Verified Document

Fingerprinting Scenario The Writer Of This Work Research Paper

Related Topics:

Fingerprinting Scenario

The writer of this work assumes the position of Crime Scene Investigator who is responding to a homicide scene at a convenience store/gas station at 3:00 A.M. Upon first arriving the officer who first responded at the scene relates information that there was an additiaonl employee present during the incident in addition to a mother and her 15-year-old son who are both witnesses to the crime. There is a deceased victim with a gunshot wound in the chest. The responsibility fo the Crime Scene Invesetigator includes latent print work and other related tasks.

Upon arrival to the sceneit is noted that the scene was secured prior to the arrival of the Crime Scene Investigator. In additional all crime scene integrity precautions and procedures are in place and the crime scene photographer has taken all necessary on-scene photographs for you. All sketches and measurements...

Other visible items include the following:
(1) Paper "Quick Pick" Lottery Ticket on counter with a blood-like impression on it;

(2) A blue steel .38 caliber revolver with reddish-brown spots and two hair-like fibers on it on the floor by the ice cream cooler;

(3) A ripped open cardboard carton on the floor in front of the counter;

(4) A crude map and directions to the store drawn/written in pencil on a piece of notebook paper on the floor;

(5) A typical cardboard six pack container of cold beer (bottles) on the floor near the beer cooler

(6) One spent bullet embedded in the wall behind the counter

(7) Spilled cigar box of $20 bills on the floor next to the deceased

(8) Fresh-looking cigarette butt only half smoked outside the store in a parking space near the entry to…

Sources used in this document:
Bibliography

Crime Scene Procedures (2012) National Forensic Science Technology Center. Retrieved from: http://projects.nfstc.org/property_crimes/Crime_Scene_Procedures_III.pdf

Crime-Scene Investigation and Evidence Collection (nd) Chapter 2. Retrieved from: http://www.cengagesites.com/academic/assets/sites/4827/bertino_chapter2.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Law Comm. Tech Innovations in Database Communication
Words: 1963 Length: 7 Document Type: Essay

Law comm. tech Innovations in Database Communication Technologies for Law Enforcement The proliferation of computer, digital and web technology have all had a significant impact on how civil and public administration functions are performed. The ability to engage in real-time communication through an array of media, the opportunity to access enormous databases of information from the field and the capacity to capture sound, video, photo and other data all have enhanced productivity,

Computer Systems Are Increasingly Being Used to
Words: 1916 Length: 6 Document Type: Essay

computer systems are increasingly being used to cause widespread damage, with nation-states or individuals sponsored by nation-states making use of malicious codes to compromise 'enemy' information systems. In essence, cyber warfare has got to do with the attack on the information networks, computers, or infrastructure of another entity by an international organization or nation-state. In the context of this discussion, cyber war will be taken as the utilization of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now