-
state the requirements of the Fourth Amendment on the law of arrest. (2.2.7)
-
explain how constitutional rights in the Fifth, Sixth, and Fourteenth amendments affect police interrogations. (2.2.8)
-
summarize the rights of individuals being interrogated under the fifth and Sixth Amendments and the importance of adhering to procedures that protect those rights including:
-
The prohibition against forced or coerced self-incrimination
-
The Sixth Amendment right to counsel and correlating Minnesota Statute (Minn, Stat, 481.10) (2.2.9)
-
evaluate mock crime situations and determine if evidence is admissible under the Fourth Amendment. (2.2.10)
-
explain types of evidence and the differences between them, i.e., direct and circumstantial evidence. (2.2.11)
-
describe the exclusionary rule and risks associated with contaminated evidence and loss chain of custody of evidence. (2.2.12)
-
describe the following suspect identification methods: line-up, photo line-up, and field identification. (2.2.13)
-
explain and demonstrate search warrant preparation including establishing a factual basis for probable cause and identifying items to be searched for and seized. (2.3.2)
-
identify the legal requirements governing preparation and execution of the search warrant of a suspect’s home or dwelling, vehicle, or person. (2.3.3)
-
explain the scope and limitation of a lawful warrant-less seizure during a consent search of persons. (2.3.4)
-
explain the scope and limitation of a lawful warrantless search of a premise and warrantless search of a vehicle. (2.3.5)
-
explain the scope and limitation of a lawful warrant-less search during a search based on exigent circumstances. (2.3.6)
-
explain the scope of a lawful warrant-less search during a plain view search. (2.3.7)
-
discuss how telephonic search warrant and search warrant templates can speed up the search warrant application process. (2.3.8)
-
explain each of the following types of orders: Domestic Violence Protective Orders, Order of No Contact, and Orders to Pick Up Children (2.3.9.)
-
explain the Supreme Court decision Miranda vs. Arizona and the four components of the Miranda Warning. (2.6.1)
-
explain a criminal defendant’s Sixths Amendment right to an attorney in all criminal prosecutions including interviews and interrogations. (2.6.2)
-
describe legal interviewing and interrogation techniques peace officers may use and the difference between a voluntary and coerced statement. (2.6.3)
-
explain the difference between custodial and noncustodial interview or interrogation. (2.6.4)
-
describe consideration for videotaping and recording interviews and interrogations and explain when interrogations must be recorded (State v. Scales. 518 N.W.2d 587 (Minn. 1994) (2.6.5)
-
explain when admissions and confessions are legally admissible in court. (2.6.6)
-
explain the purpose of an interrogation and how results of interrogation can be used in trials. (2.6.7)
-
explain the conditions under which confessions may or may not be used in court. (2.6.8)
-
demonstrate understanding of Minnesota laws related to sexual assault including the statutory definitions of sexual-assault-related terms and what constitutes a crime of sexual assault in the first through the fifth degree (2.17.1)
-
identify facts that are known about sexual assault in the U.S. including: the prevalence of criminal sexual assault by known and unknown perpetrators, who the victims of sexual assault are/may be, who sexual assault perpetrators are/may be and, what is known about the characteristics/motivations of perpetrators of sexual assault. (2.17.2)
-
identify and refute common misinformation and misconceptions about sexual assault, sexual assault reporting, and the perpetrators and victims of sexual assault and explain how misconceptions about sexual assault can impact how victims are treated and whether or not they report assaults to the police (2.17.3)
-
explain what trauma is, the basics of how the human brain and body react to trauma and why the trauma of sexual assault victimization may disrupt normal physical emotional cognitive and interpersonal behavior immediately or well after a traumatic experience. (2.17.4)
-
demonstrate understanding that victims of sexual assault exhibit a wide spectrum of responses and coping mechanisms, that there is no right way or right time frame for a victim to respond to being sexual assaulted, and identify some signs and symptoms that may be indicative of trauma.(See full objectives for examples) (2.17.5)
-
explain how officer doubt, judgment and repeated questioning can retraumatize victims, negatively impact victims’ recovery and trust in law enforcement and support a culture where sexual assaults go
unreported and assailants are free to reoffend. (2.17.6)
-
identify the value and elements of a victim-centered approach to sexual assault including the role and importance of victim advocates and the use of trauma informed victim communication strategies (2.17.7)
-
explain why it is important to support victims according to their unique needs and circumstances. Identify some special needs that might be related to a victim’s age, gender identity, disability, religion or culture, and explain why people in marginalized communities may face different barriers to reporting sexual assault. (2.17.8)
-
identify special care and considerations for writing police reports and collecting evidence in situations involving sexual assault. (See full objectives for examples) (2.17.9)
-
discuss interview techniques used to:
-
build rapport
-
encourage full meaningful answers and discourage suggestibility
-
clarify and corroborate statements
-
enhance memory
-
detect deception
-
obtain information from a reluctant witness. (3.2.1)
-
discuss interview considerations and techniques for interviewing children, vulnerable adults and traumatized victims. (3.2.2)
-
discuss how and why interviewing techniques must vary depending on the interviewee and the circumstances, i.e., when interviewing children, traumatized victims. (3.2.3)
-
conduct interviews using procedures that:
-
are appropriate to the situations
-
ensure the protection of individual rights
-
effectively gather information
-
encourage cooperation
-
enhance memory. (3.2.4)
-
conduct interrogations of suspects using appropriate techniques to gather information, detect deception, and gain and admission or confession depending on the circumstances. (3.2.5)
-
explain and participate in evidence-based procedures for identifying suspects, i.e., lineup, photo lineup, and field identification, including blind/blinded administration of the lineup, instructions to the eye witness that the perpetrator may or may not be present, use of non-suspect “fillers” that match the eyewitness’s description of the perpetrator and do not make the suspect noticeably stand out and asking a witness to state his or her level of certainty, in his or her own words, as soon as an identification is made. (3.2.6.)
-
describe appropriate protective gear that may be needed when collecting g and processing evidence. (3.5.1)
-
identify various types of evidence, i.e., blood and biological weapons, explosives and arson related evidence, hair and fiber, impressions, fingerprints, documents, clothing. (3.5.2)
-
describe risks associated with contamination of evidence. (3.5.3)
-
demonstrate proper preservation, collection, processing, storage and chain of custody procedures for a variety of types of evidence, i.e., fingerprints, DNA, shoe/tire impressions, blood spatter. (3.5.4)
-
demonstrate proper evidence documenting techniques, i.e. note taking field sketching and/or photographing/videotaping. (3.5.5)
-
discuss the impact of new or emerging technologies on crime scene evidence collection and investigation. (3.5.6)
-
recognize, secure and protect technical evidence at a crime scene, i.e. computers, phones cameras surveillance equipment. (3.5.7)
-
explain the impact of the Electronic Communication Privacy Act and other pertinent case law on the collection of technological evidence. (3.5.8)
-
discuss the importance of information obtained from electronic devices in crimes including: pornography, economic fraud, e-mail threats, extortion, gambling, identity theft, narcotics, prostitution, software piracy, and telecommunications fraud. (3.5.9)
-
practice responding to a variety of requests for service including:
-
receiving and comprehending information to and from dispatcher
-
demonstrating safe vehicle positioning where applicable based on type of call and information available
-
observing and conducting initial assessment upon arrival at the scene for safety concerns and useful information
-
using active listening and clear oral communication skills
-
identifying victims, witnesses, and suspects
-
taking statements and conducting initial interviews
-
making reasonable decisions based on a reasonable interpretation of observations and circumstance
-
determining what additional services might be called in, e.g., EMS, Social Services (3.6.1)
-
demonstrate how to safely and properly secure and protect a crime scene (3.6.2)
-
given a crime scene, determine if there is enough evidence to provide probable cause for a search or arrest warrant and fill out the appropriate forms(s) to obtain the warrant. (3.6.3)
-
request search or arrest warrants where appropriate. (3.6.4)
-
discuss investigation and evidence collection techniques specifically related to homicide, suicide, accidental and natural death scenes. (3.14.12)
-
explain the terms flashover and backdraft and the risks associated with flames, head, smoke, toxic gasses and explosions at fire scenes. (3.14.36)
-
describe the crime of arson, the common evidence used in differentiating between arson caused fire and other causes, and the importance of securing and protecting evidence at fire scenes. (3.14.37)
-
discuss responsibilities and safety concerns relative to peace officer response to fire scenes and the different roles and responsibilities of officers, fire fighters and representatives of the fire marshal’s office. (3.14.38)
-
explain how to use a fire extinguisher on various types of fires. (3.14.39)