Building Search: Tactics and Procedures PDF

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Summary

This document details best practices for building searches, emphasizing safety, communication, and methodical approaches. It covers various aspects like pre-search planning, officer deployment, exterior and interior searches, and communication protocols. The document also addresses liability issues regarding officer conduct.

Full Transcript

Building Search Thursday, May 12, 2022 1:49 PM   \\Machine generated alternative text: Org. 12/211 23.02.26 Building and Area Search Searches of Buildings and Areas 1-Apply law and commonly accepted legal principles to search private and public structures and areas. Searches of Buildings and Are...

Building Search Thursday, May 12, 2022 1:49 PM   \\Machine generated alternative text: Org. 12/211 23.02.26 Building and Area Search Searches of Buildings and Areas 1-Apply law and commonly accepted legal principles to search private and public structures and areas. Searches of Buildings and Areas 2-Explain the danger of complacency in policing when searching buildings and areas. Searches of Buildings and Areas 3-Assess the need to be physically and mentally prepared to perform a search and effectively use the tactics and tools necessary to complete it. Searches of Buildings and Areas 4-Demonstrate, explain, and critique the concepts of use of cover, concealment, and effective movement. Searches of Buildings and Areas 5-Create a plan for searching structures and areas, including; all communication needs, theresponse and approach, perimeter, and personnel and equipment needs relative to the size and layout of the structure or area. Searches of Buildings and Areas 6-Demonstrate appropriate methods of interacting with, and handling, persons found inside the structure or area being searched. Searches of Buildings and Areas 7-Upon completion of the search of a structure or area, the officer will follow the necessary steps to secure and relinquish the structure or area to a responsible party, or take measures to prevent further damage or loss. Police Liability 6-Evaluate ways in which officers may be liable for damage occurring to items of private property during the execution of their duties. ![](media/image2.png)Machine generated alternative text: Org. 12/213 23.02.26 Building and Area Search While en route to the location: Look for possible suspects leaving the area; this may not be as applicable during the day if dispatched to a densely populated area. Look for individuals wearing unusual clothing, sweating, hurrying to leave, or unusual vehicle conditions. Consider calling the occupant of the building or area to be searched. Part of this consideration should be to notify the owner or residents to help minimize confusion of who is legally present and who might be the target of the search. It is advisable to ask questions directly related to dangers on scene, suchas whether there are vicious dogs, generally unsafe conditions, or firearms present. The First Officer on the Scene Think tactically! The first officer on the scene has the ability and duty to gather information and coordinate the overall response. The officer should park in a secluded area if possible and use binoculars to visually search the exterior of the building and the surrounding area. The officer must review the physical layout of the building and consider the possible and probable points of entry and exit. The parking location may be a short distance from the exact location of the call, allowing officers a few moments to listen before approaching. It may be possible to detect the sound of someone moving in the area, dogs barking, or a car starting the next block over. Do not stand in the open; remain in the shadows or behind cover and concealment for protection. Approach quietly; be observant of the whole area, not just the building. Dispatch should be notified of officer arrival and any unusual or suspicious circumstances observed.This should be done quickly to make other responding units aware of officer presence, avoid duplication of a search, provide for officer safety, and request assistance. Notify the dispatcher of the number of backup officers needed, the positions for them to take upon arrival, and any special equipment that will be necessary. While waiting for backup officers, look around for entry points, lookouts, suspect vehicles, and movement inside the building. ![Machine generated alternative text: Org. 12/214 23.02.26 Building and Area Search If possible, an officer should position themselves onone corner of a building to visually cover two sides of that building. This will help set up adequate visual coverage as more units arrive on scene. If a suspect flees while the officer is waiting for backup, remember there may still be more suspects in the building. Officers should contain the situation the best they can and watch for movement at doors or through windows. Inform backup officers and the dispatcher of the situation, including the description and direction of travel of the suspect(s). It maybe more feasible or tactically sound for another officer to make the apprehension. Deployment of Responding Units/Officers Organize officer deployment to cover all exits and escape routes. As other units arrive, they can enhance upon the foundation built by the first officers on scene.The most common method is the \"opposing corner\" method. Suppose the first officer on scene positioned themselves in a position to see two sides of the building upon their arrival. In that case, the next available officer/unit should take an opposing corner to effectively secure the outside the building with the minimum number of officers. It further allows for officers to observe any escape routes of potential suspects. As additional officers arrive on scene, delegating and assigning different tasks for those additional units is essential. This may be assigning them to the other corners, perimeter points, or perhaps the entry search team. The entry team is the last piece since a perimeter search must be conducted before entry. Opposing Corners Method ](media/image4.png)Machine generated alternative text: Org. 12/215 23.02.26 Building and Area Search When officers are covering corners of a building, be aware of a possible crossfire situation. Officers should position themselves at different angles, utilizing available cover, to avoid a potential crossfire. The perimeter units must have a firm understanding of their responsibilities for their safety and that of other units entering and searching the building or area. Since a \"blue on blue\" shooting situation is always a possibility, exterior teams must completely understand times when shooting into a building is allowed. Likewise, teams searching the interior of a building or area must be cautious of their rounds exiting the building and hitting officers or civilians. Exterior and the Immediate Surrounding Area Officers should always search the exterior and the immediate surrounding area before entry is made. Check outbuildings, trash bins, trees, shrubbery, weeds, roofs of buildings, company vehicles, and any other hiding place for suspects or evidence. Remember the scope of the search.Officers are allowed to search where the suspect/subject may be hiding. This includes LOOKING IN, AROUND, UNDER, and UP! Do not forget that trees and roofs may be accessed by those whom officers seek to find. USE CONTACT COVER AND BE ALERT!! Do not ignore the possibility of a burglar entering or being on the roof of a building. This should be part of the search of the exterior. If there is a way for a person to get on the roof, assume the subject/suspect knows about it. Vehicles are common in neighborhoods and aroundbuildings. Although they are a common sight, officers need to remember that suspects may have used the vehicles in the area. They also can give information as to who may be legitimately at the location. An officer must be aware of vehicles without licenseplates as they may be stolen. Another reason for a missing license plate may simply be to avoid identification. A suspect may be waiting to ambush an officer, hiding to avoid being caught or collecting \"fruits of the crime\" that has already occurred. Search the exterior of the building for the point of entry. Check doors and windows for pry marks; cut or broken glass; bloodstains; dust disturbed on window ledges; unlocked windows or doors; etc. The transom windows typically sit above the entry door. This type of window may be overlooked as they are primarily decorative in newer houses. The window, although decorative, offered the ability for air to flow in and provide additional ambient light. Remember, if there is a suspect outside or inside the building, they probably know where officers are. ![](media/image6.png)Machine generated alternative text: Org. 12/217 23.02.26 Building and Area Search As stated earlier, the responding officer should try to contact the owner or manager. Asking about unusual hiding places in the interior will help set the search team up for success. The owner, manager, and homeowner may already be on scene. This can be of great benefit but may be a hurdle to the search process. The access to keys and information is invaluable, but they may want to help in the search. The officer must not allow them into the building while the search is being conducted!!Although they are just trying to be helpful, it is distracting and makes the search officer responsible for the citizen\'s safety. Additionally, they may be armed, which can further complicate the search and reduce the safety of all involved. Search Team Having at least two officers during the search increases the safety of all involved. Due to a lack of available personnel or an extended response time, it may be challenging to have a secondary officer. This is, of course, something to consider when determining search tactics. Depending on the reason for the search, waiting for one or more assisting officers to show up is always preferable. A two-officer \"search team\" should conduct the search of the exterior of the building, the immediate surrounding area, and the interior of the building. The search team consists of a \"cover\" officer and a \"search\" officer. Each officer must understand their role in this team. When acting as a \"cover\" officer, the primary tasks include covering the \"search\" officer and any other areas not yet searched. The cover officer should consider having a long gun. Consider the area being searched and the potential for changing roles when selecting a weapon system. Both the shotgun and patrol rifle are viable options for officers trained in their use. The deployment of a long gun will be reliant on policy and the structure being searched. Practice proper weapon handling to ensure that the search officer is not \"lasered\" by the muzzle of the cover officer\'s weapon. If the search officer passes in front of the cover officer, the cover officer must lower the weapon muzzle pointing at the ground until the searching officer has cleared the line of fire. The \"search\" officer must conduct the actual search. This officer will typically be armed with their duty weapon only, leaving their hand free to use a flashlight, radio, open and close doors, turn on and off lights, etc. The search should be well planned, slow, and methodical. Getting in a hurry and taking unnecessary risks is how many officers have gotten hurt. A building search that is conducted effectively will resemble water flowing through a structure. This fluid motion of the search team comes as officers increase their comfort with different tactics. This also increases as officers become keenly aware of the other ![Machine generated alternative text: Org. 12/218 23.02.26 Building and Area Search duties performed by the other officer. The \"search\" and \"cover\" officers may switch roles whenever necessary to effectively complete their mission. As a result of the changing responsibilities, officers need to remember their area of responsibility and trust the other officers to do their job. Having only one search team is the preferred method of searching; however, itis dependent on staffing and the structure itself. Having one team makes it easier to ensure all areas have been searched. If more than one search team is used, constant communication is necessary between teams to enhance safety, deconflict movement and avoid working previously cleared areas. Tactics-Movement Remember to be thorough and take your time!!! There are many methodologies used when searching a building. Although they may differ in overall movement, they all still predominantly use somebasic concepts. \"Slicing the pie\" is one the most basic tactics in building search operations and allows officers to limit exposure to danger while gathering small pieces of information. Officers must remember not to cross their feet and to step within their shoulder width. This, mixed with an understanding of angles, places the officer in an advantageous position. This concept is incorporated in a technique referred to as \"pin and roll.\" This technique would have an officer move to the entry point of a room or structure, with the two primary officers beginning on one side of the entry point. One search team member can then slice the pie across the entry. This will allow for a large amount of the room to be cleared using distance and cover as long as possible. The primary searching officer then has a large amount of information that can be relayed before entry if entry is imperative. If the decision is made to enter the room, the searching officers must consider the room layout. Is it a center-fed room, or is it a corner-fed room? One method of entry is commonly referred to as the \"cross-over\" method, \"x\" method, or simply the \"crisscross\" method. As an example, both officers begin outside of a room on opposite sides of an entry point. One officer moves through the entry point into the room, crossing from left to right. The second officer crosses through the entry point, into the room,from right to left. ](media/image8.png)Machine generated alternative text: Org. 12/219 23.02.26 Building and Area Search Once inside the room, each officer is located on the opposite side of the entry point from where they started. Since one officer will cross in front of the other during the entry, muzzle control and muzzle awareness are critical! This allows for a smooth transition into the room and is more forgiving as officers move past the door\'s threshold. Entry can also be made by each officer stepping around and into the building on the same side of the entry point where they were on the outside. This requires telling each other what may be in their way as they enter. This is commonly referred to as the \"button hook\" method. Whatever type of entry is used, officers must remember to move away from the entry point immediately, if possible. Once inside, STOP, LOOK, AND LISTEN. The officer may have gathered a lot of information, but it is important to remember this is still an unknown environment and unknown elements still exist. There also is the need to acclimate to the environment. The room may be dark, and the eyes take a little time to adjust. This can be achieved by taking a couple of steps into the room and establishing a \"point of domination.\" It is vital to scan and be aware of where each officer is relative to each other, reinforcing safe weapon handling and muzzle awareness. Listen for any movement and to the natural sounds of the building. Take some time to evaluate and make any adjustments to the plan established outside. The tactical stance learned in firearms is a stable platform while moving through the building and promotes \"moving behind your panels.\" This concept of moving behind panels is meant for officers to have increased ballistic protection from body armor. Be aware of any cover and understand that walls inside a structure are more likely concealment and not necessarily cover. As they move through a structure, officers must critically think and make decisions. Officers gain and lose based on those decisions. For example, if all units go into a room, they gain a safer room entry but lose coverage of the hallway, and it must be retaken upon when exiting the room. Assuming the area remained clear could be highly problematic and dangerous. Before entering a hallway or entering a room, use the \"slice the pie\" technique to limit exposure while hopefully seeing the suspect before the suspect sees the officer. ![Machine generated alternative text: Org. 12/2110 23.02.26 Building and Area Search Doors may pose challenges, which can be overcome if officers gather appropriate information. An officer must consider the type of door, door handle, the location ofthe hinges, and a potential opening or window in the door. Slicing the pie even on a closed door with a window helps officers gain a lot of information before entering. When opening doors before entry, try to open the door all the way and then be sure to check the crack to verify someone is or is not hiding behind the door. More force may be used in opening the door as it is pushed open; however, be careful not to damage the structure\'s walls without just cause. Unless exceptional circumstances exist, do not pass a door without checking it first. Non-verbal communication is the preferred method to communicate while searching, if possible. During the planning phase of the search, defining and establishing what signals to use may be required. If verbal exchanges are needed, speak no louder than necessary. An officer must remember not to turn off their radio! It needs to remain on for immediate use in an emergency. If at all possible, have an earpiece for more stealth and quality of understanding. Suppose the officer does not have an earpiece, the radio volume down to maintain stealth. Check suspended ceilings closely. It is not uncommon for suspects to hide in elevated positions. If the officer believes someone may be in a ceiling, it is suggested that the officer go to a cover position and verbally order the suspect down. If no response is received, consider removing several panels, turning on the lights, and using a mirror attached to a collapsible baton to gain a view inside the confined space. If this is not possible, then the \"quick peek\" technique may be used. It is important to remember that the height and position of the quick peek must change if used multiple times. This helps to protect the officer\'s head, making the officer\'s re-appearance less predictable. In a multi-story building, consider searching one floor at a time. Starting on the bottom floor minimizes a suspect\'s ability to stalk and flank the officer. If sufficient staffing is available, it is a good idea to position an officer in a spot to guard stairs, escalators, and elevators during the search of multi-story buildings. Building searches will likely have a dim light component requiring an alternative light source. If it is tactically sound to turn the lights on, do it; otherwise, leave them off. Manipulation of the room lights also works to help an officer remember what has and has not been searched. If an officer turns lights on, consider shutting them off and closing the door when the search is complete. An officer may search a large structure and become confused by leaving some lights on. Be consistent! ](media/image10.png)Machine generated alternative text: Org. 12/2111 23.02.26 Building and Area Search If the officer(s) reach the final room on the primary search and have not yet found a subject, understand there is a high likelihood of encountering a person in the last room. If officers do not find a person after a primary search, consider a secondary search. Consistency is essential. Tactics-Suspect Contact/Control Officers should always expect to encounter someone during the search. This helps in reducing the likelihood of complacency and the possibility of missing something. An officer must determine if entry must be made or if the best option is to call the subject out. This is a balance that the officer must consider. Factors helping this are based mainly on the details of the situation. Is this an active killing situation, or is this a non-violent individual? These are just two of the questions that an officer must ask themselves before entry is made. If a suspect is located, the officers should move to a position of cover. The officer\'s roles change from \"search\" and \"cover\" officers to \"contact\" and \"cover\" officers. Whoever gives the suspect commands is now the contact officer instructing the suspect on what to do next. The remaining officer will cover the suspect and dangerareas. Defining the \"contact\" and \"cover\" roles limits confusion, speaking over each other, and issuing the suspect opposing commands. The first verbal component should include an identification statement. \"Police Department\" or \"Sheriff\'s Office\" may suffice. Not only is it essential for the officer to identify themselves but also to make a specific command. This early command will likely address controlling the suspect\'s hands, combined with an arrest statement and, if possible, the reason for being there. This is very important to gain compliance with any commands given. In addition, the suspect needs to understand who is issuing commands and the fact they are under arrest/detained. Remember, the suspect\'s hands are the most dangerous body part, and officers must clear the hands early in the interaction. As the officer moves the subject, giving clear and concise verbal commands, they must see their hands throughout this process. ![Machine generated alternative text: Org. 12/2112 23.02.26 Building and Area Search OTHER AREAS Conducting searches of buildings is expected in response to burglary calls, welfare checks, in fresh pursuit of a suspect, and even a simple request from a business or homeowner. The skills and tactics described above are not only for searching structures. The same tactics and methods can be applied in searching outside areas, stairwells, etc. If an officer moves with safety in mind and understands the concepts of cover and concealment, there is a better chance for success. CLOSING TASKS Secure the Building There may be situations where an officer finds faulty locks, doors, or windows while on patrol. The officer needs to notify the resident, manager, or business owner immediately if those are found. This notification should be done regardless if a search wasconducted or not. When the search is complete, and the officer is sure there is no suspect(s) inside, secure the building. The officer will then notify the owner, manager, or employee to explain what was done and secure the building in whatever fashion they choose. If no owner, manager, or employee can be notified, the officer must secure the building as best as possible within policy and procedure. The officer will do their best to secure the structure to prevent further home or business owner victimization. This can also prevent future civil litigation against the officer and agency. Notification of the alarm company would also be appropriate if applicable. Officers should notify Dispatch of the details and issues surrounding the search discreetly, via phone or mobile data terminal, especially avoiding a broadcast over police radio if they cannot secure the structure satisfactorily. Non-Law Enforcement listeners could exploit the unsecured scene once officers leave the area. An officer can if feasible, make periodic checks of the building until someone can be contacted. This is, of course, a courtesy and should no way be guaranteed. It is important not to enter into a special relationship with the business due to potential liability if a crime occurs once an officer promises to watch the structure. If time permits, the officer may remain near the building, watching for additional suspicious activity connected to the scene for a short time before returning to patrol duties. It is important to evaluate the given details and make the best decision possible. ](media/image12.png)Machine generated alternative text: Org. 12/2113 23.02.26 Building and Area Search CONCLUSION Officers have historically missed suspects by racing to the scene, failing to detect out-of-the-ordinary factors, and failing to take time to conduct thorough exterior, interior and area searches. Slow down, be thorough, and observant to enhance both safety and apprehension rates. ![Machine generated alternative text: Org. 12/2114 23.02.26 Building and Area Search Discussion Questions 1.Explain why having tools alone is not enough to complete a search of a structure successfully. 2.In class, there was a discussion on choices made in a building search. Why is it important to remember that every choice and tactic allows you to gain something and lose something? 3.How does a clear understanding of the \"why\" of the search set an officer up for success? 4.Why do officers get in a hurry or get complacent? How can an officer overcome this complacent mindset? 5.How does announcing and good communication improve the officer\'s and other potential subject\'s safety? ](media/image14.png)trfggv Financial Crimes Thursday, May 12, 2022 2:08 PM   \![Machine generated alternative text: Org. 12/211 23.04.15 Financial Crimes Property Crimes 6-Recognize the elements and perform an investigation of bad checks, credit card fraud, identity theft, counterfeit, fraud. Community Relations 1-Utilize basic strategies for assisting victims of crime with beneficial information. INTRODUCTION Law enforcement officers are required to investigate a variety of crimes. In recent years, financially motivated crimes have become more of a concern for law enforcement agencies of all sizes. These cases are not only more prevalent, but they are often intricate and complicated. Law enforcement officers who investigate these offenses must work to be as motivated and innovative as the persons who commit the crimes. A crime that is reported in one jurisdiction could, through good investigation, lead an officer to discover additional crimes in several other jurisdictions. These investigations require law enforcement officers to be able to work across jurisdictional boundaries and collaborate with officers from other agencies, even in different states or countries. Unfortunately, the complicated nature and broad scope of these cases can mean that suspects are not identified and the losses victims suffer are not recovered. In these instances, officers need to be well-versed in other resources that are available to victims. Sometimes just helping the victim walk through the process of making the report and advising them about steps they can take to protect themselves from being a victim of further crimes is the best an officer can do. By showing empathy and conducting a thorough, complete investigation, even when there is no arrest, the officer canstill provide a high-quality service to the victim. INTENT Intent is a critical element in proving someone guilty of a financial crime. Under being required to prove that the act was committed intentionally. However, in the state of Kansas no one can be convicted of any financial crime without the state proving he did so knowingly and intentionally. All Kansas financial crime statutes contain the same statutory language which states that the actions taken by the suspect must have been ](media/image16.png)Machine generated alternative text: Org. 12/212 23.04.15 Financial Crimes Definitions of Intent Purpose or aim. The state of mind with which an act is committed. Meaning or Design, resolve or determination with which a person acts. Mental attitude which can seldom be proved with direct evidence, but must ordinarily be proved by Why We Must Prove Intent Why would financial crime statutes be held to such a higher standard? The answer is simply because every day people make mistakes with their finances out of negligence, ignorance, or haste. People bounce checks thinking they have sufficient funds on hand. People use credit will also take all of the necessary steps voluntarily to correct the error. Simply put, we do not put people in jail for making honest mistakes. We mustprove what they were thinking at the time. What was their purpose? What was their intent? CRIMINAL USE OF A FINANCIAL CARD K.S.A. 21-5828 Statutory Definition and Penalties (a)Criminal use of a financial card is any of the following acts done with intent to defraud and to obtain money, goods, property, or services: (1)Using a financial card without the consent of the cardholder; (2)using a financial card, or the number or description thereof, which has been revoked or cancelled; or (3)using a falsified, mutilated, altered or nonexistent financial card or a number or description thereof. (b)Criminal use of a financial card is a: (1)Severity level 7, nonperson felony if the money, goods, property, or services obtained within any seven-day period are of the value of \$25,000 or more. (2)Severity level 9, nonperson felony if the money, goods, property, or services obtained within any seven-day period are of the value of at least \$1,000 but less than \$25,000. ![Machine generated alternative text: Org. 12/213 23.04.15 Financial Crimes (3)Class A nonperson misdemeanor if the money, goods, property, or services obtained within a seven-day period are of value of less than \$1,000. (c)As used in this section: (1)\"Financial card\" means an identification card, plate, instrument, device or number issued by a business organization authorizing the cardholder to purchase, lease or otherwise obtain money, goods, property, or services or to conduct other financial transactions; and (2)\"Cardholder\" means the person or entity to whom or for whose benefit a financial card is issued. (d)For the purposes of subsection (a)(2), a financial card shall be deemed canceled or revoked when notice in writing thereof has been received by the named holder thereof as shown on such financial card or by the records of the company. SOURCES OF CREDIT CARD FRAUD Card Lost by the Owner In this case the card has been lost due to the negligence of the owner. There may be no criminal act attached to coming into possession of the card. Liability attaches to the unauthorized use of the card. Therefore, the issue of consent must be addressed with the victim. Card Stolen from the Owner This is as the result of a robbery, burglary, or some form of theft. Separate criminal charges may apply to the act of obtaining the card. Liability attaches to the unauthorized use of the card. Card Stolen from the Mail This may be from a residence, business, or directly from the mail. It most often will occur without any knowledge of the party in whose name the card was issued. Federal charges may be appropriate relating to the manner in which the card was obtained. Liability attaches to the unauthorized use of the card. ](media/image18.png)Machine generated alternative text: Org. 12/214 23.04.15 Financial Crimes Mail Order, Telephone Order, or Internet Order This is the unauthorized use of the information contained on the card. The perpetrator may never have had possession ofthe actual card. The information could have been stolen through an electronic breach of an internet site or through other means which may never be known. Federal charges under the wire fraud and mail fraud statutes may apply. Liability attaches to the unauthorized use of the card. Fraudulent Application for a Financial Card information without their authorization. It may also involve using completely fictitious information. This act could include federal charges for theft from the mail. The criminal will steal pre- The criminal will then apply for the card, probably change the address for delivery of the card and subsequent statements, and leave the victim in the dark that a card was ever applied for or received. Counterfeiting or Alteration of a Financial Card This may involve making changes to the account number or other data on an existing card. Due to advances in technology, the manufacture of completely fraudulent cards and duplication of valid cards has become widespread. Gift cards are also subject to this type of fraud, in which new unsold gift cards may be shoplifted, cloned onto ablank card, and then put back on the shelf to be sold. After the card is sold, the thief can use the cloned card just as if it were the original. Skimming This involves the use of a digital device, either handheld or fixed in place, which allows the user to capture the identification information contained in the magnetic stripe on the back of the card. This information can then be used to make purchases overthe telephone or online. The suspect can also imprint the information to another card with a clean magnetic stripe. If a skimmer is installed on an ATM, it might also have a small camera that will allow the suspects to see the key pad on the ATM. This allows the suspect to see the buttons the victim presses when they enter their personal identification number (PIN). ![Machine generated alternative text: Org. 12/215 23.04.15 Financial Crimes VICTIMS It is important to properly identify and document all victims of these crimes. In most cases, the person whose name is printed on the financial card is not the only victim of a crime. By identifying all victims of a case, officers can conduct a thorough investigation and provide the best service for everyone. Individuals By law, individuals can only be held liable for limited amounts of money lost due to credit card fraud. Under the Fair Credit Billing Act (FCBA), the maximum liability is \$50.00 on a credit card once the victim has reported its fraudulent use. This penalty would apply to each card if multiple cards were involved. Under the Electronic Fund Transfer Act (EFTA), individuals cannot be held liable for any unauthorized charges to an ATM or debit card if they report that the card is lost or stolen before any unauthorized charges occur. If they wait more than two days after they discover the theft or unauthorized use of the card, victims may be liable for up to \$500 of the lost funds. If they wait more than 60 calendar days after receiving their bank statement, victims could be liable for the entire loss. Even i rating may already be done and it may be widespread and long term. Vendors Vendors who have been victimized by the unauthorized or fraudulent use of a financial card may be held liable for the total amount of the fraud if they have not followed established security procedures. However, if they can show that they did follow the standard security procedures recommended by the industry, they will most likely not incur any liability and will receive a charge back from the bank or vendor that issued the card in question. Issuing Bank or Vendor The issuing bank or vendor will most often be the ultimate victim in these crimes because they will have to absorb the loss from the fraudulent activity. ](media/image20.png)Machine generated alternative text: Org. 12/216 23.04.15 Financial Crimes ELEMENTS OF THE CRIME As with all other crimes, there are certain elements that must be present before charges can be brought under K.S.A. 21-5828. These elements must be developed during the investigation and supported by factual evidence. The type of evidence that would be appropriate will be discussed in later sections. The officer must prove the defendant used the financial card or the information represented on the card. The officer must prove the cardholder had not consented to the use of the card by the suspect and that the suspect knew that was the case. This element becomes a common issue when the suspect is a family member or close associate. They might raise the issue that the cardholder allowed them to use the card. The officer must document that this is not true. In addition, the fact that the person using the card did so in ways not intended by the cardholder will not on its own constitute a violation of this statute. For example, the fact that the user made purchases well in excess of what the cardholder thought would happen would not be a violation because consent was given. The officer must prove the suspect used the card for the purpose of obtaining money, goods, or services. Simple possession of the card, while it may support a theft charge, will not amount to a violation of this statute. The officer must prove the suspect took the actions with the intent to defraud. This will require proof the suspect knew the actions violated the law and that they were made willfully. In order to prove a felony, the officer must have proof of an accumulation of transactions that equal or exceed \$1,000.00 in a seven-day period. ![Machine generated alternative text: Org. 12/217 23.04.15 Financial Crimes EVIDENCE TO BE COLLECTED Each case will have its own aspects, but there are some basic investigative steps that can be taken which will be common to the majority of investigations of violations of this statute. Determine the identity of the suspect, if known, or obtain a detailed description. If the identity is known, be sure to include all available identifiers such as name, date of birth, etc. Collect videos or still photographs from surveillance cameras within the vendor location or at the ATM site. Conduct a detailed interview with the cardholder making sure the issue of consent is covered fully. Do not overlook this issue even in a case where the card has been stolen. Take detailed statements from all witnesses and note their personal identifying information to facilitate follow-up contacts. Be sure to note those witnesses who can identify the suspect. Be certain to interview any clerk or employee who actually dealt with the suspect during the transaction and cover all pertinent details in the interview. Determine the value and description of the merchandise purchased, or the amount of cash fraudulently obtained. Collect all receipts. Be sure to obtain the original of any receipt containing the signature of the suspect. This could be used in a handwriting analysis later.You may be able to recover fingerprints or other forensic evidence as well. Take custody of the actual credit card if it was left behind by the suspect or seized by the vendor or ATM. Remember that in many cases the card may not be available or may not even exist. The number may be all that exists. The actual card is not a piece of evidence that is critical to a conviction. If a card exists, however, it is helpful because it may contain forensic evidence. It can also be helpful to actually show a jury tangible evidence. Make note of any false identification information provided by the suspect. Obtain the names and contact information for the store manager or owner and, if the crime involves an ATM, for the bank manager or security officer. Contact the issuing bank or vendor and get a history of the charges made on the card. Be sure to obtain a detailed breakdown by day. This will be necessary in determining the level of the charges filed. ](media/image22.png)A document with text on it Description automatically generated![Machine generated alternative text: Org. 12/219 23.04.15 Financial Crimes FORGERY K.S.A. 21-5823 Statutory Definition and Penalties \[in part\] (a)Forgery is, with intent to defraud: (1)Making altering or endorsing any written instrument in such manner that it purports to have been made, altered or endorsed by another person, either real or fictitious, and if a real person without the authority of such person; or altering any written instrument in such manner that it purports to have been made at another time or with different provisions without the authority of the maker thereof; or making, altering or endorsing any written instrument in such manner that it purports to have been made, altered or endorsed with the authority of one who did not give such authority; (2)issuing or distributing such written instrument knowing it to have been thus made, altered or endorsed; or (3)possessing, with the intent to issue or distribute, any such written instrument knowing it to have been thus made, altered or endorsed. (b)(1) Forgery is a severity level 8, nonperson felony. APPLICATION OF THE STATUTE Although we most often think of the forgery statute as it pertains to forged checks, it should be noted -5111, Crimes and Punishments, the legislature defines the term written or printed matter or the equivalent thereof, used for purposes of reciting, embodying, conveying or recording information, and any money, token, stamp, seal, badge, trademark, or other evidence or symbol of value, right, privilege or identification, which is capable of being used to the advantage or disadvantage of ](media/image24.png)A document with text on it Description automatically generated![Machine generated alternative text: Org. 12/2111 23.04.15 Financial Crimes Altered Checks This is a check that is legitimate insofar as its original amount is concerned, but has since been altered to show a different amount payable, date, or payee. It is important in these types of cases to have the creator of the check personally identify those areas which have been altered and to give a clear statement as to what was originally entered on the check. Altered checks via check washing are a growing segment of check fraud. portions of the writing removed by a solvent and replaced with fraudulent information which might show no signs of alteration. Counterfeit or Fictitious Checks It is important to note that the check itself does not need to be stolen. Merely the account and routing information can be used illegally. Electronic check transfers and pay by phone services offered by many venders only require this information to process transactions via the internet or by phone. The information can be used to create counterfeit checks. This is an area that is becoming more common. Printers and software that allow individuals to create checks are readily and legally available. If the criminal has PRESERVATION OF EVIDENCE As with evidence of any crime, if officers recover any of these checks they should preserve them so they can be forensically analyzed. Secure the document in a paper sleeve or folder so it can be analyzed for fingerprints and possibly for handwriting and ink. Many banks will provide law enforcement officers with clear paper sleeves they use in the course of their business. Handwriting Analysis and Exemplars Handwriting analysis is an excellent tool to use when investigating forgery cases. However, this is an exact science and should not be rushed into in a haphazard fashion. Before attempting to obtain an exemplar from a suspect the officer should locate and contact a certified examiner for advice. The Kansas Bureau of Investigation laboratory wouldbe a good first contact. ](media/image26.png)Machine generated alternative text: Org. 12/2112 23.04.15 Financial Crimes IN THE EVENT OF AN ARREST After an arrest has been made, keep in mind that many forgery suspects are involved with multiple subjects and scams. Look for information related to coconspirators and other types of financial or identity crimes which may go hand in hand with their forgery operations. False ID cards, stolen mail, bags of trash, computers, cell phones, digital cameras, and other electronic devices may include evidence of forgeries. Also, look for solvents such as acetone, nail polish remover, alcohol, oven cleaner, or even bleach which can be used to remove or fade inks on checks. COUNTERFEITING CURRENCY K.S.A. 21-5840 Statutory Definition and Penalties (a)Counterfeiting currency is: (1)Making, forging or altering any note, currency, obligation or security of the United States with the intent to defraud; (2)distributing, or possessing with the intent to distribute, any note, currency, obligation or security of the United States knowing suchnote, currency, obligation or security has been made, forged or altered with the intent to defraud; or (3)possessing any paper, ink, printer, press, currency plate, computer or other item with the intent to make, forge or alter any note, currency, obligation or security of the United States. (b)Counterfeiting currency as defined in: (1)Subsection (a)(1) or (a)(2) is a: (A) Severity level 7, nonperson felony, if the total face value of the notes, currency, obligations or securities is \$25,000 or more; and (B) severity level 8, nonperson felony, if the total face value of the notes, currency, obligations or securities is less than \$25,000; and (2)subsection (a)(3) is a severity level 9, nonperson felony. ![Machine generated alternative text: Org. 12/2113 23.04.15 Financial Crimes HISTORY Prior to 2018, the state of Kansas did not have a statute for counterfeiting currency. If a law enforcement officer in the state investigated a case involving a counterfeit bill and was able to identify a suspect and develop a prosecutable case, the case could not be prosecuted in the state court. The case would have to be adopted by the United States Secret Service and charged federally. If the case was not charged federally, the officer would have to find an applicable state charge to use in their local district court. Forgery and theft were statutes that were used, as altered documents were used to obtain property or services by deception. With the creation of the counterfeiting currency statute, officers now have the option to charge the suspect with themost appropriate charge through state courts. APPLICATION OF THE STATUTE The first subsection of the statute breaks down the counterfeiting currency violation into three distinct acts. The first part deals with the creation or fabrication of currency from nothing, as well as the forging or altering of any existing currency. The second part deals with the act of distributing or possessing with the intent to distribute counterfeit currency. The final part deals with possession of any items used to make, forge or alter any currency. Subsections (1) and (2) are level 7 felonies if the value of the counterfeit currency is \$25,000 or more and level 8 felonies if the value of the counterfeit currency is less than \$25,000. Subsection (3) is a level 9 felony. As with other financial crimes, an officer must prove that the suspect, if they did not actually make or alter the currency, knew that the currency was counterfeit at the time they distributed or were in possession of the currency. The intent this may be proven circumstantially or by direct evidence or admission. VICTIMS The victim in a counterfeiting currency case can be individuals or vendors, as the counterfeit currency is typically given in exchange for goods or services. Depending on the circumstances of the case, the United States government could also be a victim. For example, if a real \$1 bill is altered and made to appear to be a \$100 bill, it has been damaged and is no longer usable as United States currency. ](media/image28.png)Machine generated alternative text: Org. 12/2114 23.04.15 Financial Crimes ELEMENTS OF THE CRIME To ensure a successful prosecution of a counterfeiting currency case, an officer must prove the defendant made, forged or altered the currency with the intent to defraud. Alternatively, the officer must prove the defendant distributed or possessed with the intent to distribute counterfeit currency with the intent to defraud. Or the officer must prove the defendant possessed any of the materials with the intent to make, forge or alter currency with the intent to defraud. EVIDENCE TO BE COLLECTED Each case will be unique, but there are some basic investigative steps that can be taken which will be common to the majority of investigations of violations of this statute. Take custody of the counterfeit currency and preserve it as officers would any other document that might be processed for fingerprints or other forensic evidence. Make note of the serial number and take a photograph of the counterfeit currency. If there ar jurisdictions, compare the serial numbers. If the serial numbers match other cases, coordinate with the officers who are investigating the other cases to determine if any suspects have been identified. Determine the identity of the suspect, if known, or obtain a detailed description. If the identity is known, be sure to include all available identifiers such as name, date of birth, etc. Collect videos or still photographs from surveillance cameras in the area. Take detailed statements from all witnesses and determine what, if anything, they did to attempt to ensure the authenticity of the counterfeit currency. Note the personal identifying information of all witnesses to facilitatefollow-up contacts. Be sure to note those witnesses who can identify the suspect. Be certain to interview any clerk or employee who actually dealt with the suspect during the transaction and cover all pertinent details in the interview. Determine the value and description of the merchandise purchased. Make a record of any false identification provided by the suspect. ![A document with text on it Description automatically generated](media/image30.png)Machine generated alternative text: Org. 12/2116 23.04.15 Financial Crimes (b)Giving a worthless check is: (1)a severity level 7, nonperson felony if: (A)The check is drawn for \$25,000 or more; or (B)more than one worthless check is given within a seven-day period and the combined total of the checks is \$25,000 or more; (2)a severity level 9, nonperson felony if: (A)The check is drawn for at least \$1,000 but less than \$25,000; (B) more than one worthless check is given within a seven-day period and the combined total of the checks is at least \$1,000 but less than \$25,000; or (C) the person giving the worthless check has, within five years immediately preceding commission of the crime, been convicted of giving a worthless check two or more times; and (3)a class A nonperson misdemeanor if the check is drawn for less than \$1,000. APPLICATION OF THE STATUTE As with the forgery statute, the legislature recognized that violations of this statute are committed by groups of people as well as by individuals. In that regard they worded the statute so that the penalties are extended to all members of an operation by saying checks. The first half of the statute covers those instances where someone knowingly and intentionally writes a check on an account that is either closed or non-existent. The second part deals with an instance where someone knowingly and intentionally writes a check on an account which does not contain sufficient funds to pay the check. ![Machine generated alternative text: Org. 12/2117 23.04.15 Financial Crimes Closed Account Checks These are checks written on an account that truly did exist at one time and on which the suspect had signing privileges. A crucial element in these types of cases is proving that the suspect clearly knew that the account was closed and still intentionally issued the worthless check or checks. In order to prove that fact, officers will most likely need records and testimony from the bank at which the account was located. If the bank records show that the suspect closed the account themselves, the knowledge issue is clearly addressed. However, if the bank closed the account, then officers must prove that the bank properly notified the suspect and that they received such notification. In that vein, the officer must also consider the possibility that the account involved another geographic location and leaves behind an open bank account with funds on deposit. This is often done to be sure that all outstanding checks are paid. After a period of time prescribed by the laws of the particular state, the bank may declare that the account was abandoned, and close the account. The bank will provide notification to the account holder but, if the new address is unknown, the notification may never be delivered. The bank will turn these abandoned funds over to the state. If the individual later realizes the account was left open and writes a check to empty the account, that check will be returned because the account was closed. In this instance officers will most likely not have the requisite intent. Insufficient Funds Checks In order to prove that there were insufficient funds to pay the check at the time of its presentation, as required by the statute, the officer will need to get the records of the account from the bank. Knowledge and intent become critical at this stage. Two major defenses will often be raised in these cases. The first is that the whole situation was simply a mistake and the suspect truly believed that there were sufficient funds on hand. The intent of the statute is not that people be convicted because of sloppy bookkeeping or bad math. Statements made by the suspect might be helpful here. The officer could also check to see if the suspect made numerous inquiriesabout the balance of the account. Officers must prove that the suspect knew what the balance was and would be when the check was presented. ](media/image32.png)Machine generated alternative text: Org. 12/2118 23.04.15 Financial Crimes A second defense will be that the suspect knew they had insufficient funds at the time they wrote the check but fully expected to have sufficient funds on deposit by the time the check would be presented for payment. One example would be where the suspect expected a direct deposit of a salary check to be made by a certain date but unexpectedly it was late. In thisinstance, there would be no intent to defraud. NOTE: In the instance of checks written on closed accounts and insufficient funds checks, the legislature has declared in the statute that intent can be negated by the payment of the required fee to the bank within the time frame established by the statute. In other words, if an individual makes a good faith effort to resolve the worthless check situation by paying the bank an overdraft fee, the state cannot come in behind that, prosecute the individual and state that their payment of the overdraft fee constitutes the knowledge and intent required by the statute. INVESTIGATIVE POINTS If a law enforcement officer does investigate a worthless check case, there are some circumstances that might need to be addressed in order to prove intent to defraud. Postdated Checks A postdated check is one that is written on a given date but bears a calendar date sometime in the future. Payment with a postdated check requires an agreement between the issuer of the check and the person accepting it. The nature of the agreement would be that the check would not be negotiated by the person accepting it until the date shown on the check. As part of the agreement, the issuer guarantees sufficient funds will be available to pay the check when it is presented. If the person accepting the check presents it for payment prior to the shown date and sufficientfunds are not on hand, there is no violation because the agreement was not followed by the person who accepted the check and entered into the agreement. ![Machine generated alternative text: Org. 12/2119 23.04.15 Financial Crimes ars the date it was issued. In this case the issuer and the person accepting the check agree upon a date when the check can be presented for payment. In exchange for the person accepting the check waiting until that date, the issuer agrees sufficient fundswill be available to pay the check on that date. As with the postdated check, if both parties uphold their parts of the agreement, the transaction is legitimate. If the check is presented on the agreed date and sufficient funds are not on hand, then the basis exists for prosecution under this statute. Stop Payment Checks The issuer of a check is entitled to direct the bank to stop payment of that check if they feel the transaction has been invalidated in some way. The bank will charge the issuer a fee for that service. In exchange, the bank will not pay the check if it is presented for payment unless and until the issuer directs the bank otherwise or issues a new check. In order for a suspect to use a stop payment action as a defense against a worthless check charge, there must be an absence of intent. The most common example of this would be that the account had sufficient funds on hand to pay the check at the time it was issued and especially when the stop payment was requested. IDENTITY THEFT ANDIDENTITY FRAUD K.S.A. 21-6107 Statutory Definition Identity Theft and Identity Fraud (a)Identity theft is obtaining, possessing, transferring, using, selling or purchasing any personal identifying information, or document containing the same, belonging to or issued to another person, with intent to defraud that person, or anyone else, in order to receive any benefit; or misrepresent that person in order to subject that person economic or bodily harm (b)Identity fraud is: (1)using or supplying information the person knows to be false in order to obtain a document containing any person identifying information; or (2)altering, amending, counterfeiting, making, manufacturing or otherwise replicating any document containing personal identifying information with the intent to deceive. ](media/image34.png)Machine generated alternative text: Org. 12/2120 23.04.15 Financial Crimes Statutory Definition of Personal Identifying Information (e) As used in this section: (1) an individual including, but not limited to, pictures, videos, emails and other data files; (2) following: (A)Name (B)birth date (C)address (D)telephone number (E) -drivers identification number or card (F)social security number or card (G)place of employment (H)employee identification numbers or other personal identification (J)birth, death or marriage certificates (K)electronic identification numbers (L)electronic signatures (M)any financial number, or password that can be used to access a checking or savings accounts, credit or debit card information, demand deposit or medical information; and (N)passwords, usernames or other log-in information that can be but not limited to, content stored on a social networking website. ![Machine generated alternative text: Org. 12/2121 23.04.15 Financial Crimes A Growing Problem In most years since 2001, the number of reports of identity theft received by the Federal Trade Commission (FTC) has increased. The agency took 86,250 reports in 2001 and the number grew to 650,523 by 2019. But the number more than doubled from 2019 to 2020, with a staggering 1,387,615 reports. Kansas is not immune to the issue. In fact, a study conducted by the FTC in 2020 disclosed that Kansas ranked first for the number of identity theft reports per 100,000 population, with 43,211 reports of identity theft. Plus, the top four cities in the top 50 metropolitan areas with the number of identity theft reports per 100,000 population were all in Kansas (1. Topeka, 2. Lawrence, 3. Wichita, and 4. Manhattan). Who is the Victim in Identity Theft? Identity theft is the fastest growing financial crime in the world and with this increase law enforcement has had to rethink its understanding of the crime and how to properly respond. One of the primary issues has been to identify who is actually the victim of the crime. Historically, if an individual reported that someone had used a credit card the vendor who accepted the card or the financial institution who held the funds as the victim. However, case histories have shown that the individual whose identity is used fraudulently can suffer significant financial losses, as well as long term damage to their fiscal and personal credibility, and often severe emotional and personal issues. The bottom line is there is no shortage of victims when it comes to identity theft and the officer has a responsibility to address all of them. Vendors Vendors can be victimized in a number of ways. They may be presented with a fraudulent credit card that was or appears to have been issued by them. The vendor might be a department store, a gasoline company or the like. When it turns out that these cards were fraudulently used or obtained, the vendor is likely to absorb the full loss for the fraudulent charges. If the fraudulent card used is backed by a financial institution and the vendor does not follow proper verification procedures, they will again be responsible for the entire loss. ](media/image36.png)A document with text on it Description automatically generated![Machine generated alternative text: Org. 12/2123 23.04.15 Financial Crimes Added to the financial cost is the emotional toll that dealing with the problem causes. Understandably, businesses and financial institutions are hesitant to do business with or extend credit to someone who appears to have a poor credit history. The victimized consumer is then put in the position of having to prove that they did not do the things appearing on their records. They are also left with the job of undoing everything and correcting a problem that they had no hand in causing in the first place. An additional problem for the victim is that the individual who committed the crime and caused the problem is often not located and is free to cause additional problems. Because the system of commerce under which we operate is based to a large part on trust, there are only limited protections the consumer can employ to proactively protect themselves. Because of this it is critical that law enforcement recognize that the individual is indeed a victim in an identity theft case. Who Commits Identity Theft? The identity thief is not someone who is unique to any particular social, economic, geographic or career group. While greed is still the most common motive behind the identity thief, that is not always the case. Sometimes it is an individual who simplywants to prove how smart they are by defeating physical and cyber security systems. Sometimes it is someone who is trying to be malicious and cause problems, embarrassment and stress for another. One growing area for identity theft is the problem of illegal immigration. but rather to create a means to stay in this country without obtaining legal immigrant status. Whatever the motivation, the crime is the same and the impact on the business, the financial institution, and the individual can be equally damaging. How are Identities Stolen? We have already touched on many of the schemes and devices used by identity thieves to obtain the information they need. These include theft from the mail, theft from trash, and card skimming. Identities could also be stolen through improper use of personnel data by employees, improper use of customer data by businesses and clerks, and other breaches of businesses or government entities, such as the United States Office of Personnel Management (OPM). ](media/image38.png)Machine generated alternative text: Org. 12/2124 23.04.15 Financial Crimes Role of Law Enforcement Law enforcement officers have two equally important jobs when dealing with identity theft. These are: (1) help the victim of the crime; and, (2) investigate the crime itself. When dealing with an identity theft situation officers can always do things that will help the victim. Unfortunately, they may not always be able to make progress in solving the crime. In fact, there will be many times when officers will not be able to do much at all because any leads to a suspect are lost in cyberspace. Help the Victim The first responder will often be the first person who has any possibility of helping the victim address the problems that may have been caused by the identity thief. In that regard, there are a few very basic steps that the officer can take to provide some initial assistance. The officer certainly does not have to take on the responsibility of walking the victim through every step and there should be no expectation that the officer will hold the process. However, by showing some initial concern and providing some very basic suggestions, the officer can help the victim get a quick start on dealing with the problem. Officers should empathize with the victim and let them know that they realize that they are, in fact, a victim in this situation. Suggest that they get all of their financial records together so that they have access to customer service numbers for all of their credit cards and bank accounts. TAKE A REPORT! This one step on the offi important thing they can do to help the victim start resolving the problems caused by this crime. The report is not a guarantee that an officer will solve the crime nor is it a promise that an investigation will even be conducted. The officer does not have the authority to make those kinds of promises. However, the victim will not be able to obtain any relief from creditors and credit bureaus without a police report and report number. The creditors and credit bureaus are constantly alert for people who may be trying to scam them. They see the filing of a report as an indication that the victim is serious in their claim. The report lends them some validity. So TAKE A REPORT! Put the victim in touch with the Federal Trade Commission (FTC). It is the one agency in the government which has the responsibility to assist the victim with the problems created by an identity thief. They will not investigate the crime. ![Machine generated alternative text: Org. 12/2125 23.04.15 Financial Crimes They will only assist the victim. The Federal Trade Commission can be contacted by telephone at 1-877-IDTHEFT (1-877-438-4338) or online at ftc.gov and then clicking on the link for Identity Theft. As an alternative approach, officers could di investigation. Officers can provide an additional service if their department contacts the Federal Trade Commission and orders a supply of their booklet TAKE CHARGE: Fighting Back Against Identity Theft. These can be ordered online for free. The booklet gives step-by-step instructions for what needs to be done as well as blank forms and helpful telephone numbers. Investigate the Crime Identity theft is a crime which demands investigation and prosecution. However, it is one of the more frustrating crimes to successfully investigate. Many cases of identity theft go unsolved because a suspect cannot be identified. Certainly, efforts shouldbe made, as with all crimes, to determine if an investigation is warranted but there also needs to be a sense of realism that these cases can often defy resolution or are simply too broad in scope for a small local department to investigate on its own. Some things to consider when making investigative decisions are: Are there any documents available including some that may have been handled or created by the suspect? If so, these documents must be secured and preserved the same as all other forms of document evidence so they can be examined for possible forensic evidence such as fingerprints and handwriting. Determine if any other crimes were committed. The crime of identity theft is rarely committed in a vacuum, that is, all by itself. There are almostalways other crimes committed such as financial card fraud, bank fraud, forgery, theft, mail fraud and others. Can the officer identify a suspect? If not, are there leads that might help you identify a suspect at some point? In order to answer these questions, officers place. Was it done locally such as by a robbery or burglary? Was it done remotely through the internet? Was it done at another geographical location ](media/image40.png)Machine generated alternative text: Org. 12/2126 23.04.15 Financial Crimes such as from determined and, as a result, a suspect may never be identified. If officers can determine a specific suspect or at least a specific scheme, they need to determine how widespread that scheme is. Is it limited to the geographic area or at least to this state? If that is the case, officers may want to pursue the case on their own. If the scope of the scheme is multi-state, national or international, is it reasonable to assume that the officer shouldbe the one to pursue the investigation? Examine who has the strongest jurisdiction and which level of investigation provides the strongest penalties. Officers also need to consider how big a commitment of resources may be involved. A small local department may not be able to spare the manpower that a state or federal agency could. There will also be costs involved that could cause budgetary issues for some departments. Other agencies may be able to assist officers or may turn out to be a better choice to conduct the investigation. At the state level, the Kansas Bureau of Investigation should be considered. At the federal level, the Federal Bureau of Investigation, the United States Secret Service, and the United States Postal Service all investigate identity theft crimes. In addition, the federal Trade Commission maintains a database called Consumer Sentinel which is for law enforcement use. Membership is free to all law enforcement agencies. Officers can enter information as well as use it for research to look for similar cases. A tool to assist law enforcement officers is section 609(e) of the Fair Credit Reporting Act. It provides victims of identity theft and law enforcement some relief in obtaining records of the crime from the financial institutions or credit card companies involved in the fraudulent transactions. Under this section of and direction, without a subpoena or warrant. Under the provisions of the act, the victim can provide law enforcement with authorization to obtain the records or the victim can request in writing that the business or institution send a copy of the records directly to the law enforcement officer. The victim may be required to provide the business or the institution with proof of identity as defined in the act and with proof of the identity theft. This would include a police report and a sworn affidavit. ![A document with text on it Description automatically generated](media/image42.png)A document with text on it Description automatically generated![Machine generated alternative text: Org. 12/2129 23.04.15 Financial Crimes Discussion Questions 1.Explain how section 609(e) of the Fair Credit Reporting Act can assist law enforcement officers in an identity theft investigation. 2.Explain why is it a good idea to have a forensic expert assist with the search of any computer or electronic device. 3.Explain why empathy is important for an officer who is investigating identity theft. ](media/image44.png)Machine generated alternative text: Org. 12/2130 23.04.15 Financial Crimes Vocabulary Empathy Intent Skimmer Financial card Forgery ![Machine generated alternative text: Org. 12/2131 23.04.15 Financial Crimes Sources Experian.com Federal Trade Commission: Consumer Sentinel Network Data Book 2020 Oxford Dictionary ](media/image46.png) Introduction to Firearms Thursday, May 12, 2022 1:49 PM   \Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 1 Class Title: Introduction to Firearms Class Code: 15.01 Handout Title: Introduction to Firearms Reviewed by: T. Kirk Bridges Instructed by: COMPETANCY STATEMENT FOR INTRODUCTION TO FIREARMS The trained student will apply the knowledge of basic concepts, functionality, and safety in handling the semi-auto pistol. LEARNING OBJECTIVES : Upon completion of the class by written examination and/or practical testing, the participant will be able to: 1. Identify rules governing the handling of firearms, including the following: a. Four General Firearm Safety Rules. b. Basic rules governing handling and storage of firearms at home. c. Render safe rules and techniques. 2. Identify and describe the following: a. Auto-pistol nomenclature. b. The operational cycle of auto-pistol. c. Procedures to function check the auto-pistol. 3. Identify the four aspects of threat incapacitation. 4. Identify the proper precautions involving range lead safety. INTRODUCTION Knowledge of firearms is a basic, but serious responsibility for all law enforcement officers. Officers must have an understanding of the function and operation of their duty weapons so they will be confident when called to use their weapon in the line of duty or in training situations. ![Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 2 THE GENERAL FIREARMS SAFETY RULES Firearms safety is as important during daily activities as during range and training activities. Law enforcement officers are required to carry, handle, and deploy their firearms in a safe manner, whether they are assigned to patrol, investigations, or specialized units within their organizations. Firearms safety rules are developed for teaching everyone how to safely manipulate and utilize a firearm. The four general safety rules are: 1. Treat all firearms as loaded. Treat every firearm as if it is loaded until YOU determine otherwise. Each firearm must be physically and visually inspected to ensure it is safe. 2. Never point a firearm at anything you are not willing to shoot. The muzzle of the weapon should not be pointed at, or pass over, anything that you do not want to shoot. Remember anything the projectile contacts will be damaged. 3. Keep your finger off the trigger until you have made the conscious decision to shoot. The conscious decision to shoot includes sights on target and the target being identified as a lethal threat. Only after these three conditions are met does the officer place their finger on the trigger. 4. Be sure of your target, backstop, and beyond. An officer must know what their target is, what is in line with the target, what is beside the target, and what is behind the target. Never shoot at anything that has not been positively identified as an intended target. AUTO-PISTOL NOMENCLATURE The semi-automatic pistol consists of two major components: the slide and the frame assemblies. Not all semi-automatic pistols are the same and some of the components may differ from one manufacturer to another. Frame The frame holds the trigger, trigger guard, the magazine release lever, slide stop lever, ejector, and grip. Some weapons will also have a de-cock lever on the frame. Slide The slide contains the barrel, rear sight, front sight, recoil guide and spring, extractor, and ejection port. Some weapons will also have a de-cock lever on the slide. ](media/image48.png)Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 3 Slide Trigger Sig Sa uer Trigger Guard Trigger Magazine Release Hammer Slide Stop Lever De - cock Lever Ejector ![Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 4 Glock Sig Sauer OPERATION CYCLE OF AUTO-PISTOL The officer should understand the functional cycle of the semi-automatic pistol in order to effectively use the pistol and deal with any stoppages that occur during its operation. There are eight steps in the functional cycle of operation of the semi-automatic pistol. Step 1: FEEDING the round up the feed ramp and toward the chamber. Rear Sight Front Sight Barrel Extractor Recoil Guide & Spring Ejection Port Rear Sight Front Sight Recoil Guide & Spring Barrel Ejection Port Extractor ](media/image50.png)Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 5 Step 2: CHAMBERING The slide strips the top round from the magazine as the slide travels forward, moving the round from the magazine to the chamber. Step 3: LOCKING The round is fully chambered and the breech end of the barrel locks into the slide. The pistol is ready to fire. ![Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 6 Step 4: FIRING The trigger is pulled, allowing the firing pin to strike the primer, igniting the primer, and firing the round. Step 5: UNLOCKING After the round has fired, the slide begins to move to the rear and the breech end of the barrel drops down, unlocking the barrel from the slide. Step 6: EXTRACTING As the slide continues to travel to the rear, the extractor pulls the spent cartridge from the chamber. ](media/image52.png)Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 7 Step 7: EJECTING As the slide completes its rearward travel, the left side of the cartridge case head contacts the ejector and the spent cartridge is pushed or flipped out of the ejection port. Step 8: COCKING As the slide completes its rearward travel the firing mechanism is cocked, ready to fire another round. ![A close-up of an object Description automatically generated](media/image54.png)Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 9 Magazine locks ![Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 10 CUSTODY AND TRANSPORTATION OF HANDGUNS Before transporting or taking custody of any firearm remember basic safety rule \#1 Treat all firearms as loaded and basic safety rule \#2 Never point a firearm at anything you are not willing to shoot. Not all firearms have the built in safety mechanisms that duty weapons do. Generally these are cheaper firearms, which may be encountered at crime scenes. These cheaper firearms require extra caution when handling. When transporting or taking custody of a semi-automatic pistol always: 1.Point the weapon in a safe direction. 2.Remove the magazine from the weapon. 3.Cycle the action. 4.Lock the slide to the rear. 5.Visually and physically check the chamber and magazine well to make sure the weapon is empty. 6.Transport the weapon with the slide open and the magazine out. When transporting or taking custody of a revolver always: 1.Point the weapon in a safe direction. ](media/image56.png)Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 11 2.Open the cylinder by using the cylinder latch. Cylinder latches will usually be on the left side of the weapon. Cylinder latches may need to be moved forward, backward, up, or down to be released, depending on the weapon. open 4.Remove the ammunition by depressing the extractor. 5.Transport the revolver with the cylinder open. FIELD STRIP AND ASSEMBLY OF THE SEMI-AUTO PISTOL Before disassembling any firearm, ensure the pistol is clear by removing the magazine and locking the slide to the rear. Visually and physically check to make sure the chamber and the magazine well are empty. Field Strip Steps 1.If the auto-pistol is equipped with a takedown lever that rotates, with the slide still locked to the rear, move the takedown lever to either the up or down position based on auto-pistol does not havea takedown lever than ease the slide forward until the slide stops. Point the visually and physically cleared auto-pistol in a safe direction and pull the trigger. 2.Pull the slide slightly to the rear relieving the tension on any slide stop levers or align any slide release pins and notches. Push any slide stops, pins or catches out of the frame. On the Glock pistol, pull the slide lock down on both sides of the frame. 3. After the cylinder latch is released, push the cylinder outward from the frame to ![Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 12 3. Remove the slide by moving the slide forward from the frame, paying attention to the guide rod spring so that it does not fly out. EYE PROTECTION SHOULD BE WORN WHEN FIELD STRIPPING OR PERFORMING ANY MAINTENANCE ON A WEAPON. 4. Turn the slide upside down, compress the recoil spring and lift out the recoil spring and guide rod assembly. 5. Lift up the barrel and pull back, removing it from the slide. Assembly Steps To assemble the semi-auto pistol, the steps used to disassemble are reversed. 1. Insert the barrel back into the slide. 2. Install the guide rod and guide rod spring assembly. 3. To install the slide on the frame The hammer should be forward. Start the notches at the rear of the slide on to the front frame rails, being careful not to damage either. moved rearward on the frame. Activate or install any needed take down levers or slide stops. FUNCTION CHECKS After assembly of the semi-auto pistol, function checks of the firearm should be performed. Prior to performing any function checks, ensure the weapon is safe by: Visually and physically check to make sure the weapon is not loaded. If the weapon requires a magazine to be inserted in order to fire, make sure the magazine is unloaded and then insert it into the magazine well of the weapon. Make sure the weapon is pointed in a safe direction at all times. Performing the Function Checks To ensure all of the function checks are performed and performed correctly, it is best to conduct the checks in the following manner: Firing mechanism check Rack the slide to the rear, cocking the weapon. ](media/image58.png)Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 13 Pull the trigger and listen to the firing pin or observe the hammer fall, if so equipped, and hold the trigger to the rear. Do not let the trigger go forward. With the trigger being held to the rear, again rack the slide to the rear. The hammer should not fall forward, if so equipped. Very gently allow the trigger to go forward, paying close attention and Pull the trigger completely to the rear; hear the firing pin and see the hammer fall forward, if so equipped. Safety check Rack the slide again and check that the weapon will de-cock, if so equipped, and all safety levers work properly. Magazine checks Insert an empty magazine and rack the slide to the rear. Make sure the slide will lock back on all empty magazines. With the slide locked back, on the empty magazine, release the magazine and make sure the magazine comes out freely. THREAT INCAPACITATION In the case of the use of firearms in deadly force scenarios, the concern is how well the bullet stops or incapacitates the offender. way to incapacitate is to interrupt vital life processes. A hole in the heart halts or impairs lungs causes bleeding flooding the air passages and causes drowning. A bullet to the brain usually stops all vital functions instantly. A hit that severs the spinal column instantly stops all bodily functions below the hit and can cause quick death. The speed of incapacitation or death depends on the severity of the wound. There are four aspects of terminal ballistics that cause incapacitation: penetration, permanent wound cavity, temporary wound cavity, and fragmentation. Penetration Penetration is the distance the bullet goes into the tissue and consequently causes damage to vital organs. Permanent Wound Cavity Generally, the larger the permanent hole caused by the projectile increases the chances of incapacitation due to blood loss, provided that a vital area is hit. ![Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 14 Temporary Wound Cavity Hydrodynamic forces cause the temporary wound cavity. Hydrodynamics is the branch of hydromechanics relating to how shock waves, transmitted via fluids, affect solid materials submerged in the fluids. The transfer of shock from a high-energy bullet can have an almost explosive effect on surrounding tissues, especially the nervous system. Although the effects of the temporary wound cavity may appear substantial, they are in reality a poor indicator of incapacitation potential. The temporary wound cavity is more pronounced in high velocity and/or expanding bullets. Fragmentation Primary fragmentation may come from the bullet itself fragmenting or from bones, teeth, etc. When dealing with firearm projectiles, the most important aspects of incapacitation are penetration and permanent wound cavity. The larger the permanent wound cavity the more effective. RANGE LEAD SAFETY Those working with and around firearms are exposed to lead through inhalation of lead dust from the ignition of the powder charge of the primer, absorption of lead dust sprayed onto the hands and through ingestion of lead dust particles reaching the mouth. Lead is taken into the blood stream, into the soft body tissue, then eventually stored in the bone where the body mistakes it for calcium. Lead has no useful purpose in the body and is considered a poison. Harmful Effects of Lead Absorption of lead into your body is hazardous to your health. Lead is stored in the blood, liver, kidney and bones. Frequent exposure to lead, particularly at high levels, can harm the nervous, digestive and reproductive systems, the brain, kidneys and can interfere with the body\'s ability to make blood. Symptoms of exposure to high lead levels may include loss of appetite, joint pain, sleep pattern changes, personality changes and sexual dysfunction. Lead dust that settles on clothes, shoes, skin, or hair can be carried home. Lead in the home is especially dangerous for children. Steps to Protect ](media/image60.png)Machine generated alternative text: Org 9/02 Rev. 8/15; 12/15, 5/20 Introduction to Firearms 15.01 15 The following are some simple steps to follow to protect you and your family from lead poisoning: DON\'T SMOKE ON THE RANGE. Smoking tobacco products on the KLETC range is not allowed. DON\'T EAT ON THE RANGE. Lead dust on hands and face can be ingested through contact with food. DON\'T COLLECT BRASS IN HATS. Many shooters use their hats to collect spent brass causing the hat to become covered in lead. When the hat is placed on the head, the lead is deposited onto the hair and absorbed into the skin. DO BE AWARE THE FACE, ARMS, HANDS & CLOTHING ARE COVERED WITH LEAD : Wash thoroughly with COLD WATER and soap, particularly those with facial hair. DO BE AWARE HAIR AND CLOTHES ARE STILL CONTAMINATED. To prevent cross-contamination, range clothes should be washed separately from other family clothing, especially those of infants. DO CHANGE RANGE SHOES BEFORE ENTERING RESIDENCE. Clothes, shoes and shooting gear are transporters of lead home to the family. Shoes should be left at the door to prevent lead from being tracked onto floors and carpets. DO AVOID PHYSICAL CONTACT WITH FAMILY MEMBERS UNTIL A SHOWER, SHAMPOO AND CHANGE OF CLOTHES. Lead can be transferred by casual contact; family and friends should not be hugged or kissed until a shower, shampoo and a change of clothes has occurred. Young children like to rush up to parents for a hug, this display of affection should be avoided if the officer is still in range clothes. CONCLUSION operate that firearm. In order to be able to operate their firearm, an officer must first understand it. By knowing how the firearm functions and what care it needs to function correctly, an officer can take the needed steps to have the necessary trust in their firearms and in themselves. Fundamentals of Marksmanship Thursday, May 12, 2022 3:44 PM   \![Machine generated alternative text: 1 Org. 9/02 Rev. 12/16, 5/20 Fundamentals of Marksmanship 15.02 Class Title: Fundamentals of Marksmanship Class Code: 15.02 Handout Title: Fundamentals of Marksmanship Reviewed by: T. Kirk Bridges Instructed by: COMPETENCY STATEMENT FOR FUNDAMENTALS OF MARKSMANSHIP LEARNING OBJECTIVES : The trained student will demonstrate marksmanship skills and abilities through implementation of fundamental standards of grip, sight alignment, trigger control, and stance. LEARNING OBJECTIVES: LO1 Demonstrate a proper shooting grip. LO2 Explain the benefits of the tactical shooting stance. LO3 Demonstrate a tactical shooting stance. LO4 Compare and contrast proper sight alignment and sight picture when compared to improper examples. LO5 Demonstrate the components of trigger control. LO6 Identify elements which have a negative impact on trigger control. INTRODUCTION A law enforcement officer is held accountable for each and every round fired from their firearm. As such, it is critical to establish a solid foundation in the fundamentals necessary to allow for a high degree of accuracy in the shooting process. Consistency and repeatability are absolutely necessary to establish and maintain the fundamentals of marksmanship. The grip, stance, sight alignment, and trigger control require a high degree of mental focus on the part of the shooter to achieve the consistent and repeatable elements of these fundamentals. ](media/image62.png)Machine generated alternative text: 2 Org. 9/02 Rev. 12/16, 5/20 Fundamentals of Marksmanship 15.02 THE GRIP A proper grip lays the foundation for a good shooting platform. An improper grip can cause shooter induced malfunctions in the auto-pistol. The slide of the auto pistol must be able to travel its intended distance at its intended speed for the firearm to function properly. A loose or weak grip can allow for the absorption of the recoil energy necessary to cycle the weapon, causing a fail to eject or extract malfunction. Grip and release, establishing the master grip high on the backstrap. Establishing a proper shooting grip begins with the firearm in the holster and is considered the first step in the Four Stage Draw. Elements of the Shooting Grip The shooter must first disengage the weapon retention devices of their holster, while simultaneously establishing the master grip on the firearm. The strong hand refers to the hand that establishes the master grip of the firearm. The support hand is utilized as a secondary support element. For a right-handed shooter, the strong hand is the right, the support hand is the left. For a left-handed shooter, the strong hand is the left, the support hand is the right. The master grip is the first stage towards building a strong foundation in gripping the firearm. The strong hand must be as high on the tang, or backstrap, as possible. This places the axis of the barrel as low as possible in relation to the strong hand to allow for a greater level created by the thumb and forefinger. ![Machine generated alternative text: 3 Org. 9/02 Rev. 12/16, 5/20 Fundamentals of Marksmanship 15.02 Bad grip lowon Good grip high on the backstrap the backstrap After drawing the firearm from its holster, the support grip should be accomplished as the firearm is being brought to a firing position. The support hand should be chest high and the thumb should bepointed toward the target. This aids in locking the wrist of the support hand and helps to prevent shooter induced malfunctions. The thumb of the support hand should be placed on a pre-determined reference point on the frame of the firearm. This reference point allows for consistency and repeatability in achieving a proper grip. The reference point may be different for each shooter. The support hand wraps around the grip of the firearm and the strong hand. The fingers of the support hand should overlap the fingers of the strong hand and be positioned directly under, and in contact with, the bottom edge of the trigger guard. This positioning prevents the strong hand. The thumb of the support hand is positioned on the slide takedown lever on the frame of the firearm using it as a reference point. The heels of the hands should be closed. Ideally, the grip of the firearm should be completely enclosed by the shooter\'s hands in a proper wraparound grip. Shooters with smaller hands may experience difficulty in completely closing the gap between the heels of their hands. and still achieve proper trigger finger placement. The proper finger placement on the of the hand. The shooter may have to slightly rotate the shooting hand to allow proper finger placement on the trigger. Any rotation of the hand may open a gap between the heels of the hands; however, it is ](media/image64.png)Machine generated alternative text: 4 Org. 9/02 Rev. 12/16, 5/20 Fundamentals of Marksmanship 15.02 important to keep any gap to a minimum. The barrel of the firearm should be aligned with the strong side forearm. The grip must be firm enough to control the recoil. To find the proper grip firmness, tighten the grip on the firearm until the firearm begins to shake, then loosen the grip until the shaking stops. It is vital the grip remains steady and constant throughout the firing cycle. The goal is to control felt recoil so the majority of the forces created move straight back into the hand and forearm. Muzzle flip occurs when the grip is improper or too loose and the barrel of the firearm rises, sometimes several inches. This requires greater time to recover to a shooting position. THE TACTICAL STANCE Benefits of the Tactical Stance A proper stance will provide the shooter with greater stability and will maximize control of the recoil. In addition, the tactical stance is very adaptable to a variety of firearms: handgun, shotgun, sub-gun, and patrol rifle. Shooting on the move, in a variety of directions, is easily accomplished with the tactical stance. Most importantly, the tactical stance places the officer square to the threat, thus maximizing the ballistic protection Tactical Stance Components The stance should feel and look aggressive. apart or slightly wider. This position allows for a solid shooting foundation. The critical straight into the target. even with the heel of the weak foot. The strong foot is the foot that corresponds with whichever hand is establishing the master grip. If the shooter is firing with their right hand, bend at the waist, knees, and ankles, and lean should be forward on the balls of their feet. ![Machine generated alternative text: 5 Org. 9/02 Rev. 12/16, 5/20 Fundamentals of Marksmanship 15.02 Feet Aligned Feet Offset SIGHT ALIGNMENT AND SIGHT PICTURE Sight Alignment Sight alignment is the relationship between the front sight and rear sight, without consideration of the target. Proper sight alignment is accomplished by lining the top of the front sight with the top of the rear sight. The front sight is centered in the notch of the rear sight. Sight Picture Sight picture is the relationship between properly aligned sights and the target. Proper sight picture is achieved by placing the front sight of the properly aligned sights in the area of the target where the shot is desired to impact. The shooter must focus and concentrate on the front sight of properly aligned sights, not the target. The front sight should be sharp and in focus, the target should appear to be blurred or fuzzy. ](media/image66.png)Machine generated alternative text: 6 Org. 9/02 Rev. 12/16, 5/20 Fundamentals of Marksmanship 15.02 Proper sight alignment and sight picture are critical for shooting accuracy. A sight alignment error of 1/16\" will cause the impact of the bullet to be more than 10\" off the intended target at 25 yards. Therefore, a shooter who lines up the front sight im. If the of aim. This assumes a five-inch sight radius. If a shooter focuses on the target instead of the front sight of properly aligned sights, the shooter will not know where the front sight was positioned when the shot breaks and therefore will not know where or if the round will hit the target. If the target is in focus, then the front sight cannot be in sharp focus to the shooter. TRIGGER CONTROL Proper trigger control is critical for both combat and target shooting. To understand trigger control, the shooter must first understand double action trigger mechanisms and single action trigger mechanisms. Double Action / Single Action Trigger Mechanisms Double action trigger mechanisms Double action trigger mechanisms refer to firearms which have a longer first trigger pull, incorporating taking up the slack in the trigger. Pulling the trigger performs two functions: cocking and firing the weapon. Firearms with a hammer will generally incorporate a double action trigger, such as the Sig P226 or Berreta 92. The second and any subsequent shot will utilize a single action trigger pull in most firearms. There are however, double action only firearms which require the full length of the trigger pull to fire every shot. The single action refers to a much shorter trigger pull and is achieved in most firearms after a proper reset of the trigger. The reset point is much shorter in the trigger pull arch than releasing the trigger to its full forward, or double action, position. ![Machine generated alternative text: 7 Org. 9/02 Rev. 12/16, 5/20 Fundamentals of Marksmanship 15.02 The Glock is referred to by the industry as a safe action firearm. Pulling the trigger performs three functions: the trigger safety is released, the firing pin is pulled to the rear and placed under spring pressure, and is then released allowing the firing pin to strike the primer of the bullet. As such, an argument can be made that the Glock is a double action pistol. Single action trigger mechanisms The many versions of the 1911 utilize a single action trigger pull. Pulling the trigger does one thing: it releases the hammer that fires the firearm. The single action trigger mechanism is generally much shorter and lighter than a double action only trigger mechanism. Components of Trigger Control Proper finger placement The first priority of trigger control is proper placement of the finger on the trigger. For double action trigger mechanisms, the trigger should be in between the first joint and the tip of the trigger finger. Placement too far forward of the joint, toward the tip of the finger, will result in shots generally being pushed to the shooter\'s weak side. Placement beyond the first joint, too much finger on the trigger, will result in shots being generally pulled to the shooter\'s strong side. For single action trigger mechanisms, the trigger should be placed in the middle of the pad, between the first finger joint and the fingertip. The shooter must find the location on their trigger finger which allows for trigger pull straight along the axis of the firearm slide. Proper finger placement Improper finger placement Trigger pull The next component of trigger control is controlling the movement of the trigger, often called trigger pull or trigger squeeze. The trigger should be steadily and deliberately brought to the rear until the shot breaks. The goal is to avoid any ](media/image68.png)Machine generated alternative text: 8 Org. 9/02 Rev. 12/16, 5/20 Fundamentals of Marksmanship 15.02 disruption of the sight picture. The shooter should not \"stage\" or pause during the trigger pull. The trigger pull should be smooth and the pressure on the trigger should be steadily increased until the shot breaks. The shot should surprise the shooter. Shooters must avoid the temptation to anticipate the shot. Anticipation will result in an errant shot, usually low of the intended shot placement. Trigger pull practice should be conducted slow and deliberately. This will allow for the development of proper muscle memory of the trigger finger. Once the foundation of muscle memory has developed, the shooter can successfully increase the speed of the trigger pull. Shooters of any skill level will benefit from dry fire practice of the trigger pull. However, practice does not make perfect. Only perfect practice will result in the development of the desired muscle memory. The process of pulling the trigger must be accomplished by pressing with the trigger finger only. A common mistake made by shooters is squeezing or tightening with their entire shooting hand. The negative shooting results are explained under the Trigger reset Auto-pistol shooters must master the trigger reset in order to achieve the high levels of shooting accuracy desired in law enforcement. After the first shot is fired, the shooter must consciously hold the trigger all the way to the rear as the weapon cycles. After recovery from the recoil, the pressure is gently released on the trigger, allowing it to move slightly forward to the point of reset. The shooter should feel and hear a click, as internal mechanisms re-engage to allow for subsequent shots. If the trigger is allowed to return to its full forward position, the shooter must then take up the slack created in the trigger pull. This creates wasted movement and can setup a potential slap or jerk of the trigger. Controlling of the trigger reset is very much a mental process. The shooter must work very slowly at first to create the necessary muscle memory. Speed can then be gradually added. Mechanical elements of trigger reset To aid in understanding the importance of trigger reset, the shooter must understand what is taking place

Use Quizgecko on...
Browser
Browser