Advertisement

Identifying Suspects

  • Jason Roach
  • Ken Pease
Chapter
  • 136 Downloads
Part of the Crime Prevention and Security Management book series (CPSM)

Abstract

The chapter title is easily comprehensible and will not occasion surprise. We think it should. Under SSP, the title would be something like ‘Identifying Flag Offences’. Choosing a person as the starting point of an investigation has all kinds of drawbacks, such as the ever-present danger of actual or claimed harassment. Think of the controversy which surrounds the use of police power to stop and search someone. By exercising that power, a police officer is implicitly saying something about the person to be searched. If an event rather than a person is the trigger, the problems are much reduced. If, for example, a person has defaulted on the payment of a fine, the person has selected him or herself for legitimate police attention. Under circumstances which we will elaborate in the following chapters, using minor offences rather than who the perpetrators are, can be regarded as transgressors volunteering for police attention.The fine defaulter above has less reason to feel aggrieved than the person searched.

Keywords

Fine Defaulters Ever-present Danger Offender Profiling National Intelligence Model Current Police Methods 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Ainsworth, P.B. (2001). Offender Profiling and Crime Analysis, Cullompton: Willan Publishing.Google Scholar
  2. Alison, L.J., McLean, C. and Almond, L. (2007). Profiling Suspects, in T. Newburn, T. Williamson, and A. Wright (eds.) Handbook of Criminal Investigation. Cullompton: Willan Publishing, 493–516.Google Scholar
  3. Alison, L.J. (2005). From trait based profiling to psychological contributions to apprehension methods, in L. Alison (ed.) The Forensic Psychologists Casebook: Psychological Profiling and Criminal Investigation. Cullompton: Willan.Google Scholar
  4. Bichard, M. (2004). The Bichard Enquiry Report, London: House of Commons Stationary Office. Also found at http://dera.ioe.ac.uk/6394/1/report.pdf (accessed 5th January, 2016).
  5. Blumstein, A., Cohen, J., Roth, J. A., and Visher, C.A. (1986). Criminal Careers and Career Criminals, Washington DC: National Academy Press.Google Scholar
  6. Bouhana, N. (2004). Profiling Arson. Unpublished PhD. thesis, Institute of Criminology, University of Cambridge.Google Scholar
  7. Byford, L. (1981). Sir Lawrence Byford Report into the police handling of the Yorkshire Ripper case. London: Home Office. Also found at https://www.gov.uk/government/publications/sir-lawrence-byford-report-into-the-police-handling-of-the-yorkshire-ripper-case (accessed 5th January, 2016).
  8. Chenery, S, Henshaw, C. and Pease, K. (1999). Illegal Parking in Disabled Bays: A Means of Offender Targeting, Policing and Reducing Crime Briefing Note 1/99. London: Home Office.Google Scholar
  9. Clarke, R.V.G. (1997) (ed.) Situational Crime Prevention: Successful Studies (2nd edition), Albany, NY: Harrow and Heston.Google Scholar
  10. Cope, N. (2003). Crime analysis principles and Practice, in T. Newburn (ed.) Handbook of Policing. Cullompton: Willan Publishing, 404–430.Google Scholar
  11. Gudjonsson, G. and Copson, G. (1997). The role of the expert in criminal investigation, in J. Jackson and D. Bekerian (eds.) Offender Profiling: Theory Research and Practice, Chichester: Wiley.Google Scholar
  12. Her Majesty’s Inspectorate of Constabulary. (1997). Policing with Intelligence: Criminal Intelligence. London: Home Office.Google Scholar
  13. Home Office. (2004). Prolific and Other Priority Offender Strategy: Initial Guidance: Catch and Convict Framework. London: Home Office.Google Scholar
  14. Innes, M. (2003).Investigating Murder: Detective Work and the Police Response to Criminal Homicide. Oxford: Clarendon Press.CrossRefGoogle Scholar
  15. Innes, M. (2007). Investigation order and major crime inquiries, in, T. Newburn, T. Williamson, and A. Wright (eds.) Handbook of Criminal Investigation. Cullompton: Willan Publishing, 255–75.Google Scholar
  16. Innes, M., Fielding, N. and Cope, N. (2005). The appliance of science? The theory and practice of crime intelligence analysis, British Journal of Criminology, 45, 39–57.CrossRefGoogle Scholar
  17. John, T. and Maguire, M. (2003). Rolling out the National Intelligence Model: Key challenges, in, K. Bullock and N. Tilley (eds.) Crime Reduction and Problem-Orientated Policing. Cullompton: Willan Publishing.Google Scholar
  18. John, T. and Maguire, M. (2004). The National Intelligence Model: Early Implementation Experience in Three Police Force Areas. Cardiff University Working Paper Series 50.Google Scholar
  19. John, T. and Maguire, M. (2007). Criminal intelligence and the National Intelligence Model, in, T. Newburn, T. Williamson, T. and A. Wright (eds.) Handbook of Criminal Investigation. Cullompton: Willan Publishing, 199–225.Google Scholar
  20. Maguire, M. (2003). Criminal Investigation and crime control, in T. Newburn (ed.) Handbook of Policing. Cullompton: Willan Publishing.Google Scholar
  21. Maguire, M. (2008). Criminal investigation and crime control, in, T. Newburn (ed.) Handbook of Policing (Second Edition). Cullompton: Willan Publishing.Google Scholar
  22. Matza, D. (1969). Becoming Deviant. Englewood Cliffs, N.J: Prentice Hall.Google Scholar
  23. McConville, M., Sanders, A., and Leng, R. (1991). The Case for the Prosecution. London: Routledge.Google Scholar
  24. Mokros, A. and Alison, L. (2002). Is profiling possible? Testing the predicted homology of crime scene actions and background characteristics in a sample of rapists, Legal and Criminological Psychology, 7, 25–43.CrossRefGoogle Scholar
  25. Newburn, T. (2007). Criminology. Cullompton: Willan Publishing.Google Scholar
  26. Ratcliffe, J. (2008). Intelligence-Led Policing. Cullompton: Willan Publishing.Google Scholar
  27. Rossmo, D.K. (2009) (ed.) Criminal Investigative Failures, Baton Rouge: CRC Press.Google Scholar
  28. Salfati, G. and Bateman, A. (2005). Serial homicide: An investigation of behavioural consistency, Journal of Investigative Psychology and Offender Profiling, 2, 121–44.CrossRefGoogle Scholar
  29. Stelfox, P. and Pease, K. (2005). Cognition and detection: reluctant bedfellows? In Smith, M. J. and Tilley, N. (2003). Community policing, problem-orientated policing and intelligence-led policing, in T. Newburn (ed.) Handbook of Policing, Cullompton: Willan Publishing.Google Scholar
  30. Townsley, M. and Pease, K. (2002). How efficiently can we target prolific offenders? International Journal of Police Science and Management, 4 (4) 323–331.CrossRefGoogle Scholar
  31. Townsley, M. and Pease, K. (2003). Two go wild in Knowsley: Analysis for evidence-led crime reduction, in, K. Bullock and N. Tilley (eds.) Problem-Orientated Policing. Cullompton: Willan Publishing. Tilley, N. (2005). Crime Science: New Approaches to Preventing anbd Detecting Crime. Cullompton: Willan Publishing.Google Scholar
  32. Woodhams, J., Hollin, C.R. and Bull, R. (2007). The psychology of linking crimes: a review of the evidence. Legal and Criminological Psychology (2007), Vol. 12, 233–249.Google Scholar

Copyright information

© The Author(s) 2016

Authors and Affiliations

  • Jason Roach
    • 1
  • Ken Pease
    • 2
  1. 1.University of HuddersfieldHuddersfieldUK
  2. 2.University College LondonLondonUK

Personalised recommendations