence, or to bring a situation under control, it does not require the investigator to undertake any validation of the information they are relying on. The information may be taken at face-value.

Establishing reasonable grounds to believe and taking the action of making an arrest or conducting a search will not necessarily be the precursor to collecting enough evidence to lay charges. In some cases, an arrest is made because reasonable grounds existed and, after additional information and evidence are accessed, it becomes clear that the person is not guilty of the offence. Consequently, the process of laying a charge does not take place and the person is released. Remaining open to the outcome of determining innocence is truly a test of objectivity for investigators. This objectivity can sometimes be difficult to achieve when there is serious pressure to capture a dangerous offender. The mistake of being too quick to proceed with charges, or even discounting and ignoring evidence that indicates innocence, is a trap that has led many investigators to the end their careers under accusations of lost objectivity or even incompetence (Pennington, 1999).

When charges are laid, objectivity can become a key issue at the trial and the defence may demand that the investigator provide an accurate account of evidence that was considered or ignored in the thinking process to establish their reasonable grounds to believe. Forming reasonable grounds is a process that should be undertaken with careful consideration of the facts. Forming reasonable grounds requires a diligent intent to remember the facts, keeping in mind that an articulation of the subjective analysis used in forming reasonable grounds for belief may be required as testimony in a court.

This degree of self-awareness is a critical step in building the thinking skills to become a good investigator. &nbsp;With these thinking skills in mind, tools will be provided&nbsp;later in this book that can assist an investigator with the practice of thinking through investigations using a step-by-step process.
<h2>Topic 6: Proof Within a Balance of Probabilities</h2>
As mentioned above, the balance of probabilities is the civil court standard of proof that&nbsp;is less onerous than the criminal court standard of proof beyond a reasonable doubt. For something to be proven within a balance of probabilities means that it is more likely than not to have occurred. On a scale of equal balance, if the likelihood is more than 50% that something occurred, the test of being “within a balance of probabilities” has been met. In most cases, if the criminal test of proof beyond a reasonable doubt has been met, that same evidence presented at a civil trial is likely to meet the required threshold of being within a balance of probabilities (Allen, 1991). It is important for a criminal investigator to understand that, even though there may not be enough evidence to meet the requirement for a criminal charge or establish proof beyond a reasonable doubt, the evidence may still be successful in establishing civil liability within a balance of probabilities. The possibility of civil action makes it important for investigators to remain diligent in collecting and preserving evidence, even if they believe there will not be a criminal charge proceeding.
<h2>Topic 7: The Adversarial System</h2>
In the trial of a person charged with an offence in a criminal court proceeding, the judge will hear the evidence and arguments presented by both the prosecution and the defence. The prosecution and the defense exist in&nbsp;court in an adversarial relationship with the onus resting with the prosecution to prove the facts of the case beyond a reasonable doubt. The defence may challenge the evidence, question the testimony and the credibility of witnesses, and present alternate theories of events or evidence, where the accused person could be considered not responsible or sometimes less responsible for the alleged offence. The facts required to be proven will vary depending on the offence being alleged; however, the prosecutor’s task to achieve a conviction requires that every element of the charge is proved beyond a reasonable doubt.

As an investigator, you will often work in partnership with the prosecutor assembling evidence to be presented in court. However, once in court, the police are merely witnesses for the court and do not play active role in the prosecution of an accused. Police investigators are not adversaries to the defence or the accused and should not consider themselves as such. Very often in court, a police investigator will have their evidence aggressively challenged by the defence lawyer in a very adversarial manner, and it will certainly feel as if the investigator is being challenged as an adversary. It is sometimes even a defence strategy to provoke the police investigator into a confrontation where they take an adversarial stance against the defence of the accused. In these cases, it is important for an investigator to remember that their credibility as an objective investigator can be compromised by the demonstration of an adversarial attitude or demeanor in court. This is not to say that an investigator must be submissive to the defence — providing evidence in an objective, respectful, and balanced manner is the key.

To share some advice once provided to this writer by a seasoned senior investigator:
<blockquote>Your job ends on the court house&nbsp;steps. Do your investigation and take your evidence to court. Give your testimony and your job is done. Let the court make their decision and the case is done. If you allow yourself to take ownership of every decision the court makes, you will not last as an investigator. Let your job end on the court house steps,” (Fookes, 1973).</blockquote>
Police investigators are officers of the justice system, independent to the crown prosecutor’s office. Police investigate and collect the evidence, and the crown prosecutor presents the evidence collected by the police to the court. The crown prosecutor does not and should not direct or interfere with police investigations. In Canada, this concept of independent functions between the police and the prosecutor’s office is sometimes misunderstood. This misconception can sometimes happen due to our exposure to the American justice system where district attorneys, as prosecutors, do become very involved in directing the investigative processes in American jurisdictions.
<h2>Topic 8:&nbsp;Statutory Law</h2>
Statutory law is written law enacted by different levels of government. These written laws regulate the conduct of citizens. Laws are enacted with escalating levels of authority from the three levels of government in Canada. The most serious laws are the domain of the federal government, which takes responsibility for controlling criminal conduct under the <em>Criminal Code of Canada</em>, as well as criminal conduct ascribed to be of national concern under a broad spectrum of other federal statues, such as:
<ol>
 	<li>The <em>Criminal Code of Canada</em></li>
 	<li>The <em>Controlled Drug and Substances Act</em> for drugs offences</li>
 	<li>The <em>Fire Arms Act</em> for the control of firearms and restricted weapons</li>
 	<li>The <em>Canadian Environmental Protection Act </em>for&nbsp;environmental offences</li>
 	<li>The <em>Canada Revenue Agency Act</em> for Income tax offences</li>
 	<li>The <em>Canadian Customs and Border Services Act</em> for border security</li>
</ol>
Statues, such as the <em>Motor Vehicles Acts</em> or the <em>Liquor Control and Licencing Acts</em>, are enacted by the provincial governments, and these laws vary somewhat from province to province. Each province has discretion to independently regulate issues, such as speed-limits or minimum drinking age, reflecting the cultural tolerances and social norms of their jurisdiction. At the lowest level, municipal governments enact by-law statues exclusive to their local concerns, such as parking or littering laws.

The <em>Criminal Code of Canada</em> is the most important and instructive federal statute for investigators. It provides police investigators with their authorities to use force, make arrests, enter private property, search for and seize evidence, and to lay charges against offenders. The wording of the Criminal Code of Canada is very clear regarding the types of action and conduct that constitute criminal offences. The Criminal Code also is generally clear about the rules for when and how a police officer may use force, arrest a suspect, enter private property, search and seize evidence, and lay a criminal charge against a suspect. However, there remains&nbsp;a significant amount of subjective interpretation in the code that must be done in the mind of an investigator to effectively use the various stated authorities to enforce the law. This need to interpret statutory law exists because of case law decisions and the common law precedents that have been established from those case law decisions.
<h2>Topic 9:&nbsp;Common Law (Case Law)</h2>
Common law is law that is not written down as legislation or a statue&nbsp;and is based on rulings and&nbsp;precedents of past cases&nbsp;to guide judges in making later decisions in similar future cases. It cannot be found in any statute or body of legislation, but only in past decisions. It is flexible and adapts to changing circumstances.

Fulfilling the role of a police investigator requires an understanding of specific statutory authorities, along with the case law and common law definitions for utilizing those authorities. Statutory authorities provide powers for arrest and use of force, powers for entry to private property, and powers to search for and seize evidence. Case law and common law are procedural in nature. They help define limits within statutory authorities and dictate the way the law is administered by the court. By extension, case law and rules of evidence define the way police investigations should be conducted, the way suspects should be treated, and the processes for collecting evidence and preserving it for court. The ability of an investigator to properly interpret and follow these statutory laws, case laws, and rules of evidence, can play a large part in determining if the evidence from an investigation is accepted or rejected by the court.

Case law and common law exist because, over the years, the courts have continually found that applying statutory law cannot happen without interpretation and consideration of exceptions. Critical points of subjective analysis, deciding issues of fairness to the accused, and balancing the need to protect society from criminal conduct have caused the courts to interpret how the law should be applied. These interpretations, when accepted by the judicial system, become precedents and sometimes even doctrines of law. Many of them directly comment on the matters an investigator should consider when making specific decisions to take action. With these stated matters of case law in mind, investigators are called upon to subjectively interpret the circumstances, evidence, and information relating to an event, and to determine if the specific facts and circumstances will meet the tests that allow action to be taken.

Many of an investigator’s interpretations and subsequent actions can be critical to the court accepting the evidence collected when the case goes to court, such as:
<ul>
 	<li>Using physical force, up to and including deadly force</li>
 	<li>Forming reasonable grounds to detain or arrest suspect</li>
 	<li>Entering private property with or without a warrant</li>
 	<li>Using the rules of exigent circumstances to protect life and safety of person or evidence</li>
 	<li>Using discretion to take actions, other than charges, when an offence has been committed</li>
</ul>
In addition to these case law decisions, common law also provides several doctrines of law that define consistent rulings of the courts when making assessments of the evidence being presented in relation to some specific common issues. A doctrine is established through repeated application of the same legal precedents, and there is an expectation that the lower courts will respect the application of these legal precedents in stated cases of the higher courts. Knowing these doctrines, and considering how the court might apply them to the evidence being presented, assists investigators on the proper ways to collect evidence that will best inform the court.
<h3>The Common Law Doctrine of Necessity</h3>
Under criminal law, the defense of necessity can be invoked by the defence in cases where the accused seeks to provide a rationale that committing the offence was the unavoidable result of some serious circumstance beyond his or her control. In considering this defence, the court will apply a very strict standard in order to meet the conditions prescribed in the common law doctrine of necessity (Gecker, 1989). It is important for an investigator to know the criterion that the court will apply, in-as-much as it will allow the investigator to seek out evidence that either supports or negates the necessity defense. The leading case in Canada for such a defence is <em>R v Perka</em> where Justice Dickson described the rationale for the defence as a recognition that:
<blockquote>A liberal and humane criminal law cannot hold people to the strict obedience of laws in emergency situations where normal human instincts, whether of self-preservation or of altruism, overwhelmingly impel disobedience.

However, it must be "strictly controlled and scrupulously limited." and <em>[sic]</em> can only be applied in the strictest of situations where true "involuntariness" is found. Three elements are required for a successful defence:
<ol>
 	<li>the accused must be in&nbsp;imminent peril&nbsp;or danger</li>
 	<li>the accused must have had no reasonable legal alternative to the course of action he or she undertook</li>
 	<li>the harm inflicted by the accused must be proportional to the harm avoided by the accused</li>
</ol>
The peril or danger must be more than just foreseeable or likely. It must be near and unavoidable.

At a minimum the situation must be so emergent and the peril must be so pressing that normal human instincts cry out for action and make a counsel of patience unreasonable.

With regard to the second element, if there was a reasonable legal alternative to breaking the law, then there can be no finding of necessity. Regarding the third element requiring proportionality, the harm avoided must be at least comparable to the harm inflicted (R v Perka, 1984).</blockquote>
Clearly, the standard for the defense of necessity sometimes requires the interpretation of complex issues. This interpretation determines if the circumstances and evidence fall within the ascribed definitions to be considered necessity. This interpretation is the job of the court assessing the evidence to reach their belief beyond a reasonable doubt.

If an investigator has discovered sufficient evidence and has reasonable grounds to believe an offence has been committed, there are sufficient grounds to lay the charge. In serious cases, where harm to persons, or significant property damage has occurred, police investigators do not have the discretion to consider if an accused person should be afforded the defence of necessity due to the complexity of the issues. In lesser cases, for instance where a police officer stops a car for speeding and the driver shows that they are speeding to get a critically injured person to the hospital, a police officer might use discretion and accept the excuse of necessity to forgo the speeding ticket. Conversely, if an accused person made the decision to cut a lifeline that caused a mountain climber to fall to his death to save himself from being pulled over the edge, that decision of necessity needs to be made by a judge in a court of law.

In serious cases, it is important for an investigator to remember that their job does not include making any final interpretation regarding the defense of necessity, even if evidence of necessity may exist. The investigator’s task is restricted to recognize and collect all evidence that may assist the court to make their decision on the issues of necessity. This would include recognizing and collecting evidence to show:
<ol>
 	<li>The nature of the danger being imminent or not</li>
 	<li>Evidence of other legal alternatives or actions that were available to the accused</li>
 	<li>Evidence that might indicate the danger was either avoidable or unavoidable</li>
 	<li>Evidence to demonstrate the anticipated harm from the threat, compared to the harm resulting from the accused’s action</li>
</ol>
<h3>Doctrine of Recent Possession</h3>
The doctrine of recent possession refers to the possession of property that has been recently stolen. It permits the court to make the inference that the possessor of the stolen property had knowledge that the property was obtained in the commission of an offence, and, in certain circumstances, was also a party to the initial offence (<em>R v Terrence</em>, 1983; &amp;&nbsp;<em>R v Kowlyk</em>, 1988). When considering whether to make the inference of recent possession, the prosecution must consider all the circumstances (<em>R v Abernathy</em>, 2002). This includes common sense factors, such as the amount of time that passed between possession and the offence (<em>R v Gagnon</em>, 2006). Factors to consider whether the possession was recent include the nature of the object, the rareness of the object, the readiness with which the object can and is likely to pass to another, and the ease of identification. To achieve an inference, the Crown must establish that the accused was found in possession of the item and that the item was recently stolen without an explanation (<em>R v Gagnon</em>, 2006). When the accused is found in recent possession without explanation, the prosecution&nbsp;can draw the inference and make the presumption that the accused had a role in the theft or related offences. The defence can present an argument to counter the presumption by providing evidence of a reasonable explanation (<em>R v Graham</em>, 1974).
<h3>Doctrine of Wilful Blindness</h3>
Wilful blindness, also called ignorance of the law or contrived ignorance, is something the court will consider when an accused provides a defense claiming that they were not aware of the facts that would make them either criminally or civilly liable for a criminal offence or a civil tort. As an example, this can arise where a person has purchased an expensive item of stolen property for a very small price, then attempts to defend against a charge of possession of stolen property by claiming that they did not to know the item was stolen and/or did not know the true value of the item. In applying the doctrine of wilful blindness, the court will carefully examine the circumstances to determine what the accused should have known or if the accused should have inquired further.

The Supreme Court of Canada articulated the thinking behind the assessment of wilful blindness in <em>R v Briscoe:</em>
<blockquote>“Wilful blindness does not define the mens rea required for particular offences. Rather, it can substitute for actual knowledge whenever knowledge is a component of the mens rea. The doctrine of wilful blindness imputes knowledge to an accused whose suspicion is aroused to the point where he or she sees the need for further inquiries, but deliberately chooses not to make those inquiries” (<em>R v Briscoe</em>, 2010).</blockquote>
The manner in which the court should examine these issues is further expressed in&nbsp;<em>Sansregret v The Queen</em><em>, </em>[1985] 1 S.C.R. 570 and<em>&nbsp;R v Jorgensen, </em>[1995] 4 S.C.R. 55<em>. </em>As<em> S</em>opinka J. succinctly put it in <em>R v Jorgensen</em>&nbsp;(at para. 103)<em>: </em>
<blockquote>“[a] finding of wilful blindness involves an affirmative answer to the question: Did the accused shut his eyes because he knew or strongly suspected that looking would fix him with knowledge? Courts and commentators have consistently emphasized that wilful blindness is distinct from recklessness. The emphasis bears repeating.”</blockquote>
As the Court explained further in&nbsp;<em>Sansregret v The Queen</em> (at p. 584):
<blockquote>...while recklessness involves knowledge of a danger or risk and persistence in a course of conduct which creates a risk that the prohibited result will occur, wilful blindness arises where a person who has become aware of the need for some inquiry declines to make the inquiry&nbsp;because he does not wish to know the truth. He would prefer to remain ignorant. The culpability in recklessness is justified by consciousness of the risk and by proceeding in the face of it, while in wilful blindness it is justified by the accused’s fault in&nbsp;deliberately failing to inquire&nbsp;when he knows there is reason for inquiry“ (<em>Sansregret v The Queen</em>, 1985).</blockquote>
For an investigator who anticipates that wilful blindness may become an issue at trial, it is important to recognize the need to gather the additional evidence that might demonstrate the accused knew or should have known the nature of the offence taking place, and deliberately failed to inquire.
<h2>Topic 10:&nbsp;Actus Reus and Mens Rea</h2>
To recognize the types of evidence that need to be collected with respect to various offences, an investigator must become intimately familiar with the concept of <em>actus reus,</em> which is a Latin term definable as “the guilty act” or “the criminal act”, and the concept of <em>mens rea, </em>another Latin term meaning “guilty mind” or “the intent to commit a crime”. For any specific offence, the <em>actus reus </em>will be described by the wording of the statute that prohibits the conduct. For example, for the offence of theft, under the Criminal Code of Canada, the guilty act of theft, and variations of what constitute theft, are described in detail under section 322 (Criminal Code, 1985, s 322(1, 2)) of the Criminal Code of Canada:
<blockquote>Theft 322.&nbsp;(1)&nbsp;Every one commits theft who fraudulently and without colour of right takes, or fraudulently and without colour of right converts to his use or to the use of another person, anything, whether animate or inanimate, with intent
<p style="padding-left: 30px">(a)&nbsp;to deprive, temporarily or absolutely, the owner of it, or a person who has a special property or interest in it, of the thing or of his property or interest in it;</p>
<p style="padding-left: 30px">(b)&nbsp;to pledge it or deposit it as security;</p>
<p style="padding-left: 30px">(c)&nbsp;to part with it under a condition with respect to its return that the person who parts with it may be unable to perform; or</p>
<p style="padding-left: 30px">(d)&nbsp;to deal with it in such a manner that it cannot be restored in the condition in which it was at the time it was taken or converted.</p>
(2)&nbsp;A person commits theft when, with intent to steal anything, he moves it or causes it to move or to be moved, or begins to cause it to become movable.</blockquote>
The definition of the offence of theft provides a broad range of actions that will constitute the guilty act of theft. It defines items that can be stolen as anything, whether animate or inanimate. It includes conversion of the use of an item as being a theft, and it even defines the time a theft is completed, saying theft occurs when a person merely begins to cause something to be movable. For an investigator to collect evidence to prove the guilty act of theft, these definitions create a range of activities where evidence can be collected to illustrate a theft has occurred; but, just proving one of the actions that define the guilty act of theft occurred is insufficient because theft is one of the criminal offences that requires the act to be intentional. This is where the concept of <em>m</em><em>ens rea</em> comes into play.

The concept of <em>mens rea</em> seeks to determine if the accused person had the intent to commit the offence. Going back to the wording for the offence of theft, you will see that the words “with intent” are part of that offence wording. The words “with intent” allow that if a person takes someone’s property by accident or without the intent to steal, the offence of theft is not completed. For an investigator, this is an important concept because with this term, there is an added obligation to look for evidence that can assist the court in determining if the accused did in fact have the intent to commit the offence.

In the case of a theft, evidence of intent may be part of the observed actions of the accused, such as where a shoplifter is seen stuffing store merchandise into their pockets and then walking out the nearest exit of the store without paying. In such a case, it would not be enough for the investigator to show that the accused removed the property from the store. The act of concealing the items in the pockets is critical to demonstrate the intent to commit the offence. So, for offences where the term “with intent” forms part of the wording of the offence, the investigator needs to look for those extra pieces of evidence to demonstrate intent to the court.

It should be noted that intent does not form part of the wording for all offences. There are some offences where intent is not required. These are called a “strict liability offence” in Canada, and, with these offences, it only needs to be shown that the guilty act occurred. Some less serious offences, like speeding or failing to stop at a stop sign, are “strict liability” offences, and the investigator does not need to show that there was intent to commit the offence. There are also more serious strict liability offences, such as criminal negligence causing death or bodily harm, where&nbsp;proof of intent is not required. For offences sometimes called “crimes of omission,” it is only necessary to find evidence showing that the accused failed to meet the standard of care that is expected, and that they acted in a reckless manner. In other words, their reckless disregard caused or allowed the harm to occur.
<h3>Criminal negligence</h3>
<blockquote>219. (1)&nbsp;Everyone is criminally negligent who
<p style="padding-left: 60px">(a)&nbsp;in doing anything, or</p>
<p style="padding-left: 60px">(b)&nbsp;in omitting to do anything that it is his duty to do,</p>
shows wanton or reckless disregard for the lives or safety of other persons.

Definition of&nbsp;“duty”
<p style="padding-left: 30px">(2)&nbsp;For the purposes of this section,&nbsp;“duty”&nbsp;means a duty imposed by law (Criminal Code, 1985, s 219).</p>
</blockquote>
Even though intent in not a required element for this kind of charge, careful investigation of the evidence could elevate the offence from criminal negligence causing death or bodily harm to assault or even murder, if evidence of intent can be demonstrated. To demonstrate this point, let us examine a case where three men go hunting together and each is carrying a rifle. A shot is fired and one of the men is killed. The investigation of this death reveals that the shooter had been drinking heavily and was walking along with his loaded rifle and the safety on the rifle was off. The muzzle of his rifle was pointed in the direction of the victim walking beside him. The shooter confesses that he stepped over a log, tripped, and the gun discharged killing the victim. This evidence of drinking, the safety being off, and pointing a gun at the victim might support a charge for criminal negligence causing death.

Further investigation results in a statement from the third hunter who states that the victim and the shooter were business partners, and they had been arguing all morning over how they should divide the assets of the business they were selling. At one point, the shooter was heard telling the victim, “Be reasonable or I will just get rid of you and keep it all for myself.” This statement could be interpreted as an indication of motive and perhaps even intent to kill, and could be enough to elevate the criminal negligence causing death to a charge of murder. Hence, <em>Actus Reus</em> and <em>Mens Rea</em> become core concepts of investigative thinking. As the investigation proceeds, the investigator will undertake an ongoing process of evidence collection, offence recognition, and theory development to determine if an offence occurred, how the offence occurred, and why the offence occurred or is there evidence of intent. These concepts and the thinking to conduct theory development and evidence collection will be discussed in greater detail in the proceeding chapters of this book.
<h2>Topic 11:&nbsp;<em>Prima Facie</em> Case, Elements of the Offence, and the Criminal Information (Charge)</h2>
It is the job of the crown prosecutor to present evidence to the court that proves <em>a prima facie</em> case. <em>Prima facie </em>means at first sight and is the minimum amount of evidence required to prove each element of the formal charge against the accused. The elements of the offence include proving the specific acts alleged in the offence, such as assault or robbery; however, the elements of the offence also include other critical facts that a police investigator must consider to collect the correct evidence. It is the presentation of evidence that, if believed, would establish each of the elements necessary for the prosecution to succeed. In assessing whether a <em>prima facie</em> case is made, a judge does not decide whether the evidence is likely to be believed; but merely whether, if it were, it would establish the necessary elements for a conviction (Legal Information Institute, 2016).

The formal charge against a person in Canadian criminal law is called an ‘Information’, and there are specific elements or facts within that information that need to be proven. The information is a document sworn by a police officer alleging that the offence has taken place and accusing a person of that offence. The standard wording of a criminal information is as follows:

&nbsp;
<div class="textbox examples">
<h3 itemprop="educationalUse">Criminal Information</h3>
I, Constable (name of the informant), do solemnly swear that I have reasonable and probable grounds to believe and do believe that, on or about (date of offence), at or near (place of offence), in the Province of (province name), (name of accused), did unlawfully (statement of actions of the accused), and did thereby commit the offence of (name of the offence) contrary to the provision of (section number the offence under the criminal code or other statute), sworn before me this date of information swearing.

&nbsp;

Signature of Judge or JP &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Signature of the Informant

</div>
&nbsp;

In the above Information, the elements that need to be proven to establish a <em>prima facie</em> case are:
<ol>
 	<li>The identity of the accused person named on the information</li>
 	<li>The date or time frame in which the offence occurred</li>
 	<li>The place where the offence occurred (establishing this place is within the jurisdiction of the presiding court)</li>
 	<li>The action or actions taken by the accused person that will show they committed the offence contrary to the law</li>
</ol>
In court, this information or charge becomes the first document for consideration by the judge. This information, also known as a criminal charge, is read to the accused on their first appearance in court and after the reading of the charge, the judge will ask the accused person to enter a plea of either guilty or not guilty. If the plea is guilty, the judge will hear circumstances of the offence that will determine the sentence or the penalty for the offence. If the plea is not guilty, the judge will determine if the offence is one that should be heard by a judge-and-jury or a judge alone; and, if it is one of the serious offences where the option for judge-and-jury is available, the accused will be asked to decide which type trail they would prefer. Having received a plea of not guilty, the judge will then schedule a trial date.

When the trial begins, the prosecutor will present evidence to establish the truth of each element of the information beyond a reasonable doubt. Because the court system is an adversarial system, the defence lawyer may challenge any piece of the evidence presented with the goal of not allowing the prosecution to prove one or more of the required elements to make out the <em>prime facie</em> case. The <em>prime facie</em> case is complete when sufficient evidence is presented to prove each element of the charge before the court. If any one element of the information is not proven, the <em>prima facie</em> case is not established beyond a reasonable doubt and the court will make a ruling of not guilty.
<h2>Topic 12:&nbsp;The duty to investigate and the use of discretion</h2>
An appointment as a peace officer and the duties of a&nbsp;police officer in Canada are made under the authority of various provincial police acts&nbsp;and at the federal level under the <em>RCMP Act</em>. The designation of a&nbsp;peace officer under any one of these acts enables the appointed person to exercise the powers and authorities of a peace officer described in those acts, as well as the powers and authorities to function as a peace officer under the provisions of the <em>Criminal Code of Canada </em>and any other federal and provincial statutes. In addition to these powers and authorities to act, persons designated as peace officers also have some limited protection from criminal charges and civil liabilities in cases where they unintentionally make an error or cause injury to a person. These protections from criminal and civil liability are provided under the Criminal Code for some criminal acts and under <em>Provincial Police Acts</em> and the <em>RCMP Act</em> for civil torts. These protections are not available, or can be withheld, where an officer is found to have acted with criminal intent or is found to have been reckless or criminally negligent in the execution of their duties.

So, police officers are endowed with powers and authorities to act as keepers of the peace. For the police, this responsibility is equated to doing their duty. To fully understand what this entails, one must consider these two most critical questions:
<ul>
 	<li>What are those duties?</li>
 	<li>Who decides when or if they have been properly done?</li>
</ul>
These questions have a long history of both philosophical and legal arguments, dating all the back to the origins of policing in England (Reith, 1943).&nbsp;<span style="background-color: #ff6600"></span>In those early times, the police were predominately considered to be peace-keepers. As such, the neighbourhood “Bobby” would intervene to settle local disputes. Criminal charges were the last resort. This ability of police officers to settle local disputes using their own judgement and discretion became a valued function of policing skills. The use of discretion remains today at the core of community policing, restorative justice initiatives and alternate dispute resolution programs.

The arguments surrounding police use of discretion and alternate dispute resolution are twofold. Some have argued that police with too much discretion will misuse it and become corrupt, while others contend that the justice system will become overloaded with minor cases if the police do not have the discretion to try to resolve some disputes without laying charges (<em>R v Beare</em>, 1988).
<blockquote><em>Directly on this point, Justice La Forest J. stated; Discretion is an essential feature of the criminal justice system. A system that attempted to eliminate discretion would be unworkably complex and rigid” (R v Beare, 1988).</em></blockquote>
Implicitly supporting the ongoing use of discretion, legislators continue to only provide very general definitions regarding what the duties of the police should be. Statements of police duties, such as the following are the norm.
<blockquote>&nbsp;&nbsp;&nbsp; “… (Police Officers) must perform the duties and functions respecting the preservation of peace, the prevention of crime and offences against the law and the administration of justice assigned to it or generally to peace officers by the chief constable, under the director's standards or under this Act or any other enactment<strong>” </strong>(Government of British Columbia, 2015).</blockquote>
Even under the <em>Criminal Code of Canada,</em> there is an implied discretion indicating that the laying of an information is a matter of <strong><em>may</em></strong> and not a requirement of <strong><em>will</em></strong>.
<blockquote>Section 504 CCC. Anyone who, on reasonable grounds, believes that a person has committed an indictable offence may lay an information in writing and under oath before a justice, and the justice shall receive the information, where it is alleged

(a) that the person has committed, anywhere, an indictable offence that may be tried in the province in which the justice resides (Criminal Code, 1985, s 504(1)(a)).</blockquote>
For investigators, this implied discretion to not take the action of laying a charge seems to leave the door open for a great deal of latitude and interpretation. Historically, this has been the case; but recently, there have been several cases where the incorrect use of discretion has resulted in case law providing more prescriptive direction and defined process for the use of discretion (<em>R v Beaudry</em>, 2007).

To examine the use of discretion, <em>R v Beaudry </em>(2007)&nbsp;has been very instructive in defining the criterion for officers. The brief facts of the case are as follows: the accused, Sgt. Beaudry, was a Quebec police officer who stopped a vehicle on September 22, 2000. The driver turned out to be intoxicated. Upon discovering that the driver was also a police officer whom he had met on a previous occasion, Sgt. Beaudry decided not to demand a breathalyser test from the driver. Sgt. Beaudry believed the driver to be depressed&nbsp;and stated that he was using discretion to give him a chance. Sgt. Beaudry was charged with and convicted of obstruction of justice. The court ruled that he had improperly used his discretion by allowing favouritism. Ultimately, the Supreme Court of Canada’s ruling clarified some of the limitations that they would assign to police discretion. It stated:
<blockquote>“discretion is not absolute. Far from having a carte blanche, police officers must justify their decisions rationally.”</blockquote>
In <em>R v&nbsp;Beaudry,</em> SCC ruled that the justification or using discretion must have three elements:
<ol>
 	<li>It must be an informed decision, based on evidence that constitutes reasonable ground</li>
 	<li>There must be concrete reasons for the decisions to use discretion that are not based on favouritism or bias</li>
 	<li>The officer must have both a subjectively and objectively honest belief in the reason for using the discretion, and the judge must determine that the officer’s belief reflected reality (<em>R v Beaudry</em>, 2007).</li>
</ol>
In addition to these three elements, the Supreme Court also stated that:
<blockquote>“Justification for discretion has to be proportional to the offence and has to be in the interest of public safety (R v Beaudry, 2007).”</blockquote>
From the <em>R v&nbsp;Beaudry</em>&nbsp;(2007) ruling, a set of seven principles were outlined and these principles serve as guidelines for police use of discretion in Canada:
<ol>
 	<li>Discretion is vital to the operation of the criminal justice system. Not all offenders must be charged.</li>
 	<li>The police still have discretion, but it is not absolute, it is limited.</li>
 	<li>Limited discretion means discretion must be proportional to the seriousness of the offence.</li>
 	<li>Use of discretion must be justified with concrete reasons.</li>
 	<li>Improper use of discretion does not automatically constitute “Obstruct Justice”.</li>
 	<li>A simple error of judgement is not “Obstruct Justice”.</li>
 	<li>"Obstruct Justice” is committed when discretion is disproportionate, unjustified, and intended to obstruct, pervert, or defeat the course of justice (<em>R v Beaudry</em>, 2007).</li>
</ol>
<em>&nbsp;</em>In 2007<em> f</em>ollowing this ruling, in the landmark civil case of <em>Hill v Hamilton-Wentworth Regional Police</em>, the Supreme Court of Canada added an additional rule to the existing <em>Beaudry</em> list of principles:
<blockquote>The decision not to charge an offender cannot be based on the selfish desire to avoid potential civil liability<em>&nbsp;</em>(<em>Hill v Hamilton-Wentworth Regional Police Services Board</em>, 2007).</blockquote>
<h2>Topic 13:&nbsp;Arrest and Detention</h2>
Arresting or detaining a suspect are two of the most critical actions that a police investigator can take in the process of any investigation. Each is a distinct course of action and offers the investigator strategic advantages to control the investigative environment by:
<ul>
 	<li>Bringing suspected persons under control in secure custody;</li>
 	<li>Stopping an offence in progress or preventing an offence about to be committed;</li>
 	<li>Enabling the search for items that may cause danger to the police investigator or others;</li>
 	<li>Enabling the search for evidence of the offence;</li>
 	<li>Establishing the identity of suspected persons; and</li>
 	<li>Compelling accused persons to attend court to face charges.</li>
</ul>
The concept of arrest for police investigators relates to the process of taking a person into custody upon reaching reasonable grounds to believe that an offence has been committed by the person being arrested. There are many statutes, both federal and provincial, that provide the police with powers of arrest. However, the Criminal Code of Canada provides direction for all police investigators in Canada. Section 495 of the <em>Criminal Code of Canada</em> states:
<blockquote>Arrest without warrant by peace officer
Section 495
<p style="padding-left: 30px">(1) A peace officer may arrest without warrant</p>
<p style="padding-left: 60px">(a) a person who has committed an indictable offence or who, on reasonable grounds, he believes has committed or is about to commit an indictable offence;</p>
<p style="padding-left: 60px">(b) a person whom he finds committing a criminal offence; or</p>
<p style="padding-left: 60px">(c) a person in respect of whom he has reasonable grounds to believe that a warrant of arrest or committal, in any form set out in Part XXVIII in relation thereto, is in force within the territorial jurisdiction in which the person is found.</p>
<p style="padding-left: 30px">Limitation
(2) A peace officer shall not arrest a person without warrant for</p>
<p style="padding-left: 60px">(a) an indictable offence mentioned in section 553,</p>
<p style="padding-left: 60px">(b) an offence for which the person may be prosecuted by indictment or for which he is punishable on summary conviction, or</p>
<p style="padding-left: 60px">(c) an offence punishable on summary conviction,</p>
<p style="padding-left: 60px">in any case where</p>
<p style="padding-left: 60px">(d) he believes on reasonable grounds that the public interest, having regard to all the circumstances including the need to</p>
<p style="padding-left: 90px">(i) establish the identity of the person,</p>
<p style="padding-left: 90px">(ii) secure or preserve evidence of or relating to the offence, or</p>
<p style="padding-left: 90px">(iii) prevent the continuation or repetition of the offence or the commission of another offence, may be satisfied without so arresting the person, and</p>
<p style="padding-left: 60px">(e) he has no reasonable grounds to believe that, if he does not so arrest the person, the person will fail to attend court in order to be dealt with according to law (Criminal Code, 1985, s 495(1, 2)).</p>
</blockquote>
As a specific power to take action, arrest provides police investigators with a means to intervene in criminal situations and stop persons in the process of dangerous or unlawful acts by taking them into custody. With any arrest, there is an obligation to bring the arrested person before the court for release or otherwise to release the person but compel them to court by other means, such as a summons or promise to appear.

As a lesser power, the police action of detaining a suspect has evolved in common law to allow police to take a person into custody for a shorter time. This detention can be used where reasonable grounds to believe the person has committed an offence have not yet been established, but there is some evidence or circumstances that point to the person as a suspect in the offence being investigated.

For police investigators, the actions of arrest and detention need to be considered as strategic functions of the investigative process. Making an arrest or detaining the suspect are not final outcomes, but merely strategic steps in the process of identifying the offender and gathering sufficient evidence to proceed with a charge. The powers and authorities that exist for police investigators to detain a subject or make an arrest are complex. Detaining a suspect or making an arrest may damage the investigation and threaten the admissibility of evidence flowing from detention or arrest if it is not done on the basis of real facts and circumstances that the officer can adequately articulate to the court.

There is extensive case law that speaks to the issues surrounding both the detention and arrest of a suspect. Case law makes a significant distinction that an investigator needs to consider if they are about to detain or arrest a subject. In the simplest of terms that distinction is:
<ul>
 	<li>To <strong>arrest</strong> a suspect, a police investigator needs to have reasonable grounds to believe that a person has committed the offence and in contrast,</li>
 	<li>To <strong>detain</strong> a suspect, a police investigator only requires a reasonable suspicion that a suspect is somehow implicated in the offence under investigation.</li>
</ul>
The distinction between forming reasonable grounds to believe a person has committed the offence and having a reasonable suspicion that a person is somehow implicated in the offence under investigation is a matter of evaluating the evidence available at the time detention or arrest are being considered.

To form reasonable grounds to believe a suspect has committed the offence, the investigator must have evidence that points directly to that suspect. This kind of evidence could be a witness identifying the suspect as committing the offence or strong circumstantial evidence such as fingerprints or DNA connecting the suspect to the scene or the victim. These types of evidence could provide the necessary reasonable grounds to believe the suspect committed the offence. In contrast, reasonable suspicion that a person is implicated in the offence under investigation requires significantly less concrete evidence. An investigator finding circumstantial evidence that points to a person as being implicated can be sufficient to make the detention. In articulating case law, judges have elaborated on the police common law powers to utilize detention as part of an investigation.
<blockquote>In 2004 in the case of <em>R v Mann</em>, the Supreme Court of Canada stated that, in spite of the fact that there is no general power for investigative detention, police may detain a person if there are reasonable grounds to suspect, in all the circumstances, that the individual is connected to a crime and the detention of that person is reasonably necessary on an objective view of the circumstances. The circumstances to be considered should include the extent to which a suspect’s liberty is interfered with in order for the police officer to conduct the required duties, and the individual being detained for investigation, must be told in simple language about the reason for that detention. The detention must be as short as possible in duration, and detention does not impose any obligation to answer questions. In addition, if a police officer has reasonable grounds to believe his safety or the safety of others is at risk, the officer may conduct and pat-down search on the detained subject and this kind of search is not the same as a search subsequent to an actual arrest&nbsp;(<em>R v Mann</em>, 2004).</blockquote>
With these distinctions for arrest and detention in mind, consider the following scenario to illustrate some of the decision-making an investigator must consider.
<div class="textbox examples">
<h3 itemprop="educationalUse">Scenario</h3>
It is 3 AM on a Wednesday morning and you are a uniform patrol officer working the night-shift alone in your patrol car. Your unit and two other patrol units are dispatched to attend a break and enter alarm at a warehouse building located in an industrial area on the edge of the city. This industrial area is a complex with many warehouses and manufacturing facilities, and it borders a residential subdivision area. As you proceed to the scene of the alarm, you are advised on the radio that the two other units have already arrived at the warehouse. They are confirming that a break-in has taken place. They advise that the main entry glass doors of the warehouse have been smashed. The two other units are awaiting your arrival to commence a search for any suspects inside the warehouse. On the radio, you hear that the two other units have observed an unoccupied green Ford pickup truck parked on the street near the warehouse complex. Upon running the licence plate of the vehicle, it is determined that the vehicle is registered to a Larry Lurken. Criminal records check on Lurken reveal that he has a prior criminal record for several past offences of break enter and theft.

As you proceed to the industrial area, you approach the entry road through the residential subdivision. The warehouse you are going to is only one block inside the industrial area from your entry point off the subdivision. As you approach the entrance, you see a young man standing partly hidden behind a tree on the boulevard that separates the subdivision from the industrial complex. The young man is dressed in dark blue jeans and a dark hoodie and, as you approach him, he starts to walk away.

This is a typical case where the strategy of investigative detention could be used. The facts and circumstances facing you as an investigator are:
<ul>
 	<li>You have a young man dressed in dark clothing;</li>
 	<li>He is standing partly hidden behind a tree;</li>
 	<li>It is 3 AM;</li>
 	<li>This location is on the border of an industrial complex, only one block away from the scene of a confirmed break-in; and</li>
 	<li>He is starting to walk away.</li>
</ul>
These are sufficient grounds to suspect that this person may be involved in the criminal offence under investigation. In this case, the goal for you as the investigator would be to detain and determine the identity of this person. To properly observe the rights of this person, you would advise the young man as follows:
<blockquote>“I am conducting an investigation into a break-in at a nearby warehouse building and I am detaining you for my investigation of this break-in. You are not obliged to say anything and anything you do say can be used as evidence. You have the right to retain and instruct counsel without delay.”</blockquote>
After you provide this advice of detention and the appropriate charter and caution, this person is not obliged to answer any questions, other than to provide his identity. The fact that the detainee is not obligated to talk, does not mean you as an investigator are not permitted to ask questions. After all, there may be a reasonable explanation that this man can provide for being at this location at this time, and, as an objective investigator, you must always be prepared to hear these possibilities. He may tell you he lives in the house across the street from where he is standing, and when he heard the alarm going off at the warehouse, he came outside to see what was happening. If that was his claim, and you subsequently check his identification and confirm it to be true, your grounds to suspect he is involved in the offence become greatly diminished, likely to the point where he should be released from detention.

If, on the other hand, he only provides identification and refuses to answer questions about being at this location, your suspicion would remain. Your pat-down safety search of this suspect may reveal something incriminating, such as break-in tools or keys to a Ford truck, or perhaps even a walkie-talkie, which might indicate he is standing look-out for others who were doing the actual break-in. You may find shards of broken glass on his running shoes that may be like the glass from the broken front door of the warehouse, or you may run his name through the police databases to determine that he has a past record for breaking and entering, or perhaps is shown and being an associate of Larry Lurken, the owner of the vehicle parked near the break-in location. Any of these kinds of facts or associations would be sufficient to justify the continued investigative detention of this suspect. These facts could be the beginning of circumstantial evidence from which reasonable grounds to believe could be formed to make an arrest of this suspect.

If the warehouse is searched and Larry Lurken is found inside,&nbsp;Lurken has the matching walkie-talkie to your detained suspect, and it is then discovered that the Ford key in the detainee’s pocket is the key to Lurken’s parked Ford truck, sufficient circumstantial evidence would then exist to form reasonable grounds to believe your detained suspect was a party to this offence of breaking and entering.

If, upon arriving in the area and seeing this suspicious looking young man, you had immediately made an arrest, that arrest would not have been a lawful arrest because it would not have been supported by evidence that could pass the test of forming reasonable grounds for belief. Evidence located later, such as the walkie-talkie and vehicle keys found as part of that arrest, could be excluded by the court because they were not seized as part of a lawful search incidental to lawful arrest. In the foregoing case, detention was justified by the suspicious circumstances and the subsequent discovery of other incrimination evidence after that lawful detention could lead to an arrest on reasonable grounds that could be properly articulated to the court.

As previously mentioned, the process of detention and arrest are authorized actions that an investigator may take to progress through an investigation. These actions are part of the investigative process and they must be taken after careful consideration of evidence that justifies either having a reasonable suspicion to detain or forming reasonable grounds for belief to make an arrest. It is important for an investigator to undertake careful consideration of the available information and evidence before either of these actions are taken. Any arrest or detention of a suspect should be made with awareness that the evidence considered to support the decision for action will need to be articulated later in court.

</div>
&nbsp;
<h2><span style="color: initial">Summary</span></h2>
In this chapter, we have outlined and discussed many of the legal rules that must be considered by an investigator to guide their investigative process. In common for each of these legal definitions, concepts, principles, doctrines, and protocols is the need for each to be incorporated into the investigator’s thinking process. The investigator needs to consider the circumstances being encountered and apply the law as it exists specifically to those events. These legal definitions, concepts, principles, doctrines, and protocols form the basis of the knowledge that an investigator needs to incorporate into his or her mental map to successfully navigate the investigative process. An understanding of these issues and their appropriate application will demonstrate for the court that the investigator is aware of their duty to act, their authorities to act, and it will enable the investigator to properly articulate a justification of their action.

&nbsp;
<div class="textbox exercises" style="color: initial;font-size: medium">
<h3 itemprop="educationalUse">Study Questions</h3>
<ol>
 	<li>What exactly do we mean when we refer to “fundamental justice” for people who are charged with a criminal offence in Canada?</li>
 	<li>What protection regarding life, liberty and security is provided by Sec 7 of the Canadian Charter of Rights and Freedoms?</li>
 	<li>What protection regarding search and seizure is provided by Sec 8 of the Canadian Charter of Rights and Freedoms?</li>
 	<li>What protection regarding detention or imprisonment is provided by Sec 9 of the Canadian Charter of Rights and Freedoms?</li>
 	<li>What protection on arrest or detention is provided by Sec 10 of the Canadian Charter of Rights and Freedoms?</li>
 	<li>What protection to witnesses is provided by Section 13 of the Canadian Charter of Rights and Freedoms?</li>
 	<li>What language protections are provided by Section 14 of the Canadian Charter of Rights and Freedoms?</li>
 	<li>What is the difference between “proof within a balance of probabilities” and “proof beyond a reasonable doubt”?</li>
 	<li>What is the general test for “reasonable grounds to believe”?</li>
 	<li>When must an investigator remain diligent in collecting and preserving evidence, even though they believe they will not be proceeding with a criminal charge?</li>
 	<li>What is the role of the investigator in court when presenting evidence?</li>
 	<li>Why does the police investigator have to be attentive to common law?</li>
 	<li>Can a police investigator decide whether or not an accused should be afforded the defence of necessity?</li>
 	<li>What common law doctrine can be applied when an accused is found in recent possession of stolen property?</li>
 	<li>What evidence must a police investigator gather to demonstrate that an accused was willfully blind?</li>
 	<li>What does the term “<em>Mens Rea</em>” mean and why is it important?</li>
 	<li>What is a <em>prima facie</em> case?</li>
 	<li>What is a criminal information?</li>
 	<li>Is a police investigator protected from criminal or civil liability if they make an error or cause injury to a person?</li>
 	<li>In applying his/her discretion to not lay a charge where there is reason to believe a person has committed an indictable offence, what must a police investigator remember?</li>
 	<li>When can a police investigator arrest without a warrant?</li>
 	<li>When can a police investigator detain a person?</li>
</ol>
</div>
<p style="color: initial"></p>
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>397</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:06]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:06]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-2-some-important-basic-concepts-2]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>395</wp:post_parent>
		<wp:menu_order>2</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 2: Some Important Basic Concepts]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 3: What You Need To Know About Evidence</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-3-what-you-need-to-know-about-evidence-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:08 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-3-what-you-need-to-know-about-evidence-2/</guid>
		<description></description>
		<content:encoded><![CDATA[
<div class="textbox"><em>"Evidence forms the building blocks of the investigative process and for the final product to be built properly, evidence must be </em>recognized<em>, collected, documented, protected, validated, </em>analyzed<em>, disclosed, and presented in a manner which is acceptable to the court.”</em></div>
The term “evidence”, as it relates to investigation, speaks to a wide range of information sources that might eventually inform the court to prove or disprove points at issue before the trier of fact. Sources of evidence can include anything from the observations of witnesses to the examination and analysis of physical objects. It can even include the spatial relationships between people, places, and objects within the timeline of events. From the various forms of evidence, the court can draw inferences and reach conclusions to determine if a charge has been proven beyond a reasonable doubt.

Considering the critical nature of evidence within the court system, there are a wide variety of definitions and protocols that have evolved to direct the way evidence is defined for consideration by the court. Many of these protocols are specifically addressed and defined within the provisions of the <em>Canada Evidence Act</em> (Government of Canada, 2017).

In this chapter, we will look at some of the key definitions and protocols that an investigator should understand to carry out the investigative process:
<ol>
 	<li>The probative value of evidence</li>
 	<li>Relevant evidence</li>
 	<li>Direct evidence</li>
 	<li>Circumstantial evidence</li>
 	<li>Inculpatory evidence</li>
 	<li>Exculpatory evidence</li>
 	<li>Corroborative evidence</li>
 	<li>Disclosure of evidence</li>
 	<li>Witness evidence</li>
 	<li>Hearsay evidence</li>
 	<li>Search and seizure of evidence</li>
 	<li>Exclusion of evidence</li>
</ol>
<h2>Topic 1:&nbsp;The Probative Value of Evidence</h2>
Each piece of relevant evidence will be considered based on its “probative value”, which is the weight or persuasive value that the court assigns to that particular piece of evidence when considering its value towards proving a point of fact in question for the case being heard. This probative value of evidence goes towards the judge, or the judge and jury, reaching their decision of proof beyond a reasonable doubt in criminal court, or proof within a balance of probabilities in civil court.
<h3>Eye Witness Evidence</h3>
A competent, compellable, independent, eye witness with excellent physical and mental capabilities, who has seen the criminal event take place and can recount the facts will generally satisfy the court and provide evidence that has high probative value. In assessing the probative value of witness evidence, the court will consider several factors that we will discuss in more detail in our chapter on witness management. These include:
<ul>
 	<li>The witness type as either eye witness or corroborative witness</li>
 	<li>The witness competency to testify</li>
 	<li>The witness compellability to testify</li>
 	<li>The level of witness independence from the event</li>
 	<li>The witness credibility based on assessment of physical limitations</li>
</ul>
<h3>Physical Evidence</h3>
The court will also generally attribute a high probative value to physical exhibits. The court likes physical evidence because they are items the court can see and examine to interpret the facts in issue for proof beyond a reasonable doubt. Physical evidence can include just about anything, such as weapons, fingerprints, shoe prints, tire marks, tool impression, hair, fiber, or body fluids. These kinds of physical exhibits of evidence can be examined and analyzed by experts who can provide the court with expert opinions that connect the item of evidence to a person, place, or the criminal event. This allows the court to consider circumstantial connections of the accused to the crime scene or the accused to the victim. For example, in the case where the fingerprints of a suspect are found at a crime scene, and a DNA match of a murder victim’s blood is found on that suspect’s clothing, forensic connections could be made and, in the absence of an explanation, the court would likely find this physical evidence to be relevant and compelling evidence with high probative value.
<h2>Topic 2:&nbsp;Relevant Evidence</h2>
Relevant evidence speaks to an issue before court in relation to the charge being heard. Relevant evidence includes both direct evidence and indirect circumstantial evidence. For either direct or indirect circumstantial evidence to be considered relevant to the court, it must relate to the elements of the offence that need to be proven. If the evidence does not relate to proving the place, time, identity of the accused, or criminal acts within the offence itself, the evidence will not be considered relevant to the charge. The prosecution may present evidence in the form of a physical exhibit that the court can see and examine to consider, or they may present evidence in the form of witness testimony, in which case the witness is telling the court what they perceived within the limits of their senses.

<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-01-1024x501.png" alt="Types of Evidence chart. Direct Evidence and Indirect Evidence. " width="1024" height="501" class="aligncenter size-large wp-image-398">
<h2>Topic 3:&nbsp;Direct Evidence</h2>
Direct evidence is evidence that will prove the point in fact without interpretation of circumstances. (Justice Department Canada, 2017). It is any evidence that can show the court that something occurred <em>without the need for the judge to make inferences or assumptions to reach a conclusion</em>. An eyewitness who saw the accused shoot a victim would be able to provide direct evidence. Similarly, a security camera showing the accused committing a crime or a statement of confession from the accused admitting to the crime could also be considered direct evidence. Direct evidence should not be confused with the concept of direct examination, which is the initial examination and questioning of a witness at trial by the party who called that witness. And, although each witness who provides evidence could, in theory, be providing direct testimony of their own knowledge and experiences, that evidence is often not direct evidence of the offence itself.
<h2>Topic 4:&nbsp;Circumstantial Evidence</h2>
Indirect evidence, also called circumstantial evidence, is all other evidence, such as the fingerprint of an accused found at the crime scene. Indirect evidence does not by itself prove the offence, but through interpretation of the circumstances and in conjunction with other evidence may contribute to a body of evidence that could prove guilt beyond a reasonable doubt (Justice Department Canada, 2017). Strong circumstantial evidence that only leads to one logical conclusion can sometimes become the evidence the court uses in reaching belief beyond a reasonable doubt to convict an accused. It requires assumptions and logical inferences to be made by the court to attribute meaning to the evidence<em>. </em>
<blockquote><em>"When one or more things are proved, from which our experience enables us to ascertain that another, not proved, must have happened, we presume that it did happen, as well in criminal as in civil cases." (MacDonell, 1820)</em></blockquote>
Circumstantial evidence demonstrates the spatial relationships between suspects, victims, timelines, and the criminal event. These spatial relationships can sometimes demonstrate that an accused person had a combination of intent, motive, opportunity, and/or the means to commit the offence, which are all meaningful features of criminal conduct.

Circumstantial evidence of intent can sometimes be shown through indirect evidence of a suspect planning to commit the offence, and/or planning to escape and dispose of evidence after the offence. A pre-crime statement about the plan could demonstrate both intent and motive, such as, “I really need some money. I’m going to rob that bank tomorrow."

Circumstantial evidence of conflict, vengeance, financial gain from the commission of the offence can also become evidence of motive.

Circumstantial evidence of opportunity can be illustrated by showing a suspect had access to a victim or a crime scene at the time of the criminal event, and this access provided opportunity to commit the crime.

Circumstantial evidence of means can sometimes be demonstrated by showing the suspect had the physical capabilities and/or the tools or weapons to commit the offence.

Presenting this kind of circumstantial evidence can assist the court in confirming assumptions and inferences to reach conclusions assigning probative value to connections between the accused and a person or a place and the physical evidence. These circumstantial connections can create the essential links between a suspect and the crime.

There are many ways of making linkages to demonstrate circumstantial connections. These range from forensic analysis of fingerprints or DNA that connect an accused to the crime scene or victim, to witness evidence describing criminal conduct on the part of an accused before, during, or after the offence. The possibilities and variations of when or how circumstantial evidence will emerge are endless. It falls upon the investigator to consider the big picture of all the evidence and then analytically develop theories of how events may have happened. Once a reasonable theory has been formed, evidence of circumstantial connections can be validated through further investigation and analysis of physical exhibits to connect a suspect to the crime.
<h2>Topic 5:&nbsp;Inculpatory Evidence</h2>
Inculpatory evidence is any evidence that will directly or indirectly link an accused person to the offence being investigated. For an investigator, inculpatory evidence can be found in the victim’s complaint, physical evidence, witness accounts, or the circumstantial relationships that are examined, analyzed, and recorded during the investigative process. It can be anything from the direct evidence of an eyewitness who saw the accused committing the crime, to the circumstantial evidence of a fingerprint found in a location connecting the accused to the victim or the crime scene.

Naturally, direct evidence that shows the accused committed the crime is the preferred inculpatory evidence, but, in practice, this it is frequently not available. The investigator must look for and interpret other sources for evidence and information. Often, many pieces of circumstantial evidence are required to build a case that allows the investigator to achieve reasonable grounds to believe, and enables the court to reach their belief beyond a reasonable doubt.

A single fingerprint found on the outside driver’s door of a stolen car would not be sufficient for the court to find an accused guilty of car theft. However, if you added witness evidence to show that the accused was seen near the car at the time it was stolen, and a security camera recording of the accused walking off the parking lot where the stolen car was dumped, and the police finding the accused leaving the dump site where he attempted to toss the keys of that stolen car into the bushes, the court would likely have proof beyond a reasonable doubt.

If an abundance of inculpatory circumstantial evidence can be located for presentation to the court that leads to a single logical conclusion, the court will often reach their conclusion of proof beyond a reasonable doubt, unless exculpatory evidence is presented by the defence to create a reasonable doubt.
<h2>Topic 6:&nbsp;Exculpatory Evidence</h2>
Exculpatory evidence is the exact opposite of inculpatory evidence in that it tends to show the accused person or the suspect did not commit the offence. It is important for an investigator to not only look for inculpatory evidence, but to also consider evidence from an exculpatory perspective. Considering evidence from the exculpatory perspective demonstrates that an investigator is being objective and is not falling into the trap of tunnel vision. If it is possible to find exculpatory evidence that shows the suspect is not responsible for the offence, it is helpful for police because it allows for the elimination of that suspect and the redirecting of the investigation to pursue the real perpetrator.

Sometimes, exculpatory evidence will be presented by the defence at trial to show the accused was not involved in the offence or perhaps only involved to a lesser degree. In our previous circumstantial case of car theft, there is strong circumstantial case; but what if the defence produces the following exculpatory evidence where:
<ul>
 	<li>A tow truck dispatcher testifies at the trial and produces records showing the accused is a tow truck driver;</li>
 	<li>On the date of the car theft, the accused was dispatched to the site of the car theft to assist a motorist locked out of his car;</li>
 	<li>The accused testifies that he only assisted another male to gain entry to the stolen car because he could see the car keys on the front seat;</li>
 	<li>The accused explains that, after opening the car, he agreed to meet this male at the parking lot where the car was left parked;</li>
 	<li>He accepted the keys of the stolen car from the other male to tow the vehicle later to a service station from that location;</li>
 	<li>When approached by police, he stated that he became nervous and suspicious about the car he had just towed; and</li>
 	<li>He tried to throw the keys away because he has a previous criminal record and knew the police would not believe him.</li>
</ul>
Provided with this kind of exculpatory evidence, the court might dismiss the case against the accused.

Having read this, you may be thinking that this exculpatory evidence and defence sounds a little vague, which is the dilemma that often faces the court. If they can find guilt beyond a reasonable doubt, they will convict, but if the defence can present evidence that creates a reasonable doubt, they will make a ruling of not guilty. Experienced criminals can be very masterful at coming up with alternate explanations of their involvement in criminal events, and it is sometimes helpful for investigators to consider if the fabrication of an alternate explanation will be possible. If an alternate explanation can be anticipated, additional investigation can sometimes challenge the untrue aspects of the alternate possibilities.
<h2>Topic 7:&nbsp;Corroborative Evidence</h2>
The term corroborative evidence essentially refers to any type of evidence that tends to support the meaning, validity, or truthfulness of another piece of evidence that has already been presented to the court. A piece of corroborative evidence may take the form of a physical item, such as a DNA sample from an accused matching the DNA found on a victim, thus corroborating a victim’s testimony. Corroborative evidence might also come from the statement of one independent witness providing testimony that matches the account of events described by another witness. If it can be shown that these two witnesses were separated and did not collaborate or hear each other’s account, their statements could be accepted by the court as mutually corroborative accounts of the same event.

The courts assign a great deal of probative value to corroborative evidence because it assists the court in reaching their belief beyond a reasonable doubt. For investigators, it is important to not just look for the minimum amount of evidence apparent at the scene of a crime. Investigation must also seek out other evidence that can corroborate the facts attested to by witnesses or victims in their accounts of the event. An interesting example of corroborative evidence can be found in the court’s acceptance of a police investigators notes as being <em>circumstantially corroborative</em> of that officer’s evidence and account of the events. When a police investigator testifies in court, they are usually given permission by the court to refer to their notes to refresh their memory and provide a full account of the events. If the investigator’s notes are detailed and accurate, the court can give significant weight to the officer’s account of those events. If the notes lack detail or are incomplete on significant points, the court may assign less value to the accuracy of the investigator's account.

For the court, detailed notes properly made at the time corroborate the officer’s evidence and represent a circumstantial guarantee of trustworthiness for the officer’s testimony (McRory, 2014).
<h2>Topic 8:&nbsp;Disclosure of Evidence</h2>
It is important for an investigator to be aware that all aspects of their investigation may become subject to disclosure as potential evidence for court. As part of the process of fundamental justice within the <em>Canadian Charter of Rights and Freedoms</em>, a person charged with an offence has the right to full disclosure of all the evidence of the investigation (<em>R v Stinchcombe</em>, 1991). This means that any evidence or information gathered during the police investigation must be available for the defence to review and determine if that evidence could assist the accused in presenting a defence to the charge before the court.

In the disclosure process, the decision to disclose or not to disclose is the exclusive domain of the crown prosecutor and, although police investigators may submit information and evidence to the prosecutor with the request that the information be considered an exception to the disclosure rules, the final decision is that of the crown. That said, even the decision of the crown may be challenged by the defence and that then becomes a final decision for the Judge. The prosecutor will ask the police to provide a full disclosure of the evidence gathered during their investigation.

The list of what should form part of a normal disclosure will typically include:
<ul>
 	<li>Charging document</li>
 	<li>Particulars of the offence</li>
 	<li>Witness statements</li>
 	<li>Audio/video evidence statements by witnesses</li>
 	<li>Statements by the accused</li>
 	<li>Accused's criminal record</li>
 	<li>Expert witness reports</li>
 	<li>Notebooks and Police reports</li>
 	<li>Exhibits</li>
 	<li>Search warrants</li>
 	<li>Authorizations to intercept private communications</li>
 	<li>Similar fact evidence</li>
 	<li>Identification evidence</li>
 	<li>Witnesses' criminal records</li>
 	<li>Reports to Crown Counsel recommending charges</li>
 	<li>Witness impeachment material</li>
</ul>
It is worth stressing that police notes and reports relating to the investigation are typically studied very carefully by the defence to ensure they are complete and have been completely disclosed. Disclosure will also include investigation notes and reports that relate to alternate persons considered, investigated, and eliminated as suspects in the crime for which the accused is being tried. If alternate suspects were identified and not eliminated during the investigation, that lack of investigation may form the basis for a defence to the charge.

The issues relating to the disclosure of evidence have been the subject of several Supreme Court of Canada rulings and a few exceptions to disclosure had been identified where certain information does not need to be disclosed. These exceptions to disclosure were outlined in the benchmark disclosure case of <em>R v Stinchcombe </em>(1991)<em>.</em> These exceptions include:
<ul>
 	<li>Information that is clearly irrelevant</li>
 	<li>Information that is considered privileged</li>
 	<li>Information that would expose an ongoing police investigation</li>
 	<li>Information that would compromise the safety of a witness</li>
</ul>
For an investigator, the requirement to comply with disclosure is one of the best reasons to make sure notes and reports are complete and accurately reflect the investigation and actions taken during the investigation. From the court’s perspective, there will never be any excuse for a police investigator to intentionally conceal or fail to disclose evidence or information.
<h2>Topic 9:&nbsp;Witness Evidence</h2>
Witness evidence is evidence obtained from any person who may be able to provide the court with information that will assist in the adjudication of the charges being tried. This means that witnesses are not only persons found as victims of a crime or on-scene observers of the criminal event. They may also be persons who can inform the court on events leading up to the crime, or activities taking place after the crime.

These after-the-crime activities do not just relate to activities of the suspect, but also include the entire range of activities required to investigate the crime. Consequently, every police officer involved in the investigation, and every person involved in the handling, examination, and analysis of evidence to be presented in court, is a potential witness.

Issues relating to the collection of witness evidence will be discussed in more detail in Chapter 7 on Witness Management.
<h2>Topic 10: Hearsay Evidence</h2>
Hearsay evidence, as the name implies, is evidence that a witness has heard as a communication from another party. In addition to verbal communication, legal interpretations of the meaning of hearsay evidence also include other types of person-to-person communication, such as written statements or even gestures intended to convey a message. As defined by John Sopinka in his book, <em>T</em><em>he Law of Evidence</em>, hearsay&nbsp;is:
<blockquote><strong>"</strong>Written or oral statements or communicative conduct made by persons otherwise than in testimony at the proceedings in which it is offered, are inadmissible if such statements or conduct are tendered either as proof of their truth or as proof of assertions implicit therein (Sopinka, 1999, p. 173).</blockquote>
Hearsay evidence is generally considered to be inadmissible in court at the trial of an accused person for several reasons; however, there are exceptions where the court will consider accepting hearsay evidence (Thompson, 2013). The reasons why hearsay is not openly accepted by the court include the rationale that:
<ul>
 	<li>The court generally applies the best-evidence rule to evidence being presented and the best evidence would come from the person who gives the firsthand account of events;</li>
 	<li>The original person who makes the communication that becomes hearsay, is not available to be put under oath and cross-examined by the defense;</li>
 	<li>In hearing the evidence, the court does not have the opportunity to hear the communicator firsthand and assess their demeanor to gauge their credibility; and</li>
 	<li>The court recognizes that communication that has been heard and is being repeated is subject to interpretation. Restatement of what was heard can deteriorate the content of the message.</li>
</ul>
The court will consider accepting hearsay evidence as an exception to the hearsay rule in cases where:
<ul>
 	<li>There is a dying declaration</li>
 	<li>A witness is the recipient of a spontaneous utterance</li>
 	<li>The witness is testifying to hearsay from a child witness who is not competent</li>
</ul>
<h3>Dying Declarations</h3>
Exceptions to the hearsay rule include the dying declaration of a homicide victim. This type of declaration is allowed since it is traditionally believed that a person facing imminent death would not lie. Justice Eyre in the 1789 English case of <em>R v Woodcock</em>&nbsp;stated:
<blockquote><strong>"</strong>The general principle on which this species of evidence is admitted is, that they are declarations made in extremity, when the party is at the point of death, and when every hope of this world is gone: when every motive to falsehood is silenced, and the mind is induced by the most powerful considerations to speak the truth; the situation so solemn and so awful, is considered by the law as creating an obligation equal to that which is imposed by a positive oath administered in a court of justice" <em>(R v Woodcock</em>, 1789).</blockquote>
Per the rules of the <em>Canada Evidence Act&nbsp;</em>(Government of Canada, 2015), for a dying declaration to be acceptable to the court, the victim:
<ul>
 	<li>Must be a victim of 1st or 2nd degree murder, manslaughter, or criminal negligence causing death;</li>
 	<li>Must be making a statement in regards to the cause of death;</li>
 	<li>Must know at the time they make the statement that their death is imminent;</li>
 	<li>Must be someone who would have been a competent witness had they lived; and</li>
 	<li>Must die of their injuries within a reasonable time after the statement was made.</li>
</ul>
This is a delicate area because in cases where the victim of a serious assault is in danger of dying, the investigator may have the opportunity to gain evidence by taking a statement from that victim; however, that statement would need to include some acknowledgement by the victim that they believed they are in imminent danger of dying (Sebetic, 1950).
<h4>Recipient of a Spontaneous Utterance</h4>
In cases where a witness hears a spontaneous utterance of a victim, the court may accept the witnesses restating of that utterance if, according to <em>Ratten v R </em>(1971):
<blockquote>… the statement providing it is made in such conditions of involvement or pressure as to exclude the possibility of concoction or distortion to the advantage of the maker or the disadvantage of the accused (<em>Ratten v R</em>, 1971).</blockquote>
<h3>Hearsay of Statement From a Child Witness Who is Not Competent</h3>
In cases where a child witness is not competent or available to provide evidence, the parent or another adult, who has heard a statement from that child, may be permitted to provide that information by way of hearsay to the court. These circumstances have been illustrated in case law from the case of <em>R v Khan&nbsp;</em>(1990). In this case, the mother of a 3 ½ year old girl was not present when the child was sexually assaulted by her doctor during an examination. However, immediately after the examination, the child made explicate statements of what happened to the mother and provided descriptions of acts that a child could not have made up. From this case, the court did consider hearsay evidence as an exception to the hearsay rule. The case of <em>R v Khan</em> created what has become known as the “principled approach” and it allows that hearsay evidence may be admissible if two conditions are proven. These conditions are necessity and reliability.

In <em>R v Khan </em>(1990), the S.C.C. defined <strong>necessity</strong> as instances where:
<ul>
 	<li>A child was not competent to testify by reason of young age;</li>
 	<li>A child is unable to testify;</li>
 	<li>A child is unavailable to testify; or</li>
 	<li>In the opinion of an expert psychologist providing testimony would be too traumatic and harmful to the child.</li>
</ul>
In <em>R v Khan&nbsp;</em><span>(1990)</span>, the court defined <strong>reliability</strong> factors as relating to the credibility of the person’s observations and these included:
<ul>
 	<li>When the hearsay statement was made about the offence;</li>
 	<li>The nature of the child’s demeanor;</li>
 	<li>The level of the child’s intelligence and understanding; and</li>
 	<li>The lack of a reason for the child to have fabricated the story.</li>
</ul>
Since the adoption of the <em>Khan Rul</em>e, the rules of hearsay have expanded on the principled approach that if the evidence is considered necessary to prove a fact in issue at the trial, the hearsay evidence being submitted is found to be reliable (Dostal,&nbsp;2012). To prove reliability, the crown must submit evidence that demonstrates the circumstantial guarantee of trustworthiness. This definition of reliability was further articulated in <em>R v Smith</em>:
<blockquote>"The criterion of "reliability" or the circumstantial guarantee of trustworthiness -- is a function of the circumstances under which the statement in question was made. If a statement sought to be adduced by way of hearsay evidence is made under circumstances which substantially negate the possibility that the declarant was untruthful or mistaken, the hearsay evidence may be said to be "reliable",&nbsp;i.e., a circumstantial guarantee of trustworthiness is established” (<em>R v Smith</em>, 1992).</blockquote>
An interesting aspect of hearsay evidence that sometimes confuses new investigators is that during any investigation, the investigator is searching out and retrieving hearsay accounts of events from various witnesses. From these hearsay accounts, the investigator is considering the evidence and using that hearsay information to form reasonable grounds to believe and take action. This is a totally acceptable and legally authorized process, and, if ever questioned in court regarding the process of forming reasonable grounds on the basis of hearsay, the investigator can qualify their actions by pointing out their intent to call upon the original witness to provide the court with the unfettered firsthand account of events. Investigators are merely the people empowered to assemble the available facts and information from various sources found in witnesses and crime scene evidence. As an investigator assembles the evidence they are empowered to form reasonable grounds for belief and take actions of search, seizure, arrest, and charges to commence the court process. Once in court, the investigator’s testimony will only relate to the things they have done in person or statements they have heard as exceptions to the hearsay rule while forming of reasonable grounds to take action.
<h2>Topic 11: Search and Seizure of Evidence</h2>
In order for items of physical evidence to be accepted by the court as exhibits, each item of evidence must meet the test of having been searched for and seized using the correct lawful authorities. There are a number of ways in which items of evidence may be legally searched for and seized.

Investigators may search for and seize or receive items of evidence:
<ul>
 	<li>By consent of the person being searched</li>
 	<li>On authority of a search warrant under Section 487(1) of the <em>Criminal Code of Canada</em></li>
 	<li>As part of a search incidental to the lawful arrest of a suspect</li>
 	<li>As part of a safety search incidental to the lawful detention of a suspect</li>
 	<li>Under the doctrine of evidence in plain view at a lawfully entered crime scene</li>
</ul>
It is important to note that when evidence is being presented to the court, the investigator will be held accountable to provide an explanation of the circumstances under which an item of evidence was searched for and seized. This may involve the investigator articulating not only details of how they discovered the item, but also circumstances to illustrate the offence committed and their authority to arrest, detain, and/or enter a crime scene lawfully

With similar accountability, when a Section 487(1) Criminal Code warrant is issued, the police are required in advance to swear an affidavit of facts articulating their reasonable grounds to believe that an offence has been committed and the evidence of that offence exists in the premises to be searched. This warrant and the affidavit of facts can be examined and challenged at the trial. As we proceed through this book we will discuss the process of developing the mental map that enables an investigator to meet the challenge of seeing and articulating the issues of lawful authority to search and seize evidence.
<h2>Topic 12: Exclusion of Evidence by the Court</h2>
In hearing any case, the court has the authority to either accept or exclude any piece of evidence being presented. An evaluation is applied to all evidence to determine if it will be admissible or excluded. The types of evidence that can be admitted or excluded range from the physical exhibits found at the crime scene, to the accounts of events provided by witnesses to a confession taken from a suspect. For investigators, it is important to understand that any piece of evidence could be challenged by the defence for exclusion. If challenged, the court will decide if evidence should be excluded based on a number of rules and depending on the type of evidence being presented.

In the case of witness evidence, the court will first consider if the witness is competent and compellable to give evidence. A competent witness is <em>generally</em> a compellable witness (<em>R v Schell</em>, 2004). Competent means legally qualified to testify, and compellable means legally permitted to testify. Witness competence and compellability are each decided based upon several factors that will be discussed later in the witness management portion of this book.

If a witness is found to be both competent and compellable, the court will hear their testimony and will then consider the value of the evidence provided after assessing the credibility of the witness. If a witness is found to be either not competent or not compellable, their evidence will be excluded at trial.

Like witness evidence, physical evidence is also evaluated by the court to determine its admissibility at trial based upon a number of factors. These factors will be discussed further in our chapter on crime scene management; however, they include:
<ul>
 	<li>If the evidence was lawfully seized</li>
 	<li>How the evidence was collected, marked, and preserved</li>
 	<li>If the evidence was somehow contaminated</li>
 	<li>If the chain of continuity for the evidence has been properly maintained</li>
</ul>
A flaw in any of these factors can result in evidence being excluded at trial. In addition, the court can completely exclude any evidence that has been obtained following a violation of the <em>Charter Rights and Freedoms</em> of the accused person. Such infringements on these guaranteed rights and freedoms would include:
<ul>
 	<li>Improper or unauthorized search of a person or a person’s property</li>
 	<li>Improper taking of a statement from a suspect by failing to provide the appropriate warning and caution under section 10 of the Charter</li>
 	<li>Failing to provide proper opportunity for the arrested or detained person to speak with counsel after arrest or detainment</li>
 	<li>Failing to properly disclose all the evidence prior to trial to allow the accused to make full defence to the charge</li>
</ul>
Section 24 of the <em>Canadian Charter of Right and Freedoms</em> states:
<blockquote>24. (1) Anyone whose rights or freedoms, as guaranteed by this Charter, have been infringed or denied may apply to a court of competent jurisdiction to obtain such remedy as the court considers appropriate and just in the circumstances.

(2) Where, in proceedings under subsection (1), a court concludes that evidence was obtained in a manner that infringed or denied any rights or freedoms guaranteed by this Charter, the evidence shall be excluded if it is established that, having regard to all the circumstances, the admission of it in the proceedings would bring the administration of justice into disrepute.

Practices regarding what evidence may be brought against an individual in&nbsp;trials&nbsp;are addressed by section 24(2). When evidence is obtained through the violation of a Charter&nbsp;right, the claimant is able to apply to have the evidence excluded from the trial under this section (Government of Canada, 2015).</blockquote>
The exclusion of evidence flowing from a Charter violation is not automatic, and there is significant case law that the court will consider to determine if evidence will be excluded.
<blockquote>In the case&nbsp;<em>R v&nbsp;Grant </em>(2009), the Supreme Court of Canada created a new test to determine when the administration of justice has been brought into disrepute (replacing the 1987 test in&nbsp;<em>R v Collins</em>). The&nbsp;Grant&nbsp;test lists three factors the courts must consider:
<p style="padding-left: 30px">(1) the seriousness of the&nbsp;Charter infringing conduct (focusing on a review of how society would view the actions of the state),</p>
<p style="padding-left: 30px">(2) the impact of the breach on the&nbsp;Charter protected interests of the accused (focusing on a review of how the state's actions affected the accused), and</p>
<p style="padding-left: 30px">(3) society's interests in the adjudication of the case on its merits (focusing on a review of the importance and reliability of the evidence)&nbsp;(<em>R v Grant</em>, 2009).</p>
</blockquote>
Knowing the rules for evidence collection, handling, and preservation can assist an investigator to avoid errors that could exclude evidence at trial. Following the rules that define Charter violations can assist an investigator to avoid having valuable evidence excluded completely at trial because of a charter violation. These topics will all be covered in more detail as we proceed through the various chapters to follow.
<h2>Summary</h2>
Evidence is a key feature to any investigation, so it is important for investigators to understand the various legal definitions of evidence, the various types of evidence, and the manner in which evidence is considered and weighed by the court. Evidence forms the building blocks of the investigative process and for the final product to be built properly, evidence must be recognized, collected, documented, protected, validated, analyzed, disclosed, and presented in a manner that will be acceptable to the court. As we proceed through this book, evidence will continue to be a key element for consideration in the development of proper investigative processes.
<div class="textbox exercises">
<h3 itemprop="educationalUse">Study Questions</h3>
<ol>
 	<li>What do we mean when we say that evidence will be considered by the court on its “probative value”?</li>
 	<li>What is direct evidence?</li>
 	<li>Provide three examples of direct evidence.</li>
 	<li>Can an accused be convicted of circumstantial evidence alone?</li>
 	<li>What is inculpatory evidence?</li>
 	<li>What is exculpatory evidence?</li>
 	<li>What is corroborative evidence?</li>
 	<li>What are the exceptions to the requirement of full disclosure?</li>
 	<li>Is hearsay evidence ever admissible in court?</li>
 	<li>When can evidence be excluded by a court?</li>
 	<li>If evidence was illegally obtained, is it automatically excluded by the court?</li>
</ol>
</div>
&nbsp;
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>399</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:08]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:08]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-3-what-you-need-to-know-about-evidence-2]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>395</wp:post_parent>
		<wp:menu_order>3</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 3: What You Need To Know About Evidence]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 4: The Process of Investigation</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-4-the-process-of-investigation-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:17 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-4-the-process-of-investigation-2/</guid>
		<description></description>
		<content:encoded><![CDATA[
<div class="textbox">

<em>“For the court to be satisfied that the investigator acted lawfully and within the bounds of legally prescribed authority, the judge needs to hear the investigator describe their thinking processes to form reasonable grounds, or in some emergency cases, to have a reasonable suspicion that justifies the action taken.”</em>

</div>
An effective strategy for learning any new skill is to define it and break it down into logical steps, establishing a progression that can be followed and repeated to reach the desired results. The process of investigation is no exception and can be effectively explained and learned in this manner. In this chapter, you will learn how each of the following issues relates to the process of investigation.
<ol>
 	<li>The distinction between investigative tasks and investigative thinking</li>
 	<li>The progression of the investigative process</li>
 	<li>The distinction between tactical investigative and strategic investigative responses</li>
 	<li>The concepts of event classification and offence recognition</li>
 	<li>The threat vs. action response dilemma</li>
 	<li>The distinction between active events and inactive events</li>
 	<li>The connection of active events and Level 1 priority results to the powers afforded under exigent circumstance</li>
 	<li>The Response Transition Matrix (RTM) and the critical need to transition from tactical response to strategic response</li>
</ol>
<h2>Topic 1:&nbsp;The Distinction Between Investigative Tasks and Investigative Thinking</h2>
To understand the process of investigation, it is necessary to comprehend the distinction between investigative tasks and investigative thinking. Investigative tasks relate to the information gathering processes that feed into investigative thinking and the results. Investigative thinking, on the other hand, is the process of analyzing information and theorizing to develop investigative plans. Let us consider this distinction in a little more depth.
<h3>Investigative tasks</h3>
Investigative tasks relate to identifying physical evidence, gathering information, evidence collection, evidence protection, witness interviewing, and suspect interviewing and interrogation. These are essential tasks that must be learned and practiced with a high degree of skill to feed the maximum amount of accurate information into the investigative thinking process. Criminal investigation is aimed at collecting, validating, and preserving information in support of the investigative thinking process. Accordingly, it is important to learn to do these evidence collection tasks well.
<h3>Investigative Thinking</h3>
Investigative thinking is aimed at analyzing the information collected, developing theories of what happened, the way an event occurred, and establishing reasonable grounds to believe. Those reasonable grounds to believe will identify suspects and lead to arrest and charges. Investigative thinking is the process of analyzing evidence and information, considering alternate possibilities to establish the way an event occurred and to determine if they are reasonable.
<h3>Topic 2: Progression of the Investigative Process</h3>
The investigative process is a progression of activities or steps moving from evidence gathering tasks, to information analysis, to theory development and validation, to forming reasonable ground to believe, and finally to the arrest and charge of a suspect. Knowing these steps can be helpful because criminal incidents are dynamic and unpredictable. The order in which events take place, and the way evidence and information become available for collection, can be unpredictable. Thus, only flexible general rules to structured responses can be applied. However, no matter how events unfold or when the evidence and information are received, certain steps need to be followed. These include collection, analysis, theory development and validation, suspect identification and forming reasonable grounds, and taking action to arrest, search, and lay charges.

In any case, as unpredictable as criminal events may be, the results police investigators aim for are always the same. And, you should always keep the desired results in mind to provide focus and priority to the overall investigative process. We will talk more later in this book about developing a mental map of the investigative process to assist in recording, reporting, and recounting events. It is mentioned now because a mental map is an appropriate metaphor to illustrate the investigative thinking process.

In this process, even though the path we will take to investigate may be unclear and unpredictable at first, the destination, <em>the results we seek in our investigation</em>, will always be the same and can be expressed in terms of <strong>results</strong> and their <strong>priorities</strong>.

Results and priorities focus first on the protection of the lives and safety of people. They focus second on the priorities of protecting property, gathering and preserving evidence, accurately documenting the event, and establishing reasonable grounds to identify and arrest offenders.

Priorities refer to Level One Priorities, as the protection of the lives and safety of people. This includes the protection and safety of the police officer's own life and the life and safety of other officers.

The Level Two priorities are the four remaining aforementioned results, and these may be considered equal value to each other. Depending on circumstances, a rationale can be made for choosing to concentrate on one Level Two priority at the expense of another depending on the circumstances presenting.

<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-02-1024x788.png" alt="Investigative Response Priority Results" width="1024" height="788" class="aligncenter size-large wp-image-400">

The critical point to be made here is that under no circumstances should an investigator ever choose to focus his or her efforts and attention to a Level Two priority if doing so would compromise the Level One priority of protecting the life and safety of a person, including police officers themselves. In the event&nbsp;that evidence is lost or destroyed, or that a suspect is not identified or apprehended because investigators were taking care of the Level One priority, that is a justifiable outcome. A response that would sacrifice the safety of people to achieve a level two priority would not be justifiable, and could even lead to civil or criminal outcomes against the investigators making such a choice.

Now that we have looked at the critical aspects of investigative tasks and the response priorities police investigators need to apply to decision making when they take action, we can proceed to examine the two different types of investigative response. We will refer to these as the <strong>Tactical Investigative Response</strong> and the <strong>Strategic Investigative Response</strong>.
<h2>Topic 3:&nbsp;Distinction Between a Tactical Investigative Response and a Strategic Investigative Response</h2>
These two different types of investigative responses are defined by the nature and status of the event that the investigator is facing. If it is an active event, it will require a Tactical Investigative Response and if it is an inactive event it will require a Strategic Investigative Response. It is important for an investigator to understand these two different levels of response because they include different response protocols, different legal authorities, and limitations to authority.
<h3>Tactical Investigative Response</h3>
Tactical Investigative Response is faced by operational officers who are engaged in the frontline response to criminal events. As mentioned earlier, police are often challenged to respond to events, sometimes life and death situations, where information is limited and critical decisions need to be made to take action. In these Tactical Investigative Responses, the responding officers often have little or no time to undertake the tasks of gathering information. They must rely on the information of a dispatched complaint, coupled with their own observations made once they arrive at the scene. If an officer takes the action of making an arrest or using force to bring the situation under control, they are accountable for the action they have taken, and they may be called upon by the court to articulate their thinking, albeit based on limited information.
<h3>Strategic Investigative Response</h3>
Once an investigator has arrived at the scene of an event and has brought the event under control by either making an arrest or by determining that the suspect has fled the scene and no longer poses a threat to the life or safety of persons, the investigation becomes a strategic investigative response. With this expiration of life and safety issues, also comes the expiration of exigent circumstances and the additional authorities to detain persons suspected and to enter and search private property without a warrant.

Clearly understanding and being able to define and articulate the circumstances of either an active event and tactical response, or a controlled event and a strategic response is critical. In court, it becomes important for a police investigator to describe what they were told going into the complaint, what they saw and heard when they arrived at the complaint, and, most importantly, what they were thinking to justify the action that was taken. For the court to be satisfied that the investigator acted lawfully, the judge needs to hear the investigator describe their thinking process to form reasonable grounds, or in some emergency cases, to have a reasonable suspicion that justifies the action taken.

To properly articulate their thinking in these investigative responses, it is important for the officer to understand the situational elements that can help define their thinking process when they testify in court. Two of the most important situational elements to understand are <strong>event classification</strong> and <strong>offence recognition</strong>.
<h2>Topic 4: Event Classification and Offence Recognition</h2>
In order to enter any investigation in either the tactical or the strategic response mode, an investigator must engage their thinking processes and make decisions about the event they are confronting. Is it an <em>active event</em> in progress that requires immediate and decisive tactical actions; or is it an <em>inactive event</em> where a less urgent, slower, and more strategic approach can be taken? This slower and more considered approach is the strategic investigative response, and the situational elements of this approach will be discussed in detail later in this chapter. Thinking about these situational elements of active event or inactive event is call event classification.

Considering the possible crime being committed in the event is called “offence recognition”, and this recognition of a specific offence activates the investigator’s thinking to look for the evidence that supports the elements of that recognized offence.
<h2>Topic 5:&nbsp;Classifying the Event as Either an Active Event or an Inactive Event</h2>
For each of these classifications of <strong>active event</strong> or <strong>inactive event</strong>, the investigator has some different legal authorities to put into action, as well as some immediate responsibilities for the protection, collection, and preservation of evidence. When attending the scene of any reported event, the investigator should assume that the event is active until it has been established to be inactive.

In many cases, an event can be re-classified as an inactive event when it is determined that the suspect has left the scene of the event, or the event has concluded by the suspect being arrested. In cases where the suspect is still at the scene of an active event, the investigator needs to be thinking about the possibility of detaining the suspect or making an arrest of that suspect for an offence in progress. To make that detention or arrest, the investigator should be thinking about what possible offence they are being called to investigate by the initial complaint, and also by the evidence they are seeing and hearing upon arrival.

The classification of active event or inactive event is critical. It is a distinction that will guide an officer to determine what powers of detention, arrest, use of force, entry to property, and search may be relied upon to take action. The defining elements between&nbsp;active event and inactive event are:
<h3>An Active Event</h3>
<ol>
 	<li>The criminal act is or may still be in progress at the scene.</li>
 	<li>The suspect is or may still be at the scene of the event.</li>
 	<li>The situation is, or may be, a danger to the life or safety of a person, including the life or safety of attending police officers.</li>
</ol>
<h3>An Inactive Event</h3>
<ol>
 	<li>The criminal act has concluded at the scene.</li>
 	<li>The suspect or suspects have left the scene or have been arrested or detained.</li>
 	<li>The situation at the scene no longer represents a danger to the life or safety of a person, including police officers.</li>
</ol>
<h2>Topic 6: Threat vs Action Analysis Dilemma</h2>
The critical elements of this <em>Threat vs. Action Analysis Dilemma</em> were demonstrated in what became known as “Active Shooter calls” flowing from the incident at Columbine High School in 1999 (Police Executive Research Forum, 2014). In this incident, two armed teenagers went on a shooting spree in the high school killing 13 people and wounding 20 others before turning their weapons on themselves and committing suicide. Officers responding to that call followed departmental protocols of that era. These protocols dictated they should wait for the arrival of their Emergency Response Team in events where armed suspect confrontations were taking place. The fact that these first responders waited despite ongoing killing taking place inside the high school led to a determination that police have a duty to take action in such cases, and waiting is not the correct response. As a result of these determinations, active shooter response protocols were adopted across North America and police agencies re-trained their personnel to respond to active shooters with more immediate action and strategies to enter and confront the shooters in order to protect lives of possible victims.

The <em>Threat vs. Action Analysis Dilemma</em> response protocols in the active shooter response situations now provide the standard or benchmark that a responding officer must consider when faced with the decision to enter a dangerous situation alone and take action, or to wait for back-up before entering to take action. For active shooter situations, the protocols across North America are now prescribed responses, where responding officers are trained to enter and confront with minimal back-up. That said, not every potentially dangerous <em>Threat vs. Action Analysis Dilemma</em> is going to be an active shooter. Responding officers will often be faced with other calls where danger exists to the safety of persons and the decision to enter or wait for back-up must still be made. In these cases, the responding officer must weigh the available information and respond or wait for back-up per their own threat vs risk assessment of the facts. The active shooter protocols have provided something of a calibration to this analysis where extreme ongoing threat to life and safety of person equals high duty and high expectation to take action.
<h2>Topic 7: Rules of Engagement for an Active Event or an Inactive Event</h2>
Police officers may be called to action by many different means. It may be a radio dispatch 911 call to attend an emergency, a citizen flagging down the passing police car to report an incident, or an officer coming upon a crime in progress. Whatever the means of being called to action, this is the first step of the police officer becoming engaged in a thinking process to gather and evaluate information, make decisions, and take action. The first step of this thinking process for the investigator is to make the evaluation and ask the questions:
<ol>
 	<li>Is this an<strong> Active Event </strong>requiring a<strong> Tactical Investigative Response? </strong></li>
 	<li>Is this an <strong>Inactive Event </strong>requiring a<strong> Strategic Investigative Response?</strong></li>
</ol>
As a subsequent part of this evaluation determining an Active Event or Inactive Event, the investigator should also be alert to the type crime being encountered. For example, is it an assault, a robbery, or a theft? From the perspective of police tactical investigative response, an investigator confronted with an active event must first assess the threat level. Is there a danger to the life or safety of persons that would require a <strong>Level One Priority Result</strong>, taking immediate action to protect life and safety of persons, including the life and safety of attending police officers?

In assessing these threat levels to life and safety, police are often faced with very limited information. Sometimes there is only a possible threat, or an implied threat to the life or safety of persons. In such cases, it is only necessary for the police to suspect that there is a threat to the life or safety of a person to evoke the extended powers provided by exigent circumstances. In these cases of implied threats, police are authorized to rely on the powers afforded by exigent circumstances to enter private property without a warrant and to detain and search suspects who may present a danger. These are significant powers and an investigator must be aware that if they use these powers, there is a strong possibility they will later be called upon to justify the exercise of those powers. Let us consider that section of the <em>Criminal Code</em> that authorizes officers to enter a dwelling without a warrant, and then apply that understanding to some scenarios:
<blockquote><strong>Authority to enter dwelling without warrant under the&nbsp;<em>Criminal Code of Canada</em></strong>

529.3 (1) Without limiting or restricting any power a peace officer may have to enter a dwelling-house under this or any other Act or law, the peace officer may enter the dwelling-house for the purpose of arresting or apprehending a person, without a warrant referred to in section 529 or 529.1 authorizing the entry, if the peace officer has reasonable grounds to believe that the person is present in the dwelling-house, and the conditions for obtaining a warrant under section 529.1 exist but by reason of exigent circumstances it would be impracticable to obtain a warrant.&nbsp;<span>(Criminal Code, 1985, s 529(1))</span>

Exigent circumstances
(2) For the purposes of subsection (1), exigent circumstances include circumstances in which the peace officer

(a) has reasonable grounds to<strong> suspect</strong> that entry into the dwelling-house is necessary to prevent imminent bodily harm or death to any person; or

(b) has reasonable grounds to <strong>believe</strong> that evidence relating to the commission of an indictable offence is present in the dwelling-house and that entry into the dwelling-house is necessary to prevent the imminent loss or imminent destruction of the evidence. (Criminal Code, 1985, s 529(2)(a,b))

<strong>Where warrant is not necessary pursuant to the <em>Criminal Code of Canada</em></strong>

487.11 A peace officer, or a public officer who has been appointed or designated to administer or enforce any federal or provincial law and whose duties include the enforcement of this or any other Act of Parliament, may, in the course of his or her duties, exercise any of the powers described in subsection 487(1)<span>(Criminal Code, 1985, s 487(1))</span>&nbsp;or
492.1(1) without a warrant if the conditions for obtaining a warrant exist but by reason of exigent circumstances it would be impracticable to obtain a warrant.&nbsp;<span>(Criminal Code, 1985, s 492(1))</span></blockquote>
<div class="textbox examples">
<h3 itemprop="educationalUse">Scenario #1</h3>
A uniform patrol officer receives a call to attend a complaint through radio dispatch. The 911 caller is reporting that he has just witnessed his neighbour punch his wife in the front yard and then drag her forcibly into their house. The responding officer is immediately able to classify this event as an <em>active event</em>. The officer’s <em>offence recognition</em> of the criminal act is that it is likely an assault and possibly a forcible confinement. Given this assessment, the situation requires a <em>Tactical Investigative Response</em>. The suspect is still at the scene and there is an ongoing possibility of danger to the life or safety of the suspect's wife. In this type of case, the officer can draw upon the extended powers under exigent circumstances to ensure the safety of the wife. Considering the information that has been reported, the officer may go to the residence with a view to using the necessary force to enter without a warrant to investigate the safety and well-being of the identified victim. If, after entering the home, further investigation provides evidence to confirm an assault, the officer can arrest the identified suspect for that offence. In this scenario, the information that allows the classification of the <em>active&nbsp;event</em>&nbsp;and the offence recognition is fairly clear in the reported circumstances.

</div>
<div class="textbox examples">
<h3 itemprop="educationalUse">Scenario #2</h3>
Sometimes an event cannot be immediately classified as either an active event or an inactive event. In these cases, where the information is less clear, the investigator may be justified to assume an ongoing danger to the life or safety of persons, and remain in the tactical investigative response mode utilizing the powers afforded under exigent circumstances to pursue the investigation until it is determined that an implied danger no longer exists. For example, consider the situation where police dispatch receives a 911 call from a woman crying. Before any further information can be obtained from the caller, the call is terminated from the caller's end. A patrol unit is dispatched to attend the residential address associated with the identified phone number. Upon arrival at the front door of the caller's address, attending officers are met by a male resident of the home who identifies himself as the home owner. The attending officers advise the male that a terminated 911 call from a crying woman was received from this address. The male states that there is nothing wrong in his home and he refuses to allow officers to enter the premises. The officers advise the male that they need to enter the premises to satisfy themselves that there is no ongoing threat to the life or safety of the crying woman caller. The officers warn the man that they will be entering the premises and if he resists he will be arrested for obstructing a police officer.<strong>&nbsp;</strong>

The man steps aside and the officers enter the home and find a woman in the bedroom area with a bleeding nose and a bruised face. The woman tells officers that the male, her husband, punched her in the face during an argument and when she attempted to call police he ripped the phone cord from the wall and struck her again. She states that he threatened to kill her if she cried out when the police came to the door. The man is arrested for assault, forcible confinement, and uttering threats. He is provided with his Charter Rights and warning, and he is then asked if he wishes to make any statement.

To evaluate this scenario, the officers had very little information in the first instance that would allow them to make a determination of active event or inactive event. The information to identify a criminal act was equally limited. Fortunately, case law has evolved to recognize this kind of information-limited case, and it provides a framework for making a response that can protect life and safety. In such situations, an officer is still empowered to act under the authority of “exigent circumstances”<strong>. </strong>Considering information-limited circumstances like this, the officer only needs to have a suspicion that there is a threat to the life or safety of a person to act. That threat may be simply implied by the circumstances being presented. In this case, the implied threat to life or safety of a person was the disconnected 911 call. The officers had a duty to attend and resolve the possible threat to life or safety of a person implied in this disconnected 911 call (<em>R v Godoy</em>, 1999).

</div>
As you might imagine, an officer attending the calls outlined in the preceding scenarios needs to be very clear on the circumstances where implicit distress and exigent circumstances can be interpreted to use the powers to enter private property. This same need extends to using appropriate levels of force and making an arrest. Considering these are active and still evolving criminal events, there is urgency to act. It is critical for the investigating officer to have a clear understanding of these principles to quickly assess the presented facts, make the event classification, and take the necessary action in an expedient manner.

As outlined earlier in this book, there is a significant difference between reasonable grounds to believe and reasonable grounds to suspect, and an officer who is not clear on the distinction might have a difficult time articulating to the court how and why they took the initiative to act or not to act. It is these types of cases, where there is implied distress, or an implied threat to life or safety, that an investigator must be clear on their interpretation of the event and on their authorities to take action. The thinking involved might be described as an active event and an explicit or implied threat to life or safety equals exigent circumstances.

<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-03-1024x268.png" alt="Active Event + Explicit or Implied Threat to Life or Safety = Exigent Circumstances" width="1024" height="268" class="aligncenter size-large wp-image-401">
<h3>More on Offence Recognition</h3>
At the same time the event is being classified as either active event or inactive event, the investigator should be engaging in the thinking process of offence recognition. In other words, what offence is being reported or what is the offence being observed in the fact pattern that is unfolding? With this offence recognition, the investigator will begin to assemble a mental inventory of the evidence and information that will be required to support the recognized offence(s). Having an offence in mind, the investigator will also begin to consider their range of powers and authorities that can be used under the law regarding that offence. The investigator will ask them self;
<ul>
 	<li>Is this a summary conviction offence where the suspect must be found committing to justify an arrest?</li>
 	<li>Or, is it an indictable or dual procedure offence where there is direct evidence or strong circumstantial evidence to support an arrest?</li>
</ul>
If the investigator determines that they are attending to an Active Event and their offence recognition suggests that there may be a danger to the life or safety of a person, such as assault causing bodily harm, they will know that they need only find evidence to form reasonable grounds to believe in order to make an arrest. As part of attendance to the scene of the event, the investigator should be classifying the location to determine what their legal requirements are for their authority to enter. Consideration of the possible authorities to enter private property would include:
<ul>
 	<li>Consent of the property owner</li>
 	<li>Section 487 CCC warrant to search</li>
 	<li>Exigent circumstances to suspect a need to protect the life or safety of a person</li>
 	<li>Exigent circumstance with reasonable grounds to believe there will be a destruction of evidence of an indictable offence</li>
 	<li>Fresh pursuit of a suspect found committing an offence</li>
</ul>
If the investigator arrives at the scene where a suspect is immediately apparent, the investigator can make an immediate detention or perhaps even an arrest. The investigator may rely on the Section 529 (2) of the <em>Criminal Code of Canada&nbsp;</em><span>(1985)&nbsp;</span>under exigent circumstance to enter private property without a warrant to make the arrest and ensure the safety of persons at the scene. If the investigator makes an arrest after forming reasonable grounds for belief, they are required by the <em>Canadian Charter of Rights and Freedoms</em> to tell the suspect what offence they are being arrested for.
<h3>Required Warnings</h3>
The following is the standard <em>Charter of Rights</em>&nbsp;(Canadian Charter, 1982, s 10(a,b)) warning and police warning. These standard caution warnings are given as follows:
<blockquote>I am arresting you (or detaining you) for [name of offence(s)].

<strong>POLICE WARNING</strong>
I wish to give you the following warning: You need not say anything. You have nothing to hope from any promise or favour, and nothing to fear from any threat whether or not you do say anything. Anything you do or say may be used as evidence.

Do you understand? (Transit Police, 2015)

<strong>CHARTER WARNING</strong>

You have the right to retain and instruct counsel without delay. You also have the right to free and immediate legal advice from duty counsel by making free telephone calls to [toll-free phone number(s)] during business hours and [toll-free phone number(s)] during non-business hours.

Do you understand?

Do you wish to call a lawyer?

You also have the right to apply for legal assistance through the provincial legal aid program.

Do you understand? (Transit Police, 2015)</blockquote>
Let us consider the following scenario to illustrate these principles in action.
<div class="textbox examples">
<h3 itemprop="educationalUse">Scenario</h3>
An officer is dispatched to attend the complaint of an assault with a weapon and determines that it is taking place in a residential dwelling house in a nearby subdivision. Upon arrival, the officer is met on the front lawn by a man claiming to have witnessed the owner of the home stab a visitor to the home during an altercation as a&nbsp;second male runs out the front door holding his side and bleeding from an apparent wound. A third man holding a bloody knife comes to stand in the front doorway and the witness identifies him as the owner of the home. The officer directs the man with the knife to drop it on the ground and step out of the residence. The man complies and is arrested for assault with a weapon.

</div>
From this fact pattern the investigator could make an immediate arrest for assault with a weapon. The investigator would seize the bloody knife and protect it as evidence of that offence. The facts within this scenario that allow the investigator to take action, enter the private property, and form their reasonable grounds for belief and make the arrest. When the case goes to court, the investigator of this case will articulate the chain of events along with their thinking to substantiate their reasonable grounds for belief. To achieve this, the investigator’s testimony would be that:
<ul>
 	<li>they were dispatched to attend a complaint of assault with a weapon in progress,</li>
 	<li>the suspect was still on scene and it was an active event,</li>
 	<li>considering the potential danger to life or safety of a person, they entered the property under the provisions of exigent circumstances,</li>
 	<li>an independent witness at the scene stated the home owner had stabbed a guest in the home,</li>
 	<li>a man bleeding from an apparent wound ran from the home, and</li>
 	<li>another man standing in the doorway was holding a bloody knife and was identified by the witness as the home owner.</li>
</ul>
The investigating officer arriving at the scene of this event would treat this as a Level One priority because there is an ongoing danger to the life and safety of persons. Under these circumstances, the <em>Criminal Code</em> authorities of exigent circumstances would apply. The investigator would be justified in detaining all parties present, including the witness and the victim, on the reasonable suspicion that they may all have been involved in combative behavior and might each still pose a threat to the life and safety of others, including the investigator. The powers of exigent circumstances are significant in this kind of scenario, and provide authority to take immediate action that will neutralize threats to the safety of people. Even if the facts of this assault with a weapon had evolved to show that it was taking place inside the private home of the suspect with the bloody knife, the authority of exigent circumstances would permit the investigator to enter that home without a warrant to protect the life and safety of persons. A very significant point to be made here is that as soon as the event is under control the <em>extended powers of exigent circumstances expire.</em>

Once this event has been brought under control and the threat to the life or safety of persons had been eliminated by arresting or detaining all persons present, the investigator must reclassify this event as&nbsp;an inactive event. As soon as this occurs, some of the rules of engagement and legal authorities to take action change, and the investigation must switch to a Strategic Investigative Response.

With the expiry of exigent circumstances and the switch to a Strategic Investigative Response, several factors change. If this assault with a weapon had been taking place in the suspect’s private home, and the investigator had entered under the authority of exigent circumstance, the authority to remain in the private residence and search it would expire. If the investigator needed to collect additional physical evidence in that home, such as blood from the stabbing assault, a warrant or consent to search would now be required.

In this type of case, the residence of the suspect could be locked down externally and all persons removed until a search warrant was obtained to complete the investigation. Evidence obtained up to the point where the arrest was made and before exigent circumstances expired would be lawfully seized without a warrant. This would include the seizure of the bloody knife as plain-view search or a search incidental to arrest. Anything else searched for and seized after the arrest could be challenged as an unlawful seizure if it was taken without a search warrant.

In addition to the requirement for search warrants, in some cases after exigent circumstances expire, other priorities and investigative must also change. As you will recall, the protection of life and safety of people is the Level One priority. With that priority, the court allows significant leeway to investigators in regards to the protection of crime scenes and the collection of evidence. If an investigator is attending any criminal event, the protection and collection of evidence always takes a backseat to the protection of life or safety of people. That said, once the life and safety issues have been resolved, the securing of the crime scene and the subsequent protection and collection of evidence becomes the number one priority.

Once the life and safety issues are resolved, it is time to lock down the crime scene and start protecting evidence for court. If it is possible to protect the life and safety of people and collect, protect, and preserve evidence, this is the preferred outcome. If it is not possible, the court will accept the fact that damage to evidence occurred prior to life and safety issues being resolved. Once those issues are resolved, the expectation is that a high level of care will be taken. If proper care is not taken, and evidence becomes contaminated, or continuity of possession is lost, the evidence may be ruled inadmissible at a trial. It is important for the investigator to fully grasp the construct that dictates when to transition from Tactical Investigative Response to Strategic Investigative Response.
<h2>Topic 8: Response Transition Matrix (RTM)</h2>
The <strong>RTM</strong> is a matrix tool to illustrate the considerations for police response when considering the authorities and issues to escalate or de-escalate from a Tactical Investigative Response to Strategic Investigative Response. Considering the following questions will help an investigator to identify an event as either a Tactical Investigative Response or a Strategic Investigative Response:
<ol>
 	<li>Is the event active or inactive?</li>
 	<li>What offence(s) is possibly occurring?</li>
 	<li>Do I suspect an implicit or explicit danger to the life or safety of a person?</li>
 	<li>Do I have reasonable grounds to believe evidence of an indictable offence will be lost or destroyed?</li>
 	<li>What immediate actions can be taken to protect the life or safety of persons?</li>
 	<li>What immediate action can be taken to protect evidence, without compromising life or safety?</li>
 	<li>Have life and safety issues been resolved, and should the change be made from Tactical Investigative Response to Strategic Investigative Response?</li>
</ol>
The <em>Canadian Charter of Rights and Freedoms</em>, the <em>Criminal Code</em>, and common law authorities provide police with both powers to act and limitations to taking action. In the Canadian justice system, both statutory law and case law have evolved to establish a range of authorities and police powers that allow rapid response at the more dangerous end of the matrix, and more time-consuming restrictions to act at the less threatening end of the matrix. The chart below illustrates the duty to act, the authority to act, and the priorities for action to consider.

<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-04-1024x1004.png" alt="Response-Transition-Matrix" width="1024" height="1004" class="aligncenter size-large wp-image-402">
<h2>Summary</h2>
In this chapter, we have discussed the progression of the investigative process and the key elements within the progression that must be considered by an investigator. These elements within the investigative process are the signposts on the roadway of a mental map. These signposts of active event or inactive event tell us to either take action within the extended authorities of exigent circumstances or to modify our response for an inactive event and recognize the need to make the transition to a strategic response. An investigator’s understanding of the changes in circumstances that define these situations and the change from active to inactive events can make the difference between successful and unsuccessful investigative outcomes.
<div class="textbox exercises">
<h3 itemprop="educationalUse">Study Questions</h3>
<ol>
 	<li>What is the difference between investigative tasks and investigative thinking?</li>
 	<li>What is the difference between Level One Priorities and Level Two Priorities?</li>
 	<li>What is the difference between a Tactical Investigative Response and a Strategic Investigative Response?</li>
 	<li>What is the difference between an active event and an inactive event?</li>
 	<li>When would an investigator consider the Threat vs. Action Analysis Dilemma?</li>
 	<li>When does an investigator have the authority to enter a dwelling house without a warrant?</li>
 	<li>Why is it important for an investigator to thinking about “offence recognition” at the same time they are thinking about whether a situation should be classified as an active event or an inactive event?</li>
 	<li>What is the Response Transition Matrix (RMT)?</li>
</ol>
</div>
&nbsp;
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>403</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:17]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:17]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-4-the-process-of-investigation-2]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>395</wp:post_parent>
		<wp:menu_order>4</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 4: The Process of Investigation]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 5: Strategic Investigative Response</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-5-strategic-investigative-response-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:25 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-5-strategic-investigative-response-2/</guid>
		<description></description>
		<content:encoded><![CDATA[
<div class="textbox">

<em>“The STAIR model is a tool a new investigator can use to start structuring and developing their own investigative thinking processes.”</em>

</div>
In this chapter, we will examine the operational processes of investigation. To this point, we have examined many definitions, concepts, and response protocols to set the stage for embarking on the strategic investigative response. If it can be said that there is a creative art anywhere in the processes of investigation, the strategic investigative response is where that creative art takes place. In this chapter, you will learn how each of the following concepts and processes relates to the strategic investigative response:
<ol>
 	<li>Avoiding the three big investigative errors</li>
 	<li>Recognizing the transition and implementing the strategic investigative response</li>
 	<li>Describing investigation as a process within the justice system</li>
 	<li>Utilizing the <strong>STAIR</strong> tool to work through the investigative process</li>
</ol>
<h2>Topic 1:&nbsp;Avoiding the Three Big Investigative Errors</h2>
In very fundamental terms, the three most common errors of the Strategic Investigative Response are:
<ol>
 	<li>Failing to identify and collect all the available evidence and information,</li>
 	<li>Failing to effectively analyze the evidence and information collected to identify suspects and form reasonable grounds to take action, and</li>
 	<li>Becoming too quickly focussed on one suspect or one theory of events and ignoring evidence of other viable suspect or theories that should be considered.</li>
</ol>
From the moment a police investigator is dispatched to attend an incident, the opportunity to gather and evaluate information and evidence occurs. It is not uncommon for new investigators to operate under the misconception that all the available evidence and information is going to be readily available and apparent to them at the scene. This is the misconception behind Error #1: failing to identify and collect all the available information and evidence. New investigators often don’t understand that some information and evidence can be elusive and will exist in secondary source locations that must be sought out. There is no room for complacency in the processes of collecting information and evidence. The investigator must be engaged at an elevated level of awareness to access secondary source locations. Information and evidence about the event needs to be actively looked for, recorded, and preserved in a manner that can analyzed, interpreted, and eventually presented in court.

In the first instance of collecting information and evidence, an investigator may become engaged in the process through several different means. It may be receiving information as circumstances provided by the dispatcher in the details of a 911 call, it may be a report from a citizen on the street, or it may even be an on-view situation where the investigator discovers a crime in progress. From the moment the process begins, information will be incoming and available in the form of things that are seen and heard personally by the investigator, and this includes witnesses statements received. In most investigative responses, these are the first level facts that the investigator receives to guide the immediate event classification and offence recognition. But, this information of initial complaint and first observations are not all the information that might be available. There is usually much more information and evidence to be found. This is where the extended task of information gathering begins. Consideration of pre-crime and post-crime activities of the suspect can produce evidence not available at the crime scene. Database searches for records of the suspect, victim, and witnesses, can have great value. This is where the investigator must proactively search. There are many possible sources of additional information and evidence to consider, such as:
<ul>
 	<li>CPIC (Canadian Police Information Center) for criminal records info, outstanding warrants and pointers to criminal association</li>
 	<li>Police RMS (Record Management Systems) PRIME AND PROS databases to provide information on past records of complaints, investigations of criminal activities, and historical criminal associations</li>
 	<li>ViCLAS (Violent Crime Linkage Analysis System) provides a database of searchable criminal conduct acquired from the past crimes of known offenders</li>
 	<li>MVB (Motor Vehicle Branch) records for current vehicles registered, driving record, physical descriptors, and resident address</li>
</ul>
These information data sources can all add to the personal observations made by the investigator regarding the scene of the crime. These along with the appearance and demeanor of suspects, victims, and witness; and information provided by those suspects, victims, and witnesses about the event can speak volumes. Now, add to this the physical exhibits of evidence specific to the criminal event as each of these might have meaning in their immediate form&nbsp;or may provide future meaning through forensic analysis.

Having gathered all of the available information from each of the possible sources and locations we have avoided making Error #1.

To avoid making Error #2, we must now analyse the information we have collected. It is not just information about the event and the fact-pattern that are important, it is also information about the people involved in the event and how they are connected within the fact pattern. Criminal records and police records of each person associated to the incident can provide valuable perspectives, such as people’s reputation, credibility, association to past criminal conduct, or even event-related connections between the players.

Evidence and information gathered about the event only exists at face value until the investigator undertakes the proactive process of evaluation and analysis to determine the information’s relevance to the investigation at hand. It may seem that the implications and meanings of the available information and evidence should be clear and, sometimes in simple investigations, it is clear. Sometimes, what you see is what you get. If there are eyewitnesses describing a clear fact pattern and an identified suspect, the investigation will be a straight forward matter of collecting the evidence for presentation to the court.

That said, it is not often that simple in criminal investigations. Frequently, a suspect has not yet been identified and the fact pattern of the crime is unclear. Without a proactive process of evidence&nbsp;analysis, it is not possible to reconstruct the event and recognize the implications and connections within the multiple layers of evidence and information. The indicators of motive, opportunity, and means may not be immediately apparent. If an investigator goes to a criminal event and all they do is record the facts at face value and collect the evidence that is visible on-site, the job is only half complete. They are merely recording the crime.

The outcomes of analyzing information and physical evidence can be truly significant. A focussed effort to analyze physical evidence and information can often yield results that contribute to establishing a fact pattern, identifying a suspect, and forming reasonable grounds for arrest and charges. Let us consider again the example of the <em>British Bow Street Runners&nbsp;</em><span class="s1">(Hitchcock, 2015)&nbsp;</span>who located a piece of wadding paper from the fatal bullet wound in the head of their victim. At that time, wadding paper was typically used when loading any firearm as a plug to compact the powder and direct the explosive force that discharged the bullet. Investigators could have easily recorded this exhibit and dismissed it as just another piece of wadding paper. Instead, they considered the implications. Their analysis of the information and evidence was done by comparing the torn edges of that wadding paper and making a physical match to the originating piece of wadding paper that was found in the pocket of their suspect. This critical piece of circumstantial evidence made the connection between the suspect and the crime, and it led to a conviction in court.

Error # 3 is commonly known as "tunnel vision". Over the years, commissions of inquiry into wrongful convictions have often determined that investigators in those cases had allowed themselves to fall prey to tunnel vision (MacCallum, 2008; Kaufman, 1998), This tendency to focus on a single suspect or a single theory of events can be pervasive, and even when other viable suspects are present and the physical evidence does not support their theory, investigators have been seen to continue with a single minded focus. Tunnel vision has happened frequently enough that investigators are now cautioned to be self-aware that anyone can fall prey to this error. As part of proper major case management, investigative team members are encouraged to challenge each other when they believe that evidence is being misinterpreted and a single suspect or theory is being exclusively pursued to the point where other viable suspects and theories are excluded or ignored.
<h2>Topic 2: Recognizing the Transition and Implementing the Strategic Investigative Response</h2>
As much as the tactical investigative response is driven by urgent circumstances that require immediate and decisive action to reach successful outcomes, strategic investigative response is driven by the complexity of circumstances. The investigator will need to take a slower and more deliberate approach. This means observing the rules of law that are more demanding of due process and the rules of evidence that are more demanding of adherence to protocols for crime scene management, evidence preservation, and evidence collection.

The situational elements that define a strategic investigative response are essentially the opposite of those for tactical investigative response. Specifically, the scene is now an inactive event because the suspect has left the scene or has been arrested, and there is no ongoing explicit or implied danger to the life or safety of persons including police. In the strategic investigative response, the Level Two priorities of protection of property, gathering and preserving of evidence, accurately documenting the event, and establishing reasonable grounds to identify and arrest suspects now become the paramount concerns. Switching from a tactical investigative response to a strategic investigative response is a transition point where mistakes can occur. These mistakes happen because the need to shift is not recognized and the transition to Level Two priorities is not engaged. The switch from an active event and tactical response to an inactive event and strategic response means locking down the crime scene to protect evidence and obtaining a warrant to continue the search for evidence.

This failure to transition may happen because the officers attending the scene of an active event are intensely focussed on the issues of protecting life and safety. Once those very critical issues of life and safety are resolved, the adrenaline is still flowing and shift to Level Two priorities can seem less significant than it really needs to be. Investigators need to be aware and recognize the requirement to transition to strategic investigative response and make it happen.
<h2>Topic 3:&nbsp;Describing the Investigation Process Within the System</h2>
Strategic investigative response process is slow-paced and deliberate. In this response there is a priority to collect and record the maximum amount of information and evidence for court. These tasks of strategic response include witness management, crime scene management, evidence collection, and documenting the event.

Once the determination has been made that the investigation is in strategic investigative response mode, the priorities for results change, and the investigator must start organizing their investigation of the crime being encountered. In cases where the circumstances are simple and the suspect is immediately apparent, this can be a straightforward matter of evidence collection and witness interviews. In other cases, where the facts of the case are not clear or the suspect is not immediately apparent, the tasks of investigation can be daunting, and it requires a more systematic approach. A thorough investigation is one with systems to:
<ul>
 	<li>Identify and collect all available evidence,</li>
 	<li>Identify all the witnesses, victims, and possible suspects,</li>
 	<li>Accurately document the criminal event,</li>
 	<li>Accurately document the investigative actions,</li>
 	<li>Develop theories of how the crime was committed and who may be a suspect, and</li>
 	<li>Formulate an investigative plan to form reasonable grounds and make an arrest.</li>
</ul>
It may be helpful to think about the Strategic Investigative Response like a big funnel where many sources of information and evidence pour data into the top of the funnel. That data passes through the investigative filters of analysis to determine the possibilities, developing theories to identify the best probabilities, and investigating to test those theories against known evidence and facts. It narrows itself down to inculpatory evidence that will support reasonable grounds for belief, or exculpatory evidence that will show innocence and eliminate suspects. Sufficient inculpatory evidence can tip the scale to give police reasonable grounds for belief to take action of arrest and finding proof of guilt beyond a reasonable doubt provides the court with the ability to make a finding of guilt. Exculpatory evidence tips the balance to support the presumption of innocence for the accused.

<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-05-829x1024.png" alt="Investigative-Process-Funnel" width="829" height="1024" class="aligncenter size-large wp-image-404">
<h2>Topic 4: Utilizing the STAIR Tool to Work Through the Investigative Process</h2>
At this point in our study of the investigative process, it is necessary to examine a structured process for strategic investigative response. To illustrate a system for strategic investigative response that can assist an investigator in thinking through the investigative process, we will use a model called the <strong>STAIR</strong> tool. Organized thinking and the ability to articulate a structured response cannot flow from a disorganized process. Through experience over time, most police investigators learn to structure their thinking, their investigative process, and their response priorities. Each investigator learns to build one's own mental road map.

The methods and mental mapping of the <strong>STAIR</strong> tool illustrated here are not an attempt to change the current reality of investigative thinking, it is merely the model of a process to illustrate the thinking used by many investigators. A new investigator can use this tool to start structuring and developing an investigative thinking processes.

Every day, operational police officers are tasked to respond to incidents in a never ending variety of scenarios. Arriving at the scene of an incident, the police investigator is usually at the disadvantage of not knowing many of the facts. The investigator is challenged to gather the available information and analyze what is relevant with a goal of responding quickly, effectively, and appropriately. An effective and appropriate response is a response where the investigator has made decisions according to a predetermined set of priorities. For the investigator, these priorities and the desired results should always be protecting the life and safety of persons, protecting property, gathering and preserving evidence, accurately documenting the event, and establishing reasonable grounds to identify and arrest offenders. With these results in mind, we can start by remembering that in every reported incident, a police investigator is met with a situation <strong>Situation</strong> that must be resolved. With this situation understood immediate <strong>Tasks </strong>must then be undertaken to protect life and safety, gather relevant information, preserve evidence, and identify offenders. Lastly, in every situation, the information discovered must be <strong>Analyzed</strong> to inform and guide the <strong>Investigation</strong> that must happen to reach the desired <strong>Results</strong>.

To become more self-aware, an investigator might imagine oneself working through this process and creating a mental map of the road to be traveled for each investigation. This mental map can later be articulated, describing one's thinking process and responses, observing the law as rules of the road, describing landmarks of evidence, navigating curves in the fact patterns, backing out of the dead ends of false leads, and validating the evidence discovered that led to a&nbsp;final destination. Ideally, that destination is the positive identification of a suspect and sufficient evidence to make an arrest and provide the court with proof beyond a reasonable doubt.

Later, when preparing notes, reports, court briefs, and testifying in court, the investigator will be able to recall their mental map and articulate their decision-making process to form the necessary reasonable grounds for belief to take action. If the crime remains unsolved and the investigation concludes as a cold case, the notes and reports describing the mental road map of the investigation remain on file for the next investigator who will be able to gain a clear picture of the investigation to date.
<h6><strong>S</strong><strong>ITUATION:</strong><strong>&nbsp;achieving a big picture view of the event to classify and prioritize a response</strong></h6>
<ul>
 	<li>Break out the known facts of the event</li>
 	<li>Offence classification – active event or inactive event</li>
 	<li>Identify all the players – victims, witnesses, and suspects</li>
 	<li>Offence recognition – identify the possible offence or offences being encountered</li>
</ul>
<h6><strong>T</strong><strong>ASKS:</strong><strong>&nbsp;focus on the results and the priorities of those results based on event status </strong></h6>
<ul>
 	<li>Tactical investigative response on active event – Level 1: resolve life and safety issues</li>
 	<li>Strategic investigative response on inactive event – Level 2: priorities engaged</li>
 	<li>Crime scene management – evidence identification, evidence preservation, and evidence collection</li>
 	<li>Canvassing for witnesses – witness interviewing</li>
</ul>
<ul>
 	<li>Profiling the players – use all police data base information – CPIC, PRIME, PROS</li>
 	<li>Document the event – notes, reports, photographs, diagrams, videos</li>
</ul>
<h6><strong>A</strong><strong>NALYSIS:</strong>&nbsp;examining<strong> the reported facts, the observed facts, and the physical evidence</strong></h6>
<ul>
 	<li>Make observations and connections between people and circumstances</li>
 	<li>Enhance the meaning of physical evidence by forensic analysis</li>
 	<li>Determine evidence of motive, opportunity, and means to commit the offence</li>
 	<li>Create timelines of activities</li>
 	<li>Develop assumptions and theories that will guide the investigative process</li>
 	<li>Develop investigative plans based on theories</li>
 	<li>Authentication of the event - did it occur at the time, at the place, and in the manner being reported, or is the report a fabrication?</li>
</ul>
<h6><strong>I</strong><strong>NVESTIGATION:</strong><strong>&nbsp;validating the facts through corroboration of witness accounts and evidence</strong></h6>
<ul>
 	<li>Prioritize the best investigative plans based on most likely theory</li>
 	<li>Test theories against information and evidence discovered through investigation&nbsp;to identify suspects and form reasonable grounds</li>
 	<li>Return to analysis to form new theories or modify theories as new facts are found</li>
</ul>
<h6><strong>R</strong><strong>ESULTS:</strong><strong>&nbsp;prioritizing and focussing on the results to guide the investigative process</strong></h6>
<ul>
 	<li>Protection of the lives and safety of people</li>
 	<li>Protection of property</li>
 	<li>Gathering and preserving evidence</li>
 	<li>Accurately documenting the event</li>
 	<li>Establish reasonable grounds to identify and arrest suspects</li>
</ul>
<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-06-788x1024.png" alt="STAIR-Tool" width="788" height="1024" class="aligncenter size-large wp-image-405">

<em>Please note: The STAIR investigation tool as developed and depicted in this book is based on the author’s conceptual modification of the STAR technique which is commonly used as a tool for behavioural interviewing.&nbsp;</em>
<h2>Summary</h2>
In this chapter, we have focussed on the strategic investigative process and described the <strong>STAIR</strong> tool as a means of illustrating and working through the investigative process. This is a process that can be likened to climbing a set of stairs, whereby getting to the top (<strong>Results</strong>) requires taking one step at a time from the bottom (the <strong>Situation</strong>). The second step (<strong>Tasks</strong>) then leads to a third step (<strong>Analysis</strong>) and the fourth step (<strong>Investigation</strong>). At this point, the investigator can expect to take a step back more than once to do further <strong>Analysis</strong>. In any case, the goal is always to get to the top of the stairs. Skipping any of these steps will likely lead an investigator to miss an important part of the process.

As with the preceding chapters, the intent here is simply to assist you in defining and visualizing the investigative process. This delineation should help you to conceptualize investigation as a structured process. This is a process consisting of practices of information and evidence collection, analysis, theory development, and investigative planning, pointing toward achieving consistent outcomes. In the chapters that follow, you will be challenged to apply this thinking in some scenario exercises.
<div class="bcc-box bcc-info">
<h3 itemprop="educationalUse"><strong>Study Questions</strong></h3>
<ol>
 	<li>What are the three most common errors investigators make in applying the Strategic Investigative Response?</li>
 	<li>What five groups of tasks must an investigator follow through on to complete a thorough investigation?</li>
 	<li>What categories of tasks are involved in the <strong>Situation</strong> component of the STAIR tool?</li>
 	<li>What categories of tasks are involved in the <strong>Tasks</strong> component of the STAIR tool?</li>
 	<li>What categories of tasks are involved in the <strong>Analysis</strong> component of the STAIR tool?</li>
 	<li>What categories of tasks are involved in the <strong>Investigation</strong> component of the STAIR tool?</li>
 	<li>What categories of tasks are involved in the <strong>Results</strong> component of the STAIR tool?</li>
</ol>
</div>
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>406</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:25]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:25]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-5-strategic-investigative-response-2]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>395</wp:post_parent>
		<wp:menu_order>5</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 5: Strategic Investigative Response]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 6: Applying the Investigative Tools</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-6-applying-the-investigative-tools-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:26 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-6-applying-the-investigative-tools-2/</guid>
		<description></description>
		<content:encoded><![CDATA[
<div class="textbox"><em>“As you proceed through the STAIR tool, the process of <strong>Analysis</strong> and <strong>Investigation</strong> can become somewhat circular – as the investigation reveals new information, and new information is analyzed to confirm, disprove, or modify the theories of suspects and events that are being considered.”</em></div>
In this chapter we will work through some investigative <strong>STAIR</strong> scenarios to demonstrate the required investigative awareness required to transition from the tactical investigative response to the strategic investigative response. Once in the strategic response mode we will practice applying theory development to conduct our analysis of the evidence and information found and we will create investigative plans.

This chapter presents two investigative scenarios each designed to illustrate steps of the <strong>STAIR</strong> tool allowing the student to recognize both the tactical and the strategic investigative responses and the implications of transitioning from the tactical to the strategic response.

In the strategic investigative response of the second scenario, the student is challenged to work through an exercise of identifying the available information and evidence and developing theories in order to guide their investigative plans.
<h2>Topic 1: Beginning With Your End in Mind and Focusing on <strong>Results</strong></h2>
Any investigation an investigator embarks upon must focus on the desired <strong>Results </strong>to guide the thinking and investigative action. If we know where we are going and what our results need to be, we will know how to prioritize our actions to reach those results. Setting and monitoring priorities is a critical piece of the mental mapping process. A police investigator needs to know that whatever course of action taken to achieve a&nbsp;result, it will be incumbent upon the investigator later to provide a reasonable and justifiable explanation of how and why that chosen course of action was taken. Understanding and keeping these <strong>Results</strong> in mind while entering a <strong>Situation</strong> allows better clarity to define the priorities and develop the immediate investigation and action plan.

As mentioned above, in defining and assigning priorities to the <strong>Results</strong>, the top priority is very clear: protecting the life and safety of persons. Achieving the other priorities will sometimes be sacrificed to make certain this primary priority is achieved. Protecting property, gathering and preserving evidence, accurately documenting the event, and establishing reasonable grounds to identify and arrest offenders are all important, but are considered secondary results. These individual <strong>Results</strong> may also sometimes be sacrificed, one in favor of the other, depending on the way events unfold. The setting and defining of priorities for <strong>Results</strong> will be further illustrated and practiced in several scenarios presented below. For now, with our <strong>Results</strong> concept in mind, let us apply the <strong>STAIR</strong> tool in the following scenario.
<div class="textbox examples">
<h3 itemprop="educationalUse">Scenario #1</h3>
You are working as a uniform patrol officer in a one-person marked police cruiser. It is 9 PM on Saturday evening, and you receive a radio call from dispatch assigning you to attend a domestic dispute complaint in a residential neighborhood. Dispatch advises you that the call has been received from a neighbor to the home where the domestic dispute is taking place.

The caller, Bill Murphy, reports to dispatch that he heard a woman screaming and, when he went outside, he saw his neighbour, Randy Smith and Randy’s wife, Jane, standing on their front lawn yelling at each other. He then saw Randy strike Jane in the face with his fist, and drag her by the hair back into the house. He can still hear them yelling, and he heard some crashing noises coming from their house. He does not know if there is alcohol involved, although he does know that Randy often drinks heavily. No weapons were seen, and the neighbor does not know if Smith owns any firearms. The Smiths have two young sons, eight years and four years of age. The neighbor did not see the two boys.

</div>
In this <strong>Situation</strong> phase of our <strong>STAIR</strong> tool, you have been provided with a limited amount of information. You start by breaking down the information into components:
<ul>
 	<li>A witness, Bill Murphy, has identified his neighbour as having assaulted a woman, identified as the suspect’s wife, Jane</li>
 	<li>Suspect identified is Randy Smith</li>
 	<li>Victim identified as Jane Smith</li>
 	<li>Randy Smith may be a heavy drinker, and alcohol may be a factor</li>
 	<li>This is an active event and it may still be in progress as noise from the house continues</li>
 	<li>The offence recognition would define this as an assault and possibly forcible confinement</li>
 	<li>Persons who may have their safety in danger are Jane Smith and her two young sons</li>
 	<li>The incident is reported as being currently confined to inside the house; however, the incident was, at one point, on the front lawn of their home</li>
</ul>
Keep in mind that to investigate this incident and to act in the execution of your duties, each piece of the foregoing information may be considered and acted upon as the truth, until it has been verified. Each piece of information here can contribute to the forming of reasonable grounds to enter onto private property or to make an arrest. Each piece of information you have can assist in forming beliefs regarding the safety of persons.

Remember that we begin with our end in mind considering our <strong>Results. </strong>At this stage of the investigation, there appears to be an immediate threat to the safety of Jane Smith. Domestic disputes are always emotionally charged situations, and it is reasonable for attending police officers to consider that their own personal safety will also be at risk. This is definitely a Level 1 Results priority.
<h3>Tasks</h3>
As you proceed to attend to the area of the call, you embark upon the <strong>Tasks</strong> portion of the <strong>STAIR</strong>&nbsp;tool.
<h4>Task 1: <em>Responding in the Correct Mode</em></h4>
In this case, the report identifies an active event where the suspect is still at the scene and criminal activity may still be in progress. You will be responding in Tactical Investigative Response mode.
<h4>Task 2: <em>Identifying the Players in the Event</em></h4>
<ul>
 	<li>Randy Smith</li>
 	<li>Jane Smith</li>
 	<li>Two sons – ages 8 years and 4 years old</li>
 	<li>Witness Bill Murphy</li>
</ul>
<h4>Task 3: <em>Breaking out the Facts of the Event</em></h4>
In this case, possible criminal actions witnessed by the neighbor indicate that an assault has taken place. The wife was struck in the face and dragged into the house. There may be a forcible confinement taking place. Your offence recognition, in this case, is focused on two possible offences: assault and forcible confinement. You recognize that each of these offence types is an indictable offence for which an arrest can be made if you form reasonable grounds to believe the offence(s) have been committed by Randy Smith.
<h4>Task 4: <em>Gathering All Additional Information That Might be Available</em></h4>
Faced with these circumstances, additional information would assist in making a risk/threat assessment. You proceed to the CPIC and PRIME - RMS databases to determine:
<ul>
 	<li>Criminal record information on both Randy and Jane Smith</li>
 	<li>History of previous calls to this residence</li>
</ul>
From CPIC, you determine that Randy Smith, of this address, has a record for Impaired Driving. There is no criminal record for Jane Smith. Police Records Information Management Environment (RMS) shows a previous complaint of a domestic dispute at this same residence 11 month ago. At that time, Randy Smith was arrested but not charged with assault. Jane Smith, the complainant in that case, would not proceed with charges, and there were no independent witnesses to the assault.
<h3><strong>Analysis </strong></h3>
For a police officer attending the scene of an in-progress event, it is important to consider the issues of safety and ongoing threats to safety to know how best to approach the scene and what immediate actions can be taken. As is the case with many in-progress events, there is a concern for the safety of all persons. In this case, the wife, Jane Smith, has reportedly been assaulted and dragged back into the premises. There are possibly two young sons also at the premises. Whenever there is a concern for the safety of persons, exigent circumstances exist and a police officer has extensive powers for the entry onto private property, if necessary, to detain any persons present to secure the scene and stop the continuation of an offence.
<h3><strong>Investigation</strong></h3>
Considering the explicit threat to the safety of Jane Smith, and a possible implied threat to the safety of the two sons, the issue of the safety of persons here is clear. Since this is a domestic violence complaint, there is also an implied danger to all police officers attending that must also be considered. In this case, you call for a backup patrol unit to attend. Your <em>tactical investigative response</em> plan is to approach the premises using concealment and cover as you and your backup unit assess what you can hear and see as you approach the scene.

You decide that if you do not hear or see any ongoing immediate threat, you will approach by knocking on the front door and making contact. If you do see or hear evidence to indicate there is an ongoing threat to the safety of a person (e.g. ongoing assault), you know you can enter the premises without a warrant under exigent circumstances to protect the safety of persons. You know you have an eyewitness to the offence of assault, and, with this piece of witness evidence alone, you have formed reasonable grounds to believe the offence of assault has taken place. The added information of possible alcohol involvement and past record of domestic assault complaints can be considered in the evaluation of the threat level to engage the extended authorities of exigent circumstances.

As you walk towards the house, the neighbor/witness, Bill Murphy, approaches you and states that Randy Smith just left the premises alone in his blue Dodge truck. You can see a woman and two young boys looking out the front window of the premises.

Your event classification now must change to an inactive event, and you transition to a <em>strategic investigative response</em> mode. The <strong>Results </strong>priorities now change as well. Your new priorities become:
<ol>
 	<li>Gather and preserve evidence:
<ol>
 	<li>Interview witness Bill Murphy</li>
 	<li>Interview the victim Jane Smith</li>
 	<li>Take photographs of any injuries to the victim</li>
 	<li>Determine if there are other witnesses available</li>
 	<li>Determine if other physical evidence, weapons, and/or liquor bottles are present</li>
</ol>
</li>
 	<li>Accurately document the event
<ol>
 	<li>Take the statement of witness Bill Murphy</li>
 	<li>Take statement of the victim, Jane Smith</li>
 	<li>Make personal notes</li>
 	<li>Complete an occurrence report</li>
</ol>
</li>
 	<li>Establish reasonable grounds to identify and arrest an offender
<ol>
 	<li>Verify that an offence has occurred</li>
 	<li>Verify the type of offences (e.g. assault, or assault causing bodily harm, and/or forcible confinement, and possibly impaired driving)</li>
 	<li>Verify the identity of Randy Smith as the person responsible for identified offences</li>
 	<li>If an offence and an identity of the suspect are verified, broadcast a “Be On Lookout For (BOLF)” to arrest Randy Smith for assault</li>
</ol>
</li>
</ol>
In this case, the offender was easily identifiable. This is true of many in progress occurrences that police attend. These types of cases are often handled in the progression described above, starting off as a tactical investigative response and transitioning to a strategic investigative response mode.

In cases where the offender is not immediately identifiable, or the fact pattern of the event is not clear, the investigation becomes more complex and protracted. These are the cases where the strategic investigative response will include analyzing the information and evidence to develop theories, to identify possible suspects, and to test possible fact patterns against the physical evidence and timelines.

To examine this process of strategic investigative response, we will look at a more complex scenario where additional skill sets and strategies need to be considered within the <strong>STAIR</strong> Tool.
<div class="textbox examples">
<h3 itemprop="educationalUse">Scenario #2</h3>
You are in a marked patrol vehicle, and you are dispatched to attend a local jewelry store where a robbery has just taken place. It is August 15, 2017, 4 PM on Saturday. The store is in a strip mall complex on the main street of your city. You arrive at the scene to take the complaint and investigate.

The store manager reports that at approximately 3:30 PM, three suspects entered through the front door of the store from the front parking lot. All three suspects were wearing ski masks, gloves, blue jeans, and dark jackets. All three were armed with handguns. One suspect stood guard at the front door and the other two entered the store yelling at everyone to lay face down on the floor. There were three customers in the store: two elderly women shopping together and one young woman approximately 25 years of age.

There were also two store employees working at the time. One is the store owner/manager and the other is a female sales clerk. After everyone was on the floor, the two men started smashing glass display cases and dumping the contents into white cloth bags that they had with them. One robber demanded that the manager open the cash register, which he did. There was only approximately $350 in the cash register, which was typical because most customers use credit or debit cards. The manager estimates that approximately $120,000 worth of inventory was stolen. The most valuable items taken were diamond rings and high-end designer wrist watches. Watches have serial numbers and are identifiable, and some of the diamonds are identifiable by laser micro-engraving.

The entire robbery happened in just under five minutes and, when the robbers left the store, they ran south around the corner of the building. No vehicle was seen.

</div>
<h3>&nbsp;<strong>Situation</strong></h3>
Using the <strong>STAIR</strong> tool, as you approach the scene, you are aware that the suspects have left the crime scene and this is an inactive event. Although aware of the possibility that you may see suspects leaving the area of the crime scene, your arrival and approach to the crime scene do not require the tactical investigative response of an active event. The immediate danger to the life and safety of persons at the crime scene has passed. You are in the strategic investigative response mode. Beginning with your end in mind, you now consider what will be the <strong>Results</strong> for this case:
<ul>
 	<li>Protecting the life and safety of persons at this crime scene is no longer an issue because the armed suspects have now left the scene</li>
 	<li>Protecting property will be an issue because $120,000 worth of merchandise and $350 in cash have been taken and need to be recovered</li>
 	<li>Gathering and preserving evidence will be an issue because there are witnesses to interview at the scene and possibly physical evidence left behind by the suspects</li>
 	<li>Accurately documenting the event will be necessary</li>
 	<li>Establishing reasonable grounds to identify and arrest offenders will certainly be the desired outcome</li>
</ul>
<h3><strong>Tasks</strong></h3>
With our <strong>Results</strong> priorities clearly in mind, you now undertake some specific <strong>Tasks</strong> of the <strong>STAIR</strong> tool:
<ul>
 	<li>Secure the crime scene</li>
 	<li>Examine the crime scene and call upon forensics for evidence collection</li>
 	<li>Broadcast a description of the suspects and incident details as a BOLF</li>
 	<li>Identify all witnesses and victims present</li>
 	<li>Run each witness and victim through police databases to determine any criminal records, history of criminal conduct, or association to known criminals</li>
 	<li>Take individual statements from each witness and victim</li>
</ul>
After completing your victim and witness interviews and your database searches, you have the first pieces of information from which the <strong>Analysis </strong>component can begin. Your forensic team is at the scene dusting for fingerprints and photographing the damage.
<h3><strong>&nbsp;</strong><strong>Analysis</strong></h3>
As mentioned above, <strong>STAIR</strong> will assist in developing strategies to guide the <strong>Investigation </strong>efforts. Based on the Strategic Investigative Response Funnel, all incoming information is flowed into the top of the funnel to start the process of analysis. The analysis begins by considering each of the individual known facts about the incident. In this case, the facts to be considered include:
<ul>
 	<li>Date of offence:&nbsp;Saturday August 15, 2012</li>
 	<li>Time: 4 PM</li>
 	<li>Location:&nbsp;jewelry store in down town strip mall</li>
 	<li>Owner/manager and one employee present (witnesses)</li>
 	<li>Two elderly women shopping together present (witnesses)</li>
 	<li>One 25-year-old female shopper present (witness)</li>
 	<li>Three apparently male suspects entered the store through front door</li>
 	<li>All suspects were wearing ski masks, gloves, blue jeans, and dark jackets</li>
 	<li>Each suspect had a handgun</li>
 	<li>One suspect stood guard</li>
 	<li>Two suspects entered the store</li>
 	<li>Suspects told everyone to lay on the floor</li>
 	<li>Suspects smashed display cases and loaded jewellery and watches into bags</li>
 	<li>Each suspect carried away the stolen goods in white bags</li>
 	<li>One suspect had the manager open the cash register and took $350 cash</li>
 	<li>Approx. $120,000 worth of jewellery was taken</li>
 	<li>Some of the watches and diamonds stolen are identifiable by serial numbers</li>
 	<li>Suspect fled out the front door and south around the corner of the building</li>
 	<li>No vehicle was seen</li>
 	<li>Entire robbery took under five minutes</li>
</ul>
To continue this <strong>Analysis,</strong> we start by reflecting on some of the theories we might evolve considering the facts of this case. This will begin the process of developing theories and formulating investigative plans to identify suspects and search for new evidence that either confirms or disproves those theories.
<ol>
 	<li>What theories might you have about the time and location of this offence?</li>
 	<li>Can you develop any theories about the level of planning that went into the robbery?</li>
 	<li>Consider theories about how well these three suspects know each other.</li>
 	<li>Is it possible that the suspects had been at the store sometime prior to this robbery?</li>
 	<li>What relevant theories might be considered from the way the suspects were dressed?</li>
 	<li>What relevant theories might be considered from the fact that the robbers carried handguns?</li>
 	<li>What theories might be considered from the way the robbery was carried out?</li>
 	<li>What theories might be considered regarding the items taken?</li>
 	<li>Theorize and consider if these three suspects were&nbsp;working alone.</li>
 	<li>Theorize who else might be involved.</li>
</ol>
Think about the fact pattern of this incident and answer these questions. In this process, you will engage your imagination and your deductive reasoning skills to consider the possibilities and develop theories to guide your investigative plan going forward. In this step of the <strong>Analysis </strong>process in the&nbsp;<strong>STAIR</strong>, what logical theories can you develop to explain how this crime may have been committed, and who may have been involved? Try and develop at least two or three alternate theories. As you answer each question, consider different avenues of investigation you might follow to confirm or disprove some of your theories. Can aspects of your theories be confirmed or disconfirmed against an examination of the existing physical evidence?
<h3>Investigation</h3>
As you proceed through the <strong>STAIR</strong> tool, the process of <strong>Analysis</strong> and <strong>Investigation</strong> can become somewhat circular, as the investigation reveals new information, and new information is analyzed to confirm, disprove, or modify the theories of suspects and events that you are considering.

<strong><em>Do your theories present any avenues where you can investigate further to gain additional information?</em></strong>

Outline your own analysis, assumptions, deductions, and theories. Outline the further avenues for investigations that you can undertake in this case. After you have completed your own analysis, theory development, and investigative plans, move to the end of this chapter and check your assumptions, analysis, theories, and investigative plans against the answers provided there.
<h2>Topic 2: Getting Answers in the Robbery Scenario</h2>
<ol>
 	<li><strong>What theories might you consider about the time and location of this offence?</strong>
<ul>
 	<li>The fact that the jewellery store is in a strip mall may have been a factor in the robbers selecting this location as a target. This type of business premises allows for drive by viewing of the inside of the premises, as well as quick access and exit to the outside parking area. This location also allows for the suspects to maintain an ongoing look-out for approaching police response.</li>
 	<li>The time of the offence could have been intentionally chosen closer to the end of the day on a Saturday in the hope that more cash would be in the store. Depending on the typical customer traffic volume in the mall area on a Saturday, the suspects may have hoped for more traffic volume to assist with their escape.</li>
</ul>
</li>
 	<li><strong>Can you develop any theories about the level of planning that went into the robbery?</strong>
<ul>
 	<li>Since the suspects arrived in disguise, armed with handguns, and carrying bags to take away the proceeds of the robbery, it might be theorized that they took some time to put together this special equipment to carry out the crime.</li>
 	<li>The precision with which the robbery was carried out (e.g. completed in five minutes, one suspect guarding the door, all persons ordered onto the floor) would indicate a high level of planning to orchestrate this robbery.</li>
</ul>
</li>
 	<li><strong>How well did these three suspects know each other?</strong>
<ul>
 	<li>It is very likely that the three suspects knew each other well enough to establish the level of trust required to carry out the robbery.</li>
 	<li>The type of goods taken in this robbery, except for the cash, would need to be converted to cash to be divided up later. This could indicate that a longer term relationship exists between these robbers.</li>
 	<li>The planning that is apparent would indicate that the suspects spent some time together to plan, collect the necessary equipment, and divide up the proceeds of the robbery.</li>
</ul>
</li>
 	<li><strong>Is it possible the suspects had been at the store sometime prior to this robbery?</strong>
<ul>
 	<li>To plan this robbery and execute it with this level of precision, it is very likely that the suspects spent at least some time looking over the premises and the surrounding area to plan their approach, execute the robbery, and plan their escape.</li>
</ul>
</li>
 	<li><strong>What relevant theories might be considered from the way the suspects were dressed?</strong>
<ul>
 	<li>It appears that all three suspects were wearing similar outfits with dark jackets, blue jeans, and ski masks. This may indicate that the suspects deliberately purchased specific gear for committing a crime.</li>
 	<li>This clothing might be considered somewhat non-descript, and not easily distinguishable or unique for a witness to accurately or specifically describe the fleeing suspects. The use of masks and non-descript outfits might indicate that the criminals were experienced.</li>
 	<li>The fact that they are all wearing jackets on a summer day in August might indicate that they were covering up tattoos, scars, or other distinguishing features that might otherwise assist in identifying the suspects.</li>
 	<li>The fact that all suspects were wearing gloves would indicate that they are aware that any fingerprints left behind could identify them.</li>
</ul>
</li>
 	<li><strong>What relevant theories might be made from handguns being carried by the robbers?</strong>
<ul>
 	<li>Handguns are more easily concealed and may be the weapon of choice for more professional criminals.</li>
 	<li>Handguns are more difficult to obtain, and legal handguns are generally registered, so it is likely that these were unregistered or stolen handguns.</li>
</ul>
</li>
 	<li><strong>What might be theorized from the way they carried out the robbery?</strong>
<ul>
 	<li>From the overall planning and precision in the execution of the robbery, it might be theorized that this is not the first robbery that these three have done together. This method may have been used elsewhere.</li>
</ul>
</li>
 	<li><strong>What might be theorized considering the items taken?</strong>
<ul>
 	<li>Considering that the items taken were specialty items&nbsp;and that some were marked with identifying serial numbers, it might be theorized that the robbers have a prearranged or preplanned means of disposing of the items or otherwise converting them to cash.</li>
 	<li>Alternately, the fact that they have taken items that are identifiable by serial numbers may indicate a level of haste or even inexperience because these items, if discovered after being sold, may be traced back to the robbery suspects.</li>
</ul>
</li>
 	<li><strong>Were these three suspects working alone? </strong>
<ul>
 	<li>Considering the speed of execution and the apparent level of planning that went into this robbery, it is possible that there was a fourth accomplice waiting outside in a get-away vehicle.</li>
 	<li>There is a possibility that the suspects had some inside knowledge of the jewellery store and the inventory through association with a person connected to the store.</li>
</ul>
</li>
 	<li><strong>Who else might be involved?</strong>
<ul>
 	<li>A fourth criminal associate as a get-away driver and lookout.</li>
 	<li>A customer inside the store, at the time of the robbery, acting as a scout.</li>
 	<li>A current or former employee of the store may have provided inside information.</li>
 	<li>The owner/manager of the store could be involved as part of an insurance fraud scheme.</li>
</ul>
</li>
</ol>
<h2>Topic 3: Answers to Possible Theories in the Robbery Scenario</h2>
<h3><strong>Theory #1 </strong></h3>
This is a well-planned robbery executed by three or four experienced criminals. In addition to the three suspects in the store, there might have been an outside get-away driver acting as a lookout. They intentionally selected this store because of the strip mall location and the easy access to inventory by smashing the display cabinets. They were wearing disguises and jackets to avoid facial identification and possible tattoo or scar identification. They were wearing gloves probably because they already have criminal records and know that any fingerprints left behind may allow for the suspects to be identified. The suspects gained the information to execute their robbery by conducting surveillance on the store. They intentionally selected the date and time to conduct the robbery because of customer traffic patterns. They have some means of converting or disposing of the stolen items for cash. Considering the precision of the crime, this is likely not their first robbery of this type. The possession of handguns also indicates they are likely professional criminals.
<h3><strong>Theory #2</strong></h3>
As with Theory #1, this is a well-planned robbery executed by three or four experienced criminals; however, the store was selected because they had an inside person, employee, or former employee working with them, and were provided with information to assist in the plan.
<h3><strong>Theory #3</strong></h3>
As with Theory #1, this is a well-planned robbery executed by three or four experienced criminals; however, the store owner/manager is a conspirator in the robbery, and assisted with the offence to collect insurance with the possible additional intent to be the person who resells the stolen merchandise. If this is the case, the owner/manager may be providing an inflated inventory of items taken or perhaps incorrect serial numbers for the items taken to allow for the stolen items to be more easily disposable.
<h2>Topic 4: Answers - Investigative Plans From Theory Development</h2>
Do the theories above present any avenues where you can investigate further to gain additional information?
<h3>Theory #1</h3>
<ul>
 	<li>Since it is likely not their first robbery of this kind, we should search police records for other robberies using this similar <em>modus operandi</em> (MO) in the recent past and in our area and its surrounding areas. We would be looking for similarities in:
<ol>
 	<li>Target selection</li>
 	<li>Number of suspects</li>
 	<li>Disguises used</li>
 	<li>Weapons of choice</li>
 	<li>Methodology (i.e. guard at door, making patrons lie down on the floor, bags to carry away goods)</li>
</ol>
</li>
 	<li>Considering the likelihood that these suspects conducted surveillance of this store to select it as a target, we should look at security cameras in the strip mall area and from the victim’s store for images of possible suspects watching the store on the previous Saturday at this same time.</li>
 	<li>Since a few of the items stolen had serial numbers, these numbers can be entered into CPIC as identifiers to stolen property.</li>
 	<li>Since the handguns used were likely stolen, we should look for incidents of stolen handguns recently reported.</li>
</ul>
<h3>&nbsp;Theory #2</h3>
<ul>
 	<li>Considering the possibility that an inside person, employee, or former employee is involved and provided the robbers with information, we should look closely into the criminal record and police record of the employees present at the time of the crime, as well as any other employees or former employees who can be identified. We are looking for:
<ol>
 	<li>Evidence of criminal conduct by any employee or former employee</li>
 	<li>Information of any associations between the employees or former employees to criminals, particularly those with records for robbery</li>
 	<li>Information from the owner/manager about suspicious conduct on the part of an employee, a past employee, or a disgruntled past employee</li>
 	<li>Since customers inside the store at the time of the robbery may have also been in collusion with the robbers, all three customers should be examined for criminal histories or associations to known criminals.</li>
</ol>
</li>
</ul>
<h3>Theory #3</h3>
<ul>
 	<li>If the owner/manager is involved in the robbery for the proposes of insurance fraud and/or inventory resale, we should examine several areas for evidence and information:
<ol>
 	<li>Any past record of criminal conduct by the owner/manager, particularly insurance fraud</li>
 	<li>A record of association to known criminals</li>
 	<li>A record of insurance policy status on inventory, particularly recent increases</li>
 	<li>Cross-check and verification of product inventories against items alleged to be stolen</li>
 	<li>Verification of accuracy of serial numbers on items stolen against supplier inventory records.</li>
</ol>
</li>
</ul>
<h2>Topic 5: Validation of the Report</h2>
Based on the theories considered in our robbery investigation, everyone present in the jewellery store at the time of the robbery is being considered a possible suspect. This is a part of analysis and theory development called <strong>validating the report</strong>. In criminal investigations, it occurs time and again that people reporting criminal events will lie, fabricate, or embellish, the facts. These failures to provide an accurate account of what happened occur for a variety of reasons, including, but not limited to:
<ul>
 	<li>Personal gain or financial reward, such as insurance fraud</li>
 	<li>Attempting to take revenge on someone by accusing them of a crime</li>
 	<li>Covering up personal involvement in the criminal act to avoid prosecution</li>
 	<li>Attempting to shift responsibility for a crime to someone else</li>
 	<li>Covering up the involvement of an associate to divert prosecution</li>
</ul>
With these kinds of motives in mind, an investigator analyzing and validating the facts and developing a theory of the crime should always consider four key questions to authenticate the crime report:
<ol>
 	<li>Does the evidence support the report that an offence occurred?</li>
 	<li>If an offence did occur, did it happen at the time being reported?</li>
 	<li>If an offence did occur, did it happen at the place being reported?</li>
 	<li>If an offence did occur, did it happen the way the fact pattern being reported suggests (Arcaro, 2009)?</li>
</ol>
Thinking about these questions as part of the <strong>Analysis</strong> can help the investigator to formulate possible theories and develop effective investigative plans.

At this point in the investigative process, as theories are developed and tested, additional new facts are discovered. With the discovery of new facts, the <strong>Analysis</strong> and <strong>Investigation</strong> steps of the <strong>STAIR</strong> tool become, as noted earlier, a bit of a circular process, where a new fact can confirm, disprove, or modify a theory, and a new investigative plan may evolve in a new direction seeking the formation of reasonable grounds to believe a particular suspect is responsible for the offence.
<h2>Topic 6: Evidence Transfer Theory</h2>
In our robbery scenario, the reported fact pattern appears to be fairly clear. The investigative strategies being planned are aimed at suspect identification as a first goal. But, once a suspect or suspects have been identified, because of some circumstantial association or linkage to the crime scene, it does not mean they can immediately be arrested. Often, these kinds of linkages are sufficient to only provide grounds for suspicion and are not enough to form reasonable grounds for belief to make an arrest.

The ability to link a suspect back to a crime and to form reasonable grounds for belief to make an arrest can depend on the existing evidence transfer. Evidence transfer means that evidence will transfer from a suspect to the crime scene, a suspect to a victim, from the crime scene to the victim, or from the crime scene to the suspect. Modern forensic science has evolved into forensic specialties that look for evidence transfer. For example, with the advances being made in DNA science, evidence transfer is becoming more refined allowing the analysis of ever smaller samples for comparison (Savino, 2011).

Remarkably, it is not just DNA or fingerprints that can contribute to connecting a suspect to a criminal event. Hair and fibre, shoe prints, tool marks, bite marks, ballistics, and other forensic exhibits do contribute to the range of comparison tools. We will discuss these more in-depth later in our chapter on forensic evidence; however, the point is that forensic comparisons are only one form of evidence that is developed to create circumstantial connections between a suspect, the crime, and/or the victim.
<h2>Topic 7:&nbsp;Spatial Relationships and Timelines</h2>
Other circumstantial evidence can be illustrated that connect suspects to the crime through relationships, associations, and chronology. This type of circumstantial evidence can include exhibits and witness statements that demonstrate spatial relationships. Spatial relationships are circumstantial links that demonstrate connections between objects, events, or people. This can be any type of evidence that demonstrates a connection or relationship between the suspect and the criminal event or the suspect and the victim. It could also be evidence that demonstrates where a suspect was during the critical times when the crime was occurring.

Recall the example of the young man standing behind a tree one block away from the scene of the warehouse break in. This was an example of both timeline evidence, namely being present at the scene <em>when the event took place</em>, and spatial relationship evidence, namely <em>being one block away from the crime scene</em>. This kind of evidence can be considered by the investigator in forming reasonable suspicion and reasonable grounds to believe and take action at a later point in time.
<h2>Topic 8: Timeline Evidence</h2>
Timeline evidence is any item that demonstrates a time alignment of the suspect to the criminal event or the victim. Spatial relationship evidence comes from items that demonstrate other types of connections, relationships, or associations. Consider for example, the following scenario.
<div class="textbox examples">
<h3 itemprop="educationalUse">Scenario</h3>
The body of a young woman is found by a janitor in the utility storage area of a local airport at 12 noon. It appears that she was sexually assaulted and murdered shortly after arriving on a domestic flight AC204 from a neighbouring city. This is confirmed by the boarding pass still in her pocket for Seat 16A that shows her arrival time at 10 AM.

Another airport employee is identified as a possible suspect because security cameras show him in the area of the utility storage area at 10:45 AM. Upon questioning, it is determined that he had also been on flight AC204 and that his boarding pass was for seat 16B.

A search of the suspect’s pockets shows that he has a key that opens the utility storage closet where the victim’s body was found. In this case, there is both timeline evidence and evidence of spatial relationships.

</div>
Timeline evidence would include:
<ul>
 	<li>12 Noon: time the body was found by the janitor</li>
 	<li>10 AM: time the victim’s flight arrived</li>
 	<li>10 AM: time the suspect’s flight arrived</li>
 	<li>10:45 AM: time the suspect was recorded on security camera near the crime scene</li>
</ul>
This timeline evidence provides some significant information, as it establishes a time range when the crime occurred and it establishes that the suspect was at the airport during the possible time of the crime.
<h2>Topic 9: Spatial Relationship Evidence</h2>
<ul>
 	<li>Victim and suspect’s boarding passes show that they were both on Fight AC201 and were seated next to each other</li>
 	<li>Security video puts the suspect in the area of the crime scene during the timeframe when the crime occurred</li>
 	<li>The suspect is an airport employee and was in possession of a key that would open the door of the crime scene</li>
</ul>
It is important to note here that the items of evid, in this case, ase are not forensic exhibits such as fingerprints or DNA that might draw a definite link between the suspect and the crime. They are instead linkages in times and common locations within those times. These connections within time and locations are spatial relationships, and although this circumstantial evidence from spatial relationships alone is not sufficient to prove guilt beyond a reasonable doubt, it is often sufficient to form reasonable grounds to believe that an individual is implicated in the offence. In this case, the suspect would be detained and cautioned. Additional forensic evidence collection and interrogation would follow to develop reasonable grounds for belief and possibly the grounds to lay a charge, if additional forensic evidence could be developed.
<h2>Summary</h2>
In this chapter, we have worked through some scenarios demonstrating the application of the <strong>STAIR</strong> tool in both tactical and strategic investigative processes. In working through the strategic process, we have practiced examining the fact patterns of events and making the assumptions to drive theory development directing the engagement of our investigative plans. This is truly the creative art of the investigative process and, as such, it is a process that can be enhanced through practice and experience. This can also be a great opportunity for collaboration and teamwork where brainstorming sessions take place to analyze the facts, develop theories, and develop investigative plans. Along with theory development and investigative plan making, we have examined the ways physical and circumstantial evidence of spatial relationships can be used to confirm, negate, and modify theories and investigative plans.
<div class="bcc-box bcc-info">
<h3 itemprop="educationalUse"><strong>Study Question</strong></h3>
<ol>
 	<li>Why must the investigator have the Results in mind at the outset of an investigation?</li>
 	<li>What are five reasons some people reporting a criminal event lie, fabricate, embellish, or misrepresent the facts?</li>
 	<li>What are four key questions an investigator should consider in authenticating a crime report?</li>
 	<li>What is meant by evidence transfer?</li>
 	<li>What is spatial relationship evidence?</li>
 	<li>What is timeline evidence?</li>
</ol>
</div>
&nbsp;
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>407</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:26]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:26]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-6-applying-the-investigative-tools-2]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>395</wp:post_parent>
		<wp:menu_order>6</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 6: Applying the Investigative Tools]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 7: Witness Management</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-7-witness-management-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:28 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-7-witness-management-2/</guid>
		<description></description>
		<content:encoded><![CDATA[
<div class="textbox">

<em>“Different types of witnesses will provide evidence from different perspectives, and these perspectives need to be assessed by the investigator to establish the reliability of the evidence provided.”</em>

</div>
For any investigation, the details of events provided by witnesses are a critical element of the evidence gathered. Witness testimony is the verbal account of events or knowledge of the facts relevant to the crime. Witness statements will assist the investigator in forming reasonable grounds to lay a charge and will assist the court in reaching a decision that the charge against an accused person has been proved beyond a reasonable doubt.

As the law has evolved regarding witnesses, many rules of evidence, definitions, and protocols have developed to govern the way witnesses may testify in court. It is important for an investigator to understand these elements as this allows an investigator to evaluate witnesses and collect witness evidence that will be acceptable to the courts. The purpose of this chapter is to discuss the following concepts as they relate to the process of witness management.
<ol>
 	<li>Identifying witnesses</li>
 	<li>Defining witness types</li>
 	<li>Defining competence and compellability</li>
 	<li>Identifying the witness/suspect dilemma</li>
 	<li>Witness credibility assessment</li>
 	<li>The truthfully-incorrect witness</li>
 	<li>Recognizing dominant witness influences and conformity</li>
 	<li>Dealing with uncooperative witnesses</li>
 	<li>Conducting witness interviews</li>
 	<li>The field interview</li>
</ol>
<h2>Topic 1:&nbsp;Identifying Witnesses</h2>
It is sometimes the case that persons found as apparent witnesses to an event do not always provide accurate information about their identity. The reasons for this deception can vary from actual involvement in the crime to fear of reprisals from the suspect to simply not wanting to become involved with the criminal justice system. Regardless of the reason, it is imperative for an investigator to verify the identity of each witness. This can be best achieved by viewing a valid photo ID or, in the absence of photo ID, by establishing the witness’ identity through other means, such as police records, confirmation of identity, or verification of identity by a credible third party.
<h2>Topic 2: Witness Types</h2>
Once the identity of a witness has been determined, an investigator needs to establish an understanding of the witness classification. Different types of witnesses will provide evidence from different perspectives, and these perspectives need to be assessed by the investigator to establish the reliability of the evidence provided. This is important for several reasons, including that if charges ever go before the court, a judge will also consider these witness types and apply appropriate rules of evidence and levels of probative value to the evidence each type of witness provides.
<h3>Eye Witnesses and Corroborative Witnesses</h3>
As discussed in previous chapters, evidence can be classified as either direct evidence indirect circumstantial evidence. An eyewitness is a person who directly saw the criminal event take place, while a corroborative witness is a person who can only provide circumstantial or indirect evidence of the events surrounding the crime. For example, consider two scenarios where a young cashier is shot to death during the robbery of a convenience store. In the first scenario, one witness is found at the scene of the crime when the police arrive. This witness was a customer inside the convenience store. She saw the robber walk up to the counter, raise his handgun, and shoot the cashier. This witness can identify the suspect. In the second scenario, the witness is a customer who was walking up to the front of the store when he heard what sounded like a gunshot. He then saw a man running out the front of the store with a handgun in his hand. Upon entering the store, he saw the cashier had been shot. He can identify the suspect.

In both scenarios, a male suspect is apprehended in possession of a handgun only two blocks away from the scene of the crime. In the first scenario, the witness would be classified as an <em>eyewitness;&nbsp;</em>but in the second scenario, the witness would be a <em>corroborative witness</em>.

In the described scenarios, both witnesses can provide valuable testimony; however, the evidence of the eyewitness in scenario one would be given more weight at trial because there is a direct connection that the accused committed the offence through direct evidence, and the court would not need to make any interpretation on the veracity of any circumstantial evidence. The witness was present and saw the suspect shoot the victim. The corroborative witness in the second scenario provides strong circumstantial evidence to suggest that the man running from the store committed the shooting; however, additional investigation would be needed to support the circumstantial assumption that the person seen running from the store committed the shooting.

Clearly, eyewitnesses are the type of witness that investigators hope to find in their investigative efforts. Any police investigator will tell you, eyewitnesses are frequently not present at the scene of a crime, and therefore investigators need to be skilled at discovering additional physical and circumstantial evidence that can assist the court in reaching its conclusions in relation to the evidence of a corroborative witness.

In the second scenario, additional evidence that might assist the court to reach a conclusion that the suspect running from the store was the shooter might include the following: ballistics from the handgun seized from the suspect matching the fatal bullet found in the body of the accused, gunshot residue from the hand of the suspect showing that he had recently fired a weapon, and/or conclusive information indicating that the suspect and the shooting victim were the only two persons inside the store at the time of the shooting.

This is not to say that these same items of additional evidence would not also be useful to corroborate the witness in the first scenario. The difference is that, in the case of an eyewitness, the additional evidence is a value that is added, while in the case of the corroborative witness, more evidence is required to support the conclusion of guilt beyond a reasonable doubt.
<h3>Independent Witness</h3>
In addition to considering the evidence of a witness based on being an eyewitness or a corroborative witness, the court will also give additional weight to evidence that comes from a person who is an independent witness. An independent witness is sometimes referred to as a third-party witness. They are characterized as independent because;
<ul>
 	<li>They are not associated with the victim</li>
 	<li>They are not associated with the suspect</li>
 	<li>They are not in any way associated to the criminal event</li>
</ul>
In other words, an independent witness is someone with nothing to lose and nothing to gain by the outcome of the case. With this inferred lack of vested interest to either side, the independent witness is seen by the court as providing unbiased testimony. Similar to the court, an investigator can attribute more confidence to statements made by persons who are established to be independent eyewitnesses or independent corroborative-witnesses to an event. &nbsp;&nbsp;&nbsp;<strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </strong>
<h2>Topic 3:&nbsp;Competence and Compellability</h2>
For a person to be called as a witness to testify in court, that person must be accepted by the court as being both a competent witness and a compellable witness. There are some rules that apply to assessing both competence and compellability of witnesses, and it is important for an investigator to understand these rules and definitions since it can negatively affect a case if key evidence is expected from a witness who is found either not competent or not compellable to testify. The examination here is not intended to be a comprehensive review of the rules of competence and compellability, but an overview of the main statutory issues. Case law relating to the finer points of witness competence and compellability is constantly evolving and, where applicable, may be presented in a court to challenge a witness.
<h3>A Compellable Witness</h3>
Most of the people an investigator will encounter during their investigations will be considered compellable to testify. Any person can be compelled to attend court as a witness by way of issuing a subpoena. If they fail to attend court after being served with a subpoena, the court may issue a warrant for the arrest of that witness to bring them before the court to testify. That said, once a person is compelled to attend court by either a subpoena or a warrant, there are still certain circumstances under which that person may be considered exempt, or not compellable to provide certain types of testimony. These circumstances relate to when the witness is an accused person or when the witness is the spouse of the accused.
<ol>
 	<li><strong><strong>An accused person cannot be compelled.&nbsp;</strong></strong>Under Sec 11 of the <em>Canadian Charter of Rights and Freedoms </em>(1982), an accused person cannot be compelled to testify at his or her own trial. However, if the accused person is charged jointly with another person, they may be compelled to testify against their co-accused. Under those circumstances, the witness can be afforded protection under the <em>Canada Evidence Act</em>&nbsp;(1985) and their testimony cannot subsequently be used against them at their own trial for that same offence.</li>
 	<li><strong><strong>When the witness is married to the accused.&nbsp;</strong></strong>To preserve the privilege of communication between two partners in their marriage, legislation and case law provides a protection of privacy, and anything said between two married partners in relation to a criminal event cannot be compelled as testimony in court. This exemption to testify is stated under the <em>Canada Evidence Act </em>(1985)<em>. </em>Specifically, Sec 4(3) states:</li>
</ol>
<blockquote>
<p style="padding-left: 90px">No husband is compellable to disclose any communication made to him by his wife during their marriage, and no wife is compellable to disclose any communication made to her by her husband during their marriage.</p>
</blockquote>
<p class="no-indent" style="padding-left: 90px;text-align: left">Many people incorrectly believe that this is a blanket protection where one spouse cannot testify against the other. However, the legislation only provides protection to the communication between spouses. It does not restrict a spouse being called to testify regarding observations of physical evidence or relationships. For example, a husband may arrive home covered in blood and carrying a bloody knife confessing to his wife that he just stabbed someone to death. Although the communication of the confession of the crime would not be compellable testimony, the observations of the blood, the knife, the time and location of the observation would be a compellable testimony. On this point, Sec 4(2) of the <em>Canada Evidence Act</em>&nbsp;(1985) also states:</p>

<blockquote>
<p style="padding-left: 90px">No person is incompetent, or compellable, to testify for the prosecution by reason only that they are married to the accused.</p>
</blockquote>
<p style="padding-left: 90px">In addition to the ability to call a spouse to testify regarding observations of evidence, the prosecution can compel a spouse to give evidence, including personal communications, for the prosecution in cases that involve an offence of violence against that spouse and certain sexual offence against children.</p>

<h3>A Competent Witness</h3>
Like the rules of compellability, persons are presumed to be compellable to testify unless they meet the exceptions stated under the <em>Canadian Charter of Rights and Freedoms</em> or <em>The Canada Evidence Act</em>. All witnesses are also considered competent to testify unless it can be shown that they lack certain personal abilities or capacities. Historically, common law barred certain people from testifying. These people included convicted criminals, very young children, the mentally ill, and spouses of an accused person.

Many of these rules have been overturned by statute, for example, the rule against convicts was removed by section 12 of the <em>Canada Evidence Act</em>&nbsp;(1985). The record of a convicted person can still be used as character evidence.

There are three classes of exceptions; children, persons with low mental capacity, and spouses. For each of these classes of people, it is up to the opposing counsel in court to make a challenge and establish the incompetence of the witness.

There is a presumption that the witness possesses both capacity and responsibility to give evidence. To testify, a witness needs only the ability to recall what they have seen and heard, and be able to communicate what they recall. To communicate, the witness must be able to understand and respond to questions, and the witness must demonstrate the moral capacity to tell the truth. Moreover, the determination of competency is guided by the following rules established in case law:
<blockquote><em>The proof of competency or incompetency is on the balance of probabilities&nbsp;</em>(R v Ferguson, 1996).</blockquote>
<blockquote><em>Where competency is challenged, it must be established by a voir dire before the witness can be sworn&nbsp;</em>(<em>R v Steinberg</em>, 1931).

<em>A witness who states that they may not tell the truth is still competent to testify. Such issues of truthfulness are factors of credibility for the trier-of-fact&nbsp;</em>(<em>R v Walsh</em>, 1978).</blockquote>
When considering the issues of witness competence and compellability, an investigator must keep in mind that the evidence collected from certain witnesses, such as spouses, children, and persons of low mental capacity, may be subjected to these rules. Exemptions for witness testimony and exclusion of the evidence may occur at trial (<em>R v Khan</em>, 1990;&nbsp;Justice Canada, 2017).

That said, during the investigation, it remains within the purview of the investigator to assess the information and evidence collected, and to consider that evidence when forming reasonable grounds to believe and take action. When considering the nature of the information and evidence received, it is not up to the investigator to assess whether the court will accept the information or not. The investigator’s use of the information and evidence received from a spouse, a child, or a person of low mental capacity should not be discounted in forming reasonable grounds simply in anticipation of a possible exemption of the witness and exclusion of evidence by the court. If the person giving the information or evidence is assessed as being a credible witness, the investigator should consider that material and give it fair weight in forming reasonable grounds for belief.
<h2>Topic 4: The Witness/Suspect Dilemma</h2>
Although the circumstances vary, it is a common occurrence that crimes are reported by a perpetrator posing as a victim or a witness. Crimes, such as break-and-entry and motor vehicle thefts, are quite often insurance frauds. Other crimes, including murder, have also had the offender make the report as a witness to explain their presence at the crime scene and avoid being considered as a suspect. Being aware of this possibility requires investigators to undertake a process of validating the reported crime and assessing the information being reported by witnesses or victims as a routine part of their investigation. To do this, an investigator should be attentive to questioning the report and the evidence presented to assess:
<ol>
 	<li>Did the crime happen at the time being reported?It is often difficult for a person fabricating a report to provide the true timing of the events without implicating themselves as present at the time of the crime. Asking questions that demand timelines accounting for witness activities during the crime time can sometimes detect deception.</li>
 	<li>Did the crime happen at the place being reported?Persons fabricating a report will sometimes change the location of the reported crime to avoid detection of the true crime scene where incriminating physical evidence may still be present. Carefully assessing the report in comparison to evidence present or not present can sometimes indicate this deception.</li>
 	<li>Did the crime happen in the manner being reported?False accounts of crime will often exaggerate or over report details of the event. The report will contain some level of fabrication that explains their own connection to the events. Assessing each witness version of the event for consistency or inconsistency with physical evidence and other witness versions can reveal deception.</li>
</ol>
Even with careful attention to these questions, it may not be immediately possible to confirm the validity of the crime being reported, and the investigation must proceed to take the report as true until other evidence emerges to prove otherwise.

The advantage of investigating this kind of falsely reported crime is that the suspect is presenting themselves as a witness or victim. As such, all of their statements may be taken and will be admissible against them later, without <em>voir dire</em>, if deception in their statement becomes provable. Until some distinct piece of incriminating evidence emerges, the investigator is under no obligation to caution or warn the witness. Each new statement can afford opportunities to investigate further in search of evidence of the lie that will prove deception.
<h2>Topic 5: Witness Credibility Assessment</h2>
In addition to determining if a person is an eyewitness, a corroborative witness, an independent witness, a competent witness, or a compellable witness, every person who is a witness during an investigation needs to be subjected to a credibility assessment. As information and evidence are collected from each witness, it is part of the investigator’s job to determine the level of confidence that can be attributed to each witness. This is called witness credibility assessment.

One of the most significant issues to be considered in assessing a witness is determining if they are a witness, or if they are a suspect posing as a witness. More likely than interviewing false reporters of crime, investigators find themselves interviewing a variety of ordinary people who truly have been the victim of a crime, have witnessed a crime, or witnessed some aspect of a criminal event. The level of confidence an investigator can have in a witness will be contingent on several factors relating to who the witness is, the abilities of the witness, and the circumstances of the event.
<ol>
 	<li><strong>Witness profile.</strong> Ideally, every witness would be an upstanding member of the community with a high level of integrity and an outstanding reputation. This is rarely the case. The nature of criminal activity and the natural proximity and association of criminals within a criminal community, often skew the witness list more towards those with more colorful and less upstanding personal profiles. Being part of the criminal community, or having a criminal record, does not necessarily mean that a witness will not be truthful. However, these are factors that an investigator must consider when assessing the value of the evidence being reported. For example, if a witness has a record for perjury, their evidence should be carefully scrutinized and additional corroboration may be required to strengthen the witness' account of the events to achieve acceptable credibility for the court.</li>
 	<li><strong>Witness bias – motivation to lie.</strong> As discussed earlier in this chapter, independent witnesses who are not connected to the victim, the accused, or the event itself make the most credible witnesses. People close enough to a criminal event to become witnesses are often, in some way, related to the victim, the suspect, or to the event itself. As such, the associated witness may have a bias in making their report of the event. As a friend or foe, the witness may have some motivation to withhold information or to lie to influence the outcome. Understanding how each witness fits into the event, and what their linkages are to other participants or the event itself, is an important dynamic to uncover. In the case of a bias witness, additional corroboration should also be looked for.</li>
 	<li><strong>Witness involvement - emotional impact of the event.</strong> Criminal events can be very stressful and anxiety producing experiences. This is not only true for the victim but for anyone who has been exposed to danger, violence, or situations where threats to personal safety or incidents of injuries or death have occurred. As human beings, we are not conditioned to live through these kinds of events without experiencing some kind of emotional response. Post-Traumatic Stress Disorder speaks directly to the emotional damage traumatic events can inflict (Resnick, Kilpatrick, Dansky, Saunders, &amp; Best, 1993). It is important for an investigator to consider the nature of the event and the exposure of the witness to these dynamics. Extreme post traumatic trauma, such as observing the violent death of a loved one, can sometimes render that witness unable to provide a reliable account of details (Streets, 2011). It may be necessary to give some witnesses time to regain their composure to provide information or evidence. In some cases, the traumatic effect is too significant and the information cannot be recovered. Knowing how a witness is connected to the event and being able to comprehend their potential exposure to emotional trauma provides the investigator with the insight that certain strategies, such as softer interview techniques, flexible timing, and professional support resources that take the emotional trauma of the witness into consideration, may be necessary and appropriate. Another kind of emotional trauma is a witness’ fear for their personal safety. This can be a fear of physical, psychological, or emotional reprisals for the witness providing evidence. In a situation that includes organized criminal groups, this fear is a genuine and understandable concern. In these types of cases, it may be difficult to protect the identity of a witness, and assurances of protection of the witness can be subject to jurisdictional or organizational limitations of witness protection resources.</li>
 	<li><strong>Location when viewing the event.</strong> A witness’ physical location when observing an event can become an important point of evidence, and should be considered and included in the interview and statement of each witness. If a witness is providing details of the event that required them to be in direct proximity of the accused or the event to observe or hear, the physical location of the witness at the time of those observations is a critical element. Physical location can also be important in explaining gaps or differences in witness observations. The fact that one witness to a crime observed certain actions, but another witness did not, can sometimes be explained by the alternate angles of observation of each witness or because of some physical obstruction that affected one witness but not the other. Crime scene photos and diagrams can often help witnesses to demonstrate and describe their distinct perspectives. Returning to the scene of the crime to physically establish these locations and angles of observation can be a useful exercise for investigators to conduct.</li>
 	<li><strong>Awareness of the crime - intent to observe and recall the occurrence.</strong> In most cases where a crime has occurred, a witness will know that the crime is happening, and this awareness will engage their attention to make observations that they can later recall and give an account of. In other cases, where a witness has not been alerted to the crime and is only observing the evolution of events as part of an unremarkable sequence, their memory is not as engaged and their processes of observation may not be as keen. To demonstrate this point, consider an example where a group of three people are standing in the teller’s line at a bank.
<div class="textbox examples">
<h3 itemprop="educationalUse">Scenario</h3>
At the front of the line, a young man hands the bank teller a note advising, “This is a robbery. I have a gun. Put all the cash from your till into an envelope and give it to me. Do not press the alarm or I will shoot you." The bank teller is aware that a crime is taking place; however, the two customers standing in line behind the robber are simply waiting their turn. The customer standing immediately behind the robber suddenly notices that the teller looks frightened and sees she is placing the contents of her cash drawer into an envelope. The third customer in line remains unaware and is talking on the telephone to his wife about their grocery list. The robber grabs the cash-filled envelope from the teller and turns to run out of the bank. The customer immediately behind him steps out of his way, but he bumps into the third customer still talking to his wife. In this scenario, an investigator could expect to get a detailed account of the events from the bank teller who was engaged in the event and aware of the crime from the outset. The customer immediately behind the robber become aware of the crime and was making observations half way into the robbery. This customer could likely provide some significant details. The third customer in line was never aware that a crime was in progress and, other than perhaps providing a limited description of a man who bumped into him, his value as a witness may be negligible. Many witnesses who make observations of a criminal’s activities in the pre-crime stage or in the post crime stage, when they are leaving the scene of the crime, fall into the category of not being aware of the crime. This does not mean these witnesses will be of no value but that their casual observations need to be identified and recorded as soon as possible.

</div></li>
 	<li><strong>Length of observation time.</strong> Very simply, length of observation time is the amount of time a witness had to see the event taking place. This amount of time will vary with circumstances, as there would be a difference in opportunity for observation between one witness standing stationary at the crime scene observing the event, and another driving past the unfolding events at 100 kilometers per hour. This can also be an issue contingent upon the awareness of the event taking place. Some witnesses become aware of the event more quickly and have a longer opportunity to observe. As with our example of the bank robbery, the teller being robbed had the longest observation time, the customer immediately behind the robber became aware that something was happening and had a shorter observation time, but the third customer did not become aware of anything until the robber bumped into him. This scenario demonstrates the value and detail of evidence an investigator might expect from witness with differing levels of observation time.</li>
 	<li><strong>Time elapsed between the event and the interview.</strong> A critical aspect of gaining the best account of events from any witness is making sure that the interview happens at the earliest opportunity. It is a practice in police investigation to make every effort to identify and interview witnesses as soon as possible. As a simple exercise to demonstrate the importance of finding and interviewing witness quickly, take a piece of paper and to the best of your ability, write down the details of your day starting at the beginning of the day three days ago. What did you do? Where did you go? Who did you see? If you are like most people, you have some level of daily structure to your life. From that structure, perhaps you will recall you got out of bed at a usual time. Maybe you went to work or stopped at the gym or at your favourite coffee shop on the way to work. These benchmarks of your daily routine may be easily remembered. But, on your way to work, did you happen to see a green van with extensive damage to the front end on the street near your home? Of course, this is a fictitious question, but this would be the kind of inconsequential daily observation information you might be asked to recall by police canvassing for witnesses to a crime.Understanding this time limited aspect of human memory, investigators need to consider how much weight they can place on the accuracy of information being recounted by a witness. If a witness is providing a remarkably accurate recollection of something being recounted from any distance in the past, it is a good idea to ask that person how they can recall what should be a mundane event with such a degree of accuracy or clarity. If they are correct, the witness will sometimes provide a memory trigger that made them notice and causes them to recall. For example, a witness may answer, “Yes, I remember that green van with all the damage to the front end because my brother has a green van just like that and I looked at the driver and saw that it wasn’t my brother. I looked at it even closer because I had never seen that van on my street before.”</li>
 	<li><strong>Ability to record or repetitively recount details</strong>. If a witness was aware that they had witnessed a crime and they were making a conscious effort to record or otherwise memorize the facts, this is a point that the court will be interested in hearing as part of the witness’ evidence. If, for example, to remember the licence number of a suspect vehicle, the witness repeated the number over and over until they were able to write it down, this is an important detail that should be recorded in the witness statement, and the paper upon which the number was written should be seized and retained as an exhibit that can be shown to that witness on the stand as the note they made at the time of the event. This demonstrated that the witness had intent to recall and record the details of an event, which will contribute in a positive way to the credibility of the witness.</li>
 	<li><strong>Physical abilities - hearing, sight, smell, touch, taste and cognitive perception.</strong> The physical faculties of the senses may be used by a witness in their recollection of the events they are describing. When a witness makes a statement referring to their senses, their credibility in giving that evidence will depend upon the extent to which their senses are working. In taking statements from witnesses, the investigator must be satisfied that a witness who claims to have seen an event has adequate vision to make that observation. Similarly, a person who states that they heard something must be able to demonstrate that they have adequate hearing to have heard it. Speaking very quietly to test the hearing limits of a witness or asking a witness to describe something within the visual ranges of the evidence they saw are both reasonable strategies to informally test a witness’s range or limitations of senses. Asking a witness questions about their use of eyeglasses, contact lens, or hearing aids during their observation of events are all reasonable strategies to establish the credibility of a witness to make the observations they are reporting. Flowing from the use of their senses, witnesses will often provide information and cognitive perceptions of the events they witnessed. The cognitive perceptions of a witness are their own personal interpretation of the information they took in through their senses. As such, they are a subjective analysis of the information being sensed. A witness may provide a statement regarding the age of a suspect, the size of an object, the speed of a vehicle, the smell of alcohol on a person’s breath, or even the distance they stood from the event they witnessed. To a certain degree, the court will allow such evidence and opinions of common knowledge from non-expert witnesses; however, a witness may be challenged on their observations, and it is best to understand any misperceptions in advance. Again, informal testing of a witness to become comfortable that their cognitive perceptions and subject interpretations are accurate and not significantly skewed is a reasonable way to test credibility. For estimating the age of a suspect, an investigator could ask the witness to point out other persons who are approximately the same age. Similar tests could be undertaken in testing perceptions of the size of objects, the speed of vehicles, and the distance to locations. For statements regarding observations, such as the smell of alcohol, the investigator should ask the witness to describe their personal experiences with alcohol to know that it was alcohol they smelt. If the witness had not experienced alcohol or been with people who were drinking alcohol, that opinion of smell would lose credibility.</li>
 	<li><strong>Cognitive capacity and age of witness.</strong> To establish the competency of either a child or a person of limited mental capacity, conducting a careful witness credibility assessment will be helpful for the prosecution in meeting challenges to competency. Part of the initial interview should seek to determine if the child or person of limited mental capacity understands the need to tell the truth. The competency background of the witness should be conducted by interviewing persons, such as parents, caregivers, teachers, or doctors, who know the witness and can attest to their mental capacity and their ability to understand questions and communicate their answers.The actual interview of both children and persons of low mental capacity are a delicate and time-consuming process. They must be conducted in a manner that is both suited to the maturity level of the witness, and structured using non-leading questions to elicit answers. In cases where it is possible, investigators with specialized training in this type of interviewing should be utilized. That said, in the first instance, at the scene of an event, it is important for the responding investigator to understand the special considerations that apply to this type of witness in consideration of their evidence. The goal in these cases is to determine how much weight can be attributed to the evidence being provided by witnesses. An investigator may determine that the evidence of a witness is credible and can be used in the development of forming reasonable grounds or, alternately, they may find that the credibility of the witness cannot be established, and the evidence cannot be used in the development of reasonable grounds to take action.</li>
</ol>
<h2>Topic 6: The Truthfully Incorrect Witness</h2>
As much as witnesses are a critical component of the criminal investigation process, they can also become a critical threat to the accuracy and integrity of evidence gathering. This sometimes occurs in an anomaly where an apparently credible, independent witness tells their version of&nbsp;events and they are significantly wrong in what they say they observed. Unlike cases where a witness is motivated to intentionally fabricate or exaggerate their account of events, the truthfully incorrect witness has no malicious intent and will provide their version of the events with a genuine belief that what they are saying is true and accurate. This type of witness is an independent observer with no motivation to lie, and as such the weight of their testimony can carry significant influence for the investigator’s reasonable grounds to believe and eventually carry significant probative value for proof beyond a reasonable doubt in the court. For investigators, the truthfully incorrect witness can become a paradox capable of misleading the outcome of the investigation resulting in a guilty suspect going free or an innocent suspect being arrested and charged. This anomaly of truthfully incorrect witnesses is an issue that investigators must remain mindful of. Witnesses are human and humans are fallible. Even for a witness who appears to be independent and credible, there remains a need to scrutinize and fact check the witness’s version of events against the known physical evidence and the accounts of other witnesses.

The importance of the investigator being mindful of a truthfully incorrect witness cannot be emphasized too strongly. In 1996, for example, the National Institute of Justice in the United States released a report concerning the implications of eyewitness testimony and false memories, and in it, reported that 90% of all DNA exoneration cases defendants were wrongly convicted upon the false memories of eyewitnesses (Brainerd, 2005). More recently, Smarlarz and Wells (2015), citing <em>The Innocence Project,</em> noted that eye-witness testimony was used to convict innocent people in over 70% of DNA exoneration cases. More recently yet, Rose and Beck (2016) note that eyewitness testimony accounts for more wrongful convictions than anything else. Research has shown that false memories in eye witnesses can be created in a number of ways, including through leading questions, reports from others, contact with other people, suggestions, a witness’ own expectations, the expectations of others, other social pressures, and media (Bennett, 2015;&nbsp;Allen, 1991). It has also been established that witness recall can be affected by stress (Morgan et al, 2004) and by alcohol (Oorsouw et al, 2015) in complicated ways.
<h2>Topic 7: Dominant Witness Influence and Conformity</h2>
One of the negative dynamics that can occur in an investigation where there are multiple witnesses is the contamination or influence of witness statements by a dominant witness. This influence can occur when witnesses to an event have not been separated before any interactions or conversations have occurred between the witnesses. These dynamics are possible in almost all cases, and an investigator must always be mindful that this potential exists. It is also possible that a dominant witness will boldly and sometimes aggressively state their version of the events, which can cause other less confident or less sophisticated witnesses to question their own perspective. In such cases, a less dominant witness may change their version of the events or even omit observations to conform to what the dominant witness stated.

Most susceptible to this kind of influence are very young witnesses, elderly witnesses, or witnesses who have timid personalities. On some occasions, where there is an imbalance of power or status in a personal relationship, or even in a subordinate organizational relationship, witnesses may conform to the more powerful witness out of fear of repercussions or hope of favour. In some cases, the dominant witness has a vested interest in having their version of the events stated their way, and the dominant influence towards the other witnesses is intentional and implicitly threatening in its tone.

In cases where witnesses have interacted prior to being interviewed, each witness should be interviewed in seclusion from the others. Witnesses should be asked if they have discussed the event with anyone else or heard anyone else’s version of what happened. They should be cautioned and encouraged to disregard anyone else’s version of events and limit their version to their own account of what was seen and heard during the event.
<h2>Topic 8: Uncooperative Witnesses</h2>
One of the many unpleasant dynamics of criminal activity is when the police attend the scene of a crime and witnesses, or even victims, refuse to cooperate with investigators. Sometimes, these uncooperative persons are part of the criminal lifestyle and are not willing or interested in cooperating in the justice system. The only strategy for police in these cases is to gather as much forensic evidence as possible in relation to the event and to seek charges where sufficient evidence can be found.

Although these uncooperative witnesses may believe they are not required to participate in the criminal justice system, it is entirely possible to <em>subpoena</em> an apparent witness to attend court to be questioned regarding the criminal event they witnessed. If that witness refuses to answer questions in court, it is possible for the judge to find them in contempt of the court and to sentence them accordingly. That said, this rarely happens.
<h2>Topic 9:&nbsp;Conducting Witness Interviews</h2>
Arriving at a crime scene, investigators are often confronted with a cast of characters who may be victims, witnesses, or suspects in the matter to be investigated. In the case of an active event, where immediate in-depth interviews are not possible, it is important to:
<ol>
 	<li>Conduct immediate <em>field interviews</em> of each subject at the scene;</li>
 	<li>Do an immediate preliminary classification of persons found at the scene as victims, witnesses, or suspects; and</li>
 	<li>Take appropriate measures to separate the persons found at the scene for the purpose of physical security and protection of future testimony from cross-contamination of witness accounts and conformity.</li>
</ol>
<h2>Topic 10: The Field Interview</h2>
Attending the scene of an event, the first immediate field interview may be as simple as asking an apparent victim or a probable witness,&nbsp;<em>“What happened here?".</em>&nbsp;This simple question serves several purposes for the investigator. First, it shows that the investigator is not making any investigative assumptions based on what is visible to him or her at first glance. With this question, the person being asked is prompted to supply their own version of the event, as they saw it. This pure version will assist the investigator in developing a picture of the event, and it will provide a context allowing the investigator to classify the speaker as a victim, witness, suspect, or an uninvolved party.

If the person the investigator questioned turns out to be the perpetrator, and the investigator has no other evidence that suggests this person should be a suspect, any statement made by that person would likely be considered a spontaneous utterance and may be admitted in evidence without a <em>voir dire</em>. For example, consider a situation where an investigator arrives at the scene of a street fight where a man has been fatally stabbed. The investigator asks one of the men standing nearby, “What happened here?” and the man immediately says, “I killed him and he deserved it.” This statement would be considered a spontaneous utterance and would likely be admitted as evidence without the usual <em>voir dire</em>. Once this self-incriminating statement has been made, the suspect would need to be immediately arrested and provided with the Charter warning and caution before any further statements could be pursued through additional questioning. Clearly, once a suspect is identified, they can no longer be considered as a witness.

If no one is immediately identifiable as a suspect at the scene of an event, it is reasonable for the investigator to proceed with classifying the persons present as possible witnesses. As discussed earlier in this chapter, to classify the witnesses, the investigator must consider the nature of the evidence that the witness can provide:
<ul>
 	<li>Direct evidence of the eyewitness, which is evidence of seeing the criminal event occurring and perhaps even identifying the suspect; or</li>
 	<li>Circumstantial evidence of the corroborative witness, which is indirect evidence of events, physical evidence, timelines, and spatial relationships that can assist the court in reaching a logical presumption of how the crime occurred and who was responsible.</li>
</ul>
Interviewing a witness is not just a simple matter of hearing their version of the events. There are many factors that can come into play in determining how credible a witness is. Following the initial field interview, and once the event is under control, it is important to take the witness’ formal statement at the earliest available opportunity. Taking the witness statement should be conducted using the best technology available given the circumstances. If audio and or video recording devices are not available, or obtaining them would cause an unreasonable delay in getting the witness statement, a written statement should be taken. No matter how the witness statement is recorded, it should be the goal of the investigator to obtain the best, uninfluenced, and unbiased version of events from a witness.

Like the threat of conformity being induced by a dominant witness, a witness can also be influenced by leading questions asked by an investigator. Some witnesses are so eager to assist in solving the crime that they will attempt to guess the answer to a leading question instead of admitting that they do not know the answer. The caution here is to avoid asking leading questions. Leading questions are questions that a witness might be able to infer the answer by the nature of the wording. An example of a leading question would be:
<blockquote>“Did you see Larry pick up the revolver and shoot Bill in the head?”</blockquote>
This leading double question can be answered yes or no, and it also supplies the witness with a significant amount of information that the witness can infer about the details of the event. These may be details that they would not have previously known. From this question, the witness could infer that Bill was shot in the head, the weapon used was a revolver, the suspect in the shooting was Larry, and the revolver was picked up from somewhere. A better and more appropriate initiation of the statement would be:<em> “Did you witness an event today? Tell me what you saw."</em>

Although this open-ended approach to statement taking is more time consuming, the investigator at least knows that they are not planting any ideas or words to influence the witness’ account of the event. Taking a statement in this manner is known as taking a pure version statement. A pure version statement needs to be the witness’s best, uninterrupted narration of the events, as they recall it. As the witness recounts their best memory of the event, the investigator must resist the temptation to intervene and ask clarifying questions on the points being revealed. Clarifying questions like the question used to start an interview can be leading and can influence the witness’ statement.

As the witness recounts their pure version of the events, the investigator should be taking notes on points to be clarified once the entire statement is completed. Those questions should remain as open-ended as possible. So, if the witness has stated in their pure version of events, <em>“I walked into the room and that is when I saw the shooting happen”, </em>the clarifying question should be an open-ended prompt, such as, “<em>You said you saw a shooting happen, tell me more about that."</em>

There are many different techniques and strategies for witness interviewing that cannot be addressed in this short book as part of an introduction to investigations. The best advice for new investigators for the interviewing of a witness is learning to be patient and allow the witness to tell their story in their own time and in their own way. Avoid the human tendency of trying to assist and interact with the speaker by asking questions, filling in the blanks, and clarifying things while the story is being related. The more effective interview technique is one where the witness can exhaust their memory and relate the events to the best of their ability without interference and the contaminating influence of questions that might derail their train of thought.

As discussed earlier, it sometimes happens that a witness or a reporting victim will turn out to be the perpetrator of a crime. In these cases, allowing the person to provide their full uninterrupted statement can produce incriminating indicators or even evidence of involvement. There is a tendency for criminals who fabricate their report of a crime to make sure they are adding information in their statement that helps eliminates them as a suspect. This can include unsolicited alibis for their whereabouts and their activities at the time of the reported event. When a witness supplies this type of information without being prompted, it can be an indicator of personal involvement in the criminal event. Any such voluntary explanations of personal activities should be recorded carefully and closely scrutinized to confirm the validity of facts. Follow up questions to unsolicited explanations should include seeking the names of independent witnesses who might be able to corroborate the witnesses account.

In the case where an investigator suspicious that a reporting witness or victim may be the perpetrator of the crime, there is no obligation to reveal that suspicion until evidence exists that allows the investigator to form reasonable grounds for belief. If further investigation determines that the statement is a fabrication, this may be sufficient circumstantial evidence to require a warning for at least the offence of mischief for making the false report. In such circumstances, a Charter warning and caution are appropriate before additional questioning is undertaken.
<h3>Taking the Witness Statement</h3>
The written, audio, or video statement of a witness taken by a police investigator will become the permanent record of events as seen by that witness. The police investigator will use the content of that statement as a reference document in the construction of search warrants and in support of reasonable grounds for belief to lay an arrest. The crown prosecutor will use the statement to construct their case for presentation to the court and for pre-trial disclosure of the evidence to the defence counsel. The statement will serve as a document from which the witness may refresh their memory of events to provide accurate testimony to the court.

Considering the foregoing list of uses, the witness statement needs to be as accurate and complete as possible. The standard format used to begin a witness statement is as follows:

<em>This is the statement of <span style="text-decoration: underline"><strong>witness’s full name</strong></span> taken on <span style="text-decoration: underline"><strong>date and time</strong></span> at<span style="text-decoration: underline"><strong> location where taken</strong></span> by </em><strong><span style="text-decoration: underline"><em>name of person taking or recording the statement</em></span>.</strong>

At the conclusion of the statement, it must be signed by the witness. If the statement is audio and or video recorded, the foregoing preamble needs to be used to start the statement, and once the statement is transcribed, the witness should sign the hard copy transcription.
<h3>Witness Identification of a Suspect – Photo Lineups and Live Lineups</h3>
Beyond taking a statement, one of the most common forms of obtaining information from a witness is the practice of having witnesses identify a suspect through the viewing of photographs or photo lineups. This kind of after the fact identification of a suspect will be subjected to scrutiny when it is presented in court. Strict protocols must be followed to demonstrate that the process was conducted in a fair and unbiased fashion. Under no circumstances would an investigator ever present the witness with only a single photograph or a single lineup suspect and ask if this is the suspect. Additionally, under no circumstances should an investigator ever state that the suspect is one of the persons in the lineup.

In the practice of presenting photo lineups, the photos are arranged in a series of eight pictures or more that are permanently mounted into a series of numbered windows of a special photo lineup file folder.

<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/image7-4-791x1024.jpg" alt="Photo-Lineup" width="791" height="1024" class="aligncenter size-large wp-image-408">

The suspect’s photograph is one of the eight pictures and the remaining seven photos are called "distractor photos". To be fair, these distractor photos need to be reasonably similar to the suspect photo in terms of gender, age, race, head hair, facial hair, and glasses. When the photo lineup is presented to the witness, there should be instruction by the investigator that the suspect of the investigation may or may not be in this photo lineup (i.e. "please look at all the photos carefully and only select the number of a photo if you are certain it is the suspect you saw at the time of the event").

Like photo lineups, live persons may be used to conduct a suspect identification or a suspect in custody. These live lineups are more difficult to create because they require the cooperation of the suspect and if the suspect does something during the viewing that could draw attention to him; it could prejudice the lineup process. As with the photo lineup, the distractor subjects need to be selected to be fairly similar to the suspect; however, unlike photo lineups, the live lineup requires the additional elements of ensuring that everyone is of similar height, weight, body shape, and dress. You cannot put the suspect dressed in a shirt and tie into a lineup with distractors wearing blue jeans and tee shirts.

Another means of suspect identification is permitting the witness to page through volumes of criminal file photos that are part of the local police photo collection. This technique is sometimes used when there are no identifiable suspects and the witness is reasonably certain that they will recognize the face of the suspect if they see it again. The negative aspects of this strategy are that it can take a great deal of time, and a witness can sometimes become confused by the process and overloaded with the viewing of too many faces, causing an eventual loss of confidence in making a proper identification.
<h2>Summary</h2>
This chapter examined the broad range of issues that must be considered by an investigator in relation to the collection of information and evidence from witnesses to a crime. These issues range from the way witness evidence is classified and validated to the way witnesses are assessed and evaluated to determine their ability to give evidence and the credibility of the evidence they give.

The chapter illustrated the processes required for proper witness management during investigations. These task processes of witness identification, classification, credibility assessment, and proper interviewing practices in statement taking are all components of witness management that demonstrate professional standards applied by a criminal investigator.
<div class="bcc-box bcc-info">
<h3 itemprop="educationalUse"><strong>Study Questions</strong></h3>
<ol>
 	<li>What is a collaborative witness?</li>
 	<li>What is an independent witness?</li>
 	<li>Can an accused person be compelled to testify regarding a crime they have been involved in?</li>
 	<li>Are all persons considered competent to testify?</li>
 	<li>What is witness credibility assessment?</li>
 	<li>What concerns should an investigator have about dominant witnesses?</li>
 	<li>What should an investigator do in the case of an active event where immediate in-depth interviews are not possible?</li>
 	<li>Is it possible to have a witness statement in something other than written form?</li>
 	<li>What are two negative aspects of having a witness attempting to identify a suspect by paging through volumes of criminal file photos?</li>
</ol>
</div>
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>409</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:28]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:28]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-7-witness-management-2]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>395</wp:post_parent>
		<wp:menu_order>7</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 7: Witness Management]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 8: Crime Scene Management</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-8-crime-scene-management-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:41 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-8-crime-scene-management-2/</guid>
		<description></description>
		<content:encoded><![CDATA[
<div class="textbox">

<em>“Crime scene management, and evidence management as a critical part of that, must be learned and incorporated into the investigator's toolkit.”</em>

</div>
Crime scene management skills are an extremely significant task component of investigation because evidence that originates at the crime scene will provide a picture of events for the court to consider in its deliberations. That picture will be composed of witness testimony, crime scene photographs, physical exhibits, and the analysis of those exhibits, along with the analysis of the crime scene itself. From this chapter, you will learn the task processes and protocols for several important issues in crime scene management. These include:
<ol>
 	<li>Note taking</li>
 	<li>Securing a crime scene</li>
 	<li>Evidence management</li>
 	<li>Scaling the investigation to the event</li>
</ol>
<h2>Topic 1:&nbsp;Note Taking</h2>
Although other documents will be created by the investigator to manage the crime scene, no other document will be as important to the investigator as the notebook.&nbsp;The notebook is the investigator’s personal reference for recording the investigation.

Many variations of police notebooks have emerged over the years. The court will sometimes even accept police notes that have been made on a scrap of paper if that was the only paper available at the time. However, beyond extreme circumstances, in operational investigations, the accepted parameters of a police notes and notebooks are:
<ul>
 	<li>A book with a cover page that shows the investigators name, the date the notebook was started, and the date the notebook was concluded</li>
 	<li>Sequential page numbers</li>
 	<li>A bound booklet from which pages cannot be torn without detection</li>
 	<li>Lined pages that allow for neat scripting of notes</li>
 	<li>Each entry into the notebook should start with a time, date, and case reference</li>
 	<li>Blank spaces on pages should not be left between entries and, if a blank space is left, it should be filled with a single line drawn through the space or a diagonal line drawn across a page or partial page space</li>
 	<li>Any errors made in the notebook should only be crossed out with a single line drawn through the error, and this should not be done in a manner that makes the error illegible</li>
</ul>
In court, the investigator’s notebook is their best reference document. When testifying, the court will allow an investigator to refer to notes made at the time to refresh their memory of events and actions taken. When an investigator’s notebook is examined by the court, notes consistent with the investigator’s testimony provide the court with a <em>circumstantial assurance or truthfulness</em> that the evidence is accurate and truthful (McRory, 2014). Alternately, if critical portions of the investigation are not properly recorded or are missing from the notebook, those portions of the evidence will be more closely scrutinized by the defence. The court may give those unrecorded facts less weight in its final deliberations to decide proof beyond a reasonable doubt.

For an investigator, good notes are an overview of the things seen/heard and the actions taken. A chronology of notes demonstrates the investigator’s mental map of the facts that led to forming reasonable grounds for an arrest and charges. Court cases are often extended by adjournments, appeals, or suspects evading immediate capture. This can extend the time between the investigation and the trial by several years. In these protracted cases, it becomes critical for the investigator to have detailed notes that accurately reflect their investigation to trigger their memory of the facts.

As important as the notebook is, note taking skills are often an underemphasized aspect of police training. Most police investigators develop their personal skills and note taking strategies through on the job experience and in the “trial by fire” of cross examination in court. This void in the training of note taking skills is likely due to the broad range of circumstances under which note taking needs to take place and because it is impossible to anticipate what facts will become important in every possible variation of circumstances. Thus, some combination of training, common sense, and experience will come into play for investigators to become proficient in recognizing what to record in their notebook.

The concept of "notes made at the time of an event is a rather misleading definition and requires some explanation. In an ideal world, an investigator would be able to proceed through an investigation with an open notebook and record each fact and each observation of events as they transpire. Of course, the way events unfold is dynamic and unpredictable. Circumstances often require an investigator to be fully engaged in efforts to bring a situation under control, while protecting the life and safety of persons. There is no place for an open notebook in such cases and the investigator is clearly not taking any notes at that time, but will do so after the event is under control, and as soon as it is practical to do so. Although the typical reference in court is to <em>notes made at the time</em>, in actuality, they are notes made as soon as practical under the unique circumstances of the event.

The courts do accept the operational dynamics that exists for investigators, and it sometimes becomes a question at trial to know when the notes were actually composed. As such, an investigator should always be prepared to answer this question. Having a note in the notebook regarding the time when the writing of notes was and finished acts as a reference to demonstrate awareness and attention to this issue.

Another issue related to notes made at the time is the dilemma of facts that were overlooked and then recalled after the initial notes have been completed. The human memory does have its limitations and flaws. On occasion, an investigator will complete the initial draft of their notes, and, at some later time may suddenly recall a point that was missed. On such occasions, returning to the pages of notes made at the time and attempting to insert the recalled facts is not an acceptable practice. The proper way to record these later recollections of fact is to immediately start a new note page, using the current time and date, make a reference to the previous case-notes, previous time, date, and page number, and record the newly recalled fact or facts. These kinds of recalled facts and late entries will be closely examined by defence counsel, and it can sometimes be helpful if the investigator can also make note of the fact or circumstances that led to the recollection of the additional information. Anyone who has ever participated in a critical incident, where life and safety have taken priority, can tell you that once the event is under control, investigators can be seen writing intently to document their recollection of the events.

The following strategies are recommended as a general guide to note taking:
<ol>
 	<li>Start notes by creating a big picture perspective and then move from the general to the more specific observations. In this big picture, you are creating a perspective of the facts that you have been made aware of to begin an investigation. These big picture facts become the starting point of your mental map of events, and these facts will be the framework to begin thinking about offence recognition and forming reasonable grounds to believe and take action.</li>
 	<li>In more specific terms, and to the extent it is possible, begin recording all dates, times, and descriptions of persons, places, and vehicles as they emerge. You may, in fact, have already started a page in your notebook where some exact times, addresses, licence plate numbers, names or persons, and perhaps even blurted statements from a suspect have been jotted down. It is acceptable to use these key pieces of jotted information already recorded to enlarge your detailed notes at the end of the event in a more complete fashion.</li>
 	<li>Record the identities of persons encountered and how the identity of each person was verified.&nbsp;For example: Witness Jane Doe (DOB: 8 May 64) 34345-8 St Anywhere BC Photo drivers licence ID</li>
 	<li>Record all statements made by witnesses and victims to reflect an accurate account of the information being conveyed. It is often not possible to record every statement made verbatim in notes, and, in most cases, it is not necessary. Today, technology makes it possible to digitally record the verbatim account being provided by a witness or a victim. But, merely digitally recording a statement is not sufficient, since statements will frequently form considerations in establishing reasonable grounds for belief to take action. Recording the critical details being conveyed will provide a written record of the facts considered to form reasonable grounds for belief.</li>
 	<li>If a person is a suspect or is a person who may become a suspect, make every effort to record any statements made by that person verbatim. Suspects will often be found at the scene of a crime posing as a witness or even as a victim. Accurately recording the initial statements made by such a person can produce evidence of guilt in the form of statements that are provably false or even incriminating.</li>
</ol>
It is the personal responsibility of each investigator to document their personal perception and recollection of the event they are witnessing, as it unfolds. In cases where investigators have collaborated on an agreed version of events and authored their notes to reflect those agreed upon facts, the notes are no longer the personal recollection of that investigator and, as such, may be scrutinized as being a collective version of events aimed at producing evidence that does not reflect a true account of the facts as they were witnessed by each individual investigator.

The practice of collaborating and making collective notes is sometimes called “boxing of notes” - this practice can be discovered by defence when the individual notebooks of investigators are identical or close to identical in format and content. The practice of boxing of notes has been identified as one of the flaws in investigative practice that can lead to miscarriages of justice (Salhany, 2008). As such, collaboration between investigators when making notes should be avoided. If, at any point, there is a collaboration to return to an issue together and re-examine physical evidence to clarify the point for each investigator, that collaborative effort should be noted as part of the note making of each investigator.

Despite this caution regarding the collective production of notes, there are occasions where a collective note making process is used and is accepted as reasonable. This occurs during large scale operations involving many participants, sometimes coordinated by an Emergency Operations Command Center. In these cases, there is a need for the command center participants to be completely engaged in handling the event, which may extend over periods of hours or days. The practice of each participant waiting until the protracted event has been concluded to make their individual notes would be impractical and potentially inaccurate. In these cases, it is now accepted operational practice to assign one person in the command center to act as the collective maker-of-notes to substitute for individual note-taking. The note maker in these situations is known as “The Scribe”. For the persons in the command center to be aware of the notes being made, the Scribe does not make notes into a typical notebook. In such cases, the notes are made onto large pieces of flipchart paper and, as each sheet of notes is completed, it is posted onto the wall of the command center where each participant can reference the content of the notes and verify the accuracy of the notes. At the end of the operation, the collective pages of notes are photographed and the note pages are saved by the scribe as an exhibit. Each page is often initialled by the participants. Under this process, each participant in the command center may adopt these notes as a reference document for court purposes.
<h2>Topic 2: Integrity of the Crime Scene</h2>
As part of crime scene management, protecting the integrity of the crime scene involves several specific processes that fall under the <strong>Tasks </strong>category of the <strong>STAIR</strong> Tool. These are tasks that must be performed by the investigator to identify, collect, preserve, and protect evidence to ensure that it will be accepted by the court. These tasks include:
<p style="padding-left: 60px">a) Locking down the crime scene</p>
<p style="padding-left: 60px">b) Setting up crime scene perimeters</p>
<p style="padding-left: 60px">c) Establishing a path of contamination</p>
<p style="padding-left: 60px">d) Establishing crime scene security</p>
When an investigator arrives at a crime scene, the need to protect that crime scene becomes a requirement as soon as it has been determined that the criminal event has become an inactive event and the investigator has switched to a strategic investigative response. As you will recall from the Response Transition Matrix, it is sometimes the case that investigators arrive at an active event in tactical investigative response mode. In these cases their first priority is to protect the life and safety of people, the need to protect the crime scene and its related evidence is a secondary concern. This is not to say that investigators attending in tactical investigative response mode should totally ignore evidence, or should be careless with evidence if they can protect it; however, if evidence cannot be protected during the tactical investigative response mode, the court will accept this as a reality.

As soon as the event transitions to an inactive event with a strategic investigative response, the expectations of the court, regarding the protection of the crime scene and the evidence, will change. This change means that there is an immediate requirement for the investigator to take control of and lock down that crime scene.
<h3>a)&nbsp;&nbsp;&nbsp; Locking Down the Crime Scene</h3>
Very often, when the change to strategic investigative response is recognized, first responders and witnesses, victims, or the arrested suspect may still be inside the crime scene at the conclusion of the active event. All these people have been involved in activities at the crime scene up to this point in time, and those activities could have contaminated the crime scene in various ways. Locking down the crime scene means that all ongoing activities inside the crime scene must stop, and everyone must leave the crime scene to a location some distance from the crime scene area. Once everyone has been removed from the crime scene, a physical barrier, usually police tape, is placed around the outside edges of the crime scene. Defining of the edges of the crime scene with tape is known as establishing a <em>crime scene perimeter</em>. This process of isolating the crime scene inside a perimeter is known as locking down the crime scene.
<h3>b)&nbsp;&nbsp;&nbsp; Crime Scene Perimeter</h3>
The crime scene perimeter defines the size of the crime scene, and it is up to the investigator to decide how big the crime scene needs to be. The size of a crime scene is usually defined by the area where the criminal acts have taken place. This includes all areas where the suspect has had any interaction or activity within that scene, including points of entry and points of exit. The perimeter is also defined by areas where the interaction between the suspect and a victim took place. In some cases, where there is extended interaction between a suspect and a victim over time and that activity has happened over a distance or in several areas, the investigator may need to identify one large crime scene, or several smaller crime scene areas to set crime scene perimeters. Considering the three stages of originating evidence, an investigator may find that pre-crime or post-crime activity requires the crime scene perimeter to surround a larger area, or there maybe even be an additional separate crime scene that needs to be considered.

For some crime scenes where there are natural barriers, such as buildings with doorways, it is easy to create a crime scene perimeter defining access. This becomes more complicated in outdoor venues or large indoor public venues, where fencing and barricades may be needed along with tape markers to define the perimeters.

Once the crime scene perimeter has been established and lock down has taken place, it becomes necessary to ensure that no unauthorized persons cross that perimeter. Typically, and ideally, there will only be one controlled access point to the crime scene, and that point will be at the entry point for the <em>path of contamination</em>.
<h3>c)&nbsp;&nbsp;&nbsp;&nbsp; Path of Contamination</h3>
It is not possible to eliminate all potential contamination of a crime scene. We can only control and record ongoing contamination with a goal to avoid damaging the forensic integrity of the crime scene and the exhibits. Once a crime scene has been cleared of victims, witnesses, suspects, first responders, and investigators, it is necessary to record, in notes or a statement from each person, what contamination they have caused to the scene. The information being gathered will document what evidence has been moved, what evidence has been handled, and by whom. With this information, the investigator can establish a baseline or status of existing contamination in the crime scene. If something has been moved or handled in a manner that has contaminated that item before the lock down, it may still be possible to get an acceptable analysis of that item if the contamination can be explained and quantified.

As an example, sometimes in cases of serious assaults or even murders, paramedics have been present at the scene treating injured persons. When this treatment is happening, non-suspect-related DNA transfer between persons and exhibits can occur. Determining those possibilities is one of the first steps in establishing the level of existing contamination at the time of lock down.

With everyone now outside the crime scene and the perimeter locked down, the next step is to establish a designated pathway where authorized personnel can re-enter the crime scene to conduct their investigative duties. This pathway is known as a <em>path of contamination</em> and it is established by the first investigator to re-enter the crime scene after it has been locked down. Prior to re-entering, this first investigator will take a photograph showing the proposed area where the path of contamination will extend, and then, dressed in the sterile crime scene apparel, the investigator will enter and mark the floor with tape to designate the pathway that others must follow. In creating this pathway, the first investigator will avoid placing the pathway in a location where it will interfere with apparently existing evidence and will place it only where it is required to gain a physical view of the entire crime scene. As other investigators and forensic specialists enter the crime scene to perform their duties, they will stay within the path of contamination and, when they leave the path to perform a specific duty of investigation or examination, they will record their departure from the path and will be prepared to demonstrate their departure from the pathway and explain any new contamination caused by them, such as dusting for fingerprints or taking exhibits.
<h3>d)&nbsp;&nbsp;&nbsp; Crime Scene Security</h3>
At the same time the crime scene is being defined with perimeter tape, it is also necessary to establish a security system that will ensure that no unauthorized person(s) enters the crime scene and causes contamination. For this purpose, a crime scene security officer is assigned to regulate the coming and going of persons from that crime scene. For the assigned security officer, this becomes a dedicated duty of guarding the crime scene and only allowing access to persons who have authorized investigative duties inside the crime scene. These persons might include:
<ul>
 	<li>Forensic specialists</li>
 	<li>Search team members</li>
 	<li>Assigned investigators, and/or</li>
 	<li>The coroner in the case of a sudden death investigation</li>
</ul>
To maintain a record of everyone coming and going from the crime scene, a document, known as a “Crime Scene Security Log”, is established, and each authorized person is signed in as they enter and signed out as they depart the scene with a short note stating the reason for their entry. Any unauthorized person who enters or attempts to enter a crime scene should be challenged by the crime scene security officer, and, if that person refuses to leave, they can be arrested, removed from the scene, and charged for obstructing a police officer.

The assigned security officer is responsible for creating and maintaining the Crime Security Log, which can take various forms. In short term, small scale investigations, it may only require a single page in the security officer’s note book; however, in a large scale, long term investigation, the log could include volumes of pages under the care of several assigned security officers working in shifts. Whatever the scale or format, the security log records who attended the scene, when they attended, why they were there, and when they left the scene. An example of a crime scene security log is shown in the following example.

[caption id="attachment_413" align="alignnone" width="791"]<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/CRIME-SCENE-SECURITY-LOG-791x1024.jpg" alt="Crime Scene Security Log" width="791" height="1024" class="size-large wp-image-410"> Crime Scene Security Log.[/caption]
<h2>Topic 3: Evidence Management</h2>
As we have already learned in the <strong>STAIR</strong> tool, analysis is the process that must occur to establish connections between the victims, witnesses, and suspects in relation to the criminal event. The crime scene is often a nexus of those events and consequently, it requires a systematic approach to ensure that the evidence gathered will be acceptable in court.

Exhibits, such as blood, hair, fiber, fingerprints, and other objects requiring forensic analysis, may illustrate spatial relationships through evidence transfers. Other types of physical evidence may establish timelines and circumstantial indications of motive, opportunity, or means. All evidence within the physical environment of the crime scene is critically important to the investigative process. At any crime scene, the two greatest challenges to the physical evidence are <em>contamination</em> and loss of <em>continuity.</em>
<h3>Contamination of Evidence</h3>
Contamination is the unwanted alteration of evidence that could affect the integrity of the original exhibit or the crime scene. This unwanted alteration of evidence can wipe away original evidence transfer, dilute a sample, or deposit misleading new materials onto an exhibit. Just as evidence transfer between a suspect and the crime scene or the suspect and the victim can establish a circumstantial connection, contamination can compromise the analysis of the original evidence transfer to the extent that the court may not accept the analysis and the inference that the analysis might otherwise have shown.

Contamination can take place in any number of ways including:
<ul>
 	<li>Police or other first responders interfering with evidence during a tactical investigative response</li>
 	<li>Suspects interfering with the crime scene to cover up or remove evidence</li>
 	<li>Victims or witnesses handling evidence</li>
 	<li>Animals, including pets, causing unwanted transfer of evidence or even removal of evidence through contact or consumption</li>
 	<li>Weather-related contamination due to rain, wind, or snow diluting or washing away evidence, or</li>
 	<li>Crime scene investigators failing to follow proper crime scene management procedures and causing contamination of exhibits or cross-contamination between exhibits during their investigation</li>
</ul>
Contamination is a fact of life for investigators, and any crime scene will have some level of contamination before the scene becomes an inactive event and the police can lock down the location. While issues of life and safety are at risk, the court will accept that some contamination is outside the control of the investigator. That tolerance for controlling contamination changes significantly once the crime scene is locked down and is under control. Once the scene has been locked down, crime scene management procedures <strong>must</strong> be put in place. Crime scene contamination presents three challenges for investigators, namely:
<ol>
 	<li>Preventing contamination when possible,</li>
 	<li>Controlling ongoing contamination, and</li>
 	<li>Recording the known contamination that has taken place</li>
</ol>
In regards to the phrase “control ongoing contamination”, the word "control" is used because investigators cannot eliminate ongoing contamination, they can only seek to control it. This practice of identifying and recording the known contamination is necessary, and even if contamination has taken place, identifying and explaining that contamination may salvage the analysis of exhibits that have been contaminated.

During the critical period between the lockdown of the crime scene and obtaining a warrant to search the crime scene, investigators need to consider the possibilities for ongoing contamination. If reasonable grounds exist to believe that evidence of the crime will be damaged or destroyed by some threat of contamination, the investigator has the authority, under exigent circumstances, to re-enter that crime scene without a warrant to take the necessary steps to stop or prevent contamination and protect the evidence.

The very act of entering the crime scene to collect evidence, and the process of evidence collection, are forms of contamination. The goal in controlling ongoing contamination is to avoid damaging the forensic integrity of the crime scene and its associated exhibits. It is this goal that makes crime scene management procedures essential to the investigative process.
<h3>Loss of Continuity</h3>
Like controlling contamination, establishing and maintaining continuity of evidence are protocols that protect the integrity of that evidence. For any evidence to be accepted by the court, the judge must be satisfied that the exhibit presented is the same item that was taken from the crime scene. Evidence must be presented to demonstrate “the chain of continuity”, which tracks every exhibit from the crime scene to the courtroom.

The evidence to show continuity will come from the investigator testifying that the exhibit being presented is the same exhibit that was seized at the crime scene. This testimony is supported by the investigator showing the court their markings on the exhibit or its container. These markings will include the time, date, and investigator initials, as well as a notebook entry showing the time, date, and place when the item was transported and locked away in the main exhibit holding locker. This evidence is further supported by an Exhibit Log that shows the exhibit as part of the crime scene evidence detailing where at the crime scene it was found, by whom it was found, and the supporting initials of anyone else who handled that exhibit from the crime scene continuously to the main exhibit locker. Any process where that exhibit is removed from the main exhibit locker for examination or analysis must be similarly tracked and documented with the initials, time, and date of any other handlers of the item. Any person who has handled the exhibit must be able to take the stand providing testimony that maintains the chain of continuity of the exhibit. These are simple processes yet critical. If they are not followed rigorously, it can result in the exclusion of exhibits based on lost continuity.
<h3>Attention to Originating Stages of Evidence</h3>
One of the big dilemmas in crime scene management is determining where the criminal event happened or where the event extended to. Making these determinations provides the investigator with the locations where evidence of the crime may be found. This is often not a simple matter of just attending one location or thinking about the criminal event in just a single timeframe. In the investigative process, there are three possible stages of time where evidence can originate. These are the pre-crime stage, the criminal event stage, and the post-crime stage.

These three stages of crime can also mean there could be other locations outside the immediately crime scene area where criminal activities might have also taken place and evidence might be found. The point to remember about the originating stages of evidence is that each of these stages provides possibilities for collecting evidence that could connect the suspect to the crime. When considering theory development or making an investigative plan, each of these stages of the criminal event should be considered.
<ol>
 	<li><strong>The Pre-Crime Stage</strong> occurs when evidence of preparation or planning can be found during the investigation. It can include notes, research, drawings, crime supplies or pre-crime contact with the victim or accomplices. Sometimes items of pre-crime origin, such as hair and fiber, will be later discovered at the crime scene creating an opportunity to link the suspect back to the crime</li>
 	<li><strong>The Criminal Event Stage</strong> is when the most interaction takes place between the criminal and the victim, or the criminal and the crime scene. During these interactions, the best possibilities for evidence transfer occur. Even the most careful criminals have been known to leave behind some trace of their identity in the form of fingerprints, shoe prints, glove prints, tire marks, tool impressions, shell casings, hair or fiber, or DNA.</li>
 	<li><strong>The Post-Crime Stage</strong> occurs when the suspect is departing the crime scene. When leaving the crime scene, suspects have been known to cast off items of evidence that can be recovered and examined to establish their identity. This post-crime period is also the stage where the suspect becomes concerned with cleaning up the scene. As much as a suspect may attempt to clean up, evidence transfers from the crime scene are often overlooked. These can range from hair and fiber on clothing to shards of glass on shoes. Frequently found post-crime are proceeds of the crime. These are often identifiable articles of stolen property with unique marks, victim DNA, serial numbers, or sometimes even trophies that the criminal takes as a keepsake.</li>
</ol>
<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-07-1024x636.png" alt="Originating-Stages-Evidence" width="1024" height="636" class="aligncenter size-large wp-image-411">

Evidence does not always appear as a fully formed piece of information that offers an immediate connection or an inference to implicate a suspect. It often comes together as fragments of fact in timelines, spatial relationships, and evidence transfers between the originating stages of evidence constructing circumstantial pictures to demonstrate the suspect’s identity, the fact pattern of the crime, opportunity, means, or motive and intent.
<h3>Enhancing the Value of Evidence Recovered</h3>
Pieces of physical evidence often referred to as exhibits, have investigative values at two different levels for investigators. At the first level each physical exhibit has a face value represented by what it is and where it exists within the context of the crime scene. For example a bloody shoeprint found on the floor of a crime scene tells us that someone transferred evidence of blood onto their shoe from a source and walked in a particular direction within the crime scene. These are first level interpretations of evidence that we can reconstruct with our own observations. At the second level this same bloody shoeprint may be subjected to forensic examinations that could provide additional information. For example analysis of the shoeprint pattern, size, and accidental characteristics may allow a positive match to the shoe of a suspect, or the blood may be examined to match the DNA of a victim or other originating source. Both these first level and second level values can greatly assist in creating a reconstruction and interpretation of what happened at the crime scene.

Physical exhibits that need to be examined, seized<strong>, </strong>and documented at any crime scene are a major concern for investigators. As mentioned earlier, one of the big challenges for investigators is to identify and document all of the available evidence and information. This raises the important questions of what will become evidence and what is going to be important?

When the suspect and the fact-pattern are not immediately apparent, how does an investigator determine which items within the crime scene need to be considered and taken as possible evidence? There are some general practices that can be followed, but a guiding principle of evidence collection followed by most experienced investigators is to err on the side of caution. More is always better than less. To assist in deciding what could possibly become relevant, investigators need to consider:
<ul>
 	<li>Items that the suspect may have touched or interacted with</li>
 	<li>Items that a victim may have touched or interacted with</li>
 	<li>Items that the suspect may have brought to the crime scene</li>
 	<li>Items that may have passed between the suspect and the victim</li>
 	<li>Items that the suspect may have taken from the crime scene</li>
 	<li>Items that the suspect may have discarded while departing the crime scene</li>
</ul>
Once the crime scene examination has been completed, and the crime scene has been unsecured and abandoned as an open area, returning to collect forgotten evidence is often not possible. It is better to collect everything that could possibly be relevant or could become relevant.

In terms of searching for evidence, once the crime scene has been locked down and secured, the crime scene itself needs to be considered as the first big exhibit. As the first big exhibit, it needs to be subjected to documentation using photography, video recording, measurements, and diagrams. Within this first big exhibit, other smaller and possibly-related exhibit may be discovered. What items are found and where may show spatial relationships of interaction demonstrating proof to support a sequence of events. This physical evidence will become the benchmark of known facts that investigators can use to verify the stories of victims and witnesses, or even the alibi of a possible suspect. Physical evidence at both level-one and level-two becomes the known facts upon which theories of events may be developed and tested. <em>Any item could be considered evidence if it demonstrates a spatial relationship relative to the place, the people, or the times, relative to the criminal event.</em>

<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/Img-08-1024x924.png" alt="The-Crime" width="1024" height="924" class="aligncenter size-large wp-image-412">

The very first step at this point is securing and documenting the crime scene. It is helpful for investigators to recognize that a crime scene is not just a location where exhibits are found, but the crime scene should be considered as a single big exhibit unto itself. Not only will individual exhibits within the crime scene have value as evidence, the spatial relationships between exhibits in the scene may speak as circumstantial evidence to the overall event.

To secure the crime scene as the first big exhibit, investigators will conduct a complete walk-through on the path of contamination completely photographing and videotaping the entire crime scene. This first process is very helpful in demonstrating the exact state of the crime scene prior to things being moved for forensic examination. This should happen immediately after lock down and it will become a snapshot demonstrating the existing spatial relationships at that point in time.
<h3>Creating A Field Sketch and Crime Scene Diagram</h3>
The next step is to document the crime scene as either a field sketch or a crime scene diagram. Either of these can be done to illustrate the physical dimensions and notable characteristics of the crime scene. The difference between the Field Sketch and the Crime Scene Diagram is that the sketch, as implied by the name, is a quick rough depiction of the event. The field sketch, like notes in an investigator’s notebook, serves as a memory aid. The crime scene diagram is a more formal representation of the same information, but is composed to scale using the assistance of the field sketch and measurements. In either of these drawings of the crime scene similar core information will be represented.
<ul>
 	<li>If it is a building, it will show the address of the location, entries, exits, windows, the position of rooms, the position of furniture, and the location of all exhibits relative to the crime.</li>
 	<li>In an outdoor crime scene, establishing and documenting the location of the scene becomes more complex. The geographic location of an outdoor scene needs to be established relative to some known geographic location, such as a roadway intersection, a mile-marker, or even by way of fixing of GPS coordinates of latitude and longitude to a permanent fixed object at the crime scene. In some cases, such as a large open field, where no permanent fixed objects are available, it may become necessary to place a fixed object like a steel survey pin to mark a fixed point at the crime scene.</li>
 	<li>After the initial diagram features are completed and evidence is collected within the crime scene, each of those exhibits will be shown on the diagram with an exhibit number. That number will be cross referenced to the exhibit log that will be completed by an assigned exhibit custodian as part of the crime scene management team. This process of showing each exhibit as a number eliminates the need to clutter the diagram with written description of each exhibit found. In some cases, where there are many exhibits, writing the description of each exhibit onto the diagram would make it unreadable, cluttered, and confusing.</li>
 	<li>In addition to existing features and evidence at the crime scene, the diagram will also show the location of the path of contamination that has been established and the external perimeter of the crime scene.</li>
 	<li>As part of accepted protocols, these diagrams are always drawn with an orientation to North at the top of the diagram, and all writing on the diagram is oriented in one direction, namely east to west</li>
</ul>
<h3>The Exhibit Log</h3>
As part of the evidence management process, establishing the first link in the chain of continuity occurs when the crime scene is secured and the assigned exhibit custodian records of the exhibits that have been identified at the scene is created. These items are recorded in a document called an “Exhibit Log” or an “Exhibit Ledger”. This Exhibit Log or Ledger shows an assigned number for each exhibit that is identified and seized. It shows where at the scene the exhibit was located, and the number of that exhibit is place in the corresponding location in the crime scene diagram.

The Exhibit Log shows who seized the exhibit and when it was turned over to the exhibit custodian. The Exhibit Log also shows a time and date when the exhibit was placed into the main secure exhibit storage locker. When the exhibits are taken to court, the court will only accept the exhibits if the secured chain of continuity can be shown to be guarded and unbroken. If an exhibit custodian were to stop and leave the exhibits unguarded in a vehicle or left the exhibit in the office while attending to another matter – that would break the chain of continuity. The following document is an example of a common Exhibit Log Document.

<img src="https://pressbooks.bccampus.ca/criminalinvestigation/wp-content/uploads/sites/162/2020/08/EXHIBIT-LOG-791x1024.jpg" alt="Exhibit Log" width="791" height="1024" class="alignnone size-large wp-image-413">

Evidence at a crime scene is generally found in two forms. One is evidence of witnesses who can provide their observations of the criminal event. The other is physical items of evidence that can be examined, analyzed, and interpreted to illustrate facts about the criminal event. Each of these forms of evidence present some similar concerns for investigators, and each requires some specific considerations to best search for, collect, and preserve the information that exists.
<h4><strong>Searching for Witness Evidence</strong></h4>
Identifying and interviewing the witnesses to a criminal event can be as simple as speaking to persons who have remained at the scene of the crime to give statements. Alternately, it can be as difficult as identifying and tracking down a person who saw something or heard something that was part of the criminal event, but they are not even aware that what they saw or heard was important, or they do wish to cooperate with the police.

The process searching for witnesses starts at the crime scene itself. This search will include not only identifying and interviewing the persons who are immediately present, but also determining who else might have been present during the pre-crime and post-crime stages of the event.
<ul>
 	<li>Often, witnesses remaining at the crime scene can assist in identifying other witnesses who were present and have since departed.</li>
 	<li>CCTV security cameras can sometimes assist in identifying other witnesses who were present.</li>
 	<li>Identifying the vehicles parked in proximity to the crimes scene or returning to the crime scene on subsequent days around the time of the crime can assist in identifying a witness whose normal course of activities may have previously put them in the area at the time of the crime.</li>
</ul>
In addition to these witness search strategies, another process known as canvassing for witnesses can also be employed. Canvassing is a strategy of conducting door-to-door inquiries in the immediate area of the crime to determine if anything was seen or heard by neighbours. Canvassing can also take the form of structured media releases to request persons with knowledge of the criminal event to come forward. Whatever witness identification strategies are used, time is of the essence. Memories fade and people under normal circumstances only retain day-to-day recollection of unremarkable events for a limited time. Identifying and speaking to the witness, and receiving their best recollection of the events, will be discussed in the chapter on witness management; however, witness evidence can make or break the investigation, and it must be collected quickly, accurately, and effectively.
<h3>Searching for and Identifying Physical Evidence</h3>
Earlier in this book, we described physical evidence as the buried treasure for investigators and critical when it comes to verifying or discounting various versions of an event in court. Physical evidence is something tangible that the court can examine and consider in making connections and determining proof beyond a reasonable doubt. In contrast, witness evidence does not have a physical quality that the court can observe. It requires the court to accept the perception and interpretation of events being provided by a person and, as such, the court cannot evaluate witness evidence with the same confidence of verification that it uses when considering physical evidence.

In our sub-section on Originating Stages of Evidence, we looked at the timeframes and alternate crime scene venues where evidence of a crime may be found. Now, we are going to consider the physical evidence that investigators should think about when evaluating what might constitute an item of physical evidence. We will consider how evidence can be searched for, how it should be collected, when it should be collected, and how it should be preserved. These processes present several challenges:
<ol>
 	<li><strong>Physical evidence can be transient or time sensitive.</strong> As part of the big picture search in the first instance, the investigator must be conscious of physical evidence that needs to be immediately recorded and documented.</li>
 	<li><strong>Physical evidence can be concealed and may not be easily visible.</strong> Walking onto a crime scene in the first instance, it would be unrealistic for an investigator to believe they will immediately see all the physical evidence that needs to be collected. Items of physical evidence can exist in many forms and discovering their existence is a matter of careful examination of the entire scene. The idea of conducting a big picture search first allows the investigator to not only discover the immediately apparent items, but also for a survey of the crime scene to determine areas where the small scale and more detailed search might be productive.
<ul>
 	<li>Doors and windows: open, locked, or unlock can be relevant to time and means of entry or exit from the scene</li>
 	<li>Condition of room lighting: turned on or off can suggest the lighting conditions at the time of the crime</li>
 	<li>Status of appliances in use at the scene can indicate certain activities</li>
 	<li>Last activation of electronic devices can narrow timelines of activity</li>
 	<li>Ambient crime scene temperature and body temperature can be relevant in relation to time of death and the progress <em>rigor mortis</em> or decomposition</li>
</ul>
</li>
 	<li><strong>The immediate value of an item may not be visible at first glance.</strong> Moving from the big picture search to identify items in the smaller scale search, investigators can conduct a detailed grid search of the crime scene to locate items that may be very small or are concealed by other objects. These grid searches can be useful in breaking down the crime scene into smaller search areas to make sure that no area goes unexamined. Along with this detailed search for small or concealed items, the investigator needs to consider enlisting the assistance of forensic specialists to search for items that may require enhanced examination and analysis beyond the bounds of regular human senses and perception. For example, the use of black light can reveal body fluid or stains, and latent fingerprints can become visible after fuming or the application of special powder. In most major criminal cases, forensic specialists will be available to assist in conducting the detailed crime scene search. Every investigator must be proficient in recognizing when to utilise of these forensic tools.</li>
 	<li><strong>The size or nature of an item of evidence may make it impossible to seize or preserve.</strong> Among the challenges of gathering evidence at a crime scene are:
<ul>
 	<li>Some exhibits are too big to be physically seized and brought to court. As previously noted, the entire crime scene and the inherent spatial relationships of objects within that scene could be considered as one big exhibit that needs to be shown to the court. This big crime scene exhibit is captured and can be presented to the court by way of video recording, photographs, crime scene diagram, or using a sample of smaller exhibits within the scene itself.</li>
 	<li>Some exhibits are perishable and impractical to seize and preserve for court. A good example would be the evidence of the dead body in a murder case. The body itself would be impractical to bring to court. It is considered adequate to have photographic evidence and certificates of analysis on pathology samples.</li>
 	<li>Some exhibits are transient in nature and cannot be permanently seized and preserved for court. For example, ambient room temperature or lighting status at the crime scene needs to be preserved by photographs and measurements in that moment of time and subsequently presented to the court as photographs and readings by the attending investigator.</li>
</ul>
</li>
 	<li><strong>The collection of certain evidence can cause cross-contamination to other exhibits.</strong> A major consideration in the collection of any evidence at a crime scene is to ensure that evidence with any potential for cross-contamination is handled in a manner that takes precautions against this occurring. In most cases, at major crime scenes, physical evidence is collected by forensic experts. However, this does not preclude the need for investigators to understand the dangers of cross-contamination and the precautions required to prevent it. This is particularly true when it comes to the collection of bodily substances where DNA might be collected. DNA analysis is now so advanced that even a small trace of DNA material can be transferred by the careless or inadvertent handling of one exhibit to the next. This cross-contamination can be avoided or prevented by the practice of handling only one exhibit at a time, marking that exhibit, placing into a secure container, and decontaminating the investigator by changing gloves and discarding any item could have come into contact with the previous exhibit. Despite the assurance that forensic specialists will normally attend a crime scene for evidence collection, it is possible that an investigator at the scene will be forced to handle a number of exhibits to protect that evidence from some type of environmental damage or other security threat.</li>
</ol>
<h2>Topic 4:&nbsp;Scaling the Investigation to the Event</h2>
Not every crime scene is a major event that requires an investigator to call out a team and undertake the crime scene and evidence management processes that have been described in this book. Often, for minor crimes, a single investigator will be alone at the crime scene and will engage in all the roles described, albeit on a far smaller scale. When this process is being undertaken by a single investigator on a smaller scale, the issues of diagram, security log, and exhibit log may be limited to data and illustrations in the notebook of the investigator.

It is important to stress that each of the tasks below needs to be considered and addressed for every crime scene investigation, no matter how big or how small. Specifically:
<ul>
 	<li>The crime scene must be secured, preserved, and recorded until evidence is collected</li>
 	<li>Existing contamination must be considered and recorded</li>
 	<li>Cross-contamination must be prevented</li>
 	<li>Exhibits must be identified, preserved, collected, and secured to preserve the chain of continuity.</li>
</ul>
Large scale or small scale, all these issues must be considered, addressed, and recorded to satisfy the court that the crime scene and the evidence were handled correctly.
<h2>Summary</h2>
In this chapter, we have discussed the critical issues of crime scene management, evidence identification, evidence location, evidence collection, evidence protection, and proper documentation. These are the most important skills that an investigator can learn and incorporate into their investigative toolkit. As much as these tasks may seem simplistic, ritualistic, and mundane, they are the very foundation of a criminal investigation, and without this foundation of proper evidence practices in place, the case will collapse when it comes to court.

There is a great opportunity on a day-to-day basis for new investigators to begin practicing the protocols of crime scene management on a smaller scale investigating crimes such as break and entry and lower level assaults. Once these skills of crime scene management and evidence management are learned and incorporated into daily practice, they will become the procedural norm and will form the essential operational habits for proper and professional investigative practice.
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>414</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:41]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:41]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-8-crime-scene-management-2]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>395</wp:post_parent>
		<wp:menu_order>8</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 8: Crime Scene Management]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 9: Interviewing, Questioning, and Interrogation</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-9-interviewing-questioning-and-interrogation-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:41 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-9-interviewing-questioning-and-interrogation-2/</guid>
		<description></description>
		<content:encoded><![CDATA[
<div class="textbox">

<em>“Understanding the correct processes and legal parameters for interviewing, questioning, and interrogation, can make the difference between having a suspect’s confession accepted as evidence by the court or not.”</em>

</div>
In this chapter, we will examine the interviewing, questioning, and interrogation of suspects as information gathering techniques police use to aid them in investigations. In modern day policing, interviewing, questioning, and interrogation techniques are measured, objective, and ethical. They are aimed at the goal of discovering the truth; not just getting a confession to a crime. This is a contrast to earlier times of policing, when techniques called the “third degree” sometimes involved threats, intimidation, coercion, and even physical violence. Fortunately, these “third degree” techniques were identified in the United States by the Wickersham Commission in 1931, as being unlawful police practices that caused false confessions and miscarriages of justice, where suspects were sometimes wrongfully convicted and imprisoned (Head, 2010).

Emerging from this, police forces across North America, who were using the “third degree” techniques to varying extents, started moving towards less oppressive and less aggressive methods of interrogating suspects (Gubrium, 2002).

While there has been a significant evolution to more objective and ethical practices, the courts still remain vigilant in assessing the way police interview, question, and interrogate suspects during criminal investigations. The courts expect police to exercise high standards using practices that focus on the rights of the accused person, and minimize any physical or mental anguish that might cause a false confession. In meeting these expectations, the challenges of suspect questioning and interrogation can be complex, and many police agencies have trained interrogators and polygraph operators who undertake the interrogation of suspects for major criminal cases. But not every investigation qualifies as a major case, and frontline police investigators are challenged to undertake the tasks of interviewing, questioning, and interrogating possible suspects daily. The challenge for police is that the questioning of a suspect and the subsequent confession can be compromised by flawed interviewing, questioning, or interrogation practices. Understanding the correct processes and the legal parameters can make the difference between having a suspect’s confession accepted as evidence by the court or not. With the above in mind, this chapter will focus on several salient issues, including:
<ol>
 	<li>The progression from interviewing to questioning to interrogating, and how this progression relates to investigative practices</li>
 	<li>The junctures that demonstrate the need to change from interviewing a witness to questioning a detained suspect to interrogating an arrested suspect</li>
 	<li>The issues of physical and mental distress, and how to avoid the perception of officer-induced distress during an interrogation</li>
 	<li>The seven elements to review to prepare an interrogation plan</li>
 	<li>The five common reasons arrested suspects waive their right to silence and provide statements and confessions</li>
 	<li>The interrogation strategies to initiate statements using the motivations within the five common reasons</li>
 	<li>The three types of false confessor and strategies to deal with false confessions</li>
 	<li>The additional rights of young offenders and practices required to meet the investigative obligations under Canada’s <em>Youth Criminal Justice Act</em></li>
 	<li>Ancillary offence recognition</li>
</ol>
<h2>Topic 1:&nbsp;Interviewing – Questioning – Interrogating</h2>
Police investigations can be dynamic, and the way events unfold and evidence is revealed can be unpredictable. This premise also holds true for interviewing, questioning, interrogating suspects. Players in a criminal event may be revealed as suspects at different stages of the investigation. To properly secure and manage the statement evidence that is gained during interactions with suspects or possible suspects, it is important for investigators to understand the actions that should be taken at each stage, while remembering that interviewing, questioning, and interrogating are terms that refer to separate stages in the process of gathering verbal responses from a suspect or a possible suspect. But each stage is different in relation to when and how the information gathering process can and should occur. The differences between these three stages needs to be defined in the mind of the investigator&nbsp;since they will move through a process of first interviewing, then questioning, and finally interrogating a suspect. When this progression occurs, the investigator needs to recognize the changing conditions and take the appropriate actions at the correct junctures to ensure that, if a confession is obtained, it will be admissible at trial. Given this, let us examine the operational progression of these three stages and identify the circumstances that make it necessary to switch from one stage to the next.

<strong>Interviewing</strong> a possible suspect is the first stage and the lowest level of interaction. In fact, the person is not even definable as a suspect at this point. As pointed out in our chapter on witness management, suspects often report criminal events while posing as witnesses or even victims of the crime. The investigator receiving a statement report from such a person may become suspicious that they are not being truthful; however, until those suspicions are confirmed by evidence that meets the test of forming reasonable grounds for belief, the investigator may continue to talk to this possible suspect without providing any Section 10 Charter or cautions. There is a unique opportunity at that point to gather the poser’s version of events, including any untrue statements that may afford an opportunity to later investigate and demonstrate a possible fabrication, which is by itself a criminal offence. The transition point for an investigator to move from interviewing a witness or victim to detaining and questioning the person as a possible suspect should occur when real evidence is discovered giving the investigator reasonable grounds to suspect that the person is involved in the event. Discovering real evidence and gaining "reasonable grounds to suspect" creates an obligation for the investigator to stop interviewing the person who then becomes a suspect. At this point, the person is a suspect a&nbsp;should be detained for the suspected offence and provided the appropriate Section 10 Charter and Statement Caution before proceeding with the questioning of the suspect.

<strong>Questioning</strong> a suspect is the next level of interaction. For a suspect to be questioned, there will be some type of circumstantial evidence that allows the investigator to detain that suspect. In our previous scenario of the young man found at 3AM standing under the tree in a residential area at the boarder of an industrial complex one block away from the building where a break-in was confirmed to have taken place, that young man was properly detained, chartered, and warned for the investigation of the break-in. However, there was no immediate evidence that could link him to that actual crime at that point. He was only suspected by the circumstantial evidence of time, conduct, and proximity to the event. He was obligated to provide his name and identification. If he had tried to leave, he could have been arrested for obstructing a police officer in the execution of duty. The investigator at the scene of that incident would have questioned this suspect, and by his rights under the <em>Canadian Charter of Rights and Freedoms</em>, the suspect would not be obliged to answer questions.

This right to not talk does not preclude the investigator from asking questions, and the investigator should continue to offer the suspect an opportunity to disclose information that may be exculpatory and enable the investigator to eliminate that person as a suspect in the crime being investigated. As an example of this, again, consider our young man who was detained when found standing under the tree near a break-in. If that man had answered the question what are you doing here by stating that he lived in the house just across the street, and when he heard the break-in alarm, he came outside to see what was happening, this would greatly reduce suspicion against the young man once this statement was confirmed. Subsequent confirmation by a parent in the home that they had heard him leave when the alarm sounded could eliminate him as a suspect and result in his release.

<strong>Interrogation</strong> is the most serious level of questioning a suspect, and interrogation is the process that occurs once reasonable grounds for belief have been established, and after the suspect has been placed under arrest for the offence being investigated. Reasonable grounds for belief to make such an arrest require some form of direct evidence or strong circumstantial evidence that links the suspect to the crime. Of course, where an arrest is made, the suspect will be provided with their charter rights and the police caution, as per the following:
<blockquote>
<h5>Charter Warnings</h5>
Section 10(a)

"I am arresting/detaining you for: (State reason for arrest/detention, including the offence and provide known information about the offence, including date and place.)"

Section 10(b)

"It is my duty to inform you that you have the right to retain and instruct Counsel in private, without delay. You may call any lawyer you want. There is a 24-hour telephone service available which provides a legal aid duty lawyer who can give you legal advice in private. This advice is given without charge and the lawyer can explain the Legal Aid Plan to you. If you wish to contact a legal aid duty lawyer, I can provide you with the telephone number.

Do you understand?

Do you want to call a lawyer?"&nbsp;<span>(Canadian Charter, 1982, s 10(a,b))</span>
<h5><strong>Police&nbsp;Warning</strong></h5>
"You are not obliged to say anything, but anything you do say may be given in evidence." (Transit Police, 2015)

If the suspect has already had communication with the police in relation to the offence being investigated, they should be provided with the secondary caution. This secondary caution serves to advise the accused person that, even if they have previously made a statement, they should not be influenced by that to make further statements.
<h5>Secondary Police Warning</h5>
"(Name), you are detained with respect to: (reason for detainment). If you have spoken to any police officer (including myself) with respect to this matter, who has offered you any hope of advantage or suggested any fear of prejudice should you speak or refuse to speak with me (us) at this time, it is my duty to warn you that no such offer or suggestion can be of any effect and must not influence you or make you feel compelled to say anything to me (us) for any reason, but anything you do say may be used in evidence" (Transit Police, 2015).</blockquote>
Once the accused has been afforded the opportunity to speak with a lawyer, the caution obligations of the police to the accused have been met, and the suspect may be questioned with respect to their involvement in the offence. These cautions and warnings may sound like a great deal of effort aimed at discouraging a suspect from saying anything at all to the police, and, in many cases that is the result. However, if the cautions are properly administered, and the opportunities to speak with counsel are properly provided, a major obstacle to the admission of any future statements has been satisfied.

Interrogation generally takes place in the formal environment of an interview room and is often tape-recorded or video-recorded to preserve the details of what was said. A video recording is the preferred means because it accurately represents the environment of the interview room in which the interrogation was conducted. In challenging the processes of an interrogation where a statement has been made by an accused, defense counsel will look for anything that can be pointed to as an oppressive environment or threatening conduct by the investigator. Within the appropriate bounds of maintaining an environment of safety and security, the investigator should make every effort to demonstrate sensitivity to these issues.

Seating in the room should be comfortable and balanced for face to face contact. The investigator should not stand over the suspect or walk around the room behind the suspect while conducting the interview. More than one investigator in the room with the suspect can be construed as being oppressive and should be avoided. The suspect should be offered a beverage or food if appropriate and should be told that a bathroom is available for their needs upon request. The demeanor of the investigator should be non-aggressive and calm, demonstrating an objective professional tone as a seeker of the truth. Setting a non-aggressive tone and establishing an open rapport with the suspect is not only beneficial to demonstrate a positive environment to the court, it also helps to create a positive relationship of openness and even trust with the suspect. This type of relationship can be far more conducive to gaining cooperation towards a statement or even a confession.

Prior to beginning the actual interrogation, the investigator should prepare an interrogation plan by:
<ol>
 	<li>Reviewing the suspect’s profile, criminal record, and past investigations</li>
 	<li>Reviewing the full details of the existing investigation to date</li>
 	<li>Determining the elements of the offence that will need to be proved</li>
 	<li>Determining if sufficient evidence has already been obtained to submit a <em>prima facia </em>case to Crown</li>
 	<li>Examining evidence that demonstrates motive, opportunity, and means</li>
 	<li>Determining what evidence was located and considered in forming reasonable grounds to arrest the suspect</li>
 	<li>What physical evidence has been found that may yet be analyzed to prove the suspect’s involvement</li>
</ol>
Preparing the interrogation plan can assist the investigator in developing a strategy to convince the suspect to answer questions or confess to the crime. Those uninitiated to the process of interrogation might wonder why anyone would possibly choose to answer questions or confess when they have been provided with their <em>Charter of Rights and Freedoms</em> and the standard caution that they are not obliged to say anything, and anything they do say may be used as evidence. There are several reasons that can motivate or persuade a suspect to answer questions or confess. Statements or confessions are often made despite the warnings that would seemingly deter anyone from saying anything. These reasons include:
<ul>
 	<li>Wishing to exonerate oneself,</li>
 	<li>Attempting deception to outsmart the system,</li>
 	<li>Conscience,</li>
 	<li>Providing an explanation to minimize one’s involvement in the crime, or</li>
 	<li>Surrender in the face of overwhelming evidence.</li>
</ul>
Investigators who are familiar with these reasons and motivations can utilize them in assessing their suspect and developing a strategy for their interrogation plan.
<h3>Exoneration</h3>
After making an arrest, an objective investigator must always be prepared to hear an explanation that will challenge the direct evidence or the assumptions of the circumstantial evidence that led to the reasonable grounds for belief to make that arrest. The best reason an arrested suspect can be offered to answer questions is to be exonerated from the crime. It is possible, and it does occur, that persons are arrested for a crime they have not committed. Sometimes, they are wrongly identified and accused by a victim. Other times, they are incriminated by a pattern of circumstantial evidence that they can ultimately explain. The interrogation following the arrest is an opportunity for the suspect to put their version of events on the record, and to offer an alternate explanation of the evidence for investigators to consider. Exoneration is not just an interrogation strategy; it is the duty of an objective investigator to offer a suspected person the opportunity of make an explanation of the evidence that led to their arrest. This can be initiated by offering the suspect the proposition, “This is the evidence that led to your arrest. If there is an alternate explanation for this evidence, please tell me what that is." In some cases, the statements made by the suspect will require additional investigation and confirmation of facts to verify the exoneration. Conducting these investigations is also the duty of an objective investigator.
<h3>Deception to Outsmart the System</h3>
Some experienced criminals or persons who have committed well-planned crimes believe that they can offer an alternate explanation for their involvement in the criminal event that will exonerate them as a suspect. An investigator may draw answers from this type of suspect by offering the same proposition that is offered for exoneration. This is the opportunity for a suspect to offer an alibi or a denial of the crime and an alternate explanation or exonerating evidence. It can be very difficult for a suspect to properly explain away all the evidence. Looking at the progression of the event, an interrogator can sometimes ask for additional details that the suspect cannot explain. The truth is easier to tell because it happened, and the facts will line up. In contrast, a lie frequently requires additional lies to support the untrue statement. Examining a statement that is believed to be untrue, an interrogator can sometimes ask questions that expose the lies behind the original lie.
<h3>Conscience</h3>
As much as the good guys versus the bad guys' concept of criminal activity is commonly depicted in books and movies, experienced investigators can tell you that people who have committed a criminal offence often feel guilt and true regret for their crime. This is particularly true of persons who are first-time offenders and particularly young offenders who have committed a crime against a person.

Suspects fitting this category may be identified by their personal profile, which typically includes no criminal record, no police record or limited police record of prior investigations, evidence of poor planning, or evidence of emotional/spontaneous actions in the criminal event.

Suspects who fit this profile may be encouraged to talk by investigators who have reviewed the effect that the criminal act has had on the victim or the victim’s family. Following this review of victim impact, the investigator can accentuate the suspect’s lack of past criminal conduct, while making the observation that the suspect probably feels really bad about this. Observing the suspect during this progression, a suspect affected by guilt will sometimes exhibit body language or facial expressions of concern or remorse. Responses, such as shoulders slumping, head hung down, eyes tearing up, or avoiding eye contact, can indicate the suspect is ashamed and regretful of the crime. Observing this type of response, an investigator may move to a theme of conversation that offers the suspect the opportunity to clear their conscience by taking responsibility for their actions and apologizing or by taking some other action to right the wrong that has been done.
<h3>Explanation to Minimize Involvement</h3>
Suspects who have been arrested will sometimes be willing to provide an additional explanation of their involvement or the events to reduce their level of culpability or blame for the crime. In cases where multiple suspects have been arrested for a crime, one of those suspects may wish to characterize their own involvement as peripheral, sometimes as being before the fact or after the fact involvement. Examples of this would be a person who left the door unlocked for a break-in to take place or merely driving the getaway car. These less involved suspects hope to gain a reduced charge or even be reclassification as a witness against their co-accused. In such cases, where multiple suspects are arrested, the investigator can initiate this strategy by offering the proposition, “If you have only a limited or minimal level of involvement in this crime, you should tell me about that now.”
<h3><strong>Surrender to Overwhelming Evidence</strong></h3>
The arrested suspect in a criminal investigation waiting in custody for interrogation has plenty to think about. Even the most experienced criminals will be concerned about how much evidence the police have for proving their connection to the crime. In the process of presenting a suspect with the opportunity to address the evidence that has been collected, an additional strategy can sometimes be engaged where there is a large volume of incriminating evidence or undeniable direct evidence, such as eyewitnesses or strong forensic evidence for circumstantial connections of the suspect to the crime. In such cases, if the interrogator can reveal the evidence in detail to the suspect, this disclosure may result in the suspect losing hope and making a confession to the crime. Although this tendency to surrender to overwhelming evidence may seem illogical, it does happen. Sometimes, this surrender has more to do with conscience and shame of the crime, but other times, the offender has just lost the energy to resist what they perceive to be a hopeless fight. As counter intuitive as this may seem, research has found that the suspect's perception of the strength of police evidence is one of the most important factors influencing their decision to confess to police (Gudjonsson &amp; Petursson, 1991). More recent research has shown that the stronger the evidence, the more likely a suspect was to confess (Gudjonsson, 2015 ).
<h2>Topic 2: Dealing with False Confessions</h2>
As noted at the beginning of this chapter, the goal of ethical interviewing, questioning, and interrogation is to elicit the truth, and the truth can include statements that are either inculpatory confessions of guilt or exculpatory denial of involvement in a crime. Whenever an investigator has interrogated a suspect, and a confession of guilt has been obtained, that investigator needs to take some additional steps to ensure that the confession can be verified as truthful before it goes to court. These additional steps are required because, although the investigator has not used any illegal or unethical techniques, the court will still consider whether the accused, for some reason, has confessed to a crime they did not commit. A skilled defense lawyer will often present arguments alleging that psychological stresses of guilt or hopelessness from exposure to overwhelming evidence have been used to persuade a suspect to confess to a crime they did not commit. In such cases, it is helpful for the court to hear any additional statements made by the accused, such as those that reveal that the suspect had direct knowledge of the criminal event that could only be known to the criminal responsible.

In police investigations, there are many details of the criminal event that will be known to the police through their examination of the crime scene or through the interview with witnesses or victims. These details can include the actual way the crime was committed, such as the sequence of events, the tools used in the crime; or the means of entry, path of entry/exit, along with other obscure facts that could only be known by the actual perpetrator. There are opportunities in a crime scene examination for the investigator to observe one or more unique facts that can be withheld as “hold back evidence”. This hold back evidence is not made part of reports or media release, and is kept exclusively to test for false confessions. Confessing to the crime is one thing, but confessing to the crime and revealing intimate details is much more compelling to the court. Regardless of the effort and care that investigators take to not end up with a false confession, they still occur, and there are some more common scenarios where false confessions happen. It is important for an investigator to consider these possibilities when a confession is obtained. These situations are:
<ol>
 	<li><em>The confessor was enlisted to take the blame</em> - On occasions where persons are part of organized crime, a person of lower status within the group is assigned or sacrificed to take the blame for a crime in place of a person of higher status. These organizational pawns are usually persons with a more minor criminal history or are a young offender, as they are likely to receive a lesser sentence for the offence.</li>
 	<li><em>The Sacrificial Confessor -</em> Like the confessor enlisted in an organized criminal organization, there is another type of sacrificial confessor; the type who steps forward to take the blame to protect a friend or loved one. These are voluntary confessors, but their false confession can be exposed by questioning the confessor about the hold back details of the event.</li>
 	<li><em>The Mentally Ill False Confessor -</em> This type of false confessor are encountered when there is significant media attention surrounding a crime. As Pickersgill (2015) noted, an innocent person may voluntarily provide a false confession because of a pathological need for notoriety or the need to self-punish due to guilt over an unrelated past offences. Additionally, those suffering from psychosis, endogenous depression, and Munchausen Syndrome may falsely confess to a crime they did not commit (Abed, 2105)<strong><em>. </em></strong>As with other false confessors, these people can be discovered using hold back detail questioning.</li>
</ol>
<h2>Topic 3: Interviewing, Questioning, and Interrogating Young Offenders</h2>
Over the past century, with the <em>Juvenile Delinquents Act</em> (1908), the <em>Young Offenders Act</em> (1984), and the <em>Youth Criminal Justice Act</em> (2003), there has been an increased recognition in Canada of the need to treat young offenders differently than their adult counterparts. Recognizing the special needs of youth, each of these acts moved to treat young offenders less punitively and with a greater attention to rehabilitation. Further, under the <em>Youth Criminal Justice Act</em> (<em>YCJA</em>), young offenders are regarded as a special category of suspect, and some very strict rules apply to the process of arresting, questioning, or interrogating a young offender. For instance, the <em>YCJA</em> requires the notification and inclusion of parents or guardians in situations where a youth is being subjected to action for an investigation or a charge for an offence. As well, any young persons must have their Charter Rights explained by the investigator with language appropriate to their age and level of understanding. This means that the officer must talk with and assess an accused youth to determine their ability to understand their rights before taking their statement.

The officer’s process of assessment will be questioned and examined by the court before any statement made by a youth is admitted as evidence. During this examination, the court will determine from the evidence whether the youth fully understood the rights being explained to them. An officer presenting evidence of having conducted a proper assessment of an accused youth should have notes reflecting the conversations and specific observations of the youth’s responses to satisfy the court that adequate efforts were made to ensure that the youth did understand their rights. Good evidence of understanding can be achieved by asking the youth to repeat, summarize, or paraphrase their understanding of the rights that were explained to them.

In addition to the right to instruct counsel, as afforded to any adult under the <em>Canadian Charter of Rights and Freedoms</em>, a youth must also be afforded the additional right of being given a reasonable opportunity to consult with a parent or, in the absence of a parent, an adult relative or any other appropriate adult chosen by the young person, as long as that person is not a co-accused or under investigation for the same offence.

Further, in addition to this right, there is also an obligation on the police investigator to provide independent notice to the parent of a detained young person as soon as possible. The requirement for notice to the parent is a separate obligation for police, and it requires specific notification of (a) the name of the young person, (b) the charge against the young person, and (c) a statement that the young person has the right to be represented by counsel. If a parent is not available to receive this notice, it may be given to a person whom the investigator deems appropriate. In the case of some young people, this could be an older sibling, an adult caregiver, or, for those in the care of Social Services, a social worker in charge of the young person care. In any case, these requirements and others specific to young offenders are spelled out under Sec 146 of the <em>Youth Criminal Justice Act</em>:
<blockquote>Youth Criminal Justice Act (Section 146)

(1)&nbsp;Subject to this section, the law relating to the admissibility of statements made by persons accused of committing offences applies in respect of young persons.

(2)&nbsp;No oral or written statement made by a young person who is less than eighteen years old, to a peace officer or to any other person who is, in law, a person in authority, on the arrest or detention of the young person or in circumstances where the peace officer or other person has reasonable grounds for believing that the young person has committed an offence is admissible against the young person unless
<p style="padding-left: 30px">(a)&nbsp;the statement was voluntary;</p>
<p style="padding-left: 30px">(b)&nbsp;the person to whom the statement was made has, before the statement was made, clearly explained to the young person, in language appropriate to his or her age and understanding, that</p>
<p style="padding-left: 60px">(i)&nbsp;the young person is under no obligation to make a statement,</p>
<p style="padding-left: 60px">(ii)&nbsp;any statement made by the young person may be used as evidence in proceedings against him or her,</p>
<p style="padding-left: 60px">(iii)&nbsp;the young person has the right to consult counsel and a parent or other person in accordance with paragraph&nbsp;(c), and</p>
<p style="padding-left: 60px">(iv)&nbsp;any statement made by the young person is required to be made in the presence of counsel and any other person consulted in accordance with paragraph&nbsp;(c), if any, unless the young person desires otherwise;</p>
<p style="padding-left: 30px">(c)&nbsp;the young person has, before the statement was made, been given a reasonable opportunity to consult</p>
<p style="padding-left: 60px">(i)&nbsp;with counsel, and</p>
<p style="padding-left: 60px">(ii)&nbsp;with a parent or, in the absence of a parent, an adult relative or, in the absence of a parent and an adult relative, any other appropriate adult chosen by the young person, as long as that person is not a co-accused, or under investigation, in respect of the same offence; and(d)&nbsp;if the young person consults a person in accordance with paragraph&nbsp;(c), the young person has been given a reasonable opportunity to make the statement in the presence of that person.</p>
(3)&nbsp;The requirements set out in paragraphs&nbsp;(2)(b) to (d) do not apply in respect of oral statements if they are made spontaneously by the young person to a peace officer or other person in authority before that person has had a reasonable opportunity to comply with those requirements.

(4)&nbsp;A young person may waive the rights under paragraph&nbsp;(2)(c) or (d) but any such waiver
<p style="padding-left: 30px">(a)&nbsp;must be recorded on video tape or audio tape; or</p>
<p style="padding-left: 30px">(b)&nbsp;must be in writing and contain a statement signed by the young person that he or she has been informed of the right being waived.</p>
(5)&nbsp;When a waiver of rights under paragraph&nbsp;(2)(c) or (d) is not made in accordance with subsection&nbsp;(4) owing to a technical irregularity, the youth justice court may determine that the waiver is valid if it is satisfied that the young person was informed of his or her rights, and voluntarily waived them.

(6)&nbsp;When there has been a technical irregularity in complying with paragraphs&nbsp;(2)(b) to (d), the youth justice court may admit into evidence a statement referred to in subsection&nbsp;(2), if satisfied that the admission of the statement would not bring into disrepute the principle that young persons are entitled to enhanced procedural protection to ensure that they are treated fairly and their rights are protected.

(7)&nbsp;A youth justice court judge may rule inadmissible in any proceedings under this Act a statement made by the young person in respect of whom the proceedings are taken if the young person satisfies the judge that the statement was made under duress imposed by any person who is not, in law, a person in authority.

(8)&nbsp;A youth justice court judge may in any proceedings under this Act rule admissible any statement or waiver by a young person if, at the time of the making of the statement or waiver,
<p style="padding-left: 30px">(a)&nbsp;the young person held himself or herself to be eighteen years old or older;</p>
<p style="padding-left: 30px">(b)&nbsp;the person to whom the statement or waiver was made conducted reasonable inquiries as to the age of the young person and had reasonable grounds for believing that the young person was eighteen years old or older; and</p>
<p style="padding-left: 30px">(c)&nbsp;in all other circumstances the statement or waiver would otherwise be admissible.</p>
(9)&nbsp;For the purpose of this section, a person consulted under paragraph&nbsp;(2) (c) is, in the absence of evidence to the contrary, deemed not to be a person in authority.&nbsp;(Government of Canada, 2015)</blockquote>
<h2>Topic 4: Ancillary Offence Recognition</h2>
Criminal acts can be complex and persons committing crimes can be devious. For every law prohibiting a criminal act, there are those who seek to avoid prosecution or to subvert the law completely. Criminal law has evolved into the current model to reflect the different types of crimes that are possible, and this evolution now includes laws known as ancillary offences. For an investigator, part of the investigative skill set is learning to recognize the evidence and fact patterns that constitute these ancillary criminal acts. These offences include:
<ul>
 	<li>Conspiracy to commit an offence</li>
 	<li>Attempting to commit an offence</li>
 	<li>Being an accessory after the fact to an offence</li>
 	<li>Aiding and abetting an offence</li>
 	<li>Counselling a person to commit an offence</li>
 	<li>Compounding an indictable offence</li>
</ul>
For any of these offences, an investigator needs to be aware of the types of information and evidence that will support these charges. Sometimes an investigation will identify a suspect participant where there appears to be a nexus of involvement to the crime, but that nexus is not sufficient evidence of a criminal act to support an arrest or a charge. In these cases, an ancillary offence may be appropriate.
<h3><strong>Conspiracy to Commit an Offence</strong></h3>
A conspiracy to commit any offence requires an agreement between two or more persons to commit a criminal act.
<blockquote><strong>Conspiracy Offence Criminal Code of Canada</strong>

<span style="color: initial;font-size: 1.0em;text-align: justify">(1) Except where otherwise expressly provided by law, the following provisions apply in respect of conspiracy:</span>
<p style="padding-left: 30px">(a) every one who conspires with any one to commit murder or to cause another person to be murdered, whether in Canada or not, is guilty of an indictable offence and liable to a maximum term of imprisonment for life;</p>
<p style="padding-left: 30px">(b) every one who conspires with any one to prosecute a person for an alleged offence, knowing that he did not commit that offence, is guilty of an indictable offence and liable</p>
<p style="padding-left: 60px">&nbsp;(i) to imprisonment for a term not exceeding ten years, if the alleged offence is one for which, on conviction, that person would be liable to be sentenced to imprisonment for life or for a term not exceeding fourteen years, or</p>
<p style="padding-left: 60px">(ii) to imprisonment for a term not exceeding five years, if the alleged offence is one for which, on conviction, that person would be liable to imprisonment for less than fourteen years;</p>
(c) every one who conspires with any one to commit an indictable offence not provided for in paragraph (a) or (b) is guilty of an indictable offence and liable to the same punishment as that to which an accused who is guilty of that offence would, on conviction, be liable; and

(d) every one who conspires with any one to commit an offence punishable on summary conviction is guilty of an offence punishable on summary conviction. (Dostal, 2012)</blockquote>
The offence that is being conspired upon is called the “target offence”, and that offence does not need to be carried out to constitute the offence of conspiracy. All that is required to establish the offence of conspiracy is evidence that two or more persons conspired together and formed a common intent to commit the targeted offence.

As an interesting side note to the conspiracy charge: if two persons conspire together to commit any offence outside of Canada and that offence would be an offence if committed in Canada, they may be charged with conspiracy (Government of Canada, 2017). In other words, two persons may conspire in Canada to commit a murder in the United States, and, even if that murder is not committed, they could be charged with conspiracy to commit murder.

Conspiracy opens the door to many possibilities where persons not otherwise chargeable may be held accountable for their part in a criminal act or in a proposed criminal act.

Consider the situation where an armed robbery of a bank occurs and three suspects flee the scene as police respond. The last suspect to exit the bank, William Tooslow, is stopped and arrested by police responding to the alarm, but the other two suspects escape. As the investigation proceeds, no additional evidence is found to identify the two robbers who escaped, but searches of Mr. Tooslow’s cell phone reveal book messages and emails with another male, Iben Faster, where plans to rob this bank were clearly being made over the past week.

Although there is not enough evidence to place Mr. Faster in the bank at the time of the robbery, he could still be charged with conspiracy to commit armed robbery, while Mr. Tooslow is charged with the actual offence of armed robbery. During an interrogation, a suspect may attempt to minimize their involvement in the crime and admit only to participating in making the plan. An investigator needs to recognize that this is still a chargeable offence.
<h3>Attempting to Commit an Offence</h3>
Like conspiracy, attempting to commit an offence does not require that the offence is committed.
<blockquote><strong>Attempts – Criminal Code of Canada</strong>
<p style="padding-left: 30px">24. (1) Every one who, having an intent to commit an offence, does or omits to do anything for the purpose of carrying out the intention is guilty of an attempt to commit the offence whether or not it was possible under the circumstances to commit the offence. (Dostal, 2012)</p>
</blockquote>
Unlike conspiracy, attempting to commit an offence only requires one person planning the crime to commit the target offence. For the offence of attempting to commit an offence to be completed, there must be evidence to show that the accused went past the point of mere planning and did something or omitted to do something in the furtherance of their plan. This attempting to commit provision can be a useful strategic tool for investigators because it provides the option to intervene before an offence in the planning stage takes place.

Consider the scenario where a suspect, Franky Yapsalot, tells a friend that he is planning to do a home invasion at the residence of a wealthy local businessman on Saturday night. The friend informs to the police and investigators conduct surveillance on Mr. Yapsalot. On Saturday night, Mr. Yapsalot is observed wearing dark clothing and gloves and gets into his car with a sawed off shotgun. As he drives into the residential area of the businessman’s home, police stop his car and make the arrest. In this case, sufficient evidence would exist to make a charge of attempted break and enter with intent to commit an indictable offence.

The offence of attempting to commit an offence can sometimes allow police to take effective enforcement action and intervene before the target offence occurs, without endangering the proposed victim of the planned offence. At the interrogation stage of an investigation, a suspect wanting to minimize his culpability may admit to sufficient planning and action to make out the offence of attempting to commit.
<h3>Being an Accessory After the Fact to an Offence</h3>
Accessory after the fact is another offence where a person can be charged with participating in a crime, even if they were not directly involved in planning or carrying out the primary offence.
<blockquote><strong>Accessory after the fact – Criminal Code of Canada</strong>

23. (1) An accessory after the fact to an offence is one who, knowing that a person has been a party to the offence, receives, comforts or assists that person for the purpose of enabling that person to escape. (Dostal, 2012)</blockquote>
A person can be charged as an “accessory after-the-fact” to an offence, if evidence is discovered to show that they knew that another person had committed the primary offence and they received, comforted, or assisted that person to enable them to escape justice. An example of this offence could be where a person receives a phone call from a friend asking to be transported and hidden away after escaping from prison. If the friend complies with this request, they would become an accessory after the fact to the offence of escaping lawful custody.
<h3>Counselling a Person to Commit an Offence</h3>
In this type of ancillary crime, the person providing the counseling becomes a party to the offence if it is committed.
<blockquote><strong>Person counselling offence – <em>Criminal Code of Canada</em></strong>

22. (1) Where a person counsels another person to be a party to an offence and that other person is afterwards a party to that offence, the person who counselled is a party to that offence, notwithstanding that the offence was committed in a way different from that which was counselled.

<strong>Idem</strong>

(2) Every one who counsels another person to be a party to an offence is a party to every offence that the other commits in consequence of the counselling that the person who counselled knew or ought to have known was likely to be committed in consequence of the counselling.

<strong>Definition of “counsel”</strong>

(3) For the purposes of this Act, “counsel” includes procure, solicit or incite.
R.S., 1985, c. C-46, s. 22; R.S., 1985, c. 27 (1st Supp.), s. 7. (Dostal, 2012)</blockquote>
Like conspiracy and aiding/abetting, it is not necessary for the person providing the counselling to participate in the offence, and the offence does not even need to be committed following the exact instruction of the counsellor. A condition to this offence is that the counsellor will only be a party if they knew or should have known that the other person was likely to commit that crime in consequence of the counseling. An interrogator recognizing this offence would seek to draw out admissions of what the counselling suspect knew or should have known about the likelihood of the perpetrator committing the offence.
<h3>Parties to an Offence</h3>
The ancillary offence of being a party to an offence, under section 21(1) of the Criminal Code is also often referred to as aiding and abetting.
<blockquote><strong>Parties to offence – <em>Criminal Code of Canada</em></strong>
21. (1) Every one is a party to an offence who
<p style="padding-left: 60px">(a) actually commits it;</p>
<p style="padding-left: 60px">(b) does or omits to do anything for the purpose of aiding any person to commit it; or</p>
<p style="padding-left: 60px">(c) abets any person in committing it.</p>
<strong>Common intention</strong>

(2) Where two or more persons form an intention in common to carry out an unlawful purpose and to assist each other therein and any one of them, in carrying out the common purpose, commits an offence, each of them who knew or ought to have known that the commission of the offence would be a probable consequence of carrying out the common purpose is a party to that offence. R.S., c. C-34, s. 21. (Dostal, 2012)</blockquote>
Aiding and abetting is different from other ancillary offences in that it does not become a separate charge from the primary offence. In the cases of conspiracy, counselling, and accessory after the fact, persons are charged with those ancillary offences; however, in the case of aiding and abetting an offence, the person is charged with the primary offence. So, where evidence shows that a person purchased the weapons to enable an armed robbery to take place, that person would be charged under the section for armed robbery proper.
<h2>Summary</h2>
In this chapter, we have defined the stages and discussed the issues surrounding the investigative tasks of interviewing, questioning, and interrogating suspects in criminal investigations. We have also called attention to the specific change obligations that must be recognized and responded to by an investigator as the investigation progresses. In terms of the interrogation of suspects, this chapter examined the process of developing an interrogation plan by considering the variety of motivations that might cause a suspect to make a confession to a crime, and the additional protections afforded to youth was also discussed. In this chapter’s final section, definitions and examples of hybrid ancillary offences was presented, as was the need to interrogate suspects and investigate for additional evidence in support of proving the unique elements of ancillary offences, if they have occurred.
<div class="bcc-box bcc-info">
<h3 itemprop="educationalUse">Study Questions</h3>
&nbsp;
<ol>
 	<li>At what point would an investigator move from interviewing a person to questioning them?</li>
 	<li>At what point would an investigator move from questioning a suspect to interrogating them?</li>
 	<li>What are three common scenarios where an investigator is likely to come across a false confession?</li>
 	<li>What are two ways in which young offenders must be treated differently than adults by an investigator in the process of questioning them about involvement in a crime?</li>
 	<li>What are six examples of ancillary offences that investigators need to be aware of?</li>
 	<li>What evidence must be provided to show that a person can be charged with being an “accessory after the fact”?</li>
 	<li>How is “aiding and abetting” different from other ancillary offences?</li>
</ol>
</div>
&nbsp;
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>415</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:41]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:41]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-9-interviewing-questioning-and-interrogation-2]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>395</wp:post_parent>
		<wp:menu_order>9</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 9: Interviewing, Questioning and Interrogation]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 10: Forensic Sciences</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-10-forensic-sciences-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:41 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-10-forensic-sciences-2/</guid>
		<description></description>
		<content:encoded><![CDATA[
<div class="textbox">

<em>“Knowledge of forensic tools and services provides the investigator with the ability to recognize and seize on evidence opportunities that would not otherwise be possible.”</em>

</div>
In this chapter, we examine various forensic sciences and the application of forensic sciences as practical tools to assist police in conducting investigations. The chapter is not intended to be a comprehensive dissertation of the forensic sciences available. Rather, it is intended to be an overview to demonstrate the broad range of forensic tools available. As we noted in Chapter 1, it is not necessary for an investigator to be an expert in any of the forensic sciences; however, it is important to have a sound understanding of forensic tools to call upon appropriate experts to deploy the correct tools when required. The forensic analysis topics covered in this chapter include:
<ol>
 	<li>Physical Matching</li>
 	<li>Fingerprint Matching</li>
 	<li>Hair and fibre analysis</li>
 	<li>Ballistic Analysis</li>
 	<li>Blood Spatter Analysis</li>
 	<li>DNA Analysis</li>
 	<li>Forensic Pathology</li>
 	<li>Chemical Analysis</li>
 	<li>Forensic Anthropology</li>
 	<li>Forensic Entomology</li>
 	<li>Forensic Odontology</li>
 	<li>Forensic Engineering</li>
 	<li>Criminal Profiling</li>
 	<li>Geographic Profiling</li>
 	<li>Forensic Data Analysis</li>
 	<li>Forensic Document Analysis</li>
 	<li>Forensic Identification Sections</li>
 	<li>Crime Detection Laboratories</li>
</ol>
Various types of physical evidence can be found at almost any crime scene. The types of evidence and where it is found can assist investigators to develop a sense of how the crime was committed. Tool marks where a door was forced open can indicate a point of entry, shoe prints can show a path of travel, and blood stains can indicate an area where conflict occurred. Each of these pieces of physical evidence is a valuable exhibit capable of providing general information about spatial relationships between objects, people, and events. In addition, the application of forensic examination and analysis could turn any of these exhibits into a potential means of solving the crime.
<h2>Topic 1: Physical Matching</h2>
If we think back to the example in Chapter 1 where the Bow Street Runners (McCrery, 2013)&nbsp;made a physical match from the torn edges of one piece of wadding paper to the original sheet from which it was torn, we can appreciate that physical matching is a forensic technique that can be applied, to some extent, by the investigator personally viewing and studying details of the evidence. At this level, physical matching can be used by investigators to do on site analysis of evidence. That said, the more sophisticated aspects of physical matching do require the expertise of a person trained in the techniques to form and articulate an opinion that the court will accept as expert evidence.

During a crime investigation, physical matching is typically conducted on items, such as fingerprints, shoe prints, tire prints, glove prints, tool impressions, broken glass, plastic fragments, and torn edges of items, such as paper, tape, or cloth. In these physical matchings, there are two levels of examination that are typically considered; an examination for <em>class characteristics</em> and an examination for <em>accidental characteristics</em>.
<h3>Level One – The Examination of the Item for Class Characteristics</h3>
Determining class characteristics takes place in relation to items, such as shoe prints, tire prints, glove prints, and tool impressions. At the first level of examination, these items can be classified and sorted based on type, make, model, size, and pattern. For example, if a shoe print is found at the scene of a crime and is determined to be a left shoe of a size 9, Nike brand, Air Jordan model, running type shoe with a wavy horizontal sole pattern, these class characteristics collectively provide a description of the suspect's shoe based on five defined descriptors.

In turn, these class characteristics may allow the investigators to narrow their focus to suspects having that class description of shoe. It is not a positive identification of the shoe to any particular suspect, but it does allow the potential elimination of suspects who wear different sizes, brands, and sole patterns of running shoe. Using this Level One examination, an investigator at the crime scene may find a suspect shoe print showing a distinct size and sole pattern. If a suspect with a matching size and sole pattern is found near the crime scene, this Level One observation would provide strong circumstantial evidence to assist in forming reasonable grounds to suspect that this person was involved in this crime.

A Level Two examination may be able to produce a conclusive match. Positive identification requires this next level of examination, namely the examination for accidental characteristics.
<h3>Level Two - Accidental Characteristics</h3>
Accidental characteristics are the unique marks and features that develop on any item resulting from wear and tear. Looking back at the Nike Air Jordan Running Shoe, to make a positive match of a suspect's shoe to the impression found at the crime scene, the crime scene impression would be examined for nicks, gouges, and wear patterns typically present on a worn shoe. These features would then be compared to a rolled impression of a suspect's shoe, and if the same nicks, gouges, and wear patterns could be shown in all the same locations on the suspect's shoe, a positive match could be made.

This Level Two method of comparison for things, such as shoes prints, tire prints, glove prints, and tool impressions, is the practice for physical matching. Investigators can often use these physical matchings to link the suspect back to the crime scene or the victim. Finding a suspect in possession of a shoe, a tire, or a tool that is a positive match to an impression at the criminal event is a powerful piece of circumstantial evidence.

With items, such as broken glass and plastic fragments, the process of physical matching requires significantly greater levels of expertise. At Level One, these items are first matched for general characteristics, such as material colour and thickness; however, the process for making the comparison of broken edges requires microscopic examination and photographic overlay comparison of broken edge features to demonstrate a positive match. For investigators, these kind of comparisons can be called upon where there is broken glass at a crime scene and fragments of glass have been found on a suspect's clothing, or in cases where glass or plastic fragments are left at the scene of a hit-and-run car crash and a suspect vehicle is found with damage that includes similarly broken items. Glass fracture analysis can also be used to demonstrate which side of a piece of glass received the impact that caused the fracture. This can be a helpful tool in confirming or challenging a version of events, such as insurance fraud, break-in reports, and motor vehicle crashes where the damage has been exaggerated or staged. Glass fracture analysis can also be used to demonstrate the sequence and order in which a series of bullets have passed through the glass of a window. This can be helpful for an investigator to establish the origin location of the shooter, and, in cases of a drive-by shooting, the direction of travel.
<h2>Topic 2: Fingerprint Matching</h2>
The forensic science of fingerprints has a longstanding history in policing. Fingerprints have been accepted as being individually unique to each person. The courts frequently accept positive fingerprint matches conducted by an expert witness, as proof of identity beyond a reasonable doubt (Jain, 2010).

Prior to the modern advent of DNA analysis and biometric scanning technologies for positive identification, fingerprints and dental record x-rays were the only truly positive means of making a conclusive identification.

Fingerprints are unique patterns of lines and ridges that exist on the areas of our hands and fingertips, known as the plantar surfaces. These unique patterns have been classified in categories and features since the late 1800’s (Dass, 2016). The various categories and features allow each digit of a person's fingers to be catalogued in a searchable system or database. These unique categories and features do not change throughout a person’s life, unless they are subjected to damage through physical injury or intentional abrasion. The impressions of our fingerprints are often left on items we touch because the oils our bodies produce act like an invisible ink adhering to smooth surfaces we touch, thus transferring these fingerprint impressions to those surfaces. These virtually invisible image transfers are commonly called latent fingerprints, and they are easily made visible on most surfaces through the application of colored fingerprinting powder that adheres to the oils left by our fingers. The powder sticking to the oil reveals the image of lines and ridges that make up the fingerprint. It is also possible for a fingerprint impression to be exposed on surfaces, such as plastic, dry paper, or paint though a process of chemical fuming that reacts with the oils of the fingerprint changing their color, thereby exposing the image. Fingerprints are sometimes also visible when they are transferred to an object because the finger has some foreign material on it, such as ink or blood. Other forms of visible fingerprints can be found as an actual moulded impression of the fingerprint when a person touches a malleable surface, such as clay or cheese.

The unique lines and ridges of an unknown fingerprint can be searched in a database of known criminal fingerprints for identification. Today, this type of search is done electronically using a biometric scanning process known as <em>Automated Fingerprint Identification System</em> (AFIS). For smaller partial prints, identification of a suspect requires sorting through possible suspects and conducting specific searches of print characteristics to make a match. If the person who left the print does not have a criminal record or their fingerprints are not on file, the only way a comparison can be made is to obtain a set of fingerprint impressions from that person. When this is done, the print examination will be conducted by a trained fingerprint expert who will search the print to establish as many points of comparison between the suspect print and the known-print as possible. The general accepted standard for accepting a match is to find ten points of comparison.

The location and identification of a suspect’s fingerprint at the scene of a crime, or on some crime-related object, is strong circumstantial evidence from which the court can draw the inference that the suspect is, in some way, connected to the crime. The investigative challenge of finding a suspect's print is to eliminate other possible ways that the print may have been left at the scene, other than through involvement in the crime.
<h2>Topic 3: Hair and Fibre analysis</h2>
In considering once again “Locard's Theory of Evidence Transfer", <span>(Petherick, 2010</span>)&nbsp;it was suggested that a person cannot be at the scene of a crime without leaving something behind, and cannot leave the scene of a crime without taking something with them. Exhibits of hair and fibre fit support this theory well. As humans, we are constantly shedding materials from our bodies and our clothing. We enter a room and we leave behind strands of hair that fall from our heads, oily impressing of our fingerprints as we touch objects, and fibres of our clothing materials. As we leave a room, we take away hairs from other occupants of the room or fibres from the carpet and furniture adhering to our clothing. The analysis of hair and fibre, although not an exact science, can provide corroborative evidence. Hair samples can be compared taking a shed sample at the crime scene to the hair from a suspect to establish a similarity within a limited degree of certainty. If the hair happens to have been pulled out and still has root tissue, there is a possibility for more positive identification using DNA analysis. Somewhat more identifiable than hair samples, fibre samples can often be narrowed down to make a higher probability comparison using microscopic examination for size, color, and type between an unknown sample and control sample.
<h2><strong>Topic 4: Ballistic Analysis</strong></h2>
Given the number of gun-related crimes, the understanding of ballistic analysis is important for investigators. Ballistics is the study of all things that are launched into flight, how they are launched, and how they fly. In most cases, investigators find themselves dealing with several common types of firearms.
<ol>
 	<li>Handguns as either semi-automatic pistols or revolvers</li>
 	<li>Long rifles that are single shot bolt action, automatic, or semi-automatic</li>
 	<li>Shotguns that are breach loading or chambered pump action</li>
</ol>
There are techniques in ballistic science that address the unique aspects of firearms and bullets. Because ballistic comparisons seek to determine if a particular gun was the originating source of an unknown bullet or cartridge casing, this examination process is sometimes referred to as ballistic fingerprinting. The analogy being that if a particular gun touched a particular bullet or cartridge-casing, it will leave behind some unique identifiable marks or a ballistic fingerprint.
<h3>Ballistic Fingerprints</h3>
When a modern day firearm is being loaded to fire, the cartridge loaded into the gun is composed of several components. The bullet portion of the cartridge is tightly pressed into a brass tube, called the casing. At the bottom of this brass casing is a round, flat base slightly larger than the casing, and this base prevents the casing from sliding completely into the cartridge chamber of the gun when being loaded. On the bottom of this flat base of the cartridge is the primer. When the trigger is pulled, the primer is the portion of the cartridge that will be struck by the firing pin of the gun. When struck, the primer ignites the gun powder contained inside the brass casing with an explosion that causes the bullet to leave the casing, travel down the gun barrel, and exit the gun.

Each of the components of the cartridge casing can be examined forensically and comparisons can be made to suspect guns. In some instances, it is possible to determine if a cartridge has been fired from the chamber of a specific gun. This can be done by examining the unique and identifiable marks left by four aforementioned components of the gun. Like the process of physical matching, this is also a two-level process.

<strong>At Level One</strong>, cartridges are classified by the calibre, which is the size of the bullet, the maker of the cartridge, and the primer location; either a centre-fire or a rim-fire cartridge on the cartridge base.

For ballistic purposes, guns are classified by their calibre, chambering and ejector mechanisms, and firing pin, namely either centre-fire or rim-fire. Eliminations of suspect weapons can often be made at Level One. For instance, a .38 calibre bullet removed from a crime scene cannot have been fired from a .22 calibre weapon. Or, that same .38 calibre bullet showing marks from an ejector mechanism could not have been fired from a .38 calibre revolver that does not have an ejector mechanism.

<strong>At Level Two</strong>, the more decisive ballistic fingerprint comparisons are often made using the following methods:
<ol>
 	<li>Striations Matching;</li>
 	<li>Chamber Markings;</li>
 	<li>Firing-Pin Comparison; and</li>
 	<li>Ejector markings.</li>
</ol>
&nbsp;
<ol>
 	<li><strong>Striations Matching.</strong> Bullets fired from either a handgun or long rifle, other than a shotgun, fire a single projectile each time. This fired projectile is a lead or lead-composite bullet. When fired, this bullet travels down the barrel of the gun and begins to spin because the inside of the gun barrel has been intentionally machined with long gently turning grooves, called rifling. These grooves catch the soft-lead sides of the bullet spinning it like a football, and this spinning makes the bullet travel more straight and true to the target. As a result of these grooves designed into gun barrels, every bullet fired will arrive at its target with markings etched into the bullet material from contact with the grooves in the barrel. These etched markings are call <em>striations</em>, and they are uniquely identifiable back to the gun they were fired from. For an investigator, these striations create an opportunity to match the bullet to the gun that fired it. Recovered bullets can be recovered and compared to test bullets fired from a suspected gun. When striations of a recovered bullet are compared to known samples fired from a suspected gun, a side-by-side microscopic technique is used to match striation markings. An expert ballistic examiner can sometimes identify and illustrate matches in the striations to make a positive match.</li>
 	<li><strong>Cartridge Chamber Markings</strong><em><em>. </em></em>When a cartridge is loaded into the chamber of a gun, the shiny brass casing comes into contact with the hard steel sides of the chamber. This chambering of the cartridge can leave unique and identifiable scratch marks on the side of the casing. A cartridge casing ejected or unloaded from a weapon and left at the crime scene can sometimes be matched to the suspect gun by comparing these markings.</li>
 	<li><strong>Firing Pin Comparison.</strong> When the firing pin of any gun strikes the primer on the bottom of a cartridge, it leaves an indentation mark. This firing pin indentation can sometimes be matched to the firing pin of a suspect weapon. This requires microscopic examination that looks for the unique characteristics of the firing pin that become impressed into the soft metal of the primer when the firing contact happens.</li>
 	<li><strong>Ejector Mechanism Markings. </strong>Methods for loading and unloading weapons have evolved considerably due to different gun designs. The simplest guns allow the user to open the breach of the gun exposing the cartridge chamber to manually insert the cartridge and close the breach to make ready for firing. There is no ejector mechanism for these guns, so there will be no ejector marks left on the base of a cartridge when it is unloaded from the weapon. Other guns have a variety of different ejector methods, including ejectors that catch the base of the cartridge casing to physically pull it from the breach and eject them away from the gun. In cases where a gun does have an ejector mechanism, these mechanisms leave very distinct and unique marks on the soft brass cartridge base. These markings can sometimes be compared and matched back to the ejector of a suspect weapon. With this broad variety of ballistic comparison techniques, an investigator has a significant number of tools that can be deployed and strategies that can be engaged to assist in matching a bullet to the gun that fired it. Considering these tools, the cartridge casing left at the scene of a shooting can be as important as a bullet removed from the body of a shooting victim. An investigator needs to keep this in mind when seizing cartridge casings as evidence. Great care needs to be exercised to document the location where each individual casing was found, and to preserve each casing in a manner that does not degrade the possible markings that could enable a match to be made. Damage can be done by placing casings into a common bag where they can rub against each other causing more characteristics and obliterating existing marks.</li>
</ol>
<h3>Trajectory Analysis</h3>
In addition to the ballistic fingerprinting examinations, another area of ballistic science is known as trajectory analysis. The trajectory of a bullet is the path it travels from the time it leaves the barrel of the gun to the point where it finally loses the propulsion energy of the gunpowder and comes to rest. The flight of a bullet can be very short, as in the case of a point blank shooting, where a victim is shot at very close range, or it can be very distant where the target is one mile away or more, as in the case in some sniper shootings.

When the bullet is traveling a longer distance, it travels that distance in an arched path or trajectory of travel as it is pulled towards the ground by gravity. When the bullet arrives at its destination, it will have a distinct angle of entry into the target. This angle of entry can sometimes be calculated as trajectory to estimate the geographic location of the originating shot. In cases where a bullet passes through several objects, such as two walls of a house, the trajectory of the bullet can be used to determine where the shooter was located. In cases of drive-by shootings, for example, where several shots are fired, the pattern of trajectories can show if the shooter was moving and, if so, demonstrate the direction of travel.
<h2>Topic 5:&nbsp;Blood Spatter Analysis</h2>
Blood spatter analysis, also known as blood stain pattern analysis, is a relatively new forensic specialty. The purpose of this analysis is to determine the events of a crime where blood has been shed. This is accomplished through the careful examination of how blood is distributed inside the crime scene. Studies have shown that when blood is released during an attack, certain patterns of distribution can be expected (National Science Forensic Technology Center, 2012). For instance, a person being struck with a baseball bat will begin to bleed, and blood will be distributed in a droplet spatter pattern in the direction of the strike behind the victim. These droplets of blood will have a direction of travel that will be indicated by the directional slide of each droplet as the bat hits objects in its path. Blood from the victim adhering to the bat can also be distributed when the bat is on the upstroke for the next strike. This blood will be distributed in an upward directional slide pattern, for example, up a wall, onto a ceiling, or behind the attacker. Calculations of how many strikes were made may become evident from the tracking of multiple streams of droplets behind the victim and behind the attacker. Given this developing science, blood spatter analysis can be useful in criminal event reconstruction.
<h2>Topic 6:&nbsp;DNA Analysis</h2>
DNA, or deoxyribonucleic acid, is a molecule that holds the genetic blueprint used in the development, functioning, and reproduction of all living organisms. As such, it carries the unique genetic information and hereditary characteristics of the cells from which living organism are formed. Except for identical twins, the DNA profile of each living organism is unique and distinct from other organisms of the same species. There are some rare cases where one person may carry two distinct types of DNA, known as Chimera (Rogers, 2016) where paternal twin embryo merge during gestation, or in cases where a bone marrow transplant enables the production of the marrow donor DNA in the recipient’s blood. In these rare cases, a person may test for two distinct DNA profiles for different parts of their body.

In human beings, DNA comparison can enable high probability matches to be made between discarded bodily substances and the person from whom those substances originated. Bodily substances containing cellular material, such as blood, semen, seminal fluid, saliva, skin, and even hair root tissue can often be compared and matched back to its original owner with high statistical probabilities of comparison (Lindsey, 2003). Sometimes, even very old bodily substances, such as dried blood, dried saliva, or seminal stains, can be analyzed for a DNA profile. The introduction of DNA analysis has allowed investigators for advocates to re-examine historical evidence and exonerate persons wrongfully convicted and imprisoned for criminal offences (Macrae, 2015).

DNA is a very powerful tool for investigators and can be considered anytime discarded bodily material is found at a crime scene. Even very small amounts of material can yield enough material for DNA comparison. Importantly, DNA data-banks of known criminals and unsolved crimes are now becoming well established in North America (Royal Canadian Mounted Police, 2006). When a person is convicted of certain criminal offences, DNA is collected and submitted to these databases.
<h2>Topic 7:&nbsp;Forensic Pathology</h2>
Forensic Pathology is the process of determining the cause of death by examining the dead body during an autopsy. An autopsy generally takes place in the pathology department of a hospital. In the case of a suspicious death or a confirmed homicide, police investigators will be present at an autopsy to gather information, take photographs, and seize exhibits of a non-medical nature, such as clothing, bullet fragments, and items that might identify the body. These items would include personal documents, fingerprints, and DNA samples.

During an autopsy, a forensic pathologist dissects the body carefully examining, documenting, and analyzing the body parts to determine the cause of death. In the first stage of an autopsy, the pathologist examines the body for external injuries and indicators of trauma that may provide a cause of death. In this first stage of examination, the pathologist will make an estimate of the time-of-death by observing evidence of four common <em>post-mortem</em> (after-death) indicators. These are body temperature, the degree of rigor mortis, post-mortem lividity, and progress of decomposition.
<h3>Body Temperature</h3>
<em>Algor Mortis</em> is the scientific name given to the loss of body temperature after death which&nbsp;can sometimes be used to estimate the time of death (Guharaj, 2003). This is a viable technique in cases where the body is being examined within 24 hours following death. This method of estimating time of death can vary significantly dependent upon many possible variables, such as:
<ul>
 	<li>Ambient room temperature being within a normal range of approximately 22<span>°</span> Celsius</li>
 	<li>Pre-death body temperature of the victim not being elevated by illness or exertion</li>
 	<li>Thickness of clothing that might insulate the body temperature escape</li>
 	<li>The temperature and conductivity of the surface the body was located on that could artificially increase or decrease temperature loss</li>
</ul>
Considering a normal body temperature of 37° Celsius at the time of death, it can be estimated that the body will cool at a rate of 1° – 1.5° Celsius per hour. This calculation is known as the <em>Glaister Equation (</em><span class="s1">De Saram, Webster, &amp;&nbsp;Kathirgamatamby, 1956).&nbsp;</span>So, taking an internal rectal temperature and subtracting that from 37° Celsius will provide an estimate of the number of hours that have passed since the time of death. For example, a dead body with a measured temperature of 34° Celsius would provide a time range of 3 to 4.5 hours since the time of death.
<h3>Rigor Mortis</h3>
<em>Rigor mortis</em> is a term used to describe the stiffening of the body muscles after death. A dead body will go from a flaccid or limp muscle condition to one where all the muscles become contracted and stiff causing the entire body to become constricted into a fixed position. After being in a constricted and fixed position, the muscles eventually become flaccid again (Advameg, Inc., 2017).&nbsp;In normal room temperatures, this stiffening of muscles and the relaxing again has a predictable time progression of approximately 36 hours. In this progression, the stiffening of muscles will take approximately 12 hours, the body will remain stiff for 12 hours and will progressively become flaccid again over the next 12 hours.

Stiffening of muscles begins with the small muscles of the hands and face during the first 2 to 6 hours, and then progresses into the larger muscle groups of the torso, arms, and legs over the next 6 to 12 hours. These are general rules; however, the rate of rigor mortis can be different for infants, persons with extreme muscle development, or where extensive muscle activity precedes death, such as a violent struggle (Cox, 2015).

In determining the time of death in average environmental temperatures, Cox (2015) recommended that:
<ol>
 	<li>If the body feels warm and is flaccid, it has been dead for less than 3 hours</li>
 	<li>If the body feels warm and is stiff, it has been dead for 3 to 8 hours</li>
 	<li>If the body feels cold and stiff, it has been dead for 8 to 36 hours</li>
 	<li>If the body feels cold and is flaccid, it has been dead more than 36 hours</li>
</ol>
<h3>Post-Mortem Lividity</h3>
Post-mortem lividity refers to a discoloration or staining of the skin of a dead body as the blood cells settle to the lowest part of the body due to gravity. This discoloration will occur across the entire lower side of a body; however, in places where parts of the body are in contact with the floor or another solid object, the flesh compresses and staining will not occur in that area. The staining is a reddish-purple coloring, and it starts to become visible within 1 hour of death, and become more pronounced within 4 hours. Within the first 4 hours, lividity stains are not fixed and, if the body is moved, the blood products will shift and stain the part of the body that has become lower. In most cases, these stains become fixed between 12 and 24 hours. As such, they can be viewed as an indicator of how the body was left at the time of death. Importantly, if a body is found with post-mortem lividity stains not at the lowest point in the body, it can be concluded that the body has been moved or repositioned after the 12 to 24 hour stain setting period (Cox, 2015).
<h3>Decomposition</h3>
This is the final indicator a pathologist can look at to estimate the time of death. Sometimes, dead bodies are not discovered in time to use body temperature, rigor mortis, or early lividity indicators to estimate a more exact time of death. In these cases, assessing the progress of decomposition becomes important. Decomposition starts as soon as the body ceases to be alive. Subject to environmental conditions of extreme heat or cold, the readable signs of decomposition will become apparent 36 to 48 hours after death (EnkiVillage, 2017). These signs include bloating of the body and a marbling discoloration of the skin in a spider web pattern along surface blood vessels. As the body continues to decay, the skin surface will open and body fluids will begin to seep out. In advanced stages of decomposition, the body is often no longer identifiable by facial recognition, and DNA testing or dental records become the tools to determine identity. At very advanced stages of decomposition, flies and maggots begin to emerge, and the number of life cycles of the maggot-to-fly can be estimated by a forensic entomologist to provide the amount of time that has passed since these insect life cycles began.

Once these preliminary examinations have been made, the pathologist will cut the corpse open to conduct a detailed internal examination of each organ to look for signs of trauma, disease, or external indicators that might explain the cause of death, such as water in lungs or toxins in blood.
<h3>Causes of Death</h3>
There are a wide range of possible causes of death and pathologists are trained to look for these indicators, gather the evidence, and develop an expert opinion regarding the cause of death. Causes of death can include:
<ul>
 	<li>Laceration or Stabbing</li>
 	<li>Shooting</li>
 	<li>Blunt force trauma</li>
 	<li>Asphyxiation</li>
 	<li>Toxic substances</li>
 	<li>Electrocution</li>
 	<li>Depriving necessities of life</li>
</ul>
In cases of laceration or stabbing, wounds are inflicted by a sharp weapon or pointed object. The pathologist will attempt to determine if the death was caused by damaging a vital organ or by blood loss. The distinction here is that a person may be cut or stabbed in a way that causes them to bleed to death, which will be indicated to the pathologist by only a small amount of blood remaining in the body. Alternately, a laceration or stab wound may penetrate the heart, lungs, or the brain in a way that causes the organ to stop functioning and causes death. In these cases, the pathologist will make a determination and render an opinion of fatal organ damage.

In cases of stabbing, the pathologist can sometimes illustrate the entry point of the wound and trace the wound path to determine an angle of entry indicating how the stab wound was inflicted. The size, depth, and width of the wound may indicate the size and type of weapon used to create the injury. Similarly, examining the characteristics of the wound can provide information to allow the pathologist to offer an expert opinion on the direction of a laceration or cut wound by illustrating the start point and the termination point. This information can be helpful for investigators in reconstructing or confirming the actual actions and weapons used in a criminal event.

In cases of shooting, the pathologist will make a determination of whether death was caused by the fatal destruction of a vital organ or by blood loss. Recovery of a bullet or fragments of a bullet from inside the body can be helpful in ballistic analysis. Examining the entry wound can sometimes indicate the distance from which the wound was inflicted. In cases of point blank or direct contact shootings, gunshot (burned gun powder) residue will be present at the entry point of the wound. As with stab wounds, the pathway that the bullet travelled from the entry point into the body to where it came to rest can sometimes be identified by a pathologist to determine the angle of entry. For investigators, this information can be helpful in reconstructing the criminal event and determining the location of the shooter. In cases of self-inflicted gunshot wounds, a point blank entry point and a bullet path indicating a logical weapon position in the hand of the victim can provide some confirmation or contradiction of the self-inflicted wound theory.

In cases of blunt force trauma, the pathologist will look for indications of organ destruction or massive internal bleeding causing death. Blunt force trauma can be inflicted in many ways, such as massive sudden trauma from a fall from a great height, or a high-speed car crash that can immediately damage the brain, the heart, or the lungs to the point where they cease to function resulting in death. Other blunt force traumas, such as a strike to the head with a weapon, may not immediately cause death, but result in massive bleeding and internal accumulation of blood that can cause death. In cases of head injuries pathologists will sometimes be able to determine the contact point where the injuries were inflicted, and they will be able to point to the <em>contre coupe</em> injury effect, which happens when the head is struck on one side and the brain is so traumatically moved inside the skull that it also become damaged on the opposite side and bleeding occurs at the top of the brain. This bleeding inside the skull can sometimes cause death.

In a similar effect, Shaken Baby Syndrome (SBS), (Elsevier, 2016) occurs when an infant child is violently shaken by a person and the baby's brain moves back and forth traumatically inside the skull causing bruising and sometimes fatal bleeding at the front and back of the brain. An examination by the pathologist for the contact points and internal bleeding can provide valuable clues to the manner in which the blunt force trauma was inflicted. According to An Investigator’s Manual for Shaken Baby Syndrome, studies indicate that SBS is the leading cause of death in children under two years of age and research studies the United Kingdom and the United States indicate that SBS may occur each year in as many as 24 to 30 per 100,000 children under two years of age (Smith, 2010).

In cases of asphyxiation, a pathologist will look for indicators of how the body was deprived of oxygen. Several common means include strangulation, suffocation, smoke inhalation, or drowning. For strangulation, the pathologist will look for bruising around the neck inflicted by choking hands or by a ligature. A ligature is any item, such as a rope or a belt, which could be used to restrict breathing and stop oxygenated blood going to the brain, thus causing death. If a ligature has been used and removed, it will leave a distinct abrasion line. If a dead body is found with a ligature in place, investigators should take great care to not untie the ligature, but cut it off of the victim, as this allows the ligature size to be measured and compared to the size of the neck to determine the amount of breathing that was restricted. Once the ligature is removed from a dead body, a distinct ligature mark or a groove in the flesh will sometimes be visible.

To determine strangulation, the pathologist will examine the eyes of the victim for the presence of small ruptured blood vessel that appear as red spots on the white of the eyeball. These spots are known as petechial hemorrhage, and will often be visible in victims of strangulation (Jaffe, 1994).

Suffocation as a cause of asphyxiation occurs when a victim's breathing is stopped by an object, such as a pillow or a plastic bag, which restricts the ability of a victim to breath, thus causing death. Unlike strangulation, suffocation has fewer indicators of violent trauma. Suffocation deaths are sometimes accidental and are harder for pathologist to conclusively determine. The presence of a suffocation device at the scene of the death is sometimes a first clue to this cause. Other contributing causes can be the limited ability of a victim to remove the device that accidentally obstructs their breathing, as may be found with a very young child, a handicapped person, or a frail elderly victim.

Another unique type of asphyxiation death is Auto Erotic Asphyxia (AEA). This occurs when a person is attempting to enhance their sexual arousal or pleasure while masturbating and apply self-strangulation with a ligature device. Their goal in AEA is not suicide but rather to reach a state of extreme oxygen deprivation and euphoria at the time of orgasm. This strategy can go wrong when the individual passes out and their ligature does not release causing continued strangulation and death. These cases can resemble suicide; however, they are really death by misadventure because the victim had no intent to kill themselves. AEA can sometimes be distinguished from suicide by the existence of apparent masturbation, pornography at the scene, and ligature devices that have releasable controls.

In cases where asphyxiation is caused by smoke inhalation, a pathologist can find signs of soot blackening in the lungs and, if the air containing the smoke was sufficiently hot, the lungs will also show signs of burn trauma. Because arson is sometimes used as a means of disguising a homicide, finding a dead body in a burning building, and not finding signs of smoke in the lungs, is a red flag for possible death by homicide.

In cases where asphyxiation is caused by drowning, a pathologist will find signs of water present in the lungs. If there is a question as to the location of the drowning, it is possible to have a diatom test conducted on the victim’s tissue. If the victim was drowned in fresh water, the diatom material, which is microscopic algae, will have migrated from the water in the lungs to the blood and tissue of the victim. These microscopic algae are species unique to a particular body of water. Diatom material found in a victim’s lungs should match the diatom sample from the water where the body was found. If it does not match, this suggests that the victim drowned elsewhere.

In cases of toxic substances, a pathologist will test the stomach contents, the blood, eye fluid known as vitreous humor, and tissue samples from various organs in the body for poisons, drug overdose, the ingestion of toxic chemicals, or toxic gas inhalation. Any of these substances can cause death if ingested or inhaled in sufficient quantities.

In cases of electrocution, a person dies because of an electrical current passing through their body that stops the heart. A pathologist will look for signs to confirm that a current passed through the body, including contact burns where a person has touched a source of power that entered their body and existed to a grounding point. This grounding point is often at the ground through the feet, but can be through a shorter contact pathway, if another hand or part of the body was in contact with a grounded object. Burns will also be visible where the electrical current exited the body.

Cases where the necessities of life have been deprived generally occur where there is a dependent relationship between a caregiver and a victim. The victims in these cases are typically very young or very elderly persons who are unable to take care of their own needs. These cases often take place over and extended periods of time and may include other types of physical neglect or abuse. Failing to provide necessities of life is such a significant issue that the Criminal law in Canada makes provision for this as an offence.
<blockquote><strong>Duty of persons to provide necessaries</strong>

<strong>215</strong>&nbsp;(1)&nbsp;Everyone is under a legal duty
<p style="padding-left: 30px">(a)&nbsp;as a parent, foster parent, guardian or head of a family, to provide necessaries of life for a child under the age of sixteen years;</p>
<p style="padding-left: 30px">(b)&nbsp;to provide necessaries of life to their spouse or common-law partner; and</p>
<p style="padding-left: 30px">(c)&nbsp;to provide necessaries of life to a person under his charge if that person</p>
<p style="padding-left: 60px">(i)&nbsp;is unable, by reason of detention, age, illness, mental disorder or other cause, to withdraw himself from that charge, and</p>
<p style="padding-left: 60px">(ii)&nbsp;is unable to provide himself with necessaries of life.</p>
<strong>Marginal note: Offence</strong>

(2)&nbsp;Every one commits an offence who, being under a legal duty within the meaning of subsection (1), fails without lawful excuse, the proof of which lies on him, to perform that duty, if
<p style="padding-left: 30px">(a)&nbsp;with respect to a duty imposed by paragraph (1)(a) or (b),</p>
<p style="padding-left: 60px">(i)&nbsp;the person to whom the duty is owed is in destitute or necessitous circumstances, or</p>
<p style="padding-left: 60px">(ii)&nbsp;the failure to perform the duty endangers the life of the person to whom the duty is owed, or causes or is likely to cause the health of that person to be endangered permanently; or</p>
<p style="padding-left: 30px">(b)&nbsp;with respect to a duty imposed by paragraph (1)(c), the failure to perform the duty endangers the life of the person to whom the duty is owed or causes or is likely to cause the health of that person to be injured permanently.&nbsp;<span>(Justice Laws Canada, 2017)</span></p>
<strong>Marginal note: Punishment</strong>

(3)&nbsp;Every one who commits an offence under subsection (2)
<p style="padding-left: 30px">(a)&nbsp;is guilty of an indictable offence and liable to imprisonment for a term not exceeding five years; or</p>
<p style="padding-left: 30px">(b)&nbsp;is guilty of an offence punishable on summary conviction and liable to imprisonment for a term not exceeding eighteen months. (Justice Laws Canada, 2017)</p>
</blockquote>
If the death of a person is found to be the result of failing to provide the necessities of life, the responsible caregiver can ultimately be charged with criminal negligence causing death.
<h2>Topic 8: Chemical Analysis</h2>
There are a wide range of chemicals and usages that can be used in the commission of a crime or found at the scene of a crime. In addition to general chemical analysis, there are several sub-areas for analysis in cases of:
<ul>
 	<li>Accelerants used in the crime of arson;</li>
 	<li>Explosive analysis in cases of conventional crimes and terrorism;</li>
 	<li>Toxic chemicals and biological agents used in cases of murder, industrial negligence, and terrorism;</li>
 	<li>Drug analysis in the cases of trafficking and drug overdoses;</li>
 	<li>Gunshot residue analysis; and</li>
 	<li>Analysis and chemical matching of paint transfer in cases of hit and run motor vehicle crashes.</li>
</ul>
<h2>Topic 9:&nbsp;Forensic Archeology</h2>
Relatively new in the forensic world, forensic archeology is the use of archeological methods by experts to exhume crimes scenes, including bodies. These forensic experts are trained to methodically excavate and record their dig. They document the recovery of artifacts (evidence), such as human remains, weapons, and other buried items, that may be relevant to the criminal event. Forensic archeologists will often work in concert with other forensic experts in DNA, physical matching, forensic entomology, and forensic odontology in the examination of evidence.
<h2>Topic 10:&nbsp;Forensic Entomology</h2>
Forensic entomology is a very narrow field of forensic science that focuses on the life cycle of bugs. When a dead body has been left out in the elements and allowed to decompose, the investigative challenge is not only to identify the body, but to establish the time of death. Once a body has decomposed, the process of determining time of death can be aided by a forensic entomologist. As discussed in a previous chapter, these experts look at the bugs that live on a decomposing body through the various stages of their life cycle. From these life-cycle calculations, scientists are sometimes able to offer and estimate relative time of death.
<h2>Topic 11:&nbsp;Forensic Odontology</h2>
To paraphrase the description provided by Dr. Leung (2008), forensic odontology is essentially forensic dentistry and includes the expert analysis of various aspects of teeth for the purposes of investigation. Since the advent of dental x-rays, dental records have been used as a reliable source of comparison data to confirm the identity of bodies that were otherwise too damaged or too decomposed to identify through other means. The development of DNA and the ability to use DNA in the identification of badly decomposed human remains has made identity through dental records less critical. That said, even in a badly decomposed or damaged corpse, teeth can retain DNA material inside the tooth, allowing it to remain a viable source of post-mortem DNA evidence (Gaytmenn, 2003).

Beyond the identification of dead bodies, forensic odontology can sometimes also provide investigators with assistance in confirming the possible identity of a suspect responsible for a bite mark. This comparison is done by the examination and photographic preservation of the bite mark on a victim or an object, and the subsequent matching of the details in that bite mark configuration to a dental mould showing the bite configuration of a known suspect’s teeth. Although bite mark comparison has been in practice for over fifty years there remain questions to the reliability for exact matching of an unknown bite mark to a suspect (Giannelli, 2007).
<h2>Topic 12: Forensic Engineering</h2>
Forensic engineering is a type of investigative engineering that examines materials, structures, and mechanical devices to answer a wide range of questions. Often used in cases of car crashes, forensic engineers can often estimate the speed of a vehicle by examining the extent of damage to a vehicle. They can also match damage between vehicles and road surface to determine the point of impact and speed at the time of impact. Many police agencies now have specialized traffic personnel trained in accident analysis and accident reconstruction. These officers utilize a variety of forensic engineering techniques to examine and document the dynamics of car crashes to establish how and why a crash occurred.

In cases of building collapses, forensic engineers can conduct analyzes to determine the cause of a structural failure and, in the case of an intention explosion, such as in acts of terrorism, this can point to the location of the planted explosive device. The investigative possibilities for forensic engineering are too extensive to elaborate here, but if damage to a building, an object, or a piece of equipment poses an investigative question, the tools of forensic engineering should be used to seek answers.
<h2>Topic 13: Criminal Profiling</h2>
Criminal profiling, also referred to as psychological profiling, is the study of criminal conduct to develop the most likely social and psychological profile of the person who may have committed the crime based on the actions of known criminals who have committed that same type of crime in the past (Royal Canadian Mounted Police, 2015). Criminal profiling draws on information from many sources, including historical criminal statistics of known criminals. Additionally, other information is collected about violent criminals and their <em>modus operandi</em>. This kind of information can shed light on details, such as preferences for luring victims, taking trophies, abduction methods, bondage preference, torture methods, means of killing, and displaying a dead body after death. With information and specific data collected from a wide assortment of offenders, psychological profilers work with investigators to examine the details of a criminal investigation, and, based upon the known historical criminal conduct data, they determine probable descriptors and characteristics that might be expected in a current suspect’s profile.

For investigators, this kind of profiling can be helpful in focusing the investigation on the most likely persons. As an extension of these profiling techniques, a database known as <strong><em>Violent Crime Linkage Analysis System (ViCLAS)</em></strong> has been in place in Canada since the 1990s. This system documents the criminal conduct of convicted violent offenders and sex offenders, as well as certain unsolved cases, with a goal of documenting crime types and criminal conduct into a searchable database where unsolved crimes can be linked to offenders with matching profiles. According to the ViCLAS system web page, “Since the implementation of ViCLAS across the country, the database continues to swell with cases. As of April 2007, there were approximately 300,000 cases on the system and over 3,200 linkages have been made thus far,” (Royal Canadian Mounted Police, 2015). Criminal profiling provides a valuable tool for sorting and prioritizing suspects identified for further investigation. In some cases, a new suspect may even be identified through the existing data within the ViCLAS database.
<h2>Topic 14:&nbsp;Geographic Profiling</h2>
Geographic profiling is similar to psychological profiling in that it seeks to focus on the possible conduct of an unknown criminal based on the data collected from the known past criminal conduct of others. Unlike psychological profiling, geographic profiling is focused specifically on where a suspect might reside relative to the location where his or her crimes are currently being committed.

In the late 1980’s, police Detective Inspector Kim Rossmo developed a mathematical formula that began the evolution in the new forensic science of geographic profiling. Dr. Rossmo validated his mathematical formula from his observation that criminals generally seemed to live within an identifiable proximity to the chosen locations where they committed their crimes (Rossmo, 1987). Applying this method, when a criminal is suspected of committing a series of offences, it is possible to have the locations of those offences examined by a geographic profiler to estimate where that suspect most likely resides. This assessment can be helpful in searching for and identifying new suspects by prioritizing suspects based on the location of their residence relative to the identified area with the highest probability for a suspect to be found.
<h2>Topic 15:&nbsp;Forensic Data Analysis</h2>
In today’s digital world, criminal conduct frequently includes evidence in the form of digital data. The collection of data from cellular phones as proof of a criminal conspiracy, or the message tracking of images passed in the distribution of child pornography, all require significant levels of specialized technological knowledge to collect, preserve, and analyze the exhibits. Some crimes, such as identity theft and the subsequent fraudulent misappropriation of funds, are almost entirely digital data crimes, and they cross over several fields of technological expertise. It is now incumbent upon ordinary investigators to understand the basics of how to preserve digital evidence, and to know when and if digital evidence may be present. An ordinary investigator without forensic data skills and qualifications should never attempt to recover digital data evidence without help. The destruction of evidence would be like an untrained investigator trying to lift fingerprints at a crime scene.
<h2>Topic 16:&nbsp;Forensic Document Analysis</h2>
Forensic document analysis is typically done by certified forensic document examiners working as independent contractors or as employees within the service of government funded crime detection laboratories. Most often tasked within the scope of fraud investigations, these specialists examine items, such as wills, land titles, contracts, deeds, seals, stamps, bank checks, identification cards, handwritten documents and documents from photocopiers, fax machines, and printers. These documents are often examined to authenticate them as genuine or unaltered original documents where an allegation of misrepresentation or fraud has been made. Original signatures are also sometimes called into question, and these examiners can make a determination of authenticity by comparing the signature sample to samples known to be genuine. Forensic experts are also called upon to analyze threatening letters, ransom letters, or hold-up notes to make a connection to an identified suspect.
<h2>Topic 17:&nbsp;Forensic Identification Sections</h2>
Forensic identification sections are the frontline forensic specialists typically working within their own police agency. Usually, these specialists are experienced police officers who have taken forensic training in photography, fingerprint examination, physical matching, evidence collection, and crime scene management to work within this type of section. The daily work of forensic identification sections involves attending crime scenes, and conducting a variety of examinations using special fingerprint dusts, chemical fuming agents, and ultraviolet light sources to uncover impressions of fingerprint, shoeprints, tool marks or even body fluid stains not visible to the naked eye. Once the stain or the image of a forensic impression is found, these specialists can record, preserve, and recover the exhibit using photography and specialized tools for lifting the exhibit from a surface or removing the entire imprinted surface as an exhibit.
<h2>Topic 18:&nbsp;Crime Detection Laboratories</h2>
Crime Detection Laboratories, such as the RCMP labs across Canada, provide a range of specialties, including;
<ul>
 	<li><strong>Biology</strong> - Comparison of the suspect’s and victim’s body fluids and hair; most often DNA analysis</li>
 	<li><strong>Chemistry</strong> – Identifying non-biological substances found at a crime scene, such as paint, glass, liquids, fuels, and explosive substances</li>
 	<li><strong>Toxicology - </strong>The examination of body fluids to determine the level of alcohol present in the body, and providing expert opinions in relation to the extent of intoxication</li>
 	<li><strong>Documents Examination – </strong>The analysis of documents to determine authenticity for fraud allegations. Can also provide handwriting comparison</li>
 	<li><strong>Firearms Ballistics - </strong>Matching shells, casing, and fired bullets to a weapon and making a determination of bullet trajectory</li>
 	<li><strong>Tool mark examination<em> – </em></strong>Matching tool impressions to an originating suspect tool</li>
</ul>
Scientists hired to work in these crime detection laboratories require a four year specialized degree in the field of their choice. Once hired, they undergo an understudy period of 12 to 18 months in a laboratory with an expectation that they will become proficient enough in their chosen field to achieve expert qualification from the court. This expert status will allow them, on a case-by-case basis, to render expert opinion evidence on their examination of forensic exhibits.

For an investigator wishing to engage the services of the Crime Detection Laboratory, it is necessary to complete a request for analysis of the exhibit they wish to have examined and deliver that exhibit, either in person or by double registered mail, directly to the Crime Detection Laboratory to ensure continuity of the exhibit. Once examined, the analyst will return the exhibit again either by calling for a personal pick up or by double registered mail along with a certificate of analysis detailing the result of the examination. The certificate of analysis can become an exhibit for disclosure to the defense in a criminal case, and, if uncontested, will be accepted by the court as evidence. If contested, the Crime Detection Laboratory Scientist will be called to attend court and provide testimony of the examination and the results as an expert witness. They are generally cross examined by the defense to validate their expert qualifications and analyzes.
<h2>Summary</h2>
This chapter outlined a wide variety of forensic tools and services available for criminal investigators. For any investigator, knowledge of forensic tools and services provides him/her with the ability to recognize and seize on evidence opportunities that would not otherwise be possible. The picture of physical evidence found at any crime scene only has face value as a collection of objects to be viewed and considered in their existing connection to the event. Analysis of those same objects using forensic tools can add significant information, making a circumstantial connection between the players and the event, and adding new insights. Forensic analysis can make the difference between solving a crime and it becoming a cold case.
<div class="bcc-box bcc-info">
<h3 itemprop="educationalUse">Study Questions</h3>
<ol>
 	<li>In terms of a physical matching, what is the difference between a Level One and a Level-Two examination?</li>
 	<li>How are latent fingerprints made visible?</li>
 	<li>What is the difference between a Level One and Level Two ballistics examination?</li>
 	<li>What is blood spatter analysis?</li>
 	<li>What are four common post-mortem indicators considered in an autopsy?</li>
 	<li>How else can a pathologist be helpful to police besides being able to speak to cause of death?</li>
 	<li>What is forensic archeology?</li>
 	<li>What is forensic entomology?</li>
 	<li>What is criminal profiling?</li>
 	<li>What is ViCLASS?</li>
</ol>
</div>
&nbsp;
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>416</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:41]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:41]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-10-forensic-sciences-2]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>395</wp:post_parent>
		<wp:menu_order>10</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 10: Forensic Sciences]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Chapter 11: Summary</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-11-summary-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:41 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/chapter-11-summary-2/</guid>
		<description></description>
		<content:encoded><![CDATA[
The goal of this book has been to provide a new student of investigation with an overview of the skills required by a criminal investigator. As an introduction to criminal investigation, this overview has intentionally avoided delving into many areas of specialized criminal investigation. Some of these areas of investigation, such as financial crime, criminal profiling, and computer crime, are so unique and focused, that they cannot be adequately summarized here. That said, persons seeking to move into these specialized areas of investigation are well served to properly learn the core skill that are presented here.

This book has outlined the task skills and thinking skills required to guide the process of investigation. Presented here as a structured investigative model, the STAIR&nbsp;tool brings together the task skills relating to gathering, preserving, and documenting evidence with the thinking skills of analysis, theory development, investigation and fact validation. This structured system is intended to help new investigators achieve a personal awareness of their own investigative thinking, and create their own mental map for an investigative process that can be followed, documented, repeated, and enhanced through professional experience.

In the past, learning the necessary investigative skills and thinking were expected to evolve and develop in a model where the learner received basic police training, and was then exposed to progressively more complex investigations. This allowed the investigator to evolve their-own mental map for a functional investigative process. In this traditional learning model, investigators were expected to make mistakes and learn from their mistakes to evolve their personal learning of the investigative process. Often under the guidance of mentors and field trainers, good criminal investigators developed their skills and reach high levels of professionalism and competency. This book is not intended to take issue with the traditional learning model, but to suggest a means where new investigators are provided a thinking perspective and tools that enable them to enhance their learning process in ways other than exclusively through personal experience.

The intent of this book has been to provide readers with a head start in their investigative learning process by discussing the need to be aware of their own thinking process and to create a mental map. The&nbsp;<strong>STAIR</strong> tool has been developed to provide a guide to this mental mapping process. In doing so, this book discussed criminal law, witness management, interviewing and interrogation, crimes scene management, and forensic sciences. Many of these topics are sufficiently complex that entire books have been written about them. In this book, the treatment of these topics has been intentionally introductory to provide the reader with a basic awareness of each topic in its specific relationship to the criminal investigative process. As a very broad overview of these key issues, the new investigator will only have a generalist understanding of these topics and can use this book to assist them in evolving their ongoing learning in a self-directed mode relative to their perceived needs as the complexities of their new investigations might demand.
<h3>Investigative Learning Going Forward</h3>
Many topics relative to investigative practices have not been covered as part of the core knowledge requirements for a new investigator. These topics include:
<ol>
 	<li>Major Case Management</li>
 	<li>Informant and confidential source management</li>
 	<li>Undercover investigations</li>
 	<li>Specialized team investigations</li>
</ol>
While we cannot consider these topics in any depth, it will important for the new investigator to at least know about them with respect to more advanced practices of criminal investigation.
<h2>Topic 1: Major Case Management</h2>
A contemporary practice for the handling of major criminal investigations involving multiple jurisdictions, multiple investigative agencies, and often serial criminal events, Major Case Management is a system designed to achieve order, cooperation, and information sharing between police agencies. In Canada, creating and adopting the practices of Major Case Management was driven by the 1995/1996 report and Commission of Inquiry recommendations of Justice Archie Campbell examining the various police agency investigations into the activities of Paul Bernardo, who was a serial rapist and murderer whose activities between 1987 and 1992 included the rape or sexual assault of at least eight women in the areas of Scarborough, Peel, and St Catharines, Ontario, and the murder of three women in St. Catharines and Burlington, Ontario (Campbell, 1996).&nbsp;To quote directly from the Campbell’s report:
<blockquote>The Bernardo case, like every similar investigation, had its share of human error. But this is not a story of human error or lack of dedication or investigative skill. It is a story of systemic failure.

It is easy, knowing now that Bernardo was the rapist and the killer, to ask why he was not identified earlier for what he was. But the same questions and the same problems have arisen in so many other similar tragedies in other countries.

Virtually every interjurisdictional serial killer case including Sutcliffe (the Yorkshire Rapist) and Black (the cross-border child killer) in England, Ted Bundy and the Green River Killer in the United States and Clifford Olsen in Canada, demonstrate the same problems arise and the same questions. And always the answer turns out to be the same – systemic failure. Always the problems turn out to be the same, the mistakes the same, and the systemic failures the same.

What is needed is a system of case management for major interjurisdictional serial predator investigations. As system that corrects the defects demonstrated by this and so many similar cases.

A case management system is based on co-operation, rather than rivalry, among law enforcement agencies. A case management system is needed that depends on specialized training, early recognition of linked offences, co-ordination of interdisciplinary and forensic resources, and some simple mechanisms to ensure unified management, accountability and co-ordination when serial predators cross police borders. (Campbell, 1996)</blockquote>
From the recommendations of the Campbell Report, the Canadian Police College in Ottawa, Ontario took a leadership role in working with police agencies and investigators from across Canada to develop a major case management system and training that would address the concerns raised by the Campbell report. The major case management system allows for the creation of case specific major case management teams when it is determined that a serious criminal investigation crosses jurisdictional boundaries. In this system, the major case management team operates as an autonomous case specific unit, led by a command group comprised of a team commander, a primary investigator, and a file coordinator. In this structure, the team is staffed with experienced investigative personnel from each of the partner agencies, and no single partner agency has control over the conduct of the investigation.

Partner agencies receive reports on the investigative progress and provide their collective input to the team through contact with only the team commander. The major case management team handles the specific case, receiving all evidence and incoming information through the file coordinator as TIPS and each TIP is assigned by the primary investigator for follow up by the investigators on the team. The team follows a strict regime of daily information sharing through a process of daily briefings, and all team members are encouraged to share their investigative progress and to assist in the creation and development of investigative strategies. New or inexperienced investigators are not assigned to duties as part of a Major Case Management team. Being selected to participate as an investigator on one of these team means that your investigative skills have reached the point where you can be counted on to perform at a very high level.
<h2>Topic 2:&nbsp;Informant and Confidential Source Management</h2>
Informants and confidential sources often provide police investigators with information to solve a single crime or to investigate a criminal organization. In court cases, such as R vs Basi (2009), the courts have recognized that confidential informants are a critical tool for effective police work. Given this, the court provides privilege for the police and Crown to not reveal the identity of a source in court, particularly in cases where that privilege has been asked for by the source and agreed to by the police as a condition of providing information (Dostal, 2012).

Even with the condition of anonymity, experienced source handlers know that if their informant participates in the criminal event as an agent of the police, the source can be classified by the courts as an “agent provocateur”, and may not claim the privilege of anonymity. These complexities of confidentiality make source and informant management a very sensitive matter. Failure to manage the informant or their information properly can result in the identity of the person being revealed with the risk of deadly consequences or having to put the informant into a witness protection program.

The field of informant management and protection requires trust building and communication skills that will be effective with persons who are part of the criminal community. This is sometimes achieved by using discretion, not pursuing the more minor criminal activities of an informant, or even trading away certain criminal charges against the informant in exchange for specific information on a more serious crime. These strategies can be very delicate, and often require the collaboration with Crown Prosecutors in cases where the administration of justice may be compromised by an investigator acting independently.

A new investigator would not become involved in these higher level informant management cases, but could start building the framework and network of street-level contacts to learn the skills of informant management. The first stages of building the skill set to manage informants and confidential sources starts with learning to have non-judgemental conversations with members of the criminal community. When persons in the criminal community see a police investigator as fair, friendly, and approachable, this opens the door for the investigator to approach those contacts for specific inquiries when an occasion presents itself.
<h2>Topic 3: Undercover Investigations</h2>
An undercover investigation is the practice of a police officer posing as someone other than a police officer for the purpose of collecting evidence of criminal activity that would otherwise be difficult to acquire. The possible personas of the undercover investigator are almost limitless and can range from posing as a person seeking to purchase drugs from local traffickers to impersonating a vulnerable elderly citizen in a park to capture a purse snatcher preying on the elderly. There are also deep undercover strategies that may include establishing a longer term identity with the purpose of infiltrating a criminal organization or a dissident political group to gain internal intelligence of organizational activities, culture, and membership.

Police investigators often find undercover strategies successful because criminal activity can be witnessed firsthand, and admissions of guilt made to undercover operators by criminals can be admitted to court without the need of the usual <em>voir dire</em> to test for admissibility. When conducting undercover operations, investigators must be careful to ensure that their presence and communication with the suspect is not the catalyst that causes that person to initiate a crime or carry through with a crime they would not otherwise have done. If these dynamics of initiating the crime occur, a defence of entrapment can sometimes be made on behalf of the accused person. New investigators may be given the opportunity to participate in minor undercover roles fairly early in their careers, and these can be valuable learning experiences.
<h2>Topic 4: Specialized Team Investigations</h2>
The urbanization of communities and the evolution of fields of specialized policing have created new opportunities for officers. Where it was once the case that a police officer was expected to be a generalist capable of working across a wide range of policing fields, the level of expertise now expected in many fields is such that specialized investigative teams have become the norm. Specialized investigative duties now include:
<ul>
 	<li>Forensic Identification Section</li>
 	<li>Traffic Analyst and Accident Reconstruction Units</li>
 	<li>Criminal intelligence and Crime Analysis</li>
 	<li>Criminal and Geographic Crime Profiling</li>
 	<li>Polygraph section and specialized interview teams</li>
 	<li>Computer Crime Analysts and Data Recovery</li>
 	<li>Organized Crime Sections</li>
 	<li>Gang Crime Unit</li>
 	<li>Integrated Homicide Investigation Teams</li>
 	<li>Dedicated Surveillance Units</li>
 	<li>Community Policing Teams</li>
</ul>
For a new investigator, each of these specialities offers an area and a direction where they may decide to direct their career, and it is not uncommon for a police officer to move through several specialized sections over the course of their policing career. What each of these specialized teams does have in common is that investigators on these teams have all achieved the level of basic investigative task skills and thinking skills required to make them a valuable asset to their team and their organization.

As new investigators continue to develop their investigative knowledge applying the task skills and thinking skills presented in this book, it is important to remember that practice and experience are critical components of the ongoing investigative learning. Many police organizations have carefully developed field training programs where new recruits are challenged to engage and demonstrate investigative skills within a set schedule of tasks to complete the compulsory training.

Once this set schedule is completed, it is then incumbent upon the new investigator to become a more self-directed learner. In most policing organizations the path to ongoing investigative duties and the associated experience and skills development that come with those duties, is only available to those who actively seek that experience.

The secret to continued development as an investigator is a simple one; become a self-directed learner and seek out investigative experience and learning at any and all levels available. These work experiences may seem mundane and tedious at times, but every witness interviewed, every search completed, each piece of evidence properly collected and marked, every report written, and every experience testifying in court, is part of the ongoing experience and learning.
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>417</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:41]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:41]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[chapter-11-summary-2]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>395</wp:post_parent>
		<wp:menu_order>11</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_short_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[Chapter 11: Summary]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>References</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/chapter/references-2/</link>
		<pubDate>Fri, 21 Aug 2020 17:21:41 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/chapter/references-2/</guid>
		<description></description>
		<content:encoded><![CDATA[
<p class="p1"><span class="s1">Abed, R. (2105, November 14). <i>Irish Journal of Psychological Medicine, 12.</i> Retrieved from http://journals.cambridge.org/action/displayAbstract?fromPage=online&amp;aid=9001896&amp;fileId=S0790966700002007</span></p>
<p class="p1"><span class="s1">Allen, R. J. (1991). The Nature of Judicial Proof. <i>Cardozo Law Review</i>, 373-422 .</span></p>
<p class="p1"><span class="s1">Arcaro, G. (2009). <i>Criminal Investigations: Forming Reasonable Grounds</i> (Fifth ed.). Toronto, Ontario: Emond Montgomery Publications Limited.</span></p>
<p class="p1"><span class="s1">Bennett, M. (2015). <i>Unspringing the witness memory and demeanor trap: What every judge and jury needs to know about cognitive psychology and witness credibility.</i> Wahington: American University of Law.</span></p>
<p class="p1"><span class="s1">Brainerd, C. J., &amp; Reyna, V. F. (2005). <em>The Science of False Memory.</em>&nbsp;Oxford, UK:&nbsp;Oxford Universtiy Press.&nbsp;</span></p>
<p class="p1"><span class="s1">Britannica, E. O. (2015). <i>DNA Chemical Compound </i>. Retrieved from Enclyclopedia Britannica: https://www.britannica.com/science/DNA</span></p>
<p class="p1"><span class="s1">Byrnes, T. (2015). <i>Professional Criminals of America (1886)</i>. Retrieved from Online at Archive.org: https://archive.org/details/cu31924096989177</span></p>
<p class="p1"><span class="s1"></span><span class="s1">Campbell, J. A. (1996). <i>Bernardo Investigation Review.</i> Toronto: Solicitor General and Minister of Correctional Services.</span></p>
<p class="p1"><span class="s1">Cox, W. A. (2015). Early Postmortem Changes<i>.</i> Retrieved from forensicmd.files.wordpress.com</span></p>
<p class="p1"><span class="s1">Dass, S. C. (2016). Classification of Fingerprints. Retrieved from Department of Statistics &amp; Probabilities: https://www.cse.msu.edu/~cse802/Papers/802_FPClassification.pdf</span></p>
<p class="p1"><span class="s1">De Saram, G.S.W., Webster, G., Kathirgamatamby, N. (1956). Post-Mortem Temperature and the Time of Death. <i>Crim. L. Criminology &amp; Police Science</i>, 46.</span></p>
<p class="p1"><span class="s1">Dostal, P. (2012). <i>Accessory After the Fact</i>. Retrieved January 15, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Accessory_After_the_Fact</span></p>
<p class="p1"><span class="s1">Dostal, P. (2012). <i>Attempts</i>. Retrieved January 15, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Attempts</span></p>
<p class="p1"><span class="s1">Dostal, P. (2012). <i>Conspiracy (Offence)</i>. Retrieved January 15, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Conspiracy_(Offence)</span></p>
<p class="p1"><span class="s1">Dostal, P. (2012). <i>Counselling</i>. Retrieved January 15, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Counselling</span></p>
<p class="p1"><span class="s1">Dostal, P. (2012). <i>Informer Privilege</i>. Retrieved January 16, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Informer_Privilege</span></p>
<p class="p1"><span class="s1">Dostal, P. (2012). <i>Parties to an Offence</i>. Retrieved January 15, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Parties_to_an_Offence</span></p>
<p class="p1"><span class="s1">Dostal, P. (2012). <i>Principled Exception to Hearsay</i>. Retrieved January 12, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Principled_Exception_to_Hearsay</span></p>
<p class="p1"><span class="s1">Dostal, P. (2012). <i>Principles of Fundamental Justice</i>. Retrieved January 20, 2017, from The Canadian Criminal Law Notebook: http://criminalnotebook.ca/index.php/Principles_of_Fundamental_Justice</span></p>
<p class="p1"><span class="s1">Elsevier, B. (2016). <i>Coup contrecoup injury</i>. Retrieved January 27, 2017, from Science Direct: http://www.sciencedirect.com/topics/page/Coup_contrecoup_injury</span></p>
<p class="p1"><span class="s1">Advamag, Inc. (2017). <i>Rigor Mortis and Other Postmortem Changes</i>. Retrieved January 16, 2017, from Encyclopedia of Death and Dying: http://www.deathreference.com/Py-Se/Rigor-Mortis-and-Other-Postmortem-Changes.html</span></p>
<p class="p1"><span class="s1">EnkiVillage. (2017). <i>How Long Does It Take for a Body to Decompose?</i> Retrieved January 16, 2017, from EnkiVillage: http://www.enkivillage.com/how-long-does-it-take-for-a-body-to-decompose.html#affix-section-3</span></p>
<p class="p1"><span class="s1">Fookes, S. A. (1973). Patrol Sergeant. (A. GEHL, Interviewer)</span></p>
<p class="p1"><span class="s1">Gaytmenn, R. S. D. (2003). Quantification of forensic DNA from various regions of human teeth. <i>Journal of Forensic Science, 48</i>(3), 622-625.</span></p>
<p class="p1"><span class="s1">Gecker, R. A. (1989). The Doctrine of Necessity and Its Parameters. <i>Marquette Law Review</i>, 1 - 39 Volume 73 Article 1.</span></p>
<p class="p1"><span class="s1">Giannelli, P. C. (2007). <i>Faculty Publications Paper 153</i>. Retrieved Janauary 27, 2017, from Case Western University School of Law: http://scholarlycommons.law.case.edu/faculty_publications/153</span></p>
<p class="p1"><span class="s1">Gibson, D. (2014). <i>The Kennedy Assassination Cover-up.</i> New York City, NY: Kroshka Books .</span></p>
<p class="p1"><span class="s1">Goff, L. (2015). <i>Early post-mortem changes and stages of decomposition.</i> Retrieved from www.academia.dk Springer Science+Business Media B.V. 2009: www.academia.dk/BiologiskAntropologi/.../post-mortem-changes.pdf</span></p>
<p class="p1"><span class="s1">Government of British Columbia. (2015, Nov 27). <i>British Columbia Police Act.</i> Retrieved from www.qp.gov.bc.c: http://www.qp.gov.bc.ca/police/ec36700.htm#34</span></p>
<p class="p1">Government of Canada. (2015, November 13). <i>Canada Evidence Act</i>. Retrieved from http://laws.justice.gc.ca/en/C-5/</p>
<p class="p1"><span class="s1">Government of Canada. (2015). <i>Youth Criminal Justice.</i> Retrieved from Justice Laws Website - Youth Criminal Justice: http://laws-lois.justice.gc.ca/eng/acts/Y-1.5/page-57.html#h-49</span></p>
<p class="p1"><span class="s1">Government of Canada. (2015). <i>Your Guide to the Canadian Charter of Rights and Freedoms</i>. Retrieved from http://www.pch.gc.ca/eng/1356631760121/1356631904950</span></p>
<p class="p1"><span class="s1">Government of Canada. (2017). <i>Canada Evidence Act (R.S.C., 1985, c. C-5)</i>. Retrieved January 23, 2017, from http://laws-lois.justice.gc.ca/eng/acts/C-5/</span></p>
<p class="p1"><span class="s1">Government of Canada. (2017, January 14). <i>Conspiracy</i>. Retrieved January 11, 2017, from http://laws-lois.justice.gc.ca/eng/acts/C-46/section-465.html</span></p>
<p class="p1"><span class="s1">Gubrium, J. F., &amp; Holstein, J. A. (2002). <i>Handbook of Interview Research: Context and Method.</i> Thousand Oaks: Sage Publications Inc.</span></p>
<p class="p1"><span>Gudjonsson, G. H., &amp; Petursson, H. (1991). Custodial interrogation: Why do suspects confess and how does it relate to their crime, attitude and personality?.&nbsp;</span><i>Personality and Individual Differences</i><span>,&nbsp;</span><i>12</i><span>(3), 295-306.</span></p>
<p class="p1"><span class="s1">Guharaj, P. V. (2003). <i>Forensic Medicine 2nd Edition.</i> Hyderabad: Longman Orient: Sangam Books Ltd.</span></p>
<p class="p1"><span class="s1">Head, T. A. (2010). <i>Crime and Punishment in America.</i> New York, NY: Infobase Publishing.</span></p>
<p class="p1"><span class="s1">Henry, E. R. (1900). Classification and Uses of Fingerprints. <i>Routledge</i>.</span></p>
<p class="p1"><span class="s1">Hill v Hamilton-Wentworth Regional Police Services Board, 2007 SCC 41</span></p>
<p class="p1"><span class="s1">Hitchcock, T. S. (2015, June 05). The Proceedings of the Old Bailey, 1674-1913<i>.</i> Retrieved from www.oldbaileyonline.org/static/Policing.jsp</span></p>
<p class="p1"><span class="s1">Irwin Law. (n.d.). <i>Prima facie case</i>. Retrieved January 14, 2017, from The Canadian Online Legal Dictionary: https://www.irwinlaw.com/cold/prima_facie_case</span></p>
<p class="p1"><span class="s1">Jaffe, F. A. (1994). Petechial Hemorrhages: A Review of Pathogenesis. <i>The American Journal of Forensic Medicine and Pathology</i>, 203-207.</span></p>
<p class="p1"><span class="s1">Jain, A. F. (2010). Fingerprint Matching. <i>Biometrics</i>, 36-44.</span></p>
<p class="p1"><span class="s1">Justice Canada. (2017, January 14). <i>Rules of Evidence in Canada</i>. Retrieved January 14, 2017, from Canada Evidnce Act: http://laws.justice.gc.ca/en/C-5/</span></p>
<p class="p1"><span class="s1">Justice Department Canada. (2017, January 02). <i>Rules of Evidence</i>. Retrieved from http://laws.justice.gc.ca/en/C-5/</span></p>
<p class="p1"><span class="s1">Justice Laws Canada. (2017). <i>Duty of persons to provide necessaries</i>. Retrieved January 16, 2017, from http://laws-lois.justice.gc.ca/eng/acts/C-46/section-215.html</span></p>
<p class="p1"><span class="s1">Kaufman,&nbsp;<span>F., &amp; Morin, G. P. (1998).&nbsp;</span><i>The Commission on Proceedings Involving Guy Paul Morin: Report</i><span>. Ministry of the Attorney General.</span></span><span style="font-size: 14pt">Legal Information Institute.&nbsp;</span></p>
<p class="p1">Lindsey, S., Hertwig, R., &amp; Gigerenzer, G. (2003). Communicating Statistical DNA Evidence, 43 Jurimetrics J. 147-163.</p>
<p class="p1"><span class="s1">MacCallum, E. P. (2008). <i>Report of the Commission of Inquiry into the Wrongful Conviction of David Milgaard.</i> Regina, SK: Saskatchewan Government.</span></p>
<p class="p1"><span class="s1">MacDonell, J. (1820). <i>Report of State Trials Volume 1.</i> London: The State Trial Committee.</span></p>
<p class="p1"><span class="s1">Macrae, M. (2015). <i>Is the Science of DNA Wrongful Conviction-Proof?</i> Retrieved January 17, 2017, from Innocence Canada: https://www.aidwyc.org/dna/</span></p>
<p class="p1"><span class="s1">McCrery, N. (2013). <i>Silent Witnesses.</i> London: Random House Books.</span></p>
<p class="p1"><span class="s1">McRory, S. (2014). Introduction to Criminal Process for Inspector. <i>Compliance Assurance Learning and Development Program</i>, 43. Edmonton, AB: Alberta Energy Regulator.</span></p>
<p class="p1"><span class="s1">Morgan, C. H. (2004). Accuracy of eyewitness memory for persons encountered during exposure to highly intense stress. <i>International Journal of Law and Psychiatry</i>, 265-279.</span></p>
<p class="p1"><span class="s1">National Science Forensic Technology Center. (2012). A Simplified Guide To Bloodstain Pattern Analysis. <em>National Science Forensic Technology Center</em>. Retrieved January 15, 2017, from www.forensicsciencesimplified.org/blood/BloodstainPatterns.pdf</span></p>
<p class="p1"><span class="s1">Oorsouw, K. M. (2015). Alcohol intoxication impairs memory and increases suggestibility for a mock crime: a filed study. <i>Applied Cognitive Psychology, 29</i>, 293-501.</span></p>
<p class="p1"><span class="s1">Oppal, W. (2013). <i>The report of the mission women commission of inquiry.</i>&nbsp;British Columbia Government.</span></p>
<p class="p1"><span class="s1">Pennington, M. (1999). Miscarriages of Justice: A call for continued research focussing on reforming the investigative process. <i>Journal of Forensic Practice</i>, <em>13</em>, 61-71.</span></p>
<p class="p1"><span class="s1">Petherick, W. A. (2010). <i>Forensic Criminology.</i> London: Elsevier Academic Press.</span></p>
<p class="p1"><span class="s1">Police Executive Research Forum. (2014). The Police Response to Active Shooter Incidents. <em>Critical Issues in Policing Series</em>, 1-46.</span></p>
<p class="p1"><span class="s1">R v Abernathy, 2002 BCCA 8</span></p>
<p class="p2"><span class="s1">R v Basi,&nbsp;<span class="s3">2009 SCC 52, [2009] 3 SCR 389</span></span></p>
<p class="p2">R v Beare, 1988&nbsp;2 SCR 387</p>
<p class="p1">R v Beaudry<span>, [2007] 1 SCR 190, 2007 SCC 5</span></p>
<p class="p1">R v Briscoe<em>, </em>2010&nbsp;<span>SCC 13, [2010] 1 SCR 411</span></p>
<p class="p1">R v Ferguson, 1996 BCCA 342</p>
<p class="p1"><span class="s1">R v Gagnon, 2006 MBCA X at 13&nbsp;</span></p>
<p class="p1"><span class="s1">R v Godoy, 1999 1 SCR 311</span></p>
<p class="p1">R v Graham, 1974<span>&nbsp;S.C.R. 206</span></p>
<p class="p1"><span class="s1">R v Grant, 2009 SCC 32&nbsp;</span></p>
<p class="p1">R v Khan, 1990 2 SCR 531</p>
<p class="p1">R v Kowlyk, 1998 2 SCR 59</p>
<p class="p1"><span class="s1">R v Lifchus, 1997 3 SCR 320&nbsp;</span></p>
<p class="p1">R v Mann, 2004 3 SCR 59</p>
<p class="p1"><span class="s1">R v Perka, 1984 2 SCR 232</span></p>
<p class="p1">R v Schell, 2004<span>&nbsp;188 CCC (3d) 254 (ABCA)</span></p>
<p class="p1"><span class="s1">R v Smith, 1992 2 SCR 915</span></p>
<p class="p1"><span class="s1">R v Starr, 2000 2 S.C.R. 144 </span></p>
<p class="p1"><span class="s1">R v Steinberg, 1931 SCR 421</span></p>
<p class="p1"><span class="s1">R v Stinchcombe, 1991 3 SCR 326&nbsp;</span></p>
<p class="p1"><span class="s1">R v Storrey, 1990 1 SCR 241 </span></p>
<p class="p1">R v Terrence, 1983 1 SCR 357</p>
<p class="p1">R v Walsh<span>, </span>1978<span>&nbsp;48 CCC (2d) 199 (</span>ONCA)</p>
<p class="p1"><span class="s1">R v Woodcock, 1789 168 E.R. 352 (K.B.)&nbsp;</span></p>
<p class="p1"><span class="s1">Reith, C. (1943). Preventive Principle of Police. <i>Journal of Criminal Law and Criminology</i>, <em>34</em>, 206-209.</span></p>
<p class="p1"><span class="s1">Resnick, H. S., Kilpatrick, D. G., Dansky, B. S., Saunders, B. E., &amp; Best, C. L. (1993). Prevalence of civilian trauma and posttraumatic stress disorder in a representative national sample of women.&nbsp;<i>Journal of Consulting and Clinical Psychology</i>, 984-991.</span></p>
<p class="p1">Rex v.&nbsp;Burdett,<span>&nbsp;</span>1820<span>&nbsp;4 B. &amp; Aid</span></p>
<p class="p1"><span class="s1">Rogers, K. (2016). <i>Chimera Genetics</i>. Retrieved from Encyclopedia Britanica: https://www.britannica.com/topic/chimera-genetics</span></p>
<p class="p1"><span class="s1">Rose, C. &amp; Beck, V. (2009). Eyewitness accounts: False facts, false memories, and false identification. <i>Journal of Crime and Justice, 39</i>(2), 243-263.</span></p>
<p class="p1"><span class="s1">Rossmo, D. K. (1987). <i>Geographic Profiling Target Patterns of Serial Murderers.</i> Burnaby: Simon Fraser University.</span></p>
<p class="p1"><span class="s1">Rossmo, D. K. (2009). <i>Criminal Investigative Failures.</i> Bocal Raton: CRC Press Taylor &amp; Fransis Group.</span></p>
<p class="p1"><span class="s1">Royal Canadian Mounted Police. (2006, September 01). <i>National DNA Data Bank</i>. Retrieved January 16, 2017, from http://www.rcmp-grc.gc.ca/nddb-bndg/index-accueil-eng.htm</span></p>
<p class="p1"><span class="s1">Royal Canadian Mounted Police. (2015, Nov 27). <i>Criminal Investigative Analysis .</i> Retrieved from http://www.rcmp-grc.gc.ca/tops-opst/bs-sc/crim-profil-eng.htm</span></p>
<p class="p1"><span class="s1">Salhany, R. (2008). <i>Taman Inquiry into the Investigation and Prosecution of Derek Harvey-Zenk.</i> Winnipeg: Government of Manitoba.</span></p>
<p class="p1">Sansregret v The Queen<span>, 1985&nbsp;</span>1 SCR 570</p>
<p class="p1"><span>Savino, J. O., Turvey, B. E., &amp; Freeman, J. L. (2011).&nbsp;</span><i>Rape investigation handbook</i><span>. Waltham: Academic Press - an imprint of Elsevier.</span></p>
<p class="p1"><span class="s1">Sebetic, E. (1950). <i>Marquette Law Review 128.</i> Retrieved from http://scholarship.law.marquette.edu/mulr/vol34/iss2/6</span></p>
<p class="p1"><span class="s1">Shah, A. K. (2008). Heuristics Made Easy: An Effort-Reduction Framework. <i>Psychological Bulletin,&nbsp;<span>134</span></i>(2)<i><span>,&nbsp;</span></i>207-22.<i><span> </span></i>doi: 10.1037/0033-2909.134.2.207</span></p>
<p class="p1"><span>Smalarz, L., &amp; Wells, G. L. (2015). Contamination of eyewitness self-reports and the mistaken-identification problem.&nbsp;</span><i>Current Directions in Psychological Science</i><span>,&nbsp;</span><i>24</i><span>(2), 120-124.</span></p>
<p class="p1"><span class="s1">Smith, C. (2010). Shaken Baby Syndrome - An Investigator's Perspective<i>.</i> Abbotsford: University of the Fraser Valley.</span></p>
<p class="p1"><span class="s1">Sopinka, J. (1999). <i>The Law of Evidence in Canada 2nd ed.</i> Toronto, Ontario: LexisNexis Canada.</span></p>
<p class="p1"><span>Streets, M. D., &amp; Gerald, M. (1990). The homicide witness and victimization; PTSD in civilian populations: a literature review.&nbsp;</span><i>Jefferson Journal of Psychiatry</i><span>,&nbsp;</span><i>8</i><span>(1), 12.</span></p>
<p class="p1"><span class="s1">Taber, K. (2006). Beyond Constructivism: the Progressive Research Programme into Learning Science. <i>Studies in Science Education, 42</i>, 125-184.</span></p>
<p class="p1"><span class="s1">Thomas, S. A. (2000). <i>JonBenet: Inside the Ramsey Murder Investigation.</i> New York, NY: St Maritn's Paperback.</span></p>
<p class="p1"><span class="s1">Thompson, R. (2013, September 11). <i>Hearsay and Exceptions to Hearsay Rule.</i> Retrieved from https://library.lawsociety.sk.ca/inmagicgenie/documentfolder/EFLP3.PDF</span></p>
<p class="p1">Transit Police (2015, November 14). <i>Police Warnings - Transit Police.</i> Retrieved from www.transitpolice.bc.ca</p>
<p class="p1"><span class="s1">Varney, C. A. (2009). Procedural Fairness. <i>13th Annual Competition Conference of the International Bar Association</i>. Fiesole, Italy: Antitrust Division United States Department of Justice.</span></p>
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>418</wp:post_id>
		<wp:post_date><![CDATA[2020-08-21 13:21:41]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-08-21 17:21:41]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[references-2]]></wp:post_name>
		<wp:status><![CDATA[trash]]></wp:status>
		<wp:post_parent>395</wp:post_parent>
		<wp:menu_order>12</wp:menu_order>
		<wp:post_type><![CDATA[chapter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>About the Book</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/front-matter/about-the-book/</link>
		<pubDate>Tue, 12 Jan 2021 23:14:43 +0000</pubDate>
		<dc:creator><![CDATA[jgray]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/?post_type=front-matter&#038;p=432</guid>
		<description></description>
		<content:encoded><![CDATA[<p class=""><em>Introduction to Criminal Investigation, Processes, Practices, and Thinking</em> is a teaching text designed to assist the student in developing their own structured mental map of processes, practices, and thinking to conduct criminal investigations.</p>
Delineating criminal investigation into operational descriptors of tactical-response and strategic response while using illustrations of task-skills and thinking-skills, the reader is guided into structured thinking practices. Using the graphic tools of a “Response Transition Matrix”, an “Investigative Funnel”, and the “STAIR Tool”, the reader is shown how to form their own mental map of investigative thinking that can later be articulated in support of forming their reasonable grounds to believe.

Chapter 1 introduces criminal investigation as both a task process and a thinking process. This chapter outlines these concepts, rules, and processes with the goal of providing practical tools to ensure successful investigative processes and practices. Most importantly, this book informs the reader how to approach the investigative process using “investigative thinking.”

Chapter 2 illustrates investigation by establishing an understanding of the operational forum in which it occurs. That forum is the criminal justice system and in particular, the court system. The investigative process exists within the statutory rules of law, including the Canadian Charter of Rights and Freedoms, and case law rulings adjudicated by the courts. Considering the existence of these conditions, obligations, and case law rules, there are many terms and concepts that an investigator needs to understand to function appropriately and effectively within the criminal justice system. The purpose of this chapter is to introduce some of the basic legal parameters and concepts of criminal justice within which the criminal investigation process takes place.

Chapter 3 describes the functions and terms of “evidence”, as they relate to investigation. This speaks to a wide range of information sources that might eventually inform the court to prove or disprove points at issue before the trier of fact. Sources of evidence can include anything from the observations of witnesses to the examination and analysis of physical objects. It can even include the spatial relationships between people, places, and objects within the timeline of events. From the various forms of evidence, the court can draw inferences and reach conclusions to determine if a charge has been proven beyond a reasonable doubt.

Considering the critical nature of evidence within the court system, there are a wide variety of definitions and protocols that have evolved to direct the way evidence is defined for consideration by the court. In this chapter, we look at some of the key definitions and protocols that an investigator should understand to carry out the investigative process.

Chapter 4 breaks investigation down into logical steps, establishing a progression that can be followed and repeated to reach the desired results. The process of investigation can be effectively explained and learned in this manner. In this chapter the reader is introduced to various issues in the progression that relate to the process of investigation.

Chapter 5 examines the operational processes of investigation. In this chapter we introduce the three big investigative errors along with graphic illustrations of “The Investigative Funnel” and the “S T A I R Tool” to illustrate how each of these concepts in the investigative progression.

Chapter 6 provides the reader the opportunity to work through some investigative scenarios using the S T A I R Tool. These scenarios demonstrate the investigative awareness required to transition from the tactical investigative response to the strategic investigative response. Once in the strategic response mode the reader is challenged to practice applying theory development to conduct analysis of the evidence and information to create an investigative plan.

This chapter presents two investigative scenarios each designed to illustrate different steps of the S T A I R tool allowing the student to recognize both the tactical and the strategic investigative responses and the implications of transitioning from the tactical to the strategic response.

Chapter 7 illustrates the investigative practices of witness management. Witness statements will assist the investigator in forming reasonable grounds to lay a charge, and will assist the court in reaching a decision that the charge against an accused person has been proved beyond a reasonable doubt. It is important for an investigator to understand these practices as they allow an investigator to evaluate witnesses and collect witness evidence that will be acceptable to the courts.

Chapter 8 describes crime scene management skills. These skills are an extremely significant task component of investigation because evidence that originates at the crime scene will provide a picture of events for the court to consider in its deliberations. That picture will be composed of witness testimony, crime scene photographs, physical exhibits, and the analysis of those exhibits, along with the analysis of the crime scene itself. From this chapter, the reader will learn the task processes and protocols for several important issues in crime scene management.

Chapter 9 examines the interviewing, questioning, and interrogation techniques police use to aid them in investigations. The courts expect police to exercise high standards using practices that focus on the rights of the accused person, and minimize any physical or mental anguish that might cause a false confession. In meeting these expectations, the challenges of suspect questioning and interrogation can be complex, and many police agencies have trained interrogators and polygraph operators who undertake the interrogation of suspects for major criminal cases. But not every investigation qualifies as a major case, and frontline police investigators are challenged to undertake the tasks of interviewing, questioning, and interrogating possible suspects daily. The challenge for police is that the questioning of a suspect and the subsequent confession can be compromised by flawed interviewing, questioning, or interrogation practices. Understanding the correct processes and the legal parameters can make the difference between having a suspect’s confession accepted as evidence by the court or not.

Chapter 10 examines various forensic sciences and the application of forensic sciences as practical tools to assist police in conducting investigations. As we noted in Chapter 1, it is not necessary for an investigator to be an expert in any of the forensic sciences; however, it is important to have a sound understanding of forensic tools to call upon appropriate experts to deploy the correct tools when required.

Chapter 11 summarizes the learning objectives of this text and suggests investigative learning topics for the reader going forward. Many topics relative to investigative practices have not been covered here as part of the core knowledge requirements for a new investigator. These topics include:
<ol>
 	<li>Major Case Management</li>
 	<li>Informant and confidential source management</li>
 	<li>Undercover investigations</li>
 	<li>Specialized team investigations</li>
</ol>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>432</wp:post_id>
		<wp:post_date><![CDATA[2021-01-12 18:14:43]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2021-01-12 23:14:43]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[about-the-book]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>4</wp:menu_order>
		<wp:post_type><![CDATA[front-matter]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														<wp:postmeta>
		<wp:meta_key><![CDATA[_edit_last]]></wp:meta_key>
		<wp:meta_value><![CDATA[103]]></wp:meta_value>
		</wp:postmeta>
							<wp:postmeta>
		<wp:meta_key><![CDATA[pb_show_title]]></wp:meta_key>
		<wp:meta_value><![CDATA[on]]></wp:meta_value>
		</wp:postmeta>
							</item>
					<item>
		<title>Main Body</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/part/main-body/</link>
		<pubDate>Mon, 24 Apr 2017 17:44:22 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/part/main-body/</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>3</wp:post_id>
		<wp:post_date><![CDATA[2017-04-24 13:44:22]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-04-24 17:44:22]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[open]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[main-body]]></wp:post_name>
		<wp:status><![CDATA[web-only]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>1</wp:menu_order>
		<wp:post_type><![CDATA[part]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														</item>
					<item>
		<title>About</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/about/</link>
		<pubDate>Mon, 24 Apr 2017 17:44:22 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/about/</guid>
		<description></description>
		<content:encoded><![CDATA[<!-- Here be dragons.-->]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>11</wp:post_id>
		<wp:post_date><![CDATA[2017-04-24 13:44:22]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-04-24 17:44:22]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[about]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[page]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														</item>
					<item>
		<title>Buy</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/buy/</link>
		<pubDate>Mon, 24 Apr 2017 17:44:22 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/buy/</guid>
		<description></description>
		<content:encoded><![CDATA[<!-- Here be dragons.-->]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>12</wp:post_id>
		<wp:post_date><![CDATA[2017-04-24 13:44:22]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-04-24 17:44:22]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[buy]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[page]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														</item>
					<item>
		<title>Access Denied</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/access-denied/</link>
		<pubDate>Mon, 24 Apr 2017 17:44:22 +0000</pubDate>
		<dc:creator><![CDATA[klambert]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/access-denied/</guid>
		<description></description>
		<content:encoded><![CDATA[<!-- Here be dragons.-->]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>13</wp:post_id>
		<wp:post_date><![CDATA[2017-04-24 13:44:22]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2017-04-24 17:44:22]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[access-denied]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[page]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														</item>
					<item>
		<title>H5P listing</title>
		<link>https://pressbooks.bccampus.ca/criminalinvestigation/h5p-listing/</link>
		<pubDate>Mon, 01 Jun 2020 17:42:40 +0000</pubDate>
		<dc:creator><![CDATA[bpayne]]></dc:creator>
		<guid isPermaLink="false">https://pressbooks.bccampus.ca/criminalinvestigation/h5p-listing/</guid>
		<description></description>
		<content:encoded><![CDATA[<!-- Here be dragons. -->]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>286</wp:post_id>
		<wp:post_date><![CDATA[2020-06-01 13:42:40]]></wp:post_date>
		<wp:post_date_gmt><![CDATA[2020-06-01 17:42:40]]></wp:post_date_gmt>
		<wp:comment_status><![CDATA[closed]]></wp:comment_status>
		<wp:ping_status><![CDATA[closed]]></wp:ping_status>
		<wp:post_name><![CDATA[h5p-listing]]></wp:post_name>
		<wp:status><![CDATA[publish]]></wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type><![CDATA[page]]></wp:post_type>
		<wp:post_password><![CDATA[]]></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
														</item>
				</channel>
</rss>
	