Building Search: Tactics and Procedures PDF
Document Details
Uploaded by Deleted User
2022
Tags
Related
- Multi-Story Building Operating Guidelines PDF
- Officer Safety 2: Introduction To Building Searches PDF
- Police Probationer Training Programme Unit 8 PDF
- إنشاء المتجر اإللكتروني - الوØدة األولى - 2023
- Building Search PDF
- Buffalo Fire Department Search & Rescue Training Manual PDF
Summary
This document details best practices for building searches, emphasizing safety, communication, and methodical approaches. It covers various aspects like pre-search planning, officer deployment, exterior and interior searches, and communication protocols. The document also addresses liability issues regarding officer conduct.
Full Transcript
Building Search Thursday, May 12, 2022 1:49 PM Â \\Machine generated alternative text: Org. 12/211 23.02.26 Building and Area Search Searches of Buildings and Areas 1-Apply law and commonly accepted legal principles to search private and public structures and areas. Searches of Buildings and Are...
Building Search Thursday, May 12, 2022 1:49 PM Â \\Machine generated alternative text: Org. 12/211 23.02.26 Building and Area Search Searches of Buildings and Areas 1-Apply law and commonly accepted legal principles to search private and public structures and areas. Searches of Buildings and Areas 2-Explain the danger of complacency in policing when searching buildings and areas. Searches of Buildings and Areas 3-Assess the need to be physically and mentally prepared to perform a search and effectively use the tactics and tools necessary to complete it. Searches of Buildings and Areas 4-Demonstrate, explain, and critique the concepts of use of cover, concealment, and effective movement. Searches of Buildings and Areas 5-Create a plan for searching structures and areas, including; all communication needs, theresponse and approach, perimeter, and personnel and equipment needs relative to the size and layout of the structure or area. Searches of Buildings and Areas 6-Demonstrate appropriate methods of interacting with, and handling, persons found inside the structure or area being searched. Searches of Buildings and Areas 7-Upon completion of the search of a structure or area, the officer will follow the necessary steps to secure and relinquish the structure or area to a responsible party, or take measures to prevent further damage or loss. Police Liability 6-Evaluate ways in which officers may be liable for damage occurring to items of private property during the execution of their duties. Machine generated alternative text: Org. 12/213 23.02.26 Building and Area Search While en route to the location: Look for possible suspects leaving the area; this may not be as applicable during the day if dispatched to a densely populated area. Look for individuals wearing unusual clothing, sweating, hurrying to leave, or unusual vehicle conditions. Consider calling the occupant of the building or area to be searched. Part of this consideration should be to notify the owner or residents to help minimize confusion of who is legally present and who might be the target of the search. It is advisable to ask questions directly related to dangers on scene, suchas whether there are vicious dogs, generally unsafe conditions, or firearms present. The First Officer on the Scene Think tactically! The first officer on the scene has the ability and duty to gather information and coordinate the overall response. The officer should park in a secluded area if possible and use binoculars to visually search the exterior of the building and the surrounding area. The officer must review the physical layout of the building and consider the possible and probable points of entry and exit. The parking location may be a short distance from the exact location of the call, allowing officers a few moments to listen before approaching. It may be possible to detect the sound of someone moving in the area, dogs barking, or a car starting the next block over. Do not stand in the open; remain in the shadows or behind cover and concealment for protection. Approach quietly; be observant of the whole area, not just the building. Dispatch should be notified of officer arrival and any unusual or suspicious circumstances observed.This should be done quickly to make other responding units aware of officer presence, avoid duplication of a search, provide for officer safety, and request assistance. Notify the dispatcher of the number of backup officers needed, the positions for them to take upon arrival, and any special equipment that will be necessary. While waiting for backup officers, look around for entry points, lookouts, suspect vehicles, and movement inside the building. Machine generated alternative text: Org. 12/215 23.02.26 Building and Area Search When officers are covering corners of a building, be aware of a possible crossfire situation. Officers should position themselves at different angles, utilizing available cover, to avoid a potential crossfire. The perimeter units must have a firm understanding of their responsibilities for their safety and that of other units entering and searching the building or area. Since a \"blue on blue\" shooting situation is always a possibility, exterior teams must completely understand times when shooting into a building is allowed. Likewise, teams searching the interior of a building or area must be cautious of their rounds exiting the building and hitting officers or civilians. Exterior and the Immediate Surrounding Area Officers should always search the exterior and the immediate surrounding area before entry is made. Check outbuildings, trash bins, trees, shrubbery, weeds, roofs of buildings, company vehicles, and any other hiding place for suspects or evidence. Remember the scope of the search.Officers are allowed to search where the suspect/subject may be hiding. This includes LOOKING IN, AROUND, UNDER, and UP! Do not forget that trees and roofs may be accessed by those whom officers seek to find. USE CONTACT COVER AND BE ALERT!! Do not ignore the possibility of a burglar entering or being on the roof of a building. This should be part of the search of the exterior. If there is a way for a person to get on the roof, assume the subject/suspect knows about it. Vehicles are common in neighborhoods and aroundbuildings. Although they are a common sight, officers need to remember that suspects may have used the vehicles in the area. They also can give information as to who may be legitimately at the location. An officer must be aware of vehicles without licenseplates as they may be stolen. Another reason for a missing license plate may simply be to avoid identification. A suspect may be waiting to ambush an officer, hiding to avoid being caught or collecting \"fruits of the crime\" that has already occurred. Search the exterior of the building for the point of entry. Check doors and windows for pry marks; cut or broken glass; bloodstains; dust disturbed on window ledges; unlocked windows or doors; etc. The transom windows typically sit above the entry door. This type of window may be overlooked as they are primarily decorative in newer houses. The window, although decorative, offered the ability for air to flow in and provide additional ambient light. Remember, if there is a suspect outside or inside the building, they probably know where officers are. Machine generated alternative text: Org. 12/217 23.02.26 Building and Area Search As stated earlier, the responding officer should try to contact the owner or manager. Asking about unusual hiding places in the interior will help set the search team up for success. The owner, manager, and homeowner may already be on scene. This can be of great benefit but may be a hurdle to the search process. The access to keys and information is invaluable, but they may want to help in the search. The officer must not allow them into the building while the search is being conducted!!Although they are just trying to be helpful, it is distracting and makes the search officer responsible for the citizen\'s safety. Additionally, they may be armed, which can further complicate the search and reduce the safety of all involved. Search Team Having at least two officers during the search increases the safety of all involved. Due to a lack of available personnel or an extended response time, it may be challenging to have a secondary officer. This is, of course, something to consider when determining search tactics. Depending on the reason for the search, waiting for one or more assisting officers to show up is always preferable. A two-officer \"search team\" should conduct the search of the exterior of the building, the immediate surrounding area, and the interior of the building. The search team consists of a \"cover\" officer and a \"search\" officer. Each officer must understand their role in this team. When acting as a \"cover\" officer, the primary tasks include covering the \"search\" officer and any other areas not yet searched. The cover officer should consider having a long gun. Consider the area being searched and the potential for changing roles when selecting a weapon system. Both the shotgun and patrol rifle are viable options for officers trained in their use. The deployment of a long gun will be reliant on policy and the structure being searched. Practice proper weapon handling to ensure that the search officer is not \"lasered\" by the muzzle of the cover officer\'s weapon. If the search officer passes in front of the cover officer, the cover officer must lower the weapon muzzle pointing at the ground until the searching officer has cleared the line of fire. The \"search\" officer must conduct the actual search. This officer will typically be armed with their duty weapon only, leaving their hand free to use a flashlight, radio, open and close doors, turn on and off lights, etc. The search should be well planned, slow, and methodical. Getting in a hurry and taking unnecessary risks is how many officers have gotten hurt. A building search that is conducted effectively will resemble water flowing through a structure. This fluid motion of the search team comes as officers increase their comfort with different tactics. This also increases as officers become keenly aware of the other Machine generated alternative text: Org. 12/219 23.02.26 Building and Area Search Once inside the room, each officer is located on the opposite side of the entry point from where they started. Since one officer will cross in front of the other during the entry, muzzle control and muzzle awareness are critical! This allows for a smooth transition into the room and is more forgiving as officers move past the door\'s threshold. Entry can also be made by each officer stepping around and into the building on the same side of the entry point where they were on the outside. This requires telling each other what may be in their way as they enter. This is commonly referred to as the \"button hook\" method. Whatever type of entry is used, officers must remember to move away from the entry point immediately, if possible. Once inside, STOP, LOOK, AND LISTEN. The officer may have gathered a lot of information, but it is important to remember this is still an unknown environment and unknown elements still exist. There also is the need to acclimate to the environment. The room may be dark, and the eyes take a little time to adjust. This can be achieved by taking a couple of steps into the room and establishing a \"point of domination.\" It is vital to scan and be aware of where each officer is relative to each other, reinforcing safe weapon handling and muzzle awareness. Listen for any movement and to the natural sounds of the building. Take some time to evaluate and make any adjustments to the plan established outside. The tactical stance learned in firearms is a stable platform while moving through the building and promotes \"moving behind your panels.\" This concept of moving behind panels is meant for officers to have increased ballistic protection from body armor. Be aware of any cover and understand that walls inside a structure are more likely concealment and not necessarily cover. As they move through a structure, officers must critically think and make decisions. Officers gain and lose based on those decisions. For example, if all units go into a room, they gain a safer room entry but lose coverage of the hallway, and it must be retaken upon when exiting the room. Assuming the area remained clear could be highly problematic and dangerous. Before entering a hallway or entering a room, use the \"slice the pie\" technique to limit exposure while hopefully seeing the suspect before the suspect sees the officer. Machine generated alternative text: Org. 12/2111 23.02.26 Building and Area Search If the officer(s) reach the final room on the primary search and have not yet found a subject, understand there is a high likelihood of encountering a person in the last room. If officers do not find a person after a primary search, consider a secondary search. Consistency is essential. Tactics-Suspect Contact/Control Officers should always expect to encounter someone during the search. This helps in reducing the likelihood of complacency and the possibility of missing something. An officer must determine if entry must be made or if the best option is to call the subject out. This is a balance that the officer must consider. Factors helping this are based mainly on the details of the situation. Is this an active killing situation, or is this a non-violent individual? These are just two of the questions that an officer must ask themselves before entry is made. If a suspect is located, the officers should move to a position of cover. The officer\'s roles change from \"search\" and \"cover\" officers to \"contact\" and \"cover\" officers. Whoever gives the suspect commands is now the contact officer instructing the suspect on what to do next. The remaining officer will cover the suspect and dangerareas. Defining the \"contact\" and \"cover\" roles limits confusion, speaking over each other, and issuing the suspect opposing commands. The first verbal component should include an identification statement. \"Police Department\" or \"Sheriff\'s Office\" may suffice. Not only is it essential for the officer to identify themselves but also to make a specific command. This early command will likely address controlling the suspect\'s hands, combined with an arrest statement and, if possible, the reason for being there. This is very important to gain compliance with any commands given. In addition, the suspect needs to understand who is issuing commands and the fact they are under arrest/detained. Remember, the suspect\'s hands are the most dangerous body part, and officers must clear the hands early in the interaction. As the officer moves the subject, giving clear and concise verbal commands, they must see their hands throughout this process. Machine generated alternative text: Org. 12/2113 23.02.26 Building and Area Search CONCLUSION Officers have historically missed suspects by racing to the scene, failing to detect out-of-the-ordinary factors, and failing to take time to conduct thorough exterior, interior and area searches. Slow down, be thorough, and observant to enhance both safety and apprehension rates. trfggv Financial Crimes Thursday, May 12, 2022 2:08 PM Â \Machine generated alternative text: Org. 12/212 23.04.15 Financial Crimes Definitions of Intent Purpose or aim. The state of mind with which an act is committed. Meaning or Design, resolve or determination with which a person acts. Mental attitude which can seldom be proved with direct evidence, but must ordinarily be proved by Why We Must Prove Intent Why would financial crime statutes be held to such a higher standard? The answer is simply because every day people make mistakes with their finances out of negligence, ignorance, or haste. People bounce checks thinking they have sufficient funds on hand. People use credit will also take all of the necessary steps voluntarily to correct the error. Simply put, we do not put people in jail for making honest mistakes. We mustprove what they were thinking at the time. What was their purpose? What was their intent? CRIMINAL USE OF A FINANCIAL CARD K.S.A. 21-5828 Statutory Definition and Penalties (a)Criminal use of a financial card is any of the following acts done with intent to defraud and to obtain money, goods, property, or services: (1)Using a financial card without the consent of the cardholder; (2)using a financial card, or the number or description thereof, which has been revoked or cancelled; or (3)using a falsified, mutilated, altered or nonexistent financial card or a number or description thereof. (b)Criminal use of a financial card is a: (1)Severity level 7, nonperson felony if the money, goods, property, or services obtained within any seven-day period are of the value of \$25,000 or more. (2)Severity level 9, nonperson felony if the money, goods, property, or services obtained within any seven-day period are of the value of at least \$1,000 but less than \$25,000. Machine generated alternative text: Org. 12/214 23.04.15 Financial Crimes Mail Order, Telephone Order, or Internet Order This is the unauthorized use of the information contained on the card. The perpetrator may never have had possession ofthe actual card. The information could have been stolen through an electronic breach of an internet site or through other means which may never be known. Federal charges under the wire fraud and mail fraud statutes may apply. Liability attaches to the unauthorized use of the card. Fraudulent Application for a Financial Card information without their authorization. It may also involve using completely fictitious information. This act could include federal charges for theft from the mail. The criminal will steal pre- The criminal will then apply for the card, probably change the address for delivery of the card and subsequent statements, and leave the victim in the dark that a card was ever applied for or received. Counterfeiting or Alteration of a Financial Card This may involve making changes to the account number or other data on an existing card. Due to advances in technology, the manufacture of completely fraudulent cards and duplication of valid cards has become widespread. Gift cards are also subject to this type of fraud, in which new unsold gift cards may be shoplifted, cloned onto ablank card, and then put back on the shelf to be sold. After the card is sold, the thief can use the cloned card just as if it were the original. Skimming This involves the use of a digital device, either handheld or fixed in place, which allows the user to capture the identification information contained in the magnetic stripe on the back of the card. This information can then be used to make purchases overthe telephone or online. The suspect can also imprint the information to another card with a clean magnetic stripe. If a skimmer is installed on an ATM, it might also have a small camera that will allow the suspects to see the key pad on the ATM. This allows the suspect to see the buttons the victim presses when they enter their personal identification number (PIN). Machine generated alternative text: Org. 12/216 23.04.15 Financial Crimes ELEMENTS OF THE CRIME As with all other crimes, there are certain elements that must be present before charges can be brought under K.S.A. 21-5828. These elements must be developed during the investigation and supported by factual evidence. The type of evidence that would be appropriate will be discussed in later sections. The officer must prove the defendant used the financial card or the information represented on the card. The officer must prove the cardholder had not consented to the use of the card by the suspect and that the suspect knew that was the case. This element becomes a common issue when the suspect is a family member or close associate. They might raise the issue that the cardholder allowed them to use the card. The officer must document that this is not true. In addition, the fact that the person using the card did so in ways not intended by the cardholder will not on its own constitute a violation of this statute. For example, the fact that the user made purchases well in excess of what the cardholder thought would happen would not be a violation because consent was given. The officer must prove the suspect used the card for the purpose of obtaining money, goods, or services. Simple possession of the card, while it may support a theft charge, will not amount to a violation of this statute. The officer must prove the suspect took the actions with the intent to defraud. This will require proof the suspect knew the actions violated the law and that they were made willfully. In order to prove a felony, the officer must have proof of an accumulation of transactions that equal or exceed \$1,000.00 in a seven-day period. A document with text on it Description automatically generated![Machine generated alternative text: Org. 12/219 23.04.15 Financial Crimes FORGERY K.S.A. 21-5823 Statutory Definition and Penalties \[in part\] (a)Forgery is, with intent to defraud: (1)Making altering or endorsing any written instrument in such manner that it purports to have been made, altered or endorsed by another person, either real or fictitious, and if a real person without the authority of such person; or altering any written instrument in such manner that it purports to have been made at another time or with different provisions without the authority of the maker thereof; or making, altering or endorsing any written instrument in such manner that it purports to have been made, altered or endorsed with the authority of one who did not give such authority; (2)issuing or distributing such written instrument knowing it to have been thus made, altered or endorsed; or (3)possessing, with the intent to issue or distribute, any such written instrument knowing it to have been thus made, altered or endorsed. (b)(1) Forgery is a severity level 8, nonperson felony. APPLICATION OF THE STATUTE Although we most often think of the forgery statute as it pertains to forged checks, it should be noted -5111, Crimes and Punishments, the legislature defines the term written or printed matter or the equivalent thereof, used for purposes of reciting, embodying, conveying or recording information, and any money, token, stamp, seal, badge, trademark, or other evidence or symbol of value, right, privilege or identification, which is capable of being used to the advantage or disadvantage of ](media/image24.png)A document with text on it Description automatically generatedMachine generated alternative text: Org. 12/2112 23.04.15 Financial Crimes IN THE EVENT OF AN ARREST After an arrest has been made, keep in mind that many forgery suspects are involved with multiple subjects and scams. Look for information related to coconspirators and other types of financial or identity crimes which may go hand in hand with their forgery operations. False ID cards, stolen mail, bags of trash, computers, cell phones, digital cameras, and other electronic devices may include evidence of forgeries. Also, look for solvents such as acetone, nail polish remover, alcohol, oven cleaner, or even bleach which can be used to remove or fade inks on checks. COUNTERFEITING CURRENCY K.S.A. 21-5840 Statutory Definition and Penalties (a)Counterfeiting currency is: (1)Making, forging or altering any note, currency, obligation or security of the United States with the intent to defraud; (2)distributing, or possessing with the intent to distribute, any note, currency, obligation or security of the United States knowing suchnote, currency, obligation or security has been made, forged or altered with the intent to defraud; or (3)possessing any paper, ink, printer, press, currency plate, computer or other item with the intent to make, forge or alter any note, currency, obligation or security of the United States. (b)Counterfeiting currency as defined in: (1)Subsection (a)(1) or (a)(2) is a: (A) Severity level 7, nonperson felony, if the total face value of the notes, currency, obligations or securities is \$25,000 or more; and (B) severity level 8, nonperson felony, if the total face value of the notes, currency, obligations or securities is less than \$25,000; and (2)subsection (a)(3) is a severity level 9, nonperson felony. Machine generated alternative text: Org. 12/2114 23.04.15 Financial Crimes ELEMENTS OF THE CRIME To ensure a successful prosecution of a counterfeiting currency case, an officer must prove the defendant made, forged or altered the currency with the intent to defraud. Alternatively, the officer must prove the defendant distributed or possessed with the intent to distribute counterfeit currency with the intent to defraud. Or the officer must prove the defendant possessed any of the materials with the intent to make, forge or alter currency with the intent to defraud. EVIDENCE TO BE COLLECTED Each case will be unique, but there are some basic investigative steps that can be taken which will be common to the majority of investigations of violations of this statute. Take custody of the counterfeit currency and preserve it as officers would any other document that might be processed for fingerprints or other forensic evidence. Make note of the serial number and take a photograph of the counterfeit currency. If there ar jurisdictions, compare the serial numbers. If the serial numbers match other cases, coordinate with the officers who are investigating the other cases to determine if any suspects have been identified. Determine the identity of the suspect, if known, or obtain a detailed description. If the identity is known, be sure to include all available identifiers such as name, date of birth, etc. Collect videos or still photographs from surveillance cameras in the area. Take detailed statements from all witnesses and determine what, if anything, they did to attempt to ensure the authenticity of the counterfeit currency. Note the personal identifying information of all witnesses to facilitatefollow-up contacts. Be sure to note those witnesses who can identify the suspect. Be certain to interview any clerk or employee who actually dealt with the suspect during the transaction and cover all pertinent details in the interview. Determine the value and description of the merchandise purchased. Make a record of any false identification provided by the suspect. Machine generated alternative text: Org. 12/2116 23.04.15 Financial Crimes (b)Giving a worthless check is: (1)a severity level 7, nonperson felony if: (A)The check is drawn for \$25,000 or more; or (B)more than one worthless check is given within a seven-day period and the combined total of the checks is \$25,000 or more; (2)a severity level 9, nonperson felony if: (A)The check is drawn for at least \$1,000 but less than \$25,000; (B) more than one worthless check is given within a seven-day period and the combined total of the checks is at least \$1,000 but less than \$25,000; or (C) the person giving the worthless check has, within five years immediately preceding commission of the crime, been convicted of giving a worthless check two or more times; and (3)a class A nonperson misdemeanor if the check is drawn for less than \$1,000. APPLICATION OF THE STATUTE As with the forgery statute, the legislature recognized that violations of this statute are committed by groups of people as well as by individuals. In that regard they worded the statute so that the penalties are extended to all members of an operation by saying checks. The first half of the statute covers those instances where someone knowingly and intentionally writes a check on an account that is either closed or non-existent. The second part deals with an instance where someone knowingly and intentionally writes a check on an account which does not contain sufficient funds to pay the check. Machine generated alternative text: Org. 12/2118 23.04.15 Financial Crimes A second defense will be that the suspect knew they had insufficient funds at the time they wrote the check but fully expected to have sufficient funds on deposit by the time the check would be presented for payment. One example would be where the suspect expected a direct deposit of a salary check to be made by a certain date but unexpectedly it was late. In thisinstance, there would be no intent to defraud. NOTE: In the instance of checks written on closed accounts and insufficient funds checks, the legislature has declared in the statute that intent can be negated by the payment of the required fee to the bank within the time frame established by the statute. In other words, if an individual makes a good faith effort to resolve the worthless check situation by paying the bank an overdraft fee, the state cannot come in behind that, prosecute the individual and state that their payment of the overdraft fee constitutes the knowledge and intent required by the statute. INVESTIGATIVE POINTS If a law enforcement officer does investigate a worthless check case, there are some circumstances that might need to be addressed in order to prove intent to defraud. Postdated Checks A postdated check is one that is written on a given date but bears a calendar date sometime in the future. Payment with a postdated check requires an agreement between the issuer of the check and the person accepting it. The nature of the agreement would be that the check would not be negotiated by the person accepting it until the date shown on the check. As part of the agreement, the issuer guarantees sufficient funds will be available to pay the check when it is presented. If the person accepting the check presents it for payment prior to the shown date and sufficientfunds are not on hand, there is no violation because the agreement was not followed by the person who accepted the check and entered into the agreement. Machine generated alternative text: Org. 12/2120 23.04.15 Financial Crimes Statutory Definition of Personal Identifying Information (e) As used in this section: (1) an individual including, but not limited to, pictures, videos, emails and other data files; (2) following: (A)Name (B)birth date (C)address (D)telephone number (E) -drivers identification number or card (F)social security number or card (G)place of employment (H)employee identification numbers or other personal identification (J)birth, death or marriage certificates (K)electronic identification numbers (L)electronic signatures (M)any financial number, or password that can be used to access a checking or savings accounts, credit or debit card information, demand deposit or medical information; and (N)passwords, usernames or other log-in information that can be but not limited to, content stored on a social networking website. A document with text on it Description automatically generatedMachine generated alternative text: Org. 12/2124 23.04.15 Financial Crimes Role of Law Enforcement Law enforcement officers have two equally important jobs when dealing with identity theft. These are: (1) help the victim of the crime; and, (2) investigate the crime itself. When dealing with an identity theft situation officers can always do things that will help the victim. Unfortunately, they may not always be able to make progress in solving the crime. In fact, there will be many times when officers will not be able to do much at all because any leads to a suspect are lost in cyberspace. Help the Victim The first responder will often be the first person who has any possibility of helping the victim address the problems that may have been caused by the identity thief. In that regard, there are a few very basic steps that the officer can take to provide some initial assistance. The officer certainly does not have to take on the responsibility of walking the victim through every step and there should be no expectation that the officer will hold the process. However, by showing some initial concern and providing some very basic suggestions, the officer can help the victim get a quick start on dealing with the problem. Officers should empathize with the victim and let them know that they realize that they are, in fact, a victim in this situation. Suggest that they get all of their financial records together so that they have access to customer service numbers for all of their credit cards and bank accounts. TAKE A REPORT! This one step on the offi important thing they can do to help the victim start resolving the problems caused by this crime. The report is not a guarantee that an officer will solve the crime nor is it a promise that an investigation will even be conducted. The officer does not have the authority to make those kinds of promises. However, the victim will not be able to obtain any relief from creditors and credit bureaus without a police report and report number. The creditors and credit bureaus are constantly alert for people who may be trying to scam them. They see the filing of a report as an indication that the victim is serious in their claim. The report lends them some validity. So TAKE A REPORT! Put the victim in touch with the Federal Trade Commission (FTC). It is the one agency in the government which has the responsibility to assist the victim with the problems created by an identity thief. They will not investigate the crime. Machine generated alternative text: Org. 12/2126 23.04.15 Financial Crimes such as from determined and, as a result, a suspect may never be identified. If officers can determine a specific suspect or at least a specific scheme, they need to determine how widespread that scheme is. Is it limited to the geographic area or at least to this state? If that is the case, officers may want to pursue the case on their own. If the scope of the scheme is multi-state, national or international, is it reasonable to assume that the officer shouldbe the one to pursue the investigation? Examine who has the strongest jurisdiction and which level of investigation provides the strongest penalties. Officers also need to consider how big a commitment of resources may be involved. A small local department may not be able to spare the manpower that a state or federal agency could. There will also be costs involved that could cause budgetary issues for some departments. Other agencies may be able to assist officers or may turn out to be a better choice to conduct the investigation. At the state level, the Kansas Bureau of Investigation should be considered. At the federal level, the Federal Bureau of Investigation, the United States Secret Service, and the United States Postal Service all investigate identity theft crimes. In addition, the federal Trade Commission maintains a database called Consumer Sentinel which is for law enforcement use. Membership is free to all law enforcement agencies. Officers can enter information as well as use it for research to look for similar cases. A tool to assist law enforcement officers is section 609(e) of the Fair Credit Reporting Act. It provides victims of identity theft and law enforcement some relief in obtaining records of the crime from the financial institutions or credit card companies involved in the fraudulent transactions. Under this section of and direction, without a subpoena or warrant. Under the provisions of the act, the victim can provide law enforcement with authorization to obtain the records or the victim can request in writing that the business or institution send a copy of the records directly to the law enforcement officer. The victim may be required to provide the business or the institution with proof of identity as defined in the act and with proof of the identity theft. This would include a police report and a sworn affidavit. A document with text on it Description automatically generatedMachine generated alternative text: Org. 12/2130 23.04.15 Financial Crimes Vocabulary Empathy Intent Skimmer Financial card Forgery  Introduction to Firearms Thursday, May 12, 2022 1:49 PM Â \Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 1 Class Title: Introduction to Firearms Class Code: 15.01 Handout Title: Introduction to Firearms Reviewed by: T. Kirk Bridges Instructed by: COMPETANCY STATEMENT FOR INTRODUCTION TO FIREARMS The trained student will apply the knowledge of basic concepts, functionality, and safety in handling the semi-auto pistol. LEARNING OBJECTIVES : Upon completion of the class by written examination and/or practical testing, the participant will be able to: 1. Identify rules governing the handling of firearms, including the following: a. Four General Firearm Safety Rules. b. Basic rules governing handling and storage of firearms at home. c. Render safe rules and techniques. 2. Identify and describe the following: a. Auto-pistol nomenclature. b. The operational cycle of auto-pistol. c. Procedures to function check the auto-pistol. 3. Identify the four aspects of threat incapacitation. 4. Identify the proper precautions involving range lead safety. INTRODUCTION Knowledge of firearms is a basic, but serious responsibility for all law enforcement officers. Officers must have an understanding of the function and operation of their duty weapons so they will be confident when called to use their weapon in the line of duty or in training situations. Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 3 Slide Trigger Sig Sa uer Trigger Guard Trigger Magazine Release Hammer Slide Stop Lever De - cock Lever Ejector Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 5 Step 2: CHAMBERING The slide strips the top round from the magazine as the slide travels forward, moving the round from the magazine to the chamber. Step 3: LOCKING The round is fully chambered and the breech end of the barrel locks into the slide. The pistol is ready to fire. Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 7 Step 7: EJECTING As the slide completes its rearward travel, the left side of the cartridge case head contacts the ejector and the spent cartridge is pushed or flipped out of the ejection port. Step 8: COCKING As the slide completes its rearward travel the firing mechanism is cocked, ready to fire another round. Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 9 Magazine locks Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 11 2.Open the cylinder by using the cylinder latch. Cylinder latches will usually be on the left side of the weapon. Cylinder latches may need to be moved forward, backward, up, or down to be released, depending on the weapon. open 4.Remove the ammunition by depressing the extractor. 5.Transport the revolver with the cylinder open. FIELD STRIP AND ASSEMBLY OF THE SEMI-AUTO PISTOL Before disassembling any firearm, ensure the pistol is clear by removing the magazine and locking the slide to the rear. Visually and physically check to make sure the chamber and the magazine well are empty. Field Strip Steps 1.If the auto-pistol is equipped with a takedown lever that rotates, with the slide still locked to the rear, move the takedown lever to either the up or down position based on auto-pistol does not havea takedown lever than ease the slide forward until the slide stops. Point the visually and physically cleared auto-pistol in a safe direction and pull the trigger. 2.Pull the slide slightly to the rear relieving the tension on any slide stop levers or align any slide release pins and notches. Push any slide stops, pins or catches out of the frame. On the Glock pistol, pull the slide lock down on both sides of the frame. 3. After the cylinder latch is released, push the cylinder outward from the frame to Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 13 Pull the trigger and listen to the firing pin or observe the hammer fall, if so equipped, and hold the trigger to the rear. Do not let the trigger go forward. With the trigger being held to the rear, again rack the slide to the rear. The hammer should not fall forward, if so equipped. Very gently allow the trigger to go forward, paying close attention and Pull the trigger completely to the rear; hear the firing pin and see the hammer fall forward, if so equipped. Safety check Rack the slide again and check that the weapon will de-cock, if so equipped, and all safety levers work properly. Magazine checks Insert an empty magazine and rack the slide to the rear. Make sure the slide will lock back on all empty magazines. With the slide locked back, on the empty magazine, release the magazine and make sure the magazine comes out freely. THREAT INCAPACITATION In the case of the use of firearms in deadly force scenarios, the concern is how well the bullet stops or incapacitates the offender. way to incapacitate is to interrupt vital life processes. A hole in the heart halts or impairs lungs causes bleeding flooding the air passages and causes drowning. A bullet to the brain usually stops all vital functions instantly. A hit that severs the spinal column instantly stops all bodily functions below the hit and can cause quick death. The speed of incapacitation or death depends on the severity of the wound. There are four aspects of terminal ballistics that cause incapacitation: penetration, permanent wound cavity, temporary wound cavity, and fragmentation. Penetration Penetration is the distance the bullet goes into the tissue and consequently causes damage to vital organs. Permanent Wound Cavity Generally, the larger the permanent hole caused by the projectile increases the chances of incapacitation due to blood loss, provided that a vital area is hit. Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 15 The following are some simple steps to follow to protect you and your family from lead poisoning: DON\'T SMOKE ON THE RANGE. Smoking tobacco products on the KLETC range is not allowed. DON\'T EAT ON THE RANGE. Lead dust on hands and face can be ingested through contact with food. DON\'T COLLECT BRASS IN HATS. Many shooters use their hats to collect spent brass causing the hat to become covered in lead. When the hat is placed on the head, the lead is deposited onto the hair and absorbed into the skin. DO BE AWARE THE FACE, ARMS, HANDS & CLOTHING ARE COVERED WITH LEAD : Wash thoroughly with COLD WATER and soap, particularly those with facial hair. DO BE AWARE HAIR AND CLOTHES ARE STILL CONTAMINATED. To prevent cross-contamination, range clothes should be washed separately from other family clothing, especially those of infants. DO CHANGE RANGE SHOES BEFORE ENTERING RESIDENCE. Clothes, shoes and shooting gear are transporters of lead home to the family. Shoes should be left at the door to prevent lead from being tracked onto floors and carpets. DO AVOID PHYSICAL CONTACT WITH FAMILY MEMBERS UNTIL A SHOWER, SHAMPOO AND CHANGE OF CLOTHES. Lead can be transferred by casual contact; family and friends should not be hugged or kissed until a shower, shampoo and a change of clothes has occurred. Young children like to rush up to parents for a hug, this display of affection should be avoided if the officer is still in range clothes. CONCLUSION operate that firearm. In order to be able to operate their firearm, an officer must first understand it. By knowing how the firearm functions and what care it needs to function correctly, an officer can take the needed steps to have the necessary trust in their firearms and in themselves. Fundamentals of Marksmanship Thursday, May 12, 2022 3:44 PM Â \Machine generated alternative text: 2 Org. 9/02 Rev. 12/16, 5/20 Fundamentals of Marksmanship 15.02 THE GRIP A proper grip lays the foundation for a good shooting platform. An improper grip can cause shooter induced malfunctions in the auto-pistol. The slide of the auto pistol must be able to travel its intended distance at its intended speed for the firearm to function properly. A loose or weak grip can allow for the absorption of the recoil energy necessary to cycle the weapon, causing a fail to eject or extract malfunction. Grip and release, establishing the master grip high on the backstrap. Establishing a proper shooting grip begins with the firearm in the holster and is considered the first step in the Four Stage Draw. Elements of the Shooting Grip The shooter must first disengage the weapon retention devices of their holster, while simultaneously establishing the master grip on the firearm. The strong hand refers to the hand that establishes the master grip of the firearm. The support hand is utilized as a secondary support element. For a right-handed shooter, the strong hand is the right, the support hand is the left. For a left-handed shooter, the strong hand is the left, the support hand is the right. The master grip is the first stage towards building a strong foundation in gripping the firearm. The strong hand must be as high on the tang, or backstrap, as possible. This places the axis of the barrel as low as possible in relation to the strong hand to allow for a greater level created by the thumb and forefinger. Machine generated alternative text: 4 Org. 9/02 Rev. 12/16, 5/20 Fundamentals of Marksmanship 15.02 important to keep any gap to a minimum. The barrel of the firearm should be aligned with the strong side forearm. The grip must be firm enough to control the recoil. To find the proper grip firmness, tighten the grip on the firearm until the firearm begins to shake, then loosen the grip until the shaking stops. It is vital the grip remains steady and constant throughout the firing cycle. The goal is to control felt recoil so the majority of the forces created move straight back into the hand and forearm. Muzzle flip occurs when the grip is improper or too loose and the barrel of the firearm rises, sometimes several inches. This requires greater time to recover to a shooting position. THE TACTICAL STANCE Benefits of the Tactical Stance A proper stance will provide the shooter with greater stability and will maximize control of the recoil. In addition, the tactical stance is very adaptable to a variety of firearms: handgun, shotgun, sub-gun, and patrol rifle. Shooting on the move, in a variety of directions, is easily accomplished with the tactical stance. Most importantly, the tactical stance places the officer square to the threat, thus maximizing the ballistic protection Tactical Stance Components The stance should feel and look aggressive. apart or slightly wider. This position allows for a solid shooting foundation. The critical straight into the target. even with the heel of the weak foot. The strong foot is the foot that corresponds with whichever hand is establishing the master grip. If the shooter is firing with their right hand, bend at the waist, knees, and ankles, and lean should be forward on the balls of their feet. Machine generated alternative text: 6 Org. 9/02 Rev. 12/16, 5/20 Fundamentals of Marksmanship 15.02 Proper sight alignment and sight picture are critical for shooting accuracy. A sight alignment error of 1/16\" will cause the impact of the bullet to be more than 10\" off the intended target at 25 yards. Therefore, a shooter who lines up the front sight im. If the of aim. This assumes a five-inch sight radius. If a shooter focuses on the target instead of the front sight of properly aligned sights, the shooter will not know where the front sight was positioned when the shot breaks and therefore will not know where or if the round will hit the target. If the target is in focus, then the front sight cannot be in sharp focus to the shooter. TRIGGER CONTROL Proper trigger control is critical for both combat and target shooting. To understand trigger control, the shooter must first understand double action trigger mechanisms and single action trigger mechanisms. Double Action / Single Action Trigger Mechanisms Double action trigger mechanisms Double action trigger mechanisms refer to firearms which have a longer first trigger pull, incorporating taking up the slack in the trigger. Pulling the trigger performs two functions: cocking and firing the weapon. Firearms with a hammer will generally incorporate a double action trigger, such as the Sig P226 or Berreta 92. The second and any subsequent shot will utilize a single action trigger pull in most firearms. There are however, double action only firearms which require the full length of the trigger pull to fire every shot. The single action refers to a much shorter trigger pull and is achieved in most firearms after a proper reset of the trigger. The reset point is much shorter in the trigger pull arch than releasing the trigger to its full forward, or double action, position. Machine generated alternative text: 8 Org. 9/02 Rev. 12/16, 5/20 Fundamentals of Marksmanship 15.02 disruption of the sight picture. The shooter should not \"stage\" or pause during the trigger pull. The trigger pull should be smooth and the pressure on the trigger should be steadily increased until the shot breaks. The shot should surprise the shooter. Shooters must avoid the temptation to anticipate the shot. Anticipation will result in an errant shot, usually low of the intended shot placement. Trigger pull practice should be conducted slow and deliberately. This will allow for the development of proper muscle memory of the trigger finger. Once the foundation of muscle memory has developed, the shooter can successfully increase the speed of the trigger pull. Shooters of any skill level will benefit from dry fire practice of the trigger pull. However, practice does not make perfect. Only perfect practice will result in the development of the desired muscle memory. The process of pulling the trigger must be accomplished by pressing with the trigger finger only. A common mistake made by shooters is squeezing or tightening with their entire shooting hand. The negative shooting results are explained under the Trigger reset Auto-pistol shooters must master the trigger reset in order to achieve the high levels of shooting accuracy desired in law enforcement. After the first shot is fired, the shooter must consciously hold the trigger all the way to the rear as the weapon cycles. After recovery from the recoil, the pressure is gently released on the trigger, allowing it to move slightly forward to the point of reset. The shooter should feel and hear a click, as internal mechanisms re-engage to allow for subsequent shots. If the trigger is allowed to return to its full forward position, the shooter must then take up the slack created in the trigger pull. This creates wasted movement and can setup a potential slap or jerk of the trigger. Controlling of the trigger reset is very much a mental process. The shooter must work very slowly at first to create the necessary muscle memory. Speed can then be gradually added. Mechanical elements of trigger reset To aid in understanding the importance of trigger reset, the shooter must understand what is taking place