Build Stronger Cases with Mobile Device Link Analysis

Size: px
Start display at page:

Download "Build Stronger Cases with Mobile Device Link Analysis"

Transcription

1 White Paper Build Stronger Cases with Mobile Device Link Analysis How data from mobile devices reveals the patterns of life that can make for stronger proactive and reactive investigations - on the street and in the courtroom

2 Link analysis and data visualization are commonly associated with large, complex cases: the many hundreds of people and events connected to Bernie Madoff s Ponzi schemes, for instance, or the networks of organized crime families, drug cartels, street gangs and terrorists. Yet link analysis can also have narrower, more localized meaning. Prescription drug diversion, home methamphetamine manufacturing, prostitution rings, and crimes against persons or property (including violent and serial offenses) are just a few examples of criminal activities that involve small networks or often just two or three people. By connecting data from suspects and victims contacts, communications and locations, investigators can discern those subjects patterns of life - and the disruptions in those patterns - that can make their cases stronger. For these types of cases, large scale link analysis tools are unwieldy, cost prohibitive and require specialized training. Law enforcement requires a scaled-down tool to analyze only the most important information about suspects, accomplices and victims. Mobile device link analysis is this tool. By connecting data from suspects and victims contacts, communications and locations, investigators can discern those subjects patterns of life - and the disruptions in those patterns - that can make their cases stronger. From digital footprints to digital trails Any investigation relies on human behavior patterns. By linking and cross-referencing disparate data, you can deduct actionable information. UNUSUAL PATTERNS REVEAL CLUES Even anomalies - changes from normal communication and travel patterns - can have significance when analyzed in the context of an entire timeline. Pre-incident anomalies can show preparation or trigger events. Post-incident anomalies might be linked to cover-up activity. And unusual behavior at the time of the incident can show potential direct involvement, whether as a suspect, victim, or key witness. Timelines, links graphs and maps can provide investigators with a birds-eye view of ongoing behavior or deviations from normal behavior. By combining data from several people s devices, you can see not just sent and received communications (as well as the frequency and modes of communication such as calls or SMS); the links between those devices can reveal direct and mutual relationships among people. Coupled with timelines, those communications can show who communicates the most with your subjects, how they do it, and when they do it. Likewise location patterns, which can show commonalities between subjects and the places they visit. Any investigation relies on human behavior patterns. By linking and cross-referencing disparate data, you can deduct actionable information. These digital trails can provide leads which investigators may not otherwise have uncovered. The arrest of three accomplices may lead to a fourth, for example. Or, link analysis may assist the interview process by providing investigators with the links, timelines, maps and related communications that can help direct an interview or interrogation. In addition, many criminals carry more than one mobile device to cover their criminal activity. Link analysis can construct timelines of the call logs, SMS and other communications, along with GPS and social networking posts, across devices to create a fuller picture of the suspect s range of activity and contacts. 2

3 Reconstructing patterns that led to a crime Mobile device data can help reconstruct a suspect s and victim s movements, and communications in major crimes, serial crimes and group-perpetrated crimes. Violent Crimes Prior to any violent crime, the individuals, places and events in suspects and victims lives fit a routine that identifies them, a norm from which people typically don t deviate. For example, investigators may wish to establish sexual harassment, domestic or dating violence - whether constant or escalating - through several weeks or months worth of abusive text messages and repetitive phone calls. Likewise, cell phones and GPS devices owned by stalkers and their victims can be compared. In-common locations can bolster a case against a stalker, as can the frequency of one-way communication from suspect to victim. Repetitive or abusive communications that end abruptly, coinciding with a victim s death or disappearance, can help identify a suspect. Police may start by analyzing the victim s phone, GPS device or tablet, then linking that analysis with the extraction from the suspect s device(s). A homicide victim s patterns may become anomalous hours or days before death. Communications or travels that are unusual, either in their frequency or people contacted, can provide important leads. Data from one or more suspects phones, linked to patterns from the victim s phone, can provide additional clues - incriminating or exculpatory. Pattern Crimes Different patterns emerge when it comes to conspiracies and/or serial property crimes like burglaries, vandalism, arson and retail theft, all of which often involve more than one suspect. In these types of cases, the patterns may first be identified by crime analysts, whose job it is to mathematically predict likely next targets. Police who make successful arrests based on these analytics can then compare previous activities with their suspects mobile device data. In burglaries or robberies, one or more suspects may case the target location prior to committing the offense, and may also call or text associates from the location at the time of the offense. Log files, GPS and social location-based services can show this activity. Any communications among accomplices in the days or weeks leading up to the crime can also be linked and analyzed, on their own and as part of an incident timeline. Arson, theft and vandalism suspects may take images or even video of the property they stole or damaged. They may send these images to one another or to social media profiles. Connecting these images as part of a pattern - especially if that pattern has already been identified as part of predictive crime analytics - can strengthen the case against them. Prior to any violent crime, the individuals, places and events in suspects and victims lives fit a routine that identifies them, a norm from which people typically don t deviate. Overlaid on predictive crime analytics such as maps with cones of probability, angles of change, time-and-date tactical analysis, and other tools in a crime analyst s kit, communication patterns can establish that suspects actual movements fit the statistical probability of their being at a particular location at a particular time. Thus, detectives can show that their suspects are definitively linked to ongoing crime problems in their community. This can strengthen cases and can heighten the likelihood of prosecution. 3

4 Linking as part of long-term planning Mobile device link analysis can be applied proactively, too. In many communities, hotspots of prostitution, property crimes or other criminal activities can be persistent. They may recur despite consistent targeted enforcement, or shift to other areas. Identifying the people involved in these recurrent crimes may be the key to stopping them. Crime analysts create comprehensive predictive analytics to help police figure out how to deploy resources; police can get more mileage out of their deployments by analyzing any mobile device data they obtain as part of search incident to arrest. Police can get more mileage out of their deployments by analyzing any mobile device data they obtain as part of search incident to arrest. During a prostitution sweep, for instance, police might extract data from a number of prostitutes mobile phones. In-common calls or text messages to and from one particular person might point to a pimp or madam. That person s device, in turn, could provide links to other prostitutes or even other criminal activities he or she may be involved in, such as narcotics or broader human trafficking activities. Just as predictive analytics make it easier for police to deploy resources, proactive link analysis can help police plan where to find a subject for field interviewing or even arrest. Another form of proactive link analysis is using received data, such as geotagged images or other geolocation data, to discern where a suspect is likely to be at some future point: a favorite bar visited every Friday night, for instance, or at a friend s or relative s house every Wednesday morning. Again, consistent data from multiple devices can provide a clearer picture of a lead s locations and activities. Just as predictive analytics make it easier for police to deploy resources, proactive link analysis can help police plan where to find a subject for field interviewing or even arrest. Finally, criminals connected to one another may have a common code or language they use among themselves. The information within their text messages may contain key words and phrases, which police can use for future forensic analyses: within forensic software s watch lists, for instance, or as part of search and filter tools on future devices seized as part of an ongoing investigation. TAKING LINK ANALYSIS TO COURT One of the most critical pieces of automated link analysis is its value in court. Explaining the concepts for patterns of life, anomalous activities, timelines, and common locations is easier when judges and jurors can see for themselves how defendants acted before, during, and after an incident. Just as importantly, an automated link analysis is much more accurate than a manual process. No human can parse the thousands of data points representing contacts, calls, text messages, locations and other links. This can cast doubt on the veracity of an investigator s interpretation of data. 4

5 Integrating link analysis into existing workflows So, who does the analysis? It depends on the agency or task force, individual competency and mandates. More specifically, the agency s size, resources, and internal political structure determine who primarily owns data analytics. For example: In many organizations, investigators perform all forensic and analytical work themselves: from identifying suspects to writing search warrants, to digital forensics to report writing and, if necessary, testifying in court. Link analysis may become a natural part of this workflow, when the case warrants it. In larger agencies or task forces, as well as in the private sector, forensic examiners deal with all digital evidence and simply present a report to investigators when they are through. In these organizations, a forensic examiner who can analyze extracted data for possible links may make sense. In other organizations, data analysis is part of neither forensic examiners nor investigators workflows. Here, crime analysts have the expertise to crunch data related to crime trends and hotspots, and on whom investigators already rely for proactive and reactive support. They can be a one stop shop at trial to show how all the data from a crime or crime pattern fits together. Professionals in all these groups may question whether link analysis saves or costs time. Although there is no question about the value of any methodology that can reduce investigative cycles, vast swaths of digital data have become burdensome for everyone, regardless of who manages it. In larger agencies, crime analysts may require forensic examiners to work with investigators so that they can focus on patrol support. But backlogged forensic examiners may in turn ask analysts to work with investigators. The agency s size, resources, and internal political structure determine who primarily owns data analytics. In many cases, investigators have no access to either crime or forensic analysts. Even if they do, they may be unable to wait for their analysts to return results to them. They may perform much of their own analytic work. No matter who or how many perform the analysis, it is crucial to set investigative goals, prioritize tasks, and triage data. The investigator managing the case must take the lead on this activity. Supervisors could assign one person to handle mobile link analysis on a part-time basis, regardless of where the organization that person works. Or, investigative and analytical professionals could find themselves needing to negotiate. Crime analysts or forensic examiners may be willing to assist with high-profile case analytics, for example, while asking investigators to perform their own analysis on more routine cases. No matter who or how many perform the analysis, it is crucial to set investigative goals, prioritize tasks, and triage data. Regardless, the decision should be based on time savings. Timeline analysis can be done manually, for example, by merging call logs and SMS records from multiple devices into a single spreadsheet. But this could take many hours and would not provide a graphical representation of the timeline for easy presentation in court. It also raises the risk of human error, which in turn could raise doubts about the analysis accuracy. Tower data can be overlaid onto a map to show travel patterns, but this too can be painstaking work. And hours spent interrogating a suspect about his relationship to other suspects or victims may result in misleading or no information. A good mobile link analysis tool automates these processes, shortening both analytical and investigative cycles and thus making it easier to decide who should own the mobile data analytics in any organization. 5

6 Getting more out of your UFED extractions with UFED Link Analysis UFED Link Analysis is a versatile investigative tool that can be used both proactively and reactively to visually identify suspect and victim patterns of life and the anomalies that can indicate guilt or complicity in a range of cases. In any situation where investigators need this information within a limited period of time - working on their own or in conjunction with digital forensic examiners or crime analysts - this streamlined solution can provide better leads for investigators to follow up on, and better prima facie evidence that can ensure a conviction. Unlike analytic solutions that connect data from many different sources, UFED Link Analysis focuses on data that comes solely from mobile devices. It was built to help identify non-complex, low-level criminal networks such as local drug networks, prostitution rings, property crimes conspiracies and the like. It can also assist after the fact with violent or major crimes investigations, linking victims to suspects in homicides, rapes, assaults and the like. By analyzing data extracted from any of the thousands of mobile devices already supported by the UFED platform, UFED Link Analysis improves investigators likelihood of finding important leads. An analysis that could otherwise take days or weeks - and result in an end product with questionable accuracy - can be done in minutes and result in complete accuracy. UFED Link Analysis reporting is appropriate not only for intelligence and investigation building, but also for supporting courtroom testimony, as it clearly shows information in easy-to-understand visual formats. About Cellebrite Cellebrite is the world leader in delivering cutting-edge mobile forensic solutions. Cellebrite provides flexible, field proven and innovative cross platform solutions for lab and field via its UFED Pro and UFED Field Series. The company s comprehensive Universal Forensic Extraction Device (UFED) is designed to meet the challenges of unveiling the massive amount of data stored in the modern mobile device. The UFED Series is able to extract, decode, analyze and report data from thousands of mobile devices, including, smartphones, legacy and feature phones, portable GPS devices, tablets, memory cards and phones manufactured with Chinese chipsets. With more than 30,000 units deployed across 100 countries, UFED Series is the primary choice for forensic specialists in law enforcement, military, intelligence, corporate security and ediscovery. Founded in 1999, Cellebrite is a subsidiary of the Sun Corporation, a publicly traded Japanese company (6736/JQ) To learn more, visit For more information contact sales 2015 Cellebrite Mobile Synchronization LTD. All rights reserved. 6

How To Solve A Violent Home Invasion With A United Force

How To Solve A Violent Home Invasion With A United Force Use Case SOLVING VIOLENT CRIMES WITH A UNIFIED WORKFLOW In a Violent Home Invasion Investigation, the UFED Series Seamlessly Unifies Workflows from Field to Lab A series of violent home invasions has everyone

More information

SIMPLIFYING THE COMPLEXITY OF MOBILE DATA FORENSICS

SIMPLIFYING THE COMPLEXITY OF MOBILE DATA FORENSICS SIMPLIFYING THE COMPLEXITY OF MOBILE DATA FORENSICS Extract the Insights that Focus Investigations CELLEBRITE UFED PRO SERIES THE DATA SOURCES THAT MATTER MOST 95% MOBILE DEVICE ITSELF 59% THIRD-PARTY

More information

Unlock Digital Intelligence Accelerate Investigations Anywhere

Unlock Digital Intelligence Accelerate Investigations Anywhere Unlock Digital Intelligence Accelerate Investigations Anywhere Cellebrite Mobile Forensics The Exploding Implications of Mobile Data The new smoking gun in criminal investigations? Mobile devices A man

More information

WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME

WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME HELPING LAW ENFORCEMENT AGENCIES SOLVE CRIMES FASTER, WITH LOWER COSTS AND FEWER RESOURCES. 1 Wynyard Group Advanced Crime

More information

Evaluating Mobile Forensics Training & Certification Programs: 5 Questions to Ask

Evaluating Mobile Forensics Training & Certification Programs: 5 Questions to Ask Evaluating Mobile Forensics Training & Certification Programs: 5 Questions to Ask Table of Contents How to Evaluate Mobile Forensics Training...3 1. Does the vendor ground you in forensic best practices

More information

TESTIMONY OF COOK COUNTY STATE S ATTORNEY ANITA ALVAREZ SENATE JUDICIARY SUBCOMMITTEE ON HUMAN RIGHTS AND THE LAW

TESTIMONY OF COOK COUNTY STATE S ATTORNEY ANITA ALVAREZ SENATE JUDICIARY SUBCOMMITTEE ON HUMAN RIGHTS AND THE LAW TESTIMONY OF COOK COUNTY STATE S ATTORNEY ANITA ALVAREZ SENATE JUDICIARY SUBCOMMITTEE ON HUMAN RIGHTS AND THE LAW FEBRUARY 24, 2010 THANK YOU SENATOR DURBIN AND MEMBERS OF THE COMMITTEE FOR INVITING ME

More information

To do Justice, as no one is above the Law nor beneath its protection.

To do Justice, as no one is above the Law nor beneath its protection. Michael L. Ramsey, District Attorney District Attorney Department Summary Mission Statement To do Justice, as no one is above the Law nor beneath its protection. Department Description and Key Issues The

More information

10 Victims and the law 57

10 Victims and the law 57 10 Victims and the law 57 10: Victims and the law This section gives a summary of the law in relation to victims of crime. Introduction The court may call a victim as a witness in a criminal case. However,

More information

d CRIMINAL INVESTIGATION ADMINISTRATION OF JUSTICE 5 Spring 2015

d CRIMINAL INVESTIGATION ADMINISTRATION OF JUSTICE 5 Spring 2015 d CRIMINAL INVESTIGATION ADMINISTRATION OF JUSTICE 5 Spring 2015 Instructor: Steven J. Katz West Los Angeles College Course Section No. 7574 MW 7:35am-9:10am ARTC E-mail: katzsj@wlac.edu Contact Telephone:

More information

CENTRAL TEXAS COLLEGE SYLLABUS FOR CRIJ 2314 CRIMINAL INVESTIGATION. Semester Hours Credit: 3

CENTRAL TEXAS COLLEGE SYLLABUS FOR CRIJ 2314 CRIMINAL INVESTIGATION. Semester Hours Credit: 3 CENTRAL TEXAS COLLEGE SYLLABUS FOR CRIJ 2314 CRIMINAL INVESTIGATION INSTRUCTOR: OFFICE HOURS: Semester Hours Credit: 3 I. Introduction A. This course covers the fundamentals of criminal investigations

More information

Applications of GIS in Law Enforcement. John Beck Global Law Enforcement Manager Esri 12/10/2014

Applications of GIS in Law Enforcement. John Beck Global Law Enforcement Manager Esri 12/10/2014 Applications of GIS in Law Enforcement John Beck Global Law Enforcement Manager Esri 12/10/2014 My Background - Global Law Enforcement Manager - Joined Esri in Sep. 2013 - Undergraduate degree - Geography

More information

Classification scheme Criminal law and criminology (STR)

Classification scheme Criminal law and criminology (STR) Classification scheme Criminal law and criminology (STR) A Reference material A10 Reference works/bibliographies A20 Loose-leaf works Netherlands A21 Idem foreign countries A22 Idem international and comparative

More information

Making critical connections: predictive analytics in government

Making critical connections: predictive analytics in government Making critical connections: predictive analytics in government Improve strategic and tactical decision-making Highlights: Support data-driven decisions using IBM SPSS Modeler Reduce fraud, waste and abuse

More information

Piecing Digital Evidence Together. Service Information

Piecing Digital Evidence Together. Service Information Piecing Digital Evidence Together Service Information Services Overview Mobile and Tablet Forensics Mobile Phone Forensics is the legally tested and approved systematic examination of mobile phones, SIM

More information

Siebel for Investigative Case Management. An Oracle White Paper August 2007

Siebel for Investigative Case Management. An Oracle White Paper August 2007 Siebel for Investigative Case Management An Oracle White Paper August 2007 Siebel for Investigative Case Management OVERVIEW OF SIEBEL FOR INVESTIGATIVE CASE MANAGEMENT 3 UNIVERSAL CASE INBOX.... 4 INCIDENT

More information

Digital Forensics for Attorneys Overview of Digital Forensics

Digital Forensics for Attorneys Overview of Digital Forensics Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence

More information

OVERVIEW OF THE MULTNOMAH COUNTY DISTRICT ATTORNEY'S OFFICE

OVERVIEW OF THE MULTNOMAH COUNTY DISTRICT ATTORNEY'S OFFICE OVERVIEW OF THE MULTNOMAH COUNTY DISTRICT ATTORNEY'S OFFICE INTRODUCTION This outline was prepared for Deputy District Attorney Applicants. It provides an overview of the internal workings of the Multnomah

More information

Crime Location Crime Type Month Year Betting Shop Criminal Damage April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010

Crime Location Crime Type Month Year Betting Shop Criminal Damage April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010 Crime Location Crime Type Month Year Betting Shop Theft April 2010 Betting Shop Assault April 2010 Betting Shop Theft April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010 Betting Shop

More information

Decades of Successful Sex Crimes Defense Contact the Innocence Legal Team Now

Decades of Successful Sex Crimes Defense Contact the Innocence Legal Team Now Criminal Court Felonies The U.S. has the highest rate of felony conviction and imprisonment of any industrialized nation. A felony crime is more serious than a misdemeanor, but the same offense can be

More information

FROM CHARGE TO TRIAL: A GUIDE TO CRIMINAL PROCEEDINGS

FROM CHARGE TO TRIAL: A GUIDE TO CRIMINAL PROCEEDINGS FROM CHARGE TO TRIAL: A GUIDE TO CRIMINAL PROCEEDINGS If you are experiencing, or have experienced, domestic violence and/or sexual violence there are a number of ways the law can protect you. This includes

More information

January 26, 2015 Presented by Rose Mukhar, Pro Bono Attorney

January 26, 2015 Presented by Rose Mukhar, Pro Bono Attorney January 26, 2015 Presented by Rose Mukhar, Pro Bono Attorney Part 1 Criminal Laws Part 2 Business Laws Part 3 Education & Social Services Laws Victims Rights AB 1585 (Alejo) Expungement of Prostitution

More information

OFFICE OF DAKOTA COUNTY ATTORNEY JAMES C. BACKSTROM COUNTY ATTORNEY

OFFICE OF DAKOTA COUNTY ATTORNEY JAMES C. BACKSTROM COUNTY ATTORNEY OFFICE OF DAKOTA COUNTY ATTORNEY JAMES C. BACKSTROM COUNTY ATTORNEY Dakota County Judicial Center 1560 Highway 55 Hastings, Minnesota 55033-2392 Phillip D. Prokopowicz, Chief Deputy Karen A. Schaffer,

More information

IBM Content Analytics: Rapid insight for crime investigation

IBM Content Analytics: Rapid insight for crime investigation IBM Content Analytics: Rapid insight for crime investigation Discover insights in structured and unstructured information to speed case and identity resolution Highlights Reduces investigation time from

More information

One third of investigators still do not have the resources to utiltize social media properly for investigations.

One third of investigators still do not have the resources to utiltize social media properly for investigations. Industry Insights One Step Ahead: How Social Media is Changing the Face of Investigations One third of investigators still do not have the resources to utiltize social media properly for investigations.

More information

Delivery Plan 2014 15

Delivery Plan 2014 15 Delivery Plan 2014 15 Foreword Recorded crime levels have fallen considerably over the last five years but we have also seen changes to the patterns of crime. The delivery plan demonstrates our commitment

More information

RESEARCH SURVEY REPORT ON CRIME ANALYTIC SOFTWARE USE, ADOPTION AND FUTURE TRENDS

RESEARCH SURVEY REPORT ON CRIME ANALYTIC SOFTWARE USE, ADOPTION AND FUTURE TRENDS RESEARCH SURVEY REPORT ON CRIME ANALYTIC SOFTWARE USE, ADOPTION AND FUTURE TRENDS CONDUCTED BY POLICE MAGAZINE SPONSORED BY RESEARCH SURVEY REPORT In September 2014, Police Magazine and Wynyard Group collaborated

More information

Adult Criminal Justice Case Processing in Washington, DC

Adult Criminal Justice Case Processing in Washington, DC Adult Criminal Justice Case Processing in Washington, DC P. Mitchell Downey John Roman, Ph.D. Akiva Liberman, Ph.D. February 2012 1 Criminal Justice Case Processing in Washington, DC P. Mitchell Downey

More information

Piecing Digital Evidence Together. Company Information

Piecing Digital Evidence Together. Company Information Piecing Digital Evidence Together Company Information About IntaForensics About Us Established in 2006, IntaForensics has grown to become one of the leading providers of digital forensic services in the

More information

Computer Forensics: an approach to evidence in cyberspace

Computer Forensics: an approach to evidence in cyberspace Computer Forensics: an approach to evidence in cyberspace Abstract This paper defines the term computer forensics, discusses how digital media relates to the legal requirements for admissibility of paper-based

More information

Key Crime Analysis Data Sources. Crime

Key Crime Analysis Data Sources. Crime Part 2 Processes of Crime Analysis coming into the police agency, but those dispatched to or initiated by officers. Because of the vast information contained in a CAD system, information is often purged

More information

DISQUALIFICATIONS. What is a disqualification?

DISQUALIFICATIONS. What is a disqualification? DISQUALIFICATIONS As part of licensing you for childcare, our agency must conduct background study on you and anyone age 13 or older, living in your home or working with the children in care. We will give

More information

MASTERS DEGREE IN CRIMINAL JUSTICE

MASTERS DEGREE IN CRIMINAL JUSTICE MASTERS DEGREE IN CRIMINAL JUSTICE Career Opportunities: Graduates of this program will gain the skills and knowledge that will enable them to qualify for mid to higher-level positions in Criminal Justice,

More information

Texas Highway Safety Operations Center: Using Data to Combat Crime, Crash, and Traffic Enforcement Issues

Texas Highway Safety Operations Center: Using Data to Combat Crime, Crash, and Traffic Enforcement Issues Texas Highway Safety Operations Center: Using Data to Combat Crime, Crash, and Traffic Enforcement Issues 2015 Emergency Management Conference San Antonio TEXAS DEPARTMENT OF PUBLIC SAFETY Texas Highway

More information

DELAWARE COUNTY TREATMENT COURT APPLICATION

DELAWARE COUNTY TREATMENT COURT APPLICATION DELAWARE COUNTY TREATMENT COURT APPLICATION Please read each question carefully before answering. Failure to complete this form accurately will delay the processing of your application. False or misleading

More information

Education & Training Plan Criminal Investigation Professional Certificate Program with Externship

Education & Training Plan Criminal Investigation Professional Certificate Program with Externship Testing Services and Programs 1200 N. DuPont Highway Dover, DE 19901 https://www.desu.edu/academics/mycaa Contact: Amystique Harris-Church 302.857.6143 achurch@desu.edu Education & Training Plan Criminal

More information

Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map

Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map Prepared by: Booz Allen Hamilton Career Progression within the 1811 Occupational Series is Marked by Support

More information

Making Critical Connections: Predictive Analytics in Government

Making Critical Connections: Predictive Analytics in Government Making Critical Connections: Predictive Analytics in Improve strategic and tactical decision-making Highlights: Support data-driven decisions. Reduce fraud, waste and abuse. Allocate resources more effectively.

More information

THE TOP TEN PERCENT: Targeting the Top Ten Percent of Pawners

THE TOP TEN PERCENT: Targeting the Top Ten Percent of Pawners THE TOP TEN PERCENT: Targeting the Top Ten Percent of Pawners A SUCCESSFUL APPROACH TO REDUCING BURGLARIES TUCSON POLICE DEPARTMENT, 2006 SUMMARY THE PROBLEM: ANALYSIS: RESPONSE: In 2003 and 2004, the

More information

CRIMINAL LAW AND VICTIMS RIGHTS

CRIMINAL LAW AND VICTIMS RIGHTS Chapter Five CRIMINAL LAW AND VICTIMS RIGHTS In a criminal case, a prosecuting attorney (working for the city, state, or federal government) decides if charges should be brought against the perpetrator.

More information

GUIDANCE Implementing Section 176 of the Anti-social Behaviour, Crime and Policing Act 2014: Lowvalue

GUIDANCE Implementing Section 176 of the Anti-social Behaviour, Crime and Policing Act 2014: Lowvalue GUIDANCE Implementing Section 176 of the Anti-social Behaviour, Crime and Policing Act 2014: Lowvalue shoplifting Guidance for police in England and Wales First publication: June 2014 1 Introduction 1.

More information

REPORTING AN OFFENCE TO THE POLICE: A GUIDE TO CRIMINAL INVESTIGATIONS

REPORTING AN OFFENCE TO THE POLICE: A GUIDE TO CRIMINAL INVESTIGATIONS REPORTING AN OFFENCE TO THE POLICE: A GUIDE TO CRIMINAL INVESTIGATIONS If you are experiencing or have experienced domestic volence and/or sexual violence there are a number of ways the law can protect

More information

CMJ 251 - CRIMINAL INVESTIGATION Spring Syllabus 2015

CMJ 251 - CRIMINAL INVESTIGATION Spring Syllabus 2015 INSTRUCTOR INFORMATION Associate Professor David Striegel Guerrieri Hall, Room 202D Office Phone: 410-572-8755 Office Hours: CMJ 251 - CRIMINAL INVESTIGATION Spring Syllabus 2015 Monday 10:45 11:45 a.m.

More information

Crime Mapping and Analysis Using GIS

Crime Mapping and Analysis Using GIS Crime Mapping and Analysis Using GIS C.P. JOHNSON Geomatics Group, C-DAC, Pune University Campus, Pune 411007 johnson@cdac.ernet.in 1. Introduction The traditional and age-old system of intelligence and

More information

Law, Public Safety, Corrections and Security Career Cluster Criminal Investigations Course Number: 43.45300

Law, Public Safety, Corrections and Security Career Cluster Criminal Investigations Course Number: 43.45300 Law, Public Safety, Corrections and Security Career Cluster Criminal Investigations Course Number: 43.45300 Course Description: This course is designed to provide students with an opportunity to explore

More information

LAW-ENFORCEMENT RECORDS and the FREEDOM OF INFORMATION ACT

LAW-ENFORCEMENT RECORDS and the FREEDOM OF INFORMATION ACT LAW-ENFORCEMENT RECORDS and the FREEDOM OF INFORMATION ACT Law-enforcement agencies in Virginia continue to enjoy one of the broadest exemptions for releasing information in all of the states. The Virginia

More information

FLORIDA STATE UNIVERSITY POLICE DEPARTMENT Chief David L. Perry

FLORIDA STATE UNIVERSITY POLICE DEPARTMENT Chief David L. Perry FLORIDA STATE UNIVERSITY POLICE DEPARTMENT Chief David L. Perry 830 West Jefferson Street 850-644-1234 VICTIMS' RIGHTS BROCHURE YOUR RIGHTS AS A VICTIM OR WITNESS: ------- We realize that for many persons,

More information

Vancouver Police Department Crown Counsel Queries Audit

Vancouver Police Department Crown Counsel Queries Audit Vancouver Police Department Crown Counsel Queries Audit Simon Demers, Audit Manager Vancouver Police Department February 2010 Vancouver Police Department 312 Main Street Vancouver, British Columbia V6A

More information

Maricopa County Attorney s Office Adult Criminal Case Process

Maricopa County Attorney s Office Adult Criminal Case Process The following is a brief description of the process to prosecute an adult accused of committing a felony offense. Most misdemeanor offenses are handled by municipal prosecutors; cases involving minors

More information

1342) Prerequisit. cies. Investigative interview and C9, F9,) interviews. research, the. C. Sketching. the Crime and students. Scene.

1342) Prerequisit. cies. Investigative interview and C9, F9,) interviews. research, the. C. Sketching. the Crime and students. Scene. Criminal Investigation (CJSA 1342) Credit: 3 semester credit hours (3 hours lecture) Prerequisit te/co-requisite: None Course Description Investigative theory; collection and preservation of evidence;

More information

APPENDIX A Quick Reference Chart for Determining Key Immigration Consequences of Common New York Offenses

APPENDIX A Quick Reference Chart for Determining Key Immigration Consequences of Common New York Offenses APPENDIX A Quick Reference Chart for Determining Key Immigration Consequences of Common New York s For information on the applicability of these consequences to a specific noncitizen, see Chapter 3. For

More information

Overview. The TriTech Solution TriTech s Inform RMS is a proven, robust, multi-jurisdictional records management system.

Overview. The TriTech Solution TriTech s Inform RMS is a proven, robust, multi-jurisdictional records management system. Inform RMS The TriTech Solution TriTech s Inform RMS is a proven, robust, multi-jurisdictional records management system. Covering the entire life span of records development from initial generation to

More information

COMMONWEALTH OF MASSACHUSETTS THE TRIAL COURT STANDING ORDER NO. 2-86 (AMENDED)

COMMONWEALTH OF MASSACHUSETTS THE TRIAL COURT STANDING ORDER NO. 2-86 (AMENDED) COMMONWEALTH OF MASSACHUSETTS THE TRIAL COURT SUFFOLK, ss. SUPERIOR COURT DEPARTMENT STANDING ORDER NO. 2-86 (AMENDED) Applicable to All Counties to cases initiated by indictment on or after September

More information

Nebraska Law Enforcement Training Center

Nebraska Law Enforcement Training Center Site Visit Report Description of Training Organization The Nebraska Law Enforcement Training Center (NLETC) provides basic and advanced training to law enforcement officers in the State of Nebraska. The

More information

CELL PHONE LOCATION, PRIVACY AND INTIMATE PARTNER VIOLENCE. by Kaofeng Lee & Erica Olsen *

CELL PHONE LOCATION, PRIVACY AND INTIMATE PARTNER VIOLENCE. by Kaofeng Lee & Erica Olsen * CELL PHONE LOCATION, PRIVACY AND INTIMATE PARTNER VIOLENCE by Kaofeng Lee & Erica Olsen * This article was published in Domestic Violence Report, August/September 2013, Vol. 18, No. 6. Can you hear me

More information

CMPD s Predictive Crime Analytics Implementation. Harold Medlock Deputy Chief Charlotte-Mecklenburg Police Department

CMPD s Predictive Crime Analytics Implementation. Harold Medlock Deputy Chief Charlotte-Mecklenburg Police Department CMPD s Predictive Crime Analytics Implementation Harold Medlock Deputy Chief Charlotte-Mecklenburg Police Department CMPD BI Dashboards & Predictive Crime Analytics Agency Background Information Estimated

More information

Criminal Law. Month Content Skills August. Define the term jurisprudence. Introduction to law. What is law? Explain several reasons for having laws.

Criminal Law. Month Content Skills August. Define the term jurisprudence. Introduction to law. What is law? Explain several reasons for having laws. Criminal Law Month Content Skills August Introduction to law Define the term jurisprudence. What is law? Explain several reasons for having laws. Discuss the relationship between laws and values. Give

More information

LAW ENFORCEMENT OFFICER, GS-1802-05

LAW ENFORCEMENT OFFICER, GS-1802-05 Standard Job No. N1017 LAW ENFORCEMENT OFFICER, GS-1802-05 Introduction The incumbent of this position is responsible for performing full-time law enforcement duties including detection, apprehension,

More information

Bail and Remand The Scottish Executive Action Plan

Bail and Remand The Scottish Executive Action Plan Bail and Remand The Scottish Executive Action Plan The Scottish Executive Action Plan Crown copyright 2005 ISBN: 0-7559-4852-1 Scottish Executive St Andrew's House Edinburgh EH1 3DG Produced for the Scottish

More information

COMMITTEE ON LEGISLATIVE RESEARCH OVERSIGHT DIVISION FISCAL NOTE

COMMITTEE ON LEGISLATIVE RESEARCH OVERSIGHT DIVISION FISCAL NOTE COMMITTEE ON LEGISLATIVE RESEARCH OVERSIGHT DIVISION FISCAL NOTE L.R. No.: 0635-01 Bill No.: SB 429 Subject: Victims of Crime; Attorney General; Highway Patrol; Crimes and Punishment; Department of Health

More information

NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER

NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER CONTENTS Executive summary...2 The digital forensic investigation impasse...3 Lessons from

More information

2002-03 2003-04 2004-05 2005-06 2006-07 2006-07 Increase/ 1100 - General Fund Actual Actual Actual Actual Request Adopted (Decrease)

2002-03 2003-04 2004-05 2005-06 2006-07 2006-07 Increase/ 1100 - General Fund Actual Actual Actual Actual Request Adopted (Decrease) 2002-03 2003-04 2004-05 2005-06 2006-07 2006-07 Increase/ 1100 - General Fund Actual Actual Actual Actual Request Adopted (Decrease) Revenues Other Govt'l Agencies $1,999,165 $1,959,809 $1,764,763 $1,881,808

More information

A SMART CHOICE FOR LAW ENFORCEMENT TODAY

A SMART CHOICE FOR LAW ENFORCEMENT TODAY A SMART CHOICE FOR LAW ENFORCEMENT TODAY Today s Law Enforcement agencies are facing increasing documentation demands in a time when shrinking budgets make it necessary to reduce clerical staff. This results

More information

C RIMINAL LAW O V E RVIEW OF T H E T E XAS C RIMINAL J USTICE P ROCESS

C RIMINAL LAW O V E RVIEW OF T H E T E XAS C RIMINAL J USTICE P ROCESS T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S C RIMINAL LAW 1 0 1 : O V E RVIEW OF T H E T E XAS C RIMINAL J USTICE P ROCESS A C RIMINAL LAW 1 0 1 Prepared

More information

HOW A TYPICAL CRIMINAL CASE IS PROSECUTED IN ALASKA

HOW A TYPICAL CRIMINAL CASE IS PROSECUTED IN ALASKA HOW A TYPICAL CRIMINAL CASE IS PROSECUTED IN ALASKA The Office of Victims Rights receives many inquiries from victims about how a criminal case in Alaska is investigated by police and then prosecuted by

More information

2015 Campus Safety and Security Survey. Screening Questions

2015 Campus Safety and Security Survey. Screening Questions 2015 Campus Safety and Security Survey Institution: La Sierra University-Ontario Campus of Criminal Justice (117627003) Screening Questions Please answer these questions carefully. The answers you provide

More information

COMMUNITY PROTOCOL FOR DOMESTIC VIOLENCE CASES

COMMUNITY PROTOCOL FOR DOMESTIC VIOLENCE CASES COMMUNITY PROTOCOL FOR DOMESTIC VIOLENCE CASES PURPOSE: The County Attorney, Sheriff, Police Chief, Court Service Officer and DV Agency have mutually agreed upon this community protocol to encourage the

More information

Police Officers who Commit Domestic Violence-Related Criminal Offences 1

Police Officers who Commit Domestic Violence-Related Criminal Offences 1 PUBLIC DOCUMENT Association of Chief Police Officers of England, Wales and Northern Ireland Police Officers who Commit Domestic Violence-Related Criminal Offences 1 This is an ACPO policy relating to police

More information

Services. Computer Forensic Investigations

Services. Computer Forensic Investigations DataTriangle, Inc. is uniquely structured to provide you with a high quality expert as expeditiously as possible. Charles Snipes has nearly 15 years of experience with criminal investigations in the areas

More information

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION TITLE GRADE EEO-4 CODE SUPERVISORY CRIMINAL INVESTIGATOR II 43* D 13.241 SUPERVISORY CRIMINAL INVESTIGATOR

More information

District Attorney. FY 14/15 FY 15/16 Adopted CAO 108-2500 Budget Recommended Change

District Attorney. FY 14/15 FY 15/16 Adopted CAO 108-2500 Budget Recommended Change FY 14/15 FY 15/16 Adopted CAO 108-2500 Budget Recommended Change EXPENDITURES Salaries and Benefits 1,875,818 1,911,198 35,380 Services and Supplies 94,213 84,634 (9,579) Other Charges 207,072 141,406

More information

SAMPLE Memorandum of Understanding (MOU) Blueprint for Safety Participating Agencies. Community:

SAMPLE Memorandum of Understanding (MOU) Blueprint for Safety Participating Agencies. Community: SAMPLE Memorandum of Understanding (MOU) Blueprint for Safety Participating Agencies Community: I. Background A. The St. Paul Blueprint for Safety was developed in Saint Paul, MN, in 2010 by the City of

More information

The Well-Rounded Investigator

The Well-Rounded Investigator The Well-Rounded Investigator Defense Investigators Association - Fall 2013 Seminar Biographies of Presenters Honorable Judge Rogelio R. Flores, Santa Barbara County Superior Court, Santa Maria Division

More information

Kroll Ontrack Data Analytics. Forensic analysis and visualization of complex data sets to provide intelligence around investigations

Kroll Ontrack Data Analytics. Forensic analysis and visualization of complex data sets to provide intelligence around investigations Trade Date: 2013-08-14 11:57:00 Sum of Total Value: 287,663,728 Trade Date: 2013-08-14 11:51:00 Trader Name: Susan Wright Sum of Total Value: 443,382,018 Kroll Ontrack Data Analytics Trade Date: 2013-08-14

More information

Victim Witness Assistance Program

Victim Witness Assistance Program Victim Witness Assistance Program of Santa Clara County Kasey Halcón Director Case Study Law enforcement responds to a domestic disturbance. The officer enters the home and a woman is crying on the couch,

More information

Tarrant County College Police Department

Tarrant County College Police Department Tarrant County College Police Department VICTIM ASSISTANCE An Assistance Program for Victims and Family Survivors of Violent Crimes Tarrant County College The Tarrant County College District Police Department

More information

Compensation for Crime Victims

Compensation for Crime Victims Compensation for Crime Victims Compensation for Crime Victims Every state in the country operates a program to help pay for some of the expenses resulting from crimes involving violence or abuse. Victims

More information

Information for Crime Victims and Witnesses

Information for Crime Victims and Witnesses Office of the Attorney General Information for Crime Victims and Witnesses MARCH 2009 LAWRENCE WASDEN Attorney General Criminal Law Division Special Prosecutions Unit Telephone: (208) 332-3096 Fax: (208)

More information

Court, School and Law Enforcement Collaborative Task Force: Guidelines for Schools in Contacting Law Enforcement Appendix A

Court, School and Law Enforcement Collaborative Task Force: Guidelines for Schools in Contacting Law Enforcement Appendix A A: Aggravated Assault Alcohol Armed Robbery Arson, of an occupied structure Arson, of a structure or property(not occupied) Assault B: Bomb Threat Bullying Burglary/ Breaking & Entering (2 nd & 3 rd Degree)

More information

Deputy District Attorney Tammy Spurgeon Orange County District Attorney Office

Deputy District Attorney Tammy Spurgeon Orange County District Attorney Office Deputy District Attorney Tammy Spurgeon Orange County District Attorney Office The prosecution has a duty under the Fourteenth Amendment s due process clause to disclose evidence to a criminal defendant

More information

Chairman Sensenbrenner, Ranking Member Scott and Members of the

Chairman Sensenbrenner, Ranking Member Scott and Members of the Task Force: Chairman Sensenbrenner, Ranking Member Scott and Members of the I am Eric Evenson, a former federal prosecutor. I retired as an Assistant United States Attorney from the Department of Justice

More information

CASE STUDIES. Examples of analytical experiences detecting fraud and abuse with. RiskTracker. Account Activity Analysis System

CASE STUDIES. Examples of analytical experiences detecting fraud and abuse with. RiskTracker. Account Activity Analysis System CASE STUDIES Examples of analytical experiences detecting fraud and abuse with RiskTracker Account Activity Analysis System The following are descriptions of actual situations encountered by BANKDetect

More information

The Art of Trial Advocacy: Integrating Your Theme & Theory Into All Aspects of Your Trial

The Art of Trial Advocacy: Integrating Your Theme & Theory Into All Aspects of Your Trial The Art of Trial Advocacy: Integrating Your Theme & Theory Into All Aspects of Your Trial Saturday, November 5, 2011 Mohawk Valley Community College 9:00 12:00 p.m. Chair: Speaker: Frank J. Nebush, Jr.,

More information

HIRE A SPECIALIST ALWAYS FIGHTING FOR THE ACCUSED

HIRE A SPECIALIST ALWAYS FIGHTING FOR THE ACCUSED HIRE A SPECIALIST I am an experienced Board Certified criminal lawyer in Pasco Florida. Less than one percent of attorneys in Florida are Board Certified. Only Board Certified criminal lawyers are permitted

More information

I would like to request information that would assist me with my chosen subject, this includes:

I would like to request information that would assist me with my chosen subject, this includes: Freedom of Information Request Reference No: I note you seek access to the following information: i am a Middlesex University student currently studying an MA in Youth Justice, Community Safety and Applied

More information

Jail, Warrants and Court Security

Jail, Warrants and Court Security CHAPTER 4 Jail, Warrants and Court Security St. Louis County Sheriff s Office 2 The New Orleans Blueprint for Safety Jail, Warrants and Court Security Jail Booking, Supervision, and Release Training Memos

More information

YOSEMITE REGIONAL OCCUPATIONAL PROGRAM CRIMINAL JUSTICE

YOSEMITE REGIONAL OCCUPATIONAL PROGRAM CRIMINAL JUSTICE CBEDS Code: 5847 YOSEMITE REGIONAL OUPATIONAL PROGRAM IMINAL JUSTICE JOB TITLES DOT NO. Correction Officer 372.667-018 Criminalist 029.261-026 Guard, Security 372.667-034 Police Officer 375.263-014 Probation/Parole

More information

DISTRICT ATTORNEY S OFFICE OCTOBER 1 ST, 2013 2014 BUDGET

DISTRICT ATTORNEY S OFFICE OCTOBER 1 ST, 2013 2014 BUDGET DISTRICT ATTORNEY S OFFICE OCTOBER 1 ST, 2013 2014 BUDGET Denver District Attorney Strategic Overview Mission: To professionally and completely prosecute crimes and investigate potential crimes on behalf

More information

Name of Nominee: Vanessa Snyder. Nominee's Telephone: 305-215-4960. Nominee's Email: vanessa.snyder@usdoj.gov. Name of Nominator: Clayton Solomon

Name of Nominee: Vanessa Snyder. Nominee's Telephone: 305-215-4960. Nominee's Email: vanessa.snyder@usdoj.gov. Name of Nominator: Clayton Solomon The Florida Bar Young Lawyers Division The Lynn Futch Most Productive Young Lawyer Award Nomination Cover Sheet The Lynn Futch Most Productive Young Lawyer Award is given to a young lawyer who is not a

More information

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS ADVANCED CYBER THREAT ANALYTICS POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. Wynyard Advanced Cyber Threat Analytics (ACTA) is a Pro-active Cyber Forensics solution that helps protect organisations

More information

Perry Housing Partnership Transitional Housing Program APPLICATION FOR ADMISSION

Perry Housing Partnership Transitional Housing Program APPLICATION FOR ADMISSION Perry Housing Partnership Transitional Housing Program APPLICATION FOR ADMISSION DATE OF APPLICATION DATE OF INTERVIEW NAME DATE OF BIRTH SS# SPOUSE NAME DATE OF BIRTH SS# CHILDREN: NAME DATE OF BIRTH

More information

CHAPTER. What is Criminal Justice? Criminal Justice: Criminal Justice: Criminal Justice: What is the Definition of Crime?

CHAPTER. What is Criminal Justice? Criminal Justice: Criminal Justice: Criminal Justice: What is the Definition of Crime? CHAPTER What is Criminal Justice? What is the Definition of Crime? Crime: What is Justice? Justice: Social Justice: Civil Justice: The Theme of this Book Individual Rights vs. Public Order The Theme of

More information

A White Paper from AccessData Group. The Future of Mobile E-Discovery

A White Paper from AccessData Group. The Future of Mobile E-Discovery A White Paper from AccessData Group The Future of Mobile E-Discovery Contents 1. The changing landscape of e-discovery 2. New expectations in the courtroom 3. Mobile discovery within corporations 4. MPE+

More information

WHERE WILL MY CRIMINAL CASE BE DEALT WITH AND WHAT HAPPENS?

WHERE WILL MY CRIMINAL CASE BE DEALT WITH AND WHAT HAPPENS? WHERE WILL MY CRIMINAL CASE BE DEALT WITH AND WHAT HAPPENS? This factsheet relates to those who are 18 or over. If you are 17 or under, please see our separate factsheet for the Youth Court. Where will

More information

How To Be A Computer Forensics Examiner

How To Be A Computer Forensics Examiner Richard A. Peacock 410.346.7288 (Office) 443.398.5246 (Cell) rich@realforensicanalysis.com EnCase Certified Examiner (EnCE) Access Data Certified Examiner (ACE) Access Data Mobile Phone Certified Examiner

More information

2015 Campus Safety and Security Survey. Screening Questions. Institution: Main Campus (392354001) User ID: C3923541

2015 Campus Safety and Security Survey. Screening Questions. Institution: Main Campus (392354001) User ID: C3923541 2015 Campus Safety and Security Survey Institution: Main Campus (392354001) Screening Questions Please answer these questions carefully. The answers you provide will determine which screens you will be

More information

How To Become A District Attorney In Texas

How To Become A District Attorney In Texas PROFESSIONAL EXPERIENCE 2013-Present 79th Judicial District Attorney s Office Jim Wells and Brooks Counties, Texas District Attorney. Duties include the administration of 16 full-time employees including

More information

A White Paper from AccessData Group. The Future of Mobile E-Discovery

A White Paper from AccessData Group. The Future of Mobile E-Discovery A White Paper from AccessData Group The Future of Mobile E-Discovery Contents 1. The changing landscape of e-discovery 2. New expectations in the courtroom 3. Mobile discovery within corporations 4. MPE+

More information

JURY QUESTIONNAIRE [PLEASE PRINT]

JURY QUESTIONNAIRE [PLEASE PRINT] JURY QUESTIONNAIRE [PLEASE PRINT] BACKGROUND INFORMATION Full name: Date of birth: Any other names you have used: City/Area of residence: Place of birth: Are you a citizen of the United States? Yes No

More information

Greenwood County, SC Job Description

Greenwood County, SC Job Description General Description The purpose of this class within the organization is to perform general law enforcement duties; ensures the strict enforcement of state and local laws relating to public safety and

More information

INSTRUCTIONS FOR COMPLETING THE U VISA CERTIFICATION FORM

INSTRUCTIONS FOR COMPLETING THE U VISA CERTIFICATION FORM INSTRUCTIONS FOR COMPLETING THE U VISA CERTIFICATION FORM Overview of the U Visa In October 2000, Congress passed the Victims of Trafficking and Violence Protection Act (the Act). As part of this Act,

More information