Where Can Buy Criminal Investigation 12th Edition Kären M. Hess Ebook With Cheap Price
Where Can Buy Criminal Investigation 12th Edition Kären M. Hess Ebook With Cheap Price
com
https://ebookmass.com/product/criminal-
investigation-12th-edition-karen-m-hess/
https://ebookmass.com/product/criminal-investigation-12th-edition-
ebook-pdf/
ebookmass.com
https://ebookmass.com/product/criminal-investigation-12th-edition-
edition-charles-r-swanson/
ebookmass.com
https://ebookmass.com/product/criminal-investigation-ebook/
ebookmass.com
https://ebookmass.com/product/criminal-investigation-11th-edition-pdf-
etextbook/
ebookmass.com
Criminal Investigation 5th Edition, (Ebook PDF)
https://ebookmass.com/product/criminal-investigation-5th-edition-
ebook-pdf/
ebookmass.com
https://ebookmass.com/product/criminal-investigation-11th-edition-
ebook-pdf-version/
ebookmass.com
https://ebookmass.com/product/criminal-procedure-investigation-aspen-
casebook-series-3rd-edition-ebook-pdf/
ebookmass.com
https://ebookmass.com/product/criminal-investigation-justice-series-
the-justice-series-3rd-edition-ebook-pdf-version/
ebookmass.com
https://ebookmass.com/product/criminal-investigation-the-art-and-the-
science-8th-edition-ebook-pdf-version/
ebookmass.com
Copyright 2022 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
T w e l f th
Ed i t i o n
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
This is an electronic version of the print textbook. Due to electronic rights restrictions,
some third party content may be suppressed. Editorial review has deemed that any suppressed
content does not materially affect the overall learning experience. The publisher reserves the right
to remove content from this title at any time if subsequent rights restrictions require it. For
valuable information on pricing, previous editions, changes to current editions, and alternate
formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for
materials in your areas of interest.
Important Notice: Media content referenced within the product description or the product
text may not be available in the eBook version.
Copyright 2022 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Criminal Investigation, Twelfth Edition © 2023, 2017, 2013 Cengage Learning, Inc.
Christine Hess Orthmann, ALL RIGHTS RESERVED. No part of this work covered by the copyright
Kären Matison Hess, Henry Lim Cho, herein may be reproduced or distributed in any form or by any
and Jennifer Molan Cho means, except as permitted by U.S. copyright law, without the prior
SVP, Higher Education Product written permission of the copyright owner.
Management: Erin Joyner Unless otherwise noted, all content is © Cengage Learning, Inc.
VP, Product Management, Learning The names of all products mentioned herein are used for
Experiences: Thais Alencar identification purposes only and may be trademarks or registered
Product Director: Jason Fremder trademarks of their respective owners. Cengage Learning disclaims
Product Manager: Michael W. Worls any affiliation, association, connection with, sponsorship, or
endorsement by such owners.
Product Assistant: Martina Grant
Learning Designer: Natalie Goforth
For product information and technology assistance, contact us at
Senior Content Manager: Betty L. Dickson Cengage Customer & Sales Support, 1-800-354-9706
Digital Delivery Quality Partner: or support.cengage.com.
Andy Baker For permission to use material from this text or product,
submit all requests online at www.cengage.com.
Director, Product Marketing: Neena Bali
Product Marketing Manager:
Ian A. Hamilton Library of Congress Control Number: 2021946267
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Brief Contents
Section 1 Introduction 2
Chapter 1 Criminal Investigation: An Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
iii
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Section 5 Other Challenges to the Criminal Investigator 590
Chapter 17 Computer Crime and Digital Evidence. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592
Chapter 18 A Dual Threat: Drug-Related Crime and Organized Crime. . . . . . . . . . . . . . . . . . . . . . . . . 638
Chapter 19 Criminal Gangs and Other Dangerous Groups.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686
Chapter 20 Terrorism, Extremism, and Homeland Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 724
Chapter 21 Preparing for and Presenting Cases in Court. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 762
Appendixes 786
Appendix A Sudden In-Custody Death: An Investigator’s Checklist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 786
Appendix B Death Scene Record. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 789
Appendix C Washington, DC, Metropolitan Police Department Homicide Case Review
Solvability Chart. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ����������������������������� 792
Appendix D Las Vegas Metropolitan Police Department Cold Case Solvability Criteria. . . . 794
Appendix E Domestic Violence Report Review Checklist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795
Appendix F Law Enforcement Request Letter for Identity Theft Investigations. . . . . . . . . . . . . . 797
Appendix G Sample Form for Reporting Bias Crime.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 798
Glossary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 800
Author Index.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 816
Subject Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821
iv
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Visit https://ebookmass.com
now to explore a rich
collection of eBooks and enjoy
exciting offers!
Errors to Avoid | 55 Common Problems with Many Police Reports | 80
Types of Investigative Photography | 55 The Well-Written Report: From Start to Finish | 81
Surveillance Photography | 55 Organizing Information | 81
Aerial Photography | 56 Structuring the Narrative | 81
Night Photography | 58 Characteristics of Effective Reports: Content
Laboratory Photography | 58 and Form | 84
Mug Shots | 58 Recording and Dictating Reports | 92
Lineup Photographs | 58
Computerized Report Writing | 92
Identifying, Filing, and Maintaining Security of
Evaluating Your Report | 93
Evidence | 59
Identifying | 59 Citizen Online Report Writing | 93
Filing | 59 The Final Report | 94
Maintaining Security | 59 A Final Note on the Importance of Well-Written
Admissibility of Photographs in Court | 59 Reports | 95
Crime Scene Sketches: An Overview | 60 Summary | 98
The Rough Sketch | 61 Can You Define? | 98
Sketching Materials | 61 Checklist | 98
Steps in Sketching the Crime Scene | 61 References | 99
Step One: Observe and Plan | 61 Cases Cited | 99
Step Two: Measure Distances and Outline the Area | 62
Step Three: Plot Objects and Evidence | 63
Step Four: Take Notes and Record Details | 65
Chapter 4
Step Five: Identify the Scene | 65 Searches 100
Step Six: Reassess the Sketch | 65
Introduction | 101
Filing the Sketch | 67
The Fourth Amendment: An Overview of Search and
The Finished Scale Drawing | 67 Seizure | 102
Computer-Assisted Drawing | 68 Reasonableness | 102
Admissibility of Sketches and Drawings in Court | 70 Probable Cause | 103
Summary | 71 Legal Searches | 104
Can You Define? | 71 Search with a Warrant | 105
Checklists | 71 Search with Consent | 107
Patdown or Frisk during a “Stop” | 110
References | 73
Search Incident to Arrest | 111
Case Cited | 73 Warrantless Searches of Moveable Vehicles | 113
Search When an Emergency or Exigent Circumstance
Chapter 3 Exists | 115
Writing Effective Reports 74 Point-of-Entry Searches | 117
Plain-Sense Evidence | 118
Introduction | 75 Open Fields, Abandoned Property, and Public Places | 118
The Importance of Reports | 78 The Exclusionary Rule | 120
Uses of Reports | 79 The Inevitable Discovery Exception | 120
The Audience | 80 The Good Faith Exception | 120
vi
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
The Crime Scene Search | 121 Language Analysis | 164
Building Searches | 125 Human DNA Profiling | 164
Vehicle Searches | 126 Skin-Associated Chemical Signatures | 172
Suspect Searches | 127 Blood and Other Body Fluids | 172
Dead Body Searches | 129 Scent | 174
Underwater Searches | 129 Hairs and Fibers | 174
Use of Dogs in a Search | 129 Shoe and Tire Prints and Impressions | 175
Use of Technology in a Search | 130 Teeth, Bite Marks, and Lip Prints | 177
Tools and Tool Marks | 178
Search Warrant Checklist | 132
Firearms and Ammunition | 180
A Reminder | 133 Glass | 181
Summary | 133 Soils and Minerals | 183
Can You Define? | 134 Safe Insulation | 184
Checklist | 135 Ropes, Strings, and Tapes | 184
References | 135 Drugs | 185
Documents | 185
Cases Cited | 135
Laundry and Dry-Cleaning Marks | 187
Paint | 187
Chapter 5 Wood | 187
Forensics and Physical Evidence 138 Skeletal Remains | 187
Digital Evidence | 188
Introduction | 139 Weapons of Mass Destruction | 189
Definitions | 141 Other Types of Evidence | 190
Crime Scene Investigators | 142 Evidence Handling and Infectious Disease | 190
Investigative Equipment | 143 Summary | 191
Selecting Equipment | 145 Can You Define? | 192
Equipment Containers | 145t
Checklist | 192
Transporting Equipment | 145
Training in Equipment Use | 146 References | 194
Crime Scene Integrity and Contamination of Cases Cited | 197
Evidence | 146 Additional Resource | 197
Processing Evidence: Maintaining the Chain of Custody
from Discovery to Disposal | 147 Chapter 6
Discovering or Recognizing Evidence | 147 Obtaining Information and Intelligence 198
Marking, Identifying, and Collecting Evidence | 148
Packaging and Preserving Evidence | 149 Introduction | 199
Transporting Evidence | 150 Sources of Information | 201
Protecting, Storing, and Managing Evidence | 150 Reports, Records, and Databases | 202
Exhibiting Evidence in Court | 155 The Internet | 203
Final Disposition of Evidence | 155 Victims, Complainants, and Witnesses | 203
Frequently Examined Evidence | 156 Informants | 205
Fingerprints | 157 Suspects | 206
Voiceprints | 163
vii
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Investigative Questioning to Obtain Information: The Using Criminal Profilers | 231
Basics | 206 Information versus Intelligence | 231
Characteristics of an Effective Interviewer
Sharing Information and Intelligence | 232
/Interrogator | 206
Enhancing Communication | 207
Summary | 234
Barriers to Communication | 207 Can You Define? | 235
General Guidelines for Effective Questioning | 208 Checklist | 235
Specific Questioning Techniques | 210 References | 235
The Cognitive Approach | 211 Cases Cited | 238
Recording and Videotaping Interviews and
Interrogations | 212
Chapter 7
The Interview | 213
Advance Planning | 214
Identifying and Arresting Suspects 240
Selecting the Time and Place | 214 Introduction | 241
Beginning the Interview | 214
Identifying Suspects at the Scene | 243
Establishing Rapport | 214
Identification by Driver’s License | 243
Networking an Interview | 214
Biometric Identification | 244
Testimonial Hearsay | 215
Field or Show-Up Identification | 244
Statements | 215
Closing the Interview | 216
Developing Suspects | 245
Victims and Witnesses | 245
The Interrogation | 216 Modus Operandi Information | 246
The Miranda Warning | 216
Psychological or Criminal Profiling | 247
The “Question First” or “Beachheading” Technique | 219
Racial Profiling | 249
The Interplay of the Fourth and Fifth Amendments | 219
Geographic Profiling | 250
Right to Counsel under the Fifth and Sixth
Information in Police Files and Files of Other
Amendments | 220
Agencies | 250
Foreign Nationals, the Vienna Convention Treaty, and
Tracking | 251
Diplomatic Immunity | 221
Other Identification Aids | 251
Selecting the Time and Place | 221
Starting the Interrogation | 221
Locating Suspects | 251
Establishing Rapport | 222 Identifying Suspects | 252
Approaches to Interrogation | 222 Field Views | 252
Using Persuasion during Interrogation | 223 Photographic Identification | 252
Ethics and the Use of Deception | 224 Live Lineup Identification | 254
Third-Degree Tactics | 225 Special Investigative Techniques Used to Identify and
Admissions and Confessions | 225 Arrest Suspects | 256
Questioning Children and Juveniles | 227 Surveillance | 256
Undercover Assignments | 263
Evaluating and Corroborating Information | 228
Raids | 266
Scientific Aids to Obtaining and Evaluating
Legal Arrests | 267
Information | 229
Residential Entry after Outdoors Arrest | 269
The Polygraph and Voice Stress Tests | 229
Arresting a Group of Companions | 270
Hypnosis and Truth Serums | 230
Off-Duty Arrests | 270
viii
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Avoiding Civil Liability When Making Arrests | 270 Preliminary Investigation of Homicide | 301
Wrongful Arrest | 270 Determining that Death has Occurred | 302
Use of Force | 271 Securing and Documenting the Scene | 303
Less-Lethal Weapons | 273 Collecting and Moving the Body | 303
Use of Deadly Force | 275 The Focus of the Homicide Investigation | 303
Use-of-Force Reports | 278 The Homicide Victim | 304
Summary | 279 Discovering the Victim | 305
Can You Define? | 280 Identifying the Victim | 305
Checklists | 280 Estimating the Time of Death (ToD) | 306
References | 281 Recent Death | 307
Death that Occurred One-Half Hour to Four
Cases Cited | 284
Days Prior | 308
Many Days after Death | 310
Effects of Water | 311
Section 3 Investigating Violent Factors Suggesting a Change in the Victim’s Routine | 312
Crimes 286 The Medical Examination or Autopsy | 312
Exhuming a Body for Medical Examination | 313
Chapter 8 Unnatural Causes of Death and Method Used | 313
Gunshot Wounds | 313
Death Investigations 290 Stabbing and Cutting Wounds | 314
Introduction | 291 Blows from Blunt Objects | 315
Manners of Deaths | 292 Asphyxia | 315
Natural Causes | 292 Poisoning | 318
Accidental Deaths | 292 Burning | 319
Suicide | 293 Explosions, Electrocution, and Lightning | 319
Homicide | 293 Drugs | 320
Undetermined | 294 Vehicles | 320
Elements of the Crime | 295 Witnesses | 322
Causing the Death of Another Person | 295 Suspects | 322
Premeditation | 295 Mass Murderers | 323
Intent to Effect the Death of Another Person | 296 Serial Killers | 324
Adequately Provoked Intent Resulting from Heat of Lust Murderers | 325
Passion | 296 Clearing a Homicide | 325
While Committing or Attempting to Commit a Felony | 296 The Declining Clearance Rate for Homicide | 326
While Committing or Attempting to Commit a Crime Not a Aspects of the Offense Associated with Likelihood of
Felony | 296 Clearing a Case | 326
Culpable Negligence or Depravity | 296 Law Enforcement Actions Affecting Clearance | 327
Negligence | 296 The 10 Most Common Errors in Death Investigations | 327
Challenges in Investigation | 297 Impact of Unsolved Homicides | 328
Equivocal Death | 297 Cold Cases | 328
Suicide | 299 Volunteer Cold Case Squads | 329
Suicide by Police | 300 Benefits of a Cold Case Unit | 330
Suicide of Police Officers | 300 Death Notification | 330
ix
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Strategies for Reducing Homicide | 331 Investigating Stalking | 357
A Case Study | 331 Types of Stalking | 358
Summary | 332 Cyberstalking | 358
Cyberbullying | 358
Can You Define? | 333
Legislation and Department Policies | 359
Checklist | 334 The Police Response | 359
Applications | 334 Investigating Elder Abuse | 363
References | 335 Types of Elder Abuse | 364
Cases Cited | 337 Prevalence and Nature of Elder Abuse | 364
Risk Factors for Elder Abuse | 365
Chapter 9 The Police Response | 365
Elder Abuse in Long-Term Care Facilities | 370
Assault, Domestic Violence, Stalking, and Elder Reducing Elder Abuse | 370
Abuse 338 Summary | 371
Introduction | 339 Can You Define? | 371
Assault: An Overview | 340 Checklist | 372
Classification | 341 Application | 372
Legal Force | 341 References | 373
Elements of the Crime | 341 Cases Cited | 376
Simple Assault | 341
Aggravated Assault | 342 Chapter 10
Attempted Assault | 342
Sex Offenses 378
Special Challenges in Investigation | 343
The Preliminary Investigation | 343 Introduction | 379
Proving the Elements of Assault | 343 Investigating Obscene Telephone Calls and Texts | 380
Evidence in Assault Investigations | 344 Investigating Prostitution | 381
Investigating Domestic Violence | 344 Investigating Human Trafficking | 382
The Cycle of Violence | 348 Trafficking versus Smuggling | 385
Victimology | 348 Victimology | 385
Women as Abusers | 349 Challenges to Investigation | 386
Same-Sex Domestic Violence | 350 Interviewing Survivors of Human Trafficking | 388
When the Abuser Is a Police Officer | 350 Developing an Effective Response to Human
Types of Weapons Used | 351 Trafficking | 388
Predictors and Precipitators of Domestic Violence | 351
Classification of Sex Offenses | 388
The Police Response | 352
Evidence in Domestic Violence Cases | 352
Rape/Sexual Assault | 389
Elements of the Crime of Rape | 391
To Arrest or Not? | 353
Challenges to Investigation | 391
Police Nonresponse | 354
Effectiveness of Various Interventions | 355 The Police Response | 391
Restraining Orders | 356 Information to Obtain | 392
Legislation | 356 Physical Evidence | 393
Avoiding Lawsuits | 356 Investigating Date Rape | 393
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
The Victim’s Medical Examination | 395 Case Processing | 418
Blind Reporting | 396 Challenges in Investigating Child Maltreatment
Interviewing the Victim | 397 Cases | 418
Establishing the Behavioral Profile in Sex Offense Protecting the Child | 419
Cases | 399 The Need to Involve Other Agencies: The Multidisciplinary
Ending the Victim Interview | 400 Team Approach | 419
Difficulty in Interviewing Children | 420
Follow-Up Investigation | 400
Credibility Concerns | 420
Interviewing Witnesses | 400
The Initial Report | 420
Sex Offenders | 400
The Significance of Fantasy in Sexual Assaults | 400
The Police Response | 421
Interviewing Abused Children | 421
Taking a Suspect into Custody and Interrogation | 401 Sample Protocol | 424
Coordination with Other Agencies | 402 Evidence | 424
Prosecution of Rape and Statutory Charges | 402 Neglect Indicators | 425
False Reports | 403 Emotional Abuse Indicators | 425
Civil Commitment of Sex Offenders after Sentences Physical Abuse Indicators | 425
Served | 403 Sexual Abuse Indicators | 426
Sex Offender Registry and Notification | 404 The Child Abuse Suspect | 426
Summary | 405 The Parent as Suspect | 426
Can You Define? | 406 Child/Peer Suspects | 430
Checklist | 406 The Nonparent Suspect | 431
The Pedophile | 431
Application | 407
Child Sexual Abuse Rings | 431
References | 407 Ritualistic Abuse by Cults | 432
Cases Cited | 409 Juvenile Sex Offenders | 433
Victimology | 433
Chapter 11 Commercial Sexual Exploitation of Children | 433
Crimes against Children 410 Pornography | 434
Sextortion and Livestreaming of Child Sexual Abuse | 435
Introduction | 411 Commercial Sex Trafficking and Prostitution of
Maltreatment of Children: Neglect and Abuse | 413 Children | 435
Neglect | 413 Child Sex Tourism | 436
Physical Abuse | 414 Sex Offender Registry Violations | 437
Emotional Abuse | 414 Online Child Sexual Abuse | 437
Sexual Abuse | 414 Models to Combat Child Sexual Exploitation | 439
The Extent of the Problem | 415 Federal Initiatives to Protect Children Online | 439
Youth as Victims of Violent Crime | 415 International Initiatives | 440
The Effects of Child Abuse and Neglect | 416 Sex Offender Reactions to Being Caught | 440
Risk Factors for Child Maltreatment | 416 Missing Children: Runaway or Abducted? | 441
Child Abuse and Neglect Laws | 417 Runaway and Thrownaway Children | 441
Federal Legislation | 417 Abducted Children | 442
State Laws | 418 Investigating a Missing-Child Report | 443
xi
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
The AMBER Alert Plan | 445 The Complete Investigation | 469
A Child Abduction Response Team | 446 Identifying the Suspect | 470
Additional Resources Available | 446 Establishing the Modus Operandi | 470
Children as Witnesses in Court | 446 Physical Evidence | 471
Preventing Crimes against Children | 447 Mapping Robbery | 471
Summary | 448 False Robbery Reports | 471
Can You Define? | 448 Summary | 472
Checklist | 448 Can You Define? | 472
Applications | 449 Checklist | 472
References | 450 Application | 473
Cases Cited | 453 References | 474
Chapter 12
Robbery 454 Section 4 Investigating Crimes
against Property 476
Introduction | 455
Robbery: An Overview | 457
Chapter 13
Classification | 458
Residential Robberies | 458
Burglary 480
Commercial Robberies | 459 Introduction | 481
Street Robberies | 459 Burglary versus Robbery | 483
Vehicle-Driver Robberies | 460
Classification | 483
Carjacking | 460
Residential Burglaries | 483
Bank Robbery | 462
Burglary at Single-Family House Construction Sites | 484
Robberies at ATMs | 464
Commercial Burglaries | 484
Robbery versus Burglary versus Larceny | 464
Elements of the Crime: Burglary | 484
Elements of the Crime: Robbery | 464 Entering a Structure | 485
Wrongful Taking of Personal Property | 465 Without the Consent of the Person in Possession | 485
From the Person or in the Presence of the Person | 465 With Intent to Commit a Crime | 485
Against the Person’s Will by Use of Force or Threat of Additional Elements | 485
Force | 465
Establishing the Severity of the Burglary | 486
Responding to a Robbery-in-Progress Call | 465
Elements of the Crime: Possession of Burglary Tools | 486
Hostage Situations | 466
The Burglar | 487
The Preliminary Investigation and Special
Challenges | 468 Responding to a Burglary Call | 487
False Burglar Alarms | 487
Proving the Elements of the Offense | 468
Was Personal Property Wrongfully Taken? | 468 The Preliminary Investigation | 488
Was Property Taken from the Person or in the Person’s Preliminary Investigation of Residential Burglaries | 488
Presence? | 469 Preliminary Investigation of Commercial Burglaries | 489
Against the Person’s Will by Force or the Threat Fake Burglaries | 489
of Force? | 469 Determining Entry into Structures | 489
Determining Entry into Safes and Vaults | 490
xii
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Visit https://ebookmass.com
now to explore a rich
collection of eBooks and enjoy
exciting offers!
Obtaining Physical Evidence | 491 Fish and Wildlife Theft | 514
Modus Operandi Factors | 492 Cargo Theft | 515
Effective Case Management | 492 Proving the Elements of the Crime of Larceny/Theft | 516
Recovering Stolen Property | 493 Fraud | 516
Elements of the Crime: Receiving Stolen Goods | 494 Confidence Games | 517
Sting Operations | 494 Real Estate and Mortgage Fraud | 518
Insurance Fraud | 519
Preventing Burglary | 494
Health Care Fraud | 519
Summary | 496 Mass Marketing Fraud | 520
Can You Define? | 496 Mail Fraud | 520
Checklist | 496 Counterfeiting | 521
Application | 497 Check Fraud | 521
References | 497 Debit and Credit Card Fraud | 522
Identify Theft and Fraud | 524
White-Collar Crime | 528
Chapter 14
Corporate Fraud | 530
Larceny/Theft, Fraud, and White-Collar Crime 500 Money Laundering | 530
Introduction | 501 Embezzlement | 531
Environmental Crime | 532
Larceny/Theft: An Overview | 502
A Final Note about Jurisdiction | 535
Classification of Larceny/Theft | 502
Summary | 535
Elements of the Crime: Larceny/Theft | 503
Felonious Stealing, Taking, Carrying, Leading, or Driving Can You Define? | 536
Away | 503 Checklist | 536
The Personal Goods, Property, or Services of Application | 537
Another | 503 References | 537
Of a Value Above or Below a Specified Amount | 503
With the Intent to Permanently Deprive the Owner of the Chapter 15
Property or Goods | 503
Found Property | 504
Motor Vehicle Theft 540
The Preliminary Investigation | 504 Introduction | 541
Types of Larceny/Theft | 504 Motor Vehicle Identification | 543
Pickpockets and Purse Snatchers | 505 Classification of Motor Vehicle Theft | 544
Cell Phone Theft | 505 Joyriding | 544
Bicycle Theft | 506 Transportation | 544
Theft from Motor Vehicles | 506 Commission of Another Crime | 544
Mail Theft | 507 Gang Initiation | 545
Retail Shrinkage: Employee Theft, Shoplifting, and Stripping for Parts and Accessories | 545
Organized Retail Crime | 508 Reselling | 546
Jewelry Theft | 511 Elements of the Crime: Unauthorized Use of a Motor
Art Theft | 511 Vehicle | 546
Numismatic Theft: Coins, Metals, and Paper Money | 512 Intentionally Taking or Driving Away | 546
Agricultural Theft | 513 A Motor Vehicle | 546
xiii
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Without the Consent of the Owner or the Owner’s Willful, Malicious Burning of a Building or Property | 566
Authorized Agent | 547 Of Another, or of One’s Own to Defraud | 566
Interstate Transportation | 547 Or Aiding, Counseling, or Procuring the Burning | 566
Motor Vehicle Embezzlement | 547 Additional Elements That May Need to Be Proven | 566
The Preliminary Investigation | 548 Elements of the Crime of Arson under the Model Penal
Code, Section 220.1 | 566
Insurance Fraud | 548
Elements of Attempted Arson | 567
Vehicle Cloning | 549 Setting Negligent Fires | 567
Cooperating Agencies in Motor Vehicle Theft | 549 Failing to Control or Report Dangerous Fire | 567
Recognizing a Stolen Motor Vehicle or an Unauthorized The Arsonist | 567
Driver | 550 Juvenile Firesetting | 568
Recovering an Abandoned or Stolen Motor Vehicle | 551 Motivation | 568
Combating Motor Vehicle Theft | 552 Police and Fire Department Cooperation | 570
License Plates | 552 Fire Department Expertise | 570
Routine Activities and Motor Vehicle Theft | 552 Police Department Expertise | 570
Border Area Auto Theft | 553 Coordinating Efforts | 570
Theft of Patrol Cars | 553 Other Sources of Assistance in Investigating Arson | 571
Preventing Auto Theft | 554 The Bureau of Alcohol, Tobacco, Firearms, and
Thefts of Trucks, Construction Vehicles, Aircraft, and Other Explosives | 571
Motorized Vehicles | 554 News Media | 571
Trucks and Trailers | 554 Insurance Companies | 571
Construction Vehicles and Heavy Equipment | 555 Arson Task Forces | 572
Recreational Vehicles | 556 The Importance of the Dispatcher | 572
Motorized Boats and Jet Skis | 556 Special Challenges in Investigation | 572
Snowmobiles | 557 Responding to the Scene | 572
Motorcycles, Motor Scooters, and Mopeds | 557
The Preliminary Investigation | 573
Aircraft | 557
The Fire Triangle | 573
Summary | 558 Potential Arson Indicators | 574
Can You Define? | 558 Documenting the Fire Scene | 576
Checklist | 558 Physical Evidence | 577
Applications | 559 Using K-9s in Arson Investigations | 577
References | 560 Evidence on a Suspect, at a Residence, or in a
Vehicle | 578
Case Cited | 561
Observing Unusual Circumstances | 578
Interviewing the Owner/Victim, Witnesses, and
Chapter 16 Firefighters | 578
Arson, Bombs, and Explosives 562 Search Warrants and Fire Investigations | 578
Introduction | 563 Final Safety and Legal Considerations | 579
Classification of Fires | 565 Investigating Vehicle Arson | 579
Classification of Arson | 565 Prosecuting Arsonists | 580
Elements of the Crime: Arson | 566 Preventing Arson | 580
xiv
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Bombings and Explosions | 580 Preliminary Interviews | 615
Responding to a Bomb Threat | 582 Obtaining a Search Warrant | 615
Methods of Explosives Detection | 583 Recognizing Evidence—Traditional and Digital | 616
The Bomb Scene Investigation | 583 Documenting Digital Evidence | 617
Raising Awareness | 584 Collecting Physical and Digital Evidence | 617
Importance of the Team Approach | 584 Packaging, Transporting, and Storing Digital and Other
Computer Crime Evidence | 622
Summary | 584
Crime-Specific Investigations | 623
Can You Define? | 585
Forensic Examination of Digital Evidence | 623
Checklist | 585 Data Analysis and Recovery | 623
Applications | 586 Legal Considerations in Collecting and Analyzing
References | 587 Computer Evidence | 624
Cases Cited | 588 Follow-Up Investigation | 625
Developing Suspects | 625
Organized Cybercrime Groups | 626
Section 5 Other Challenges to the Undercover Investigation and Surveillance | 627
Security of the Police Department’s Computers | 627
Criminal Investigator 590 Legislation | 627
The Investigative Team | 628
Chapter 17
Resources Available | 629
Computer Crime and Digital Evidence 592
Preventing Computer Crime | 630
Introduction | 593 Summary | 632
The Scope and Cost of the Problem | 595 Can You Define? | 632
The IC3 Annual Internet Crime Report | 595 Checklist | 632
The Annual U.S. State of Cybercrime Survey | 598 Applications | 633
Terminology and Definitions | 598 References | 634
The Net versus the Web | 599
Cases Cited | 636
Layers of the Web | 600
IP Addresses | 600
Social Networking, Live Chat, and Instant Messaging | 601 Chapter 18
Classification and Types of Computer Crimes | 601 A Dual Threat: Drug-Related Crime and Organized
The Computer as Target | 602 Crime 638
The Computer as Tool | 603
Special Challenges in Investigation | 606 Introduction | 638
Nonreporting of Computer Crimes | 606 The Threat of Drugs | 640
Lack of Investigator Training | 610 Seriousness and Extent of the Drug Problem | 641
Need for Specialists and Teamwork | 610 Legal Definitions | 642
Fragility and Sensitivity of Evidence in Computer Classification of Controlled Substances | 642
Crime | 610 Narcotics | 644
Jurisdictional Issues | 610 Stimulants | 645
The Preliminary Investigation | 612 Depressants | 646
Securing and Evaluating the Scene | 613 Hallucinogens | 647
xv
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Controlled Prescription Drugs | 647 Latin American Organized Crime | 675
Marijuana | 649 African Organized Crime | 676
Designer Drugs | 650 Eurasian/Russian Organized Crime | 676
Over-the-Counter (OTC) Drugs | 651 Organized Crime and Corruption | 677
Inhalants | 652 The Police Response | 677
Club Drugs | 652
Agencies Cooperating in Investigating Organized Crime | 678
Identification of Controlled Substances | 652
Methods to Combat Organized Crime | 679
Investigating Illegal Possession or Use of Controlled Investigative Aids | 679
Substances | 657 Asset Forfeiture | 680
Recognizing the Drug Addict: Drug-Recognition Experts | 657
Physical Evidence of Possession or Use of Controlled
The Decline of Organized Crime? | 680
Substances | 658 Summary | 680
In-Custody Deaths | 659 Can You Define? | 681
Investigating Illegal Sale and Distribution of Controlled Checklists | 681
Substances | 660 Application | 682
On-Sight Arrests | 661 References | 683
Surveillance | 661
Cases Cited | 685
Undercover Assignments | 661
Narcotics Raids | 663
Drug Paraphernalia Stores | 663 Chapter 19
Online Drug Dealers | 663 Criminal Gangs and Other Dangerous Groups 686
Clandestine Drug Laboratories | 664
Introduction | 687
Identifying a Clandestine Drug Lab | 664
Entering a Clandestine Drug Lab | 664 The Threat of Criminal Gangs: An Overview | 688
Processing of Clandestine Drug Labs | 666 Gangs Defined | 688
Cleanup of Clandestine Drug Labs | 666 Extent of Gangs | 689
Indoor Marijuana Growing Operations | 667 Why People Join Gangs | 689
Investigative Aids | 667 Types of Gangs | 690
Agency Cooperation | 668 Street Gangs | 690
Drug Asset Forfeitures | 668 Prison Gangs | 691
Outlaw Motorcycle Gangs | 692
Preventing Problems with Illegal Drugs: Community
Female Gang Involvement | 692
Partnerships | 669
Gang Members in the Military | 693
The National Drug Control Strategy | 670
Gang Culture, Membership, and Organization | 693
Organized Crime: An Overview | 670 Symbols | 694
Applicable Laws against Organized Crime | 672 Turf and Graffiti | 694
Major Activities of Organized Crime | 672 Tattoos | 695
Victimless Crimes | 673 Gangs and Technology | 695
Loan-Sharking | 673
Illegal Gang Activities | 697
Money Laundering and the Infiltration of Legitimate
Gangs and Drugs | 697
Business | 673
Gangs and Violence | 698
The Threat of Specific Organized Crime Groups | 674 Gang Associations with Other Criminal Organizations | 698
Italian Organized Crime | 674
Recognizing a Gang Problem | 698
Asian Organized Crime | 674
xvi
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Identifying Gang Members | 701 Motivations for Terrorism | 729
Records to Keep | 701 Classification of Terrorist Acts | 729
Investigating Illegal Gang Activity | 702 Domestic Terrorism | 729
Approaches to the Gang Problem | 704 International Terrorism | 729
Collaborative Efforts: Gang Task Forces | 705 Domestic Terrorist Groups in the United States | 733
Far-Right Terrorism | 734
Prosecuting Gang-Related Crimes | 705
Far-Left Terrorism | 737
Federal Efforts to Combat the Gang Problem | 706 Religious Extremism | 739
Bias and Hate Crime: An Overview | 707 Other Extremist Groups | 739
Motivation for Hate Crime | 707 Terrorists as Criminals | 740
Offenses | 708 Methods Used by Terrorists | 740
Offenders | 709 Explosives and Bombs | 740
Hate Groups versus Other Dangerous Groups | 709 Weapons of Mass Destruction (WMDs) | 742
The Police Response | 709 Cyberterrorism | 743
Efforts to Combat Bias and Hate Crimes | 712 The Federal Response to Terrorism | 744
Ritualistic Crime: An Overview | 712 The U.S. Department of Homeland Security (DHS) | 744
Terminology and Symbols of Cults | 713 The USA PATRIOT Act | 745
The USA FREEDOM Act | 746
The Nature of Ritualistic Crimes | 714
The National Infrastructure Protection Plan (NIPP) | 746
Who Commits Ritualistic Crime? | 715
Investigating Possible Terrorist Activities | 747
Investigating Ritualistic Crimes | 716 Funding Terrorism | 748
Signs of Cult-Related Activity | 716 The Typical Stages in a Terrorist Attack | 749
Indicators of Ritualistic Crimes | 717 Surveillance Cameras as Investigative Tools | 750
Investigating Animal Deaths | 717
Information Gathering and Intelligence Sharing | 751
Investigating Homicides | 717
The Intelligence Cycle | 751
Investigating Satanic Serial Killings | 718
Fusion Centers | 751
Special Challenges in Ritualistic Crime Investigations | 718 Crucial Collaborations and Partnerships | 752
Summary | 719 Initiatives to Assist in the Fight against Terrorism | 752
Can You Define? | 719 Increased Border Security | 753
Checklists | 719 The National Memorial Institute for the Prevention of
Applications | 720 Terrorism | 753
References | 720 The National Center for Food Protection and
Defense | 753
Cases Cited | 723
The National Incident Management System | 753
Joint Terrorism Task Forces | 753
Chapter 20 The Role of the Media in the War on Terrorism | 753
Terrorism, Extremism, and Concerns Related to the War on Terrorism | 754
Homeland Security 724 Concern for Civil Rights | 754
Retaliation or Discrimination against People of Middle
Introduction | 725 Eastern Descent | 754
Terrorism: An Overview | 727 Community Policing, Hometown Security, and Homeland
Terrorism Defined | 728 Security | 755
Violent Extremism | 729
xvii
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Summary | 756 Final Lessons from a Seasoned Investigator’s
Can You Define? | 756 Experience | 781
Checklist | 756 Summary | 783
Application | 757 Can You Define? | 784
References | 757 Checklists | 784
Cases Cited | 761 References | 785
Useful Resources | 761 Cases Cited | 785
xviii
Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Random documents with unrelated
content Scribd suggests to you:
sama sukunimi — jos Li on mikään sukunimi. He ovat ystävyksiä,
eivät veljeksiä, niin he ovat itse selittäneet meille."
Hän kääntyi Melkyn puoleen sillä välin kun tyttö, joka yhä näytti
vastahakoiselta, oli lähtenyt yläkertaan. Hän sysäsi toveriaan kylkeen
ja kuiskasi: "Kun kohta pääsemme tuonne yläkertaan, niin pitäkää te
silmällä tuota japanilaista veitikkaa minun puhutellessani häntä.
Tarkastelkaa hänen kasvojaan ja pankaa merkille, hämmästyttääkö
jokin seikka häntä."
Ayscough oli varuillaan niin pian kun näki tuon hymyn. Hän oli
elämänsä varrella jo tullut tuntemaan jonkin verran eri
kansallisuuksien luonteita ja tiesi, että kun itämaalainen näyttää
avomieliseltä ja hymyilevältä, on paras olla varuillaan hänen
suhteensa. Hän aloitti kohtauksen kumartamalla kohteliaasti.
Samalla hän tarkasti pikaisesti herra Mori Yadaa. Tämä oli hänen
arvionsa mukaan iältään noin kahden- tai kolmenkolmatta,
mustatukkainen, mustasilmäinen herra, ilmeisestikin ylpeä
englantilaisesta puvustaan, englantilaisista liinavaatteistaan,
englantilaisesta kaulanauhastaan, sukistaan ja kengistään - lyhyesti
sanoen hän oli aika keikari - ja ympäristöstään päättäen hyvin
ihastunut englantilaisiin mukavuuksiin - eikä suinkaan tuntenut
vastenmielisyyttä sitä englantilaista tapaa kohtaan, että nautti vähän
väkijuomia tupakkansa keralla. Pöydällä hänen ulottuvillaan oli
viinikarahvi, sen vieressä imupilli kivennäisveden nauttimista varten
ja pikari herra Yadan hoikkien ja kellertäväin sormien lähettyvillä.
"Ja sitten?"
"Aivan oikein", hän vastasi heti. "Herra Chang Li — herra Chen Li.
Tunnen heidät."
"En ole nähnyt herra Chang Litä enkä Chen Litä sen jälkeen kuin
marraskuun kahdeksantenatoista aamulla", sanoi Yada äkkiä. Hän
heitti kirjan takaisin pöydälle, palasi takan edessä olevalle matolle ja
asettui seisomaan selin uuniin kädet housuntaskuissa. Hän kumarsi
kohteliaasti, kun hänen vieraansa kohottivat lasinsa häneen päin.
"Onko jotakin hullusti, herra etsiväkersantti?" hän kysyi.
"Missä?"
Siitä ovesta, josta he olivat äsken tulleet, astui nyt esiin Yada,
jonka saattoi selvästi nähdä kadun sille puolelle osuvassa kirkkaassa
kuunvalossa. Hänen kuosikasta harmaata villapukuaan peitti paksu,
turkiskauluksella varustettu päällystakki. Päässään hänellä oli
kalpeita kasvojaan varjostamassa korkea musta hattu. Hän ei
katsellut oikealle eikä vasemmalle, vaan käveli nopeasti Euston-
kadulle päin. Kun hän oli päässyt noin kolmenkymmenen kyynärän
päähän, työnsi Ayscough Melkyn eteensä heidän piilopaikastaan.
RUUMISHUONE
"Niinkö luulette?" sanoi Melky. "Mutta miksi tuo uutinen toisi hänet
näkyviin?"
"No, jos se oli Purvis", sanoi Ayscough, "oli hän tietysti mennyt
kujaa myöten ja tullut ulos sen toisesta päästä".
"Hyvä on", sanoi Ayscough. "Ja voi siinä olla jotakin oikeaakin.
Mitä tähän etsintään tulee — niin eihän meillä ainakaan ole mitään
varmuutta siitä, ettei jommallakummalla noista kiinalaisista ole ollut
jotakin yhteistä tuon varasjoukon kanssa. Eihän sitä voi koskaan
tietää — ja on melkein mahdotonta päästä suoraan päämaaliin
tällaisissa jutuissa. No niin, me olemme joka tapauksessa ryhtyneet
toimenpiteisiin saadaksemme uutisen tuosta timantista ja Chen Lin
katoamisesta huomisaamun sanomalehtiin, ja jollei se herätä koko
kaupungin mielenkiintoa —"
"Tulin tänne, kun kuulin teidän olevan täällä", hän sanoi taluttaen
Ayscoughia poispäin. "Kuulkaahan, ystäväni, yksi meidän miehistä
kertoi minulle Molteno Lodgen jutusta ja kiinalaisen ruumiin
löydöstä."
"Se nuori herra, Rubinstein, joka kävi luonanne tänä aamuna ja oli
pyytänyt minut mukaansa, löysi sen", sanoi Ayscough, joka ihmetteli
itsekseen, mihin tohtori oikein pyrki. "Olin siellä hänen kanssaan."
"Olen sitäpaitsi kuullut", jatkoi Mirandolet, "niinikään eräältä
meikäläiseltä siitä ihmeellisestä timanttia koskevasta tarinasta, jonka
on tänään iltapäivällä kertonut sen omistajan veli. Nyt tahtoisin
nähdä tuon kiinalaisen ruumiin — syyn kerron teille jälkeenpäin.
Minulla on aivan erikoinen aihe siihen. Lähdettekö kanssani
ruumishuoneeseen?"
MIRANDOLETIN MIELIPIDE
"Kyllä, pari sanaa", vastasi vahti. "Hän sanoi. 'Se on hän' ja meni
suoraan ulos ajurin rattaille."