![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Sociology, social studies > Crime & criminology > Criminal investigation & detection
In the summer of 1930, two federal prohibition agents were murdered. The first died in a hail of buckshot on a dark street in Aguilar, Colorado. Six weeks later, the second agent and his vehicle disappeared on a sunny afternoon along a New Mexico state highway south of Raton. These events occurred during the era when the government legislated a ban on alcohol manufacture, distribution, and sales within the United States. During their 50-year search, the authors sought answers to why no one was ever prosecuted for these crimes. This is the first book to correlate the two murders, identify how and why they occurred, name the parties involved and the roles they played. The authors interviewed many individuals associated with the events and discovered a trove of National Archives files containing incident reports, suspect interview notes, the dead agents' daily activity logs and their personnel files. Building upon this base, they located the remaining documents generated by state and local law enforcement officers and additionally data mined private and public contemporary newspaper collections. The shadows along the trail lift as the light of truth is shown upon this mystery. Two federal agents can now rest in peace.
Is it revenge or is it justice? DI Gravel is supposed to be on mandatory leave, but when a severed head washes up on the estuary beach his holiday is cut short. Back on the job, he's shocked when the case leads him to the victim from an old case Seventeen years ago, the system failed Rebecca. They let the abuser of a six-year-old girl walk free. But she's all grown up now and taking the law into her own hands. Is this one killer DI Gravel doesn't want to catch? This is the second book in the dark, edge-of-your-seat Carmarthen Crime thriller series set in the stunning West Wales countryside. *Previously published as Before I Met Him*
Law today is incomplete, inaccessible, unclear, underdeveloped, and often perplexing to those whom it affects. In The Legal Singularity, Abdi Aidid and Benjamin Alarie argue that the proliferation of artificial intelligence-enabled technology - and specifically the advent of legal prediction - is on the verge of radically reconfiguring the law, our institutions, and our society for the better. Revealing the ways in which our legal institutions underperform and are expensive to administer, the book highlights the negative social consequences associated with our legal status quo. Given the infirmities of the current state of the law and our legal institutions, the silver lining is that there is ample room for improvement. With concerted action, technology can help us to ameliorate the law and our legal institutions. Inspired in part by the concept of the "technological singularity," The Legal Singularity presents a future state in which technology facilitates the functional "completeness" of law, where the law is at once extraordinarily more complex in its specification than it is today, and yet operationally vastly more knowable, fairer, and clearer for its subjects. Aidid and Alarie describe the changes that will culminate in the legal singularity and explore the implications for the law and its institutions.
'A cracking read ... Ghislaine Maxwell's story has had endless column inches, but John gives such a great overview, and has mined so many sources that it still feels fresh and compelling.' Mail on Sunday Once upon a time there was a beautiful princess who suffered a tragedy, the death of her father, a war hero, a philanthropist, a good man, in suspicious circumstances. She fled to New York where she made a new life with a brilliant mathematician. Her name is Ghislaine Maxwell and her lover was Jeffrey Epstein. Through Jeffrey, and her family name, Ghislaine became friends with some of the most powerful people on earth, ex-President Bill Clinton and President-to-be Donald Trump and the second son of the Queen of England, Prince Andrew, the Duke of York. But this is no fairy tale. HUNTING GHISLAINE sets out the other side of the story, and it's one of the darkest you will ever read. Ghislaine's father, Robert Maxwell, was a sadist, a war criminal, a monster. His cruelty deformed Ghislaine Maxwell long before she met Jeffrey Epstein. Her one-time lover was convicted for being a paedophile. So Ghislaine's life has been spent serving not one monster but two. In HUNTING GHISLAINE, legendary investigative journalist John Sweeney uncovers the truth behind this fairy tale story in reverse.
Using a linguistic point of view, The Language of Confession, Interrogation, and Deception is a practical explanation of how confessions work, written by the "father of forensic linguistics", Roger W. Shuy. Using his 1993 benchmark work, Language Crimes as his model, Shuy examines criminal confessions, the interrogations that elicit them, and the deceptive language that plays a role in the confession event. He presents transcripts from numerous interrogations and analyzes how language is used, how constitutional rights are not protected, consistency and truthfulness, suggestibility, written confessions, as well as unvalidated confessions. He concludes the volume with explicit advice on how to conduct interrogations that will yield credible evidence. A landmark volume with cross-disciplinary applications, The Language of Confession, Interrogation, and Deception is useful for professionals and academics in linguistics, forensic linguistics, criminal justice, communication, and interpersonal violence.
View the Table of Contents. Read the Introduction. aAs a recognized expert in the field, Hamm is eminently
qualified to prepare this text on the subject of terrorism from the
criminal law perspective. . . . The text is written in a clear,
lively manner.a aDrawing on six case studies of terrorist attacks by radical
Islamists and right-wing racists, Hamm writes that American
counterterrorist agencies have neglected some basic insights from
scholarly criminology.a "Read this book to understand the important nexus between
terrorism and crime! This cutting edge analysis suggests a new
approach to defeat the terrorist threat to the United
States." "Hamm's clear writing style, careful research and theoretical
insights promise to make this a classic in criminology." "[Provides] the first detailed account of how crime provides
logistical support for terrorist strikes. By blending the study of
terrorism and criminology, Hamm offers the possibility of detecting
and stopping terrorism through the pursuit of conventional methods
of criminal investigation." Car bombing, suicide bombing, abduction, smuggling, homicide, and hijacking are all profoundly criminal acts. In Terrorism as Crime Mark S. Hamm presents an understanding of terrorism from a criminological point of view, arguing that the most successful way to understand, detect, prosecute and deter these acts is to use conventional criminal investigation methods. Whether in Oklahoma City or London, Terrorism as Crime demonstrates that criminal activity is the lifeblood of terrorist groups and that there are simple common denominators at work that can remove the mystery surrounding many of these terrorist groups. Once understood the vulnerabilities of these organizations can be exposed. This important volume focuses in on six case studies of crimes committed by jihad and domestic right wing groups, including biographies of more than two dozen terrorists along with descriptions of their organizations, strategies, and terrorist plots. Terrorism as Crime offers an original and significant framework for explaining international and domestic terrorism, as well as how future acts might be detected or exposed.
Investigations: 150 Things You Should Know, Second Edition, explores the essential tips and techniques for security investigations, providing a useful reference for those at any stage of their security career. This practical guide covers the legal guidelines that all investigators must follow. Through anecdotes, case studies and documented procedures, the authors present the most complete collection of investigative information available. Readers in the security and law enforcement fields will find this book easy to use and understand when seeking explanations about a wide variety of investigative topics, including constitutional law, documentary evidence, surveillance equipment, interviewing, interrogating and reporting.
Canada is actively involved through various agencies in the domestic affairs of countries in the Global South. Over time, these practices - rationalized as a form of humanitarian assistance - have become increasingly focused on enhancing regimes of surveillance, policing, prisons, border control, and security governance. Drawing on an array of previously classified materials and interviews with security experts, Security Aid presents a critical analysis of the securitization of humanitarian aid. Jeffrey Monaghan demonstrates that, while Canadian humanitarian assistance may be framed around altruistic ideals, these ideals are subordinate to two overlapping objectives: the advancement of Canada's strategic interests and the development of security states in the "underdeveloped" world. Through case studies of the major aid programs in Haiti, Libya, and Southeast Asia, Security Aid provides a comprehensive analysis and reinterpretation of Canada's foreign policy agenda and its role in global affairs.
Second edition of an established text on common procedures for the identification and processing of evidence at scenes of crime * Includes chapters on quality assurance and credibility of practices and processes * issues surrounding major and complex crime * Forensic handling of mass fatalities * Crime scene reconstruction and impact on evidence recovery processes
From sexualized selfies and hidden camera documentaries to the bouncers monitoring patrons at Australian nightclubs, the ubiquity of contemporary surveillance goes far beyond the National Security Agency's bulk data collection or the proliferation of security cameras on every corner. Expanding the Gaze is a collection of important new empirical and theoretical works that demonstrate the significance of the gendered dynamics of surveillance. Bringing together contributors from criminology, sociology, communication studies, and women's studies, the eleven essays in the volume suggest that we cannot properly understand the implications of the rapid expansion of surveillance practices today without paying close attention to its gendered nature. Together, they constitute a timely interdisciplinary contribution to the development of feminist surveillance studies.
Foreword from Professor Emeritus Robert Reiner, London School of Economics, UK.This book provides a critical examination of intelligence-led policing strategies, including an investigation of innovative strategies such as Problem Oriented Policing (POP), problem-solving, and community policing, and in-depth analyses of the Kent Policing Model, which became the template for ILP models across the world, and the UK's National Intelligence Model (NIM). Intelligence-led policing (ILP) approaches have proved particularly attractive to senior police officers and policymakers because they promise to deliver more efficient and effective solutions to the problems of crime than traditional policing practices. However, this book shows that these approaches have delivered far less than their supporters would have us to believe. In part, this has been because of what James terms as 'police orthodoxy'. However, this cannot wholly explain the relative failure of ILP in Britain and elsewhere in the developed world. Drawing on a range of material including extensive interviews with key NIM figures including ACPO members, senior police managers, intelligence workers, police detectives and staff, James questions to what extent British policing can truly be said to be intelligence-led, and whether there is a popular mandate for an alternative to traditional Peelian practice, where police aim simply to deliver intelligent rather than intelligence-led policing. The book provides important insights into the debate on intelligence-led policing and the mechanics and politics of policy development. As such it will be of great value within the policing sphere and more broadly for public policy studies.
Provides easy-to-follow flow charts that serve as procedural guide for scene investigations in most major types of crimes Presents the variety of different types of observable evidence encountered in real-life cases to inform scene investigators Offers methods for framing multiple hypotheses, using specific case examples, to factor in various considerations in crime scene reconstruction scenarios The discussion following each chapter forms a compendium of generalizations accepted in scholarly sources-a key enabler when testing the hypotheses
Every day the American government, the United Nations, and other
international institutions send people into non-English speaking,
war-torn, and often minimally democratic countries struggling to
cope with rising crime and disorder under a new regime. These
assistance missions attempt to promote democratic law enforcement
in devastated countries. But do these missions really facilitate
the creation of effective policing? Renowned criminologist David H.
Bayley here examines the prospects for the reform of police forces
overseas as a means of encouraging the development of democratic
governments. In doing so, he assesses obstacles for promoting
democratic policing in a state-of-the-art review of all efforts to
promote democratic reform since 1991. Changing the Guard offers an
inside look at the achievements and limits of current American
foreign assistance, outlining the nature and scope of the police
assistance program and the agencies that provide it. Bayley
concludes with recommendations for how police assistance could be
improved in volatile countries across the world. This book is
required reading as an instruction manual for building democratic
policing overseas.
Brief. Affordable. Visual. Part of the groundbreaking Justice Series, Criminal Investigation is a clear, thought-provoking exploration of core concepts, the latest research, and current events shaping criminal investigation today. Built to be affordable without sacrificing academic rigor, the series uses eye-catching visuals and conversation-starting pedagogy to move students beyond memorization to true understanding. Blending scientific theory with a practical approach, Lyman presents content in a logical flow paralleling the steps and considerations observed within an actual criminal investigation. The 3rd edition includes updated case studies, revised learning outcomes, and new graphics, photos, and informational boxes providing context and promoting student engagement. Criminal Investigation, 3rd Edition, is also available via Revel (R), an interactive learning environment that enables students to read, practice, and study in one continuous experience.
Social media is becoming an increasingly important-and controversial-investigative source for law enforcement. Social Media Investigation for Law Enforcement provides an overview of the current state of digital forensic investigation of Facebook and other social media networks and the state of the law, touches on hacktivism, and discusses the implications for privacy and other controversial areas. The authors also point to future trends.
The aim of this book is to examine the qualities of leadership and decision-making in the police service. Based on groundbreaking research using unique, advanced methods for examining policing in complex critical incident environments, the book focuses principally on a series of police debriefs following live major critical incidents. It captures the views of the Senior Investigating Officers (SIOs) who worked on these cases and draws upon the very rich set of experiences that they have had in dealing with complex, stressful and demanding enquiries. The book provides an introduction to new methods for exploring leadership and decision-making in critical incidents. It will be an essential resource for developers of police training in leadership and decision-making, senior police officers involved in critical incident management, organisational psychologists who work within policing, and for students whose area of study covers policing, decision-making or criminal investigation.
The approach that should be used by law enforcement officers in order to safely and effectively enter a room is a point of contention among many police trainers. Based on five experiments conducted over a two-year period, Evaluating Police Tactics demonstrates that the conventional wisdom is not optimal. Using the scientific method to systematically assess current room entry philosophies and techniques employed by police, Evaluating Police Tactics offers suggestions for examining the current philosophies and determining how patrol officers can enter scenes of ongoing violence, find the shooter, and stop the killing as safely and effectively as possible. About the Real-World Criminology Series More than just textbooks, the short books in the Real-World Criminology series are designed to be of interest to particular fields within criminology. They can be policy primers, spurring innovations in policing and corrections, theoretical works dealing with policy implications, or program evaluations incorporating theoretical foundations. Each book covers something that is happening -or should be happening-in the world of criminal justice.
This innovative text provides an excellent introduction to technology-assisted crime and the basics of investigating such crime, from the criminal justice perspective. It presents clear, concise explanations for students and professionals, who need not be technically proficient to find the material easy-to-understand and practical. The book begins by identifying and defining the most prevalent and emerging high-technology crimes - and exploring their history, their original methods of commission, and their current methods of commission. Then it delineates the requisite procedural issues associated with investigating technology-assisted crime. In addition, the text provides a basic introduction to computer forensics, explores legal issues in the admission of digital evidence, and then examines the future of high-technology crime, including legal responses.
This book by Roger W. Shuy, the senior figure in forensic linguistics, is the first to explain in an accessible way the vital role that linguistic evidence and its proper analysis play in criminal investigations. Shuy provides compelling case studies of how language functions in investigations involving, among others, wired undercover operatives, and the interrogation of suspects. He makes the point that language evidence can be as important as physical evidence, but yet does not enjoy the same degree of scrutiny by investigators, attorneys, and the courts. Beyond this, however, his more controversial thesis is that police frequently misuse or manipulate language, using various powerful controversial strategies, in order to intentionally create an impression of the targets' guilt or even to get them to confess. attorneys, law enforcement officers, judges, and juries This book makes its case by analyzing a dozen criminal cases involving a variety of crimes, such as fraud, bribery, stolen property, murder, and others. About half involve co-operating witnesses who do the tape recording, and the other half undercover police officers. These cases demonstrate how undercover operatives use different conversational strategies, such as overlapping conversation, ambiguity, interruption, refusing to take "no" for an answer, and others to create a negative impression of the targets on later listeners. Creating Language Crimes provides a fascinating window into a little-known and discussed facet of law enforcement. It will appeal to anyone concerned with language (particularly sociolinguists and discourse analysts), as well as to those involved in law enforcement and criminal cases. the appearance of such crime is created, law enforcement has not reached its evidentiary goal. Eleven conversational strategies were used in the twelve actual criminal cases described in this book.
In Fraud Examiners in White-Collar Crime Investigations, Petter Gottschalk examines and evaluates the investigative processes used to combat white-collar crime. He also presents a general theory regarding the economic, organizational, and behavioral dimensions of its perpetrators. Pool Your Resources for a Successful Investigation Gottschalk emphasizes the importance of collaboration across multiple disciplines including accounting, law, and forensic science in solving each case of suspected white-collar crime. He describes each case as a "puzzle" or "project" consisting of several steps and several participating individuals or organizations. Since so many people participate in an investigation, Gottschalk advises that objectively acquired and communicated information is vital to successful results. Fraud Examiners in White-Collar Crime Investigations approaches case studies from the perspectives of police science and detective work rather than auditing and legal thinking. Gottschalk asserts that "the private detective rather than the firm lawyer" is the more potentially successful fraud examiner. His approach emphasizes the importance of using strategy and practice in yielding results toward solving a case and highlights the use of interviews. He looks at the role of people as significant resources of information to help solve white-collar criminal cases and explains how a well-conducted interview can have a significant impact on the progress of an investigation. Through the analyses theories Gottschalk presents, this book gives you a useful tool for understanding characteristics of white-collar crime and for devising strategies for conducting and evaluating investigations of suspected white-collar crimes.
The majority of research on eyewitness memory has traditionally studied children and young adults. By contrast, this volume is designed to provide an overview of empirical research on the cognitive, social, and health related factors that impact the accuracy of eyewitness testimony given by the elderly. The book takes a lifespan developmental perspective that incorporates research on witnesses of all ages, but uses the findings to focus on issues unique to the elderly. This includes research on recognition memory with lineup identifications and recall memory that occurs when an elderly witness is asked to describe an event in court. The Elderly Eyewitness also examines jurors' reactions to the testimony of an elderly witness, and the legal and social policy issues that emerge when the elderly witness participate in legal proceedings. While reviewing what is known about the elderly witness, the book also provides a direction for future research into this new frontier of scientific inquiry. Its audience spans researchers in cognitive and developmental psychology, and professionals working in the growing area of psychology and law.
The Man Who Rode the Tiger is the dramatic story of the biggest investigation of political corruption in American municipal history. The "Seabury Investigation" became a model for federal, state, and city investigations of major officeholders and minor rascals. Samuel Seabury was a patrician New Yorker who was called upon to ride the Tammany Tiger, longtime symbol of crooked politics and influence-peddling. Seabury and his staff of tough young lawyers toppled Mayor Jimmy Walker - the popular Beau James; struck a near-death blow to Tammany Hall; were directly responsible for selecting and electing Fiorello H. LaGuardia as the most popular Mayor in New York history; and helped Governor Franklin D. Roosevelt in his campaign for the presidency of the United States. The final confrontation between Judge Seabury and Jimmy Walker was before Governor Roosevelt in Albany. FDR surprised those who thought he was a lightweight - and Tammany instrument - by handling himself beautifully, disengaging himself from Tammany's grip, and gaining national attention.
The majority of research on eyewitness memory has traditionally studied children and young adults. By contrast, this volume is designed to provide an overview of empirical research on the cognitive, social, and health related factors that impact the accuracy of eyewitness testimony given by the elderly. The book takes a lifespan developmental perspective that incorporates research on witnesses of all ages, but uses the findings to focus on issues unique to the elderly. This includes research on recognition memory with lineup identifications and recall memory that occurs when an elderly witness is asked to describe an event in court. The Elderly Eyewitness also examines jurors' reactions to the testimony of an elderly witness, and the legal and social policy issues that emerge when the elderly witness participate in legal proceedings. While reviewing what is known about the elderly witness, the book also provides a direction for future research into this new frontier of scientific inquiry. Its audience spans researchers in cognitive and developmental psychology, and professionals working in the growing area of psychology and law.
The approach that should be used by law enforcement officers in order to safely and effectively enter a room is a point of contention among many police trainers. Based on five experiments conducted over a two-year period, Evaluating Police Tactics demonstrates that the conventional wisdom is not optimal. Using the scientific method to systematically assess current room entry philosophies and techniques employed by police, Evaluating Police Tactics offers suggestions for examining the current philosophies and determining how patrol officers can enter scenes of ongoing violence, find the shooter, and stop the killing as safely and effectively as possible. About the Real-World Criminology Series More than just
textbooks, the short books in the Real-World Criminology series are
designed to be of interest to particular fields within criminology.
They can be policy primers, spurring innovations in policing and
corrections, theoretical works dealing with policy implications, or
program evaluations incorporating theoretical foundations. Each
book covers something that is happening -or should be happening-in
the world of criminal justice.
Introduction to Crime Scene Photography acquaints the reader with the essentials of basic crime scene photography techniques. It looks at the concepts related to composition and relates them to the types of photographs captured by crime scene photographers. It explains how to capture images based on the exposure settings chosen to produce the effect desired. It considers the techniques used needed to control and maximize Depth of Field (DOF), and reviews how the different lenses will affect an image. Organized into seven chapters, the book begins with an overview of crime scene photography and composition, including the three cardinal rules of good photography. It then proceeds with a discussion of the benefits of bounce flash and how to utilize this technique to properly compose the subject of interest. It also explains how to capture any image necessary at the crime scene by combining the concepts of composition, nonflash exposure, DOF, flash exposure, and the use of various types of lenses. In addition, the reader is introduced to various energy sources and filters, digital processing of evidentiary photography, and legal issues related to photographs and digital images. Examples and illustrations are provided throughout to demonstrate how the concepts examined tend to form a sort of symbiotic relationship. This text will benefit scene investigators and photographers, forensic consultants, forensic scientists, undergraduate students in forensic and/or criminal justice programs, law enforcement professionals, and anyone who wants to acquire the skills needed to be a successful crime scene photographer. |
You may like...
Interrelationship Among Aging, Cancer…
A. Pullman, Paul O.P. Ts'o, …
Hardcover
R5,331
Discovery Miles 53 310
|