![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Sociology, social studies > Crime & criminology > Criminal investigation & detection
Evidence-based policing is a core part of the National Policing Curriculum but policing students and new officers often feel daunted by the prospect of understanding research and how to use it to inform decision making in practice. This text helps readers develop a sound understanding of evidence-based practice in policing and contextualises the research process by explaining how it supports practice within the workplace. It clearly relates research to the investigative process, combining academic theory and operational understanding using relevant case studies and scenarios, and identifies the main approaches employed. It explores how evidence from research can be used to inform and develop critical arguments central to policing practice and signposts students to key sources of information. The Professional Policing Curriculum in Practice is a new series of books that match the requirements of the new pre-join policing qualifications. The texts reflect modern policing, are up-to-date and relevant, and grounded in practice. They reflect the challenges faced by new students, linking theory to real-life operational practice, while addressing critical thinking and other academic skills needed for degree-level study.
This thrilling story memorializes one of the most dangerous-and successful-series of undercover operations conducted by the Bureau of Alcohol, Tobacco, Firearms and Explosives. Written by the special agent who took these operations from disrupting small time fencing schemes to infiltrating major criminal organizations, this book is the first story of these secretive operations. During the operation's run from 2006 to 2014, Lou Valoze's fictitious businesses allowed his team of undercover agents to take thousands of weapons out of circulation and millions of dollars of drugs off the street. Through these covert "storefront" operations, the author developed a unique investigative blueprint for removing guns from the hands of violent felons and drug dealers. This book also explores the dark reality of living a double life and how it becomes difficult to tell the difference between the good guys and bad guys.
Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to effectively investigate an Android phone. This book offers a thorough review of the Android platform, including the core hardware and software components, file systems and data structures, data security considerations, and forensic acquisition techniques and strategies for the subsequent analysis require d. this book is ideal for the classroom as it teaches readers not only how to forensically acquire Android devices but also how to apply actual forensic techniques to recover data. The book lays a heavy emphasis on open source tools and step-by-step examples and includes information about Android applications needed for forensic investigations. It is organized into seven chapters that cover the history of the Android platform and its internationalization; the Android Open Source Project (AOSP) and the Android Market; a brief tutorial on Linux and Android forensics; and how to create an Ubuntu-based virtual machine (VM). The book also considers a wide array of Android-supported hardware and device types, the various Android releases, the Android software development kit (SDK), the Davlik VM, key components of Android security, and other fundamental concepts related to Android forensics, such as the Android debug bridge and the USB debugging setting. In addition, it analyzes how data are stored on an Android device and describes strategies and specific utilities that a forensic analyst or security engineer can use to examine an acquired Android device. Core Android developers and manufacturers, app developers, corporate security officers, and anyone with limited forensic experience will find this book extremely useful. It will also appeal to computer forensic and incident response professionals, including commercial/private sector contractors, consultants, and those in federal government.
This book discusses privatization of law enforcement in relation to suspected corporate crime and recommends guidelines for successful fraud examinations. There is a growing business for global auditing and local law firms to conduct internal investigations at client organizations when there is suspicion of white-collar misconduct and crime. This book reflects on the work by these private fraud examiners in terms of an evaluation of their investigation reports. The book brings an original theoretical and methodological approach to investigations of white-collar crime. It develops the theory of convenience as an explanation for motive, opportunity, and willingness to commit and conceal white-collar crime. This theory is then related to the case studies. Structured in such a way as to allow the reader to use the text as a nonsequential reference source or guide to a set of connected issues, the book illustrates the practice of privatization by cases and presents guidelines for successful fraud examination. As an investigation can lead to conviction and incarceration, this privatization of crime investigation feeds into the larger issue of privatization of policing. The work will be a valuable resource for students, academics, and practitioners working in the areas of Criminal Justice, Corporate Law, and Business.
Detection Avoidance in Homicides: Debates, Explanations and Responses presents theory and research on how offenders avoid detection and the challenges and opportunities these efforts pose to investigators. From a scholarly perspective, the book presents a continuing history of research on detection avoidance by offenders, discusses the features of complex death investigations involving detection avoidance, and critiques the current frameworks used for conceptualizing these behaviors. Dr. Ferguson focuses on the key debates in the literature, argues for collaborations between researchers and practitioners to remedy siloing, and explores the reality of detection avoidance in homicides as complex and multifaceted. While detection avoidance behaviors have the potential to negatively impact sudden death investigations and frustrate criminal investigations specifically, their use also creates broader problems. These include many problematic effects on family members of the deceased, police officers, police agencies and the communities they serve. Offenders choosing to use detection avoidance behaviors challenges the efficient use of public resources, puts at risk the successful adjudication of homicides, and creates a public safety issue. The book explains detection avoidance using learning, situational, individual and gender-based theories, including proposing whether it may be a form of coercive control used by intimate partner abusers. Finally, how detection avoidance by offenders is recognized and responded to in sudden death investigations is addressed, with specific reference to useful examples of policy reform implemented by various police agencies internationally. Providing research and theory to explain detection avoidance and best practice for responding to it, this book will be of great interest to students and scholars of criminology, forensic science and psychology. It will also be useful to professionals working with homicide offenders.
Revised and expanded to reflect the most recent innovations in the field, The Scientific Examination of Documents, Fourth Edition is a handy, accessible volume detailing current best-practices for forensic document examination. Since the first edition published in 1989, there have been drastic changes in the field of forensic document examination-both from the use of the analytic techniques available to the professional examiner-and the changes to technology in office and printing equipment and inks. The purpose of analyzing any material used in the production of a questioned document, such as an ink or a piece of paper, is to compare it with another material elsewhere in the questioned document itself-or on another document-to determine whether or not they share a common origin. There may also be a need to provide information for the investigator about the possible origins of the document. This latest edition reflects the myriad changes and advances that have occurred in the last 10 to 15 years. Topics covered include: current thinking on handwriting interpretation; accidental and deliberate modification of handwriting; the proper collection of samples; a discussion of shredded documents; professional accreditation standards, qualifications, and training; and modern digital imaging and analysis of documents and handwriting utilizing software and imaging, including reconstruction of an image from erasures, obliteration and other document altering methods. A new section addresses cognitive bias and Chapter 8 is completely updated to cover the advances in print and photocopied documents, based on current technology, and analytical developments in the comparison of such documents. Key features: Discusses issues regarding handwritten, photocopied, and printed documents-including inkjet versus digital printing Presents the advances and capabilities modern office fax, photocopy, and printing technologies-and implications for document examination Details and reinforces the importance of ensuring proper scientific methods during an examination Addresses current Raman spectroscopy, UV-VIS, mass spectroscopy, and SEM analysis techniques Highlights the importance, and implications, of biological and fingerprint evidence from documents that can be collected, examined, and utilized in a case The Scientific Examination of Documents, Fourth Edition serves as an invaluable resource to established professionals, those just entering the field, and legal and investigative professionals outside the discipline who have a professional interest dealing with questioned documents in the course of their work.
The challenge of a fully automatic fingerprint-recognition system continues to motivate many researchers to address fingerprints and related problems. In addition to fingerprint analysis in law enforcement, civilian applications are now being planned because of unique benefits that fingerprint technology offers. Automatic Fingerprint Recognition Systems assesses the challenges for achieving fully automatic operation. In addition, it examines advances in the various aspects of fingerprint recognition: newer models of individuality analysis, new technologies for inkless sensors, empirical evaluation of fingerprint recognition performance, synthetic generation of fingerprint images, fingerprint videos, and new large-scale systems for fingerprint identification. The book offers a history of fingerprint research and also confronts its future--in particular, how research in the allied fields of computer vision, image processing, pattern recognition, and empirical performance evaluation will advance the science and technology of fingerprint identification.
Widespread law enforcement or formal policing outside of cities appeared in the early 20th century around the same time the early film industry was developing -the two evolved in tandem, intersecting in meaningful ways. Much scholarship has focused on portrayals of the criminal in early American cinema, yet little has been written about depictions of the criminal's antagonist. This history examines how different on-screen representations shifted public perception of law enforcement -initially seen as a suspicious or intrusive institution, then as a power for the common good.
The International People's Tribunal addressed the many forms of violence during the period of the massacres of 1965-1966 in Indonesia. It was held in The Hague, The Netherlands, in November 2015, to commemorate fifty years since the killings began. The Tribunal, as a people's court, holds no jurisdiction and was an attempt to achieve symbolic justice for the crimes of 1965. This book offers new and previously unpublished insights into the types of crimes committed in the 1965 genocide and how these crimes were prosecuted at the International People's Tribunal for 1965. Divided thematically, each chapter analyses a different crime - enslavement, sexual violence, torture - perpetrated during the Indonesian killings. The contributions consider either general patterns across Indonesia or a particular region of the archipelago. The book reflects on how crimes were charged at the International People's Tribunal for 1965 and focuses on questions relating to the place of people's tribunals in truth-seeking and justice claims, and the prospective for transitional justice in contemporary Indonesia. Positioning the events in Indonesia in 1965 within the broader scope of comparative genocide studies, the book is an original and timely contribution to knowledge about the dynamics of the Indonesian killings. It will be of interest to academics in the field of Asian studies, in particular Southeast Asia, Genocide Studies, Criminology and Criminal Justice and Transitional Justice Studies.
Presenting an integrated approach to information exchange among law enforcement institutions within the EU, this book addresses the dilemma surrounding the need to balance the security of individuals and the need to protect their privacy and data. Providing the reader with a comprehensive analysis of information exchange tools, exploring their history, political background, the most recent legal modifications and the advantages and disadvantages of their use, it includes a comparison between different information exchange tools. Written by an author who has worked as a police officer, Home Affairs counsellor and academic, this is an important read for scholars working with EU Law, Criminal Procedure Law, and International Law as well as for practitioners who directly deal with international police cooperation or who perform criminal investigation both within and outside the EU.
This book addresses the criminalisation of sexually explicit material depicting or describing fictitious characters who appear to be children. It is the first book of its kind to specifically examine the expansion of the law to include fictional representations of children, focusing on the law in Australia, Canada, the United Kingdom, and the United States. The author explores the potential criminalisation of comics and subgenres of manga that frequently depict childlike characters in a sexual context. Of course, the need to protect children from harm outweighs freedom of expression and the right to privacy; however, this argument is complicated by the material being purely fictional. Does prohibiting the fictional representation of minors interfere with individual freedoms? Based on a detailed socio-legal study, this book extensively analyses literature and pertinent theories of criminalisation, such as the Harm Principle, Offense Principle, and Legal Moralism. The book will be an invaluable resource for academics and students in various disciplines, including law, criminology, sociology, and psychology. It will also be of interest to fans of fantasy fiction.
Research has shown that the majority of crimes are committed by persistent or serial offenders, with as little as seven percent of offenders accounting for approximately 60 percent of all crimes. By focusing police efforts on these prolific offenders and learning to identify, analyze, and resolve the crimes they commit, the law enforcement community can protect and defend the public much more effectively. Tactical Crime Analysis: Research and Investigation provides a comprehensive discussion on both the theoretical and practical aspects of crime series analysis, making it a critical resource for those engaged in crime prevention and investigation. Appropriate for all levels Written by a distinctive team of authors, each of whom combine academic credibility, police experience, and years of analytical success, this manual is designed for the novice, the working professional, and the veteran crime analyst. It provides an introduction to the realities of tactical crime analysis, assists current analysts in further developing their professional skills, and offers advanced insight for experts. Covering all aspects of serial crime investigation, the book explores: Major problems and issues within serial crime Offender spatial behavior Linkage analysis Investigative techniques Geographic profiling Next event forecasting Supplemental materials to enhance the text This multi-faceted resource includes an interview with a serial offender, case studies of solved serial crimes, and an accompanying website with supplemental material. An important addition to the reference shelf of analytical professionals, this resource provides a revealing glimpse into the machinations of the serial offender.
Who steals? An extraordinary range of folk--from low-life hoods who sign on as Medicare or Medicaid providers equipped with nothing more than beepers and mailboxes, to drug trafficking organizations, organized crime syndicates, and even major hospital chains. In "License to Steal," Malcolm K. Sparrow shows how the industry's defenses, which focus mostly on finding and correcting billing errors, are no match for such well orchestrated attacks. The maxim for thieves simply becomes "bill your lies correctly." Provided they do that, fraud perpetrators with any degree of sophistication can steal millions of dollars with impunity, testing payment systems carefully, and then spreading fraudulent billings widely enough across patient and provider accounts to escape detection. The kinds of highly automated, quality controlled claims processing systems that pervade the industry present fraud perpetrators with their favorite kind of target: rich, fast paying, transparent, utterly predictable check printing systems, with little threat of human intervention, and with the U.S. Treasury on the end of the electronic line. Sparrow picks apart the industry's response to the government's efforts to control this problem. The provider associations (well heeled and politically influential) have vociferously opposed almost every recent enforcement initiative, creating the unfortunate public impression that the entire health care industry is against effective fraud control. A significant segment of the industry, it seems, regards fraud and abuse not as a problem, but as a lucrative enterprise worth defending. Meanwhile, it remains a perfectly commonplace experience for patients or their relatives to examine a medical bill and discover that half of it never happened, or that; likewise, if patients then complain, they discover that no one seems to care, or that no one has the resources to do anything about it.Sparrow's research suggests that the growth of capitated managed care systems does not solve the problem, as many in the industry had assumed, but merely changes its form. The managed care environment produces scams involving "underutilization," and the withholding of medical care schemes that are harder to uncover and investigate, and much more dangerous to human health. Having worked extensively with federal and state officials since the appearance of his first book on this subject, Sparrow is in a unique position to evaluate recent law enforcement initiatives. He admits the "war on fraud" is at least now engaged, but it is far from won.
It is essential that those in the criminal justice system understand the tasks that police dogs perform and the evidence that their work produces. Police and Military Dogs: Criminal Detection, Forensic Evidence, and Judicial Admissibility examines the use of police and military dogs for a wide variety of functions and explores canine biology and behavior as it applies to police work. The book begins with an overview of the changes that have occurred in the field in the past four decades as discoveries have been made about canine capabilities. The author examines how a canine handler's work with a skilled police dog can affect the subsequent investigation and prosecution of the crime. He discusses optimal procedures for finding and processing evidence and describes the boundaries of admissibility of evidence produced by police dogs. The book examines the many diverse detection functions police dogs are being trained to perform, ranging from cadaver detection to the discovery of explosives. It also describes the use of dogs to apprehend criminals and in search and rescue operations. Written for a wide audience including canine handlers, forensic scientists, attorneys, and the judiciary, this volume covers topics pertinent to all aspects of the police dog in contemporary law enforcement.
Because the investigation of cold cases is usually an arduous and time-consuming task, most law enforcement agencies in the United States are not able to dedicate the resources necessary to support the cold case investigation process. However, when those cases are fully pursued and prosecuted, they often result in convictions and lengthy prison terms. Cold Cases: Evaluation Models with Follow-up Strategies for Investigators, Second Edition saves law enforcement time by providing detailed guidelines for determining if a cold case is solvable, and if so, how to organize, manage, and evaluate the investigation. It also provides techniques for developing investigative strategies to complement the evaluation process and resolve the crime. This second edition features a new revised model and methodology for investigating cold cases suitable for all police and public safety agencies-large or small, domestic or international. This new model is more expeditious and convenient for departments that have less manpower and experience in dealing with cold cases. It emphasizes the prioritization of cold cases based on the availability of physical evidence and the chances of deriving matches from said evidence and an identified person of interest. Additional topics covered in the second edition include: How cases go cold Strategies for creating a cold case unit Cold case investigations in a Dutch educational environment-a chapter written by members of the Dutch Police Academy New forensic science technologies, including DNA, CODIS, and AFIS Case studies demonstrating advances in suspectology Strategies for effective investigative interviewing Challenges posed by staged crime scenes in cold cases How to craft a cold case evaluation report The expert authors of this book maintain The Center for the Resolution of Unresolved Crimes
Police interviews with suspects and witnesses provide some of the most significant evidence in criminal investigations. Frequently challenging, they require special training and skills. This interaction process is further complicated when the suspect or witness does not speak the same language as the interviewer. A professional reference that can be used in police training or in any venue where an interpreter is used, Police Investigative Interviews and Interpreting: Context, Challenges, and Strategies provides solutions for the range of interview demands found in today's multilingual environments. Topics include: What interpreting is, the skills required, and the role of interpreters in any job context Investigative interviewing in law enforcement Concerns about interpreter intervention and its impact on interview outcomes The value of word-based over meaning-based interpretation in police and legal contexts Nonlinguistic factors that can have an impact on the interpreting process The book explores the multi-faceted dynamics of conducting investigative interviews via interpreters and examines current investigative interviewing paradigms. It offers strategies to help interpreters and law enforcement officers and provides examples of interpreted interview excerpts to enable understanding. Although the subject matter and the examples in this book are largely limited to police interview settings, the underlying rationale applies to other professional areas that rely on interviews to collect information, including customs procedures, employer-employee interviews, and insurance claim investigations. This book is part of the CRC Press Advances in Police Theory and Practice Series.
In the summer of 1930, two federal prohibition agents were murdered. The first died in a hail of buckshot on a dark street in Aguilar, Colorado. Six weeks later, the second agent and his vehicle disappeared on a sunny afternoon along a New Mexico state highway south of Raton. These events occurred during the era when the government legislated a ban on alcohol manufacture, distribution, and sales within the United States. During their 50-year search, the authors sought answers to why no one was ever prosecuted for these crimes. This is the first book to correlate the two murders, identify how and why they occurred, name the parties involved and the roles they played. The authors interviewed many individuals associated with the events and discovered a trove of National Archives files containing incident reports, suspect interview notes, the dead agents' daily activity logs and their personnel files. Building upon this base, they located the remaining documents generated by state and local law enforcement officers and additionally data mined private and public contemporary newspaper collections. The shadows along the trail lift as the light of truth is shown upon this mystery. Two federal agents can now rest in peace.
Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution. The book is divided into two major parts for easy reference. The first part explores various crimes, laws, policies, forensic tools, and the information needed to understand the underlying concepts of computer forensic investigations. The second part presents information relating to crime scene investigations and management, disk and file structure, laboratory construction and functions, and legal testimony. Separate chapters focus on investigations involving computer systems, e-mail, and wireless devices. Presenting information patterned after technical, legal, and managerial classes held by computer forensic professionals from Cyber Crime Summits held at Kennesaw State University in 2005 and 2006, this book is an invaluable resource for those who want to be both efficient and effective when conducting an investigation.
Serial killers like Seattle's Ted Bundy, Maryland's Beltway Sniper,
Atlanta's Wayne Williams, or England's Peter Sutcliffe usually
outsmart the task forces on their trail for long periods of time.
Keppel and Birnes take readers inside the operations of serial
killer task forces to learn why. What is the underlying psychology
of a serial killer and why this defeats task force investigations?
For as long as we have been researching human memory, psychologists have been investigating how people remember and forget. This research is regularly drawn upon in our legal systems. Historically, we have relied upon eyewitness memory to help judge responsibility and adjudicate truth, but memory is malleable, prone to error, and susceptible to bias. Even confident eyewitnesses make mistakes, and even accurate witnesses sometimes find their testimony subjected to harsh scrutiny. Emerging from this environment, the Cognitive Interview (CI) became a means of assisting cooperative witnesses with recalling more information without sacrificing accuracy. First used by police interviewing adult witnesses, it is now used with many populations in many contexts, including public health, accident reconstruction, and the interrogation of terror suspects. Evidence-Based Investigative Interviewing reviews the application of cognitive research to investigative interviewing, revealing how principles of cognition, memory, and social dynamics may increase the accuracy of eyewitness testimony. It provides evidence-based applications for investigators beyond the forensic domain in areas such as eyewitness identification, detecting deception, and interviewing children. Drawing together the work of thirty-three authors across both the academic and practice communities, this comprehensive collection is essential reading for researchers in psychology, forensics, and disciplines such as epidemiology and gerontology.
The International People's Tribunal addressed the many forms of violence during the period of the massacres of 1965-1966 in Indonesia. It was held in The Hague, The Netherlands, in November 2015, to commemorate fifty years since the killings began. The Tribunal, as a people's court, holds no jurisdiction and was an attempt to achieve symbolic justice for the crimes of 1965. This book offers new and previously unpublished insights into the types of crimes committed in the 1965 genocide and how these crimes were prosecuted at the International People's Tribunal for 1965. Divided thematically, each chapter analyses a different crime - enslavement, sexual violence, torture - perpetrated during the Indonesian killings. The contributions consider either general patterns across Indonesia or a particular region of the archipelago. The book reflects on how crimes were charged at the International People's Tribunal for 1965 and focuses on questions relating to the place of people's tribunals in truth-seeking and justice claims, and the prospective for transitional justice in contemporary Indonesia. Positioning the events in Indonesia in 1965 within the broader scope of comparative genocide studies, the book is an original and timely contribution to knowledge about the dynamics of the Indonesian killings. It will be of interest to academics in the field of Asian studies, in particular Southeast Asia, Genocide Studies, Criminology and Criminal Justice and Transitional Justice Studies.
With the War on Terror in full swing, the government's involvement in and influence over law enforcement has changed and, in some cases, expanded. While police forces remain under the jurisdiction of the cities and states they patrol, federal agencies have taken on a wider role in combating and prosecuting crime. Agencies such as the FBI, the DEA, the ATF, and now the Department of Homeland Security have wide and varied responsibilities and powers in combating both terrorism and other crimes. But this wasn't always the case. This timely book examines the history of American federal law enforcement as well as its current state in all of its forms. The complex system of agencies, agents, and laws that make up our federal law enforcement program have a long and varied history. Bumgarner looks at the issue of federal police powers and explores how the U.S. Supreme Court and lower courts have interpreted the constitutional limits on those powers. He introduces the reader to the many agencies that make up the federal law enforcement community and the jurisdiction and responsibilities of each, as well as the role federal public policy plays in the criminal justice system. Finally, he reviews emerging trends in federal law enforcement, including the expanding domestic effort against terrorism. Readers of this insightful book will unfailingly come away with a better understanding of the history and inner workings of federal law enforcement.
There are two parts to every crime story: how they did it and why they got caught.This book is about the second part, and how it changes the way we catch serial killers. No two stories about the capture of a serial killer are the same. Sometimes, the killers make crucial mistakes; other times, investigators get lucky. And the process of profiling, hunting, and apprehending these predators has changed radically over time, particularly in the field of criminal forensics, which has exploded in the last ten to 15 years. Laser ablation, video spectral analysis, cyber-sleuthing, and even DNA-based genetic genealogy are now crucial tools in solving murders, including the recent capture of the so-called Golden State Killer. This book in the new Profiles in Crime series tells the history of forensics through the "capture stories" of some of the most notorious serial killers, going back almost a century. The killers include: Rodney Alcala, a serial rapist and murderer sometimes called "Dating Game killer" for his appearance on that TV show. No one knows the exact number of his victims. Takahiro Shiraishi, the suicide killer from Zama, Japan, who dismembered nine victims and stored their bodies in his refrigerator. Aileen Wuornos, one of the rare female serial killers. She shot seven men in Florida and was turned in by an accomplice. Jeffrey Dahmer, the "Milwaukee Cannibal," and Bobby Joe Long, both identified by survivors Ted Bundy and David Berkowitz ("Son of Sam"), who both made mistakes Ludwig Tessnow, who killed several children in Germany, and was caught through new methods in forensic investigation that could distinguish human from animal blood
Foreword from Professor Emeritus Robert Reiner, London School of Economics, UK.This book provides a critical examination of intelligence-led policing strategies, including an investigation of innovative strategies such as Problem Oriented Policing (POP), problem-solving, and community policing, and in-depth analyses of the Kent Policing Model, which became the template for ILP models across the world, and the UK's National Intelligence Model (NIM). Intelligence-led policing (ILP) approaches have proved particularly attractive to senior police officers and policymakers because they promise to deliver more efficient and effective solutions to the problems of crime than traditional policing practices. However, this book shows that these approaches have delivered far less than their supporters would have us to believe. In part, this has been because of what James terms as 'police orthodoxy'. However, this cannot wholly explain the relative failure of ILP in Britain and elsewhere in the developed world. Drawing on a range of material including extensive interviews with key NIM figures including ACPO members, senior police managers, intelligence workers, police detectives and staff, James questions to what extent British policing can truly be said to be intelligence-led, and whether there is a popular mandate for an alternative to traditional Peelian practice, where police aim simply to deliver intelligent rather than intelligence-led policing. The book provides important insights into the debate on intelligence-led policing and the mechanics and politics of policy development. As such it will be of great value within the policing sphere and more broadly for public policy studies.
Every day the American government, the United Nations, and other
international institutions send people into non-English speaking,
war-torn, and often minimally democratic countries struggling to
cope with rising crime and disorder under a new regime. These
assistance missions attempt to promote democratic law enforcement
in devastated countries. But do these missions really facilitate
the creation of effective policing? Renowned criminologist David H.
Bayley here examines the prospects for the reform of police forces
overseas as a means of encouraging the development of democratic
governments. In doing so, he assesses obstacles for promoting
democratic policing in a state-of-the-art review of all efforts to
promote democratic reform since 1991. Changing the Guard offers an
inside look at the achievements and limits of current American
foreign assistance, outlining the nature and scope of the police
assistance program and the agencies that provide it. Bayley
concludes with recommendations for how police assistance could be
improved in volatile countries across the world. This book is
required reading as an instruction manual for building democratic
policing overseas. |
You may like...
Extremisms In Africa
Alain Tschudin, Stephen Buchanan-Clarke, …
Paperback
(1)
Arctic Climate Change - The ACSYS Decade…
Peter Lemke, Hans-Werner Jacobi
Hardcover
R4,089
Discovery Miles 40 890
|