![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Sociology, social studies > Crime & criminology > Criminal investigation & detection
'Profilers' and 'Profiling' are now widely discussed, often with almost mythical respect. This is the first volume to cut through the confusions and misunderstandings surrounding this topic to report on detailed, original, scientific research that examines the variations in criminal behaviour from which any 'profile' must be derived. The studies included examine both early approaches to the field and the future problems and potential for an Investigative Psychology approach of offender profiling. This book will be of great value to all those who have been waiting for a scientific, psychological basis to police investigations. It will be read with interest by those who want to get behind the rhetoric and controversy that surrounds 'offender profiling' and require an up to date account of current research and recent discoveries.
He baffled and eluded law enforcement officers for nearly two decades. In the end, however, it wasn't the painstaking forensic analysis of hundreds of pieces of crime scene evidence that led to the capture of the Unabomber-but the lucky tip of an informant. Truth of the matter is, for all their sophistication and hi-tech science, crime-fighting techniques such as fingerprint and DNA analysis are a factor in less than one percent of all criminal cases. In the overwhelming number of crimes, informants have provided the necessary ammunition needed to bring criminals to justice, from Genovese to Gotti and Capone to Dillinger.
The words "identity", "diversity", "multiculturalism", and "Eurocentrism" have become familiar to us through a process of political and cultural transformation. In the United States, a great national debate rages over fears that the country will fall apart and sacrifice its free speech to "political correctness". In Europe, a related discussion has focused on the resurgence of xenophobia and ethnic nationalism. Undoubtedly, these debates touch on issues which, after the collapse of Cold War geopolitics, are likely to remain with us for some time. "The Identity in Question" provides a theoretical analysis of this issue and the questions it raises about critical theory. The contributors to this collection look behind the familiar words of the discourse to rethink notions of universality and agency and the traditions of liberalism, nationalism and pluralism. They investigate the meanings of democracy and "radical democracy". They also ask how such notions relate to questions of sexual orientation. More generally, the book explores how the new critical theories and methods that have taken shape over the last 20 years figure in these debates, along with their conceptions of "otherness".
Winner of the CWA Gold Dagger for Non-Fiction. A letter arrives. You've got an appointment with a trainee clinical psychologist on April 29, 2008. You don't attend. Another letter arrives. It says they don't normally reschedule appointments, but they know this is hard for you, so they're offering you another appointment. It's on May 13, 2008. You don't attend. Two years later you shoot three people and shoot yourself. You will be called a monster. You will be called evil. The prime minister, David Cameron, will stand up in Parliament and say you were a callous murderer, end of story. You have nine days and your whole life to prove you are more than a callous murderer. Go. Raoul Moat became notorious one hot July week when, after killing his ex-girlfriend's new boyfriend, shooting her in the stomach, and blinding a policeman, he disappeared into the woods of Northumberland, evading discovery for seven days. Eventually, cornered by the police, Moat shot himself. Here, Andrew Hankinson re-tells Moat's story using Moat's words, and those of the state services which engaged with him, bringing the reader disarmingly close, at all times, to the mind of Moat.
The gripping true story of how Detective Superintendent Julie Mackay brought Melanie Road's murderer to justice. BATH, 1984 Jean Road, a 49-year-old mother of three, awakens to news that her daughter Melanie has been murdered in a nearby street as she walked home from a club in the early hours. Britain's biggest manhunt begins. A trail of blood is found leading away from the scene. It's a rare blood type. But despite a year-long inquiry and 94 arrests, the case is wound down. No one is charged with Melanie's murder. AVON & SOMERSET POLICE HQ, 2009 Detective Sergeant Julie Mackay, a 41-year-old single mother of three who has been overlooked for promotion for years, transfers to the Cold Case Unit. She unearths a file from the original inquiry and becomes hooked by the details: the rare blood type, Bath on a summer's night, the investigative wrong turns ... She takes on the case, and with the help of Melanie's inspirational mother works tirelessly to rebuild it. This is the true story of how she did it.
An Edgar Award finalist for Best Fact Crime, this "impressive...open-eyed investigative inquiry wrapped within a cultural history of rural America" (The Wall Street Journal) shows legendary statistician and baseball writer Bill James applying his analytical acumen to crack an unsolved century-old mystery surrounding one of the deadliest serial killers in American history. Between 1898 and 1912, families across the country were bludgeoned in their sleep with the blunt side of an axe. Jewelry and valuables were left in plain sight, bodies were piled together, faces covered with cloth. Some of these cases, like the infamous Villasca, Iowa, murders, received national attention. But few people believed the crimes were related. And fewer still would realize that all of these families lived within walking distance to a train station. When celebrated baseball statistician and true crime expert Bill James first learned about these horrors, he began to investigate others that might fit the same pattern. Applying the same know-how he brings to his legendary baseball analysis, he empirically determined which crimes were committed by the same person. Then after sifting through thousands of local newspapers, court transcripts, and public records, he and his daughter Rachel made an astonishing discovery: they learned the true identity of this monstrous criminal. In turn, they uncovered one of the deadliest serial killers in America. Riveting and immersive, with writing as sharp as the cold side of an axe, The Man from the Train paints a vivid, psychologically perceptive portrait of America at the dawn of the twentieth century, when crime was regarded as a local problem, and opportunistic private detectives exploited a dysfunctional judicial system. James shows how these cultural factors enabled such an unspeakable series of crimes to occur, and his groundbreaking approach to true crime will convince skeptics, amaze aficionados, and change the way we view criminal history.
This book discusses environmental crime and individual wrongdoing. It uses the theory of convenience throughout to examine financial motives, attractive opportunities, and personal willingness to explain deviant behavior. This book focusses primarily on the case study of the Island of Tjome in Norway, an attractive resort where building permits were repeatedly granted to rich people in a protected zone along the shoreline. This book investigates how these crimes were detected and investigated by police over a few years with the help of whistleblowers. It discusses the interplay between the potentially corrupt public officials, professionals like architects and attorneys, and rich individuals, as an interesting and challenging arena for law enforcement. It covers attorneys' defense strategies, evaluates private internal policing, and provides insights for those investigating individuals involved in environmental crime. It also examines the Vest Tank toxic waste dumping case and the resulting explosion where unusually both the chairperson and the chief executive were successfully sentenced to prison because of environmental crime, unlike many other environmental crime cases where individuals avoid prison. The case studies are drawn from Norway to supplement more well-known case studies from the USA.
This book explains the emerging system of domination and the exercise of power in the Third World society of Guyana. It is concerned with the police as a bureaucratic inheritance.
Some have estimated that healthcare fraud in the United States results in losses of approximately $80 billion a year. Although there are many books available that describe how to "detect" healthcare fraud, few address what must be done after the fraud is detected. Filling this need, Charles Piper's Healthcare Fraud Investigation Guidebook details not only how to detect healthcare fraud, but also how to "investigate" and prove the wrongdoing to increase the likelihood of successful prosecution in court. The book starts by covering the history of healthcare insurance and the various types of fraud schemes. It presents Charles Piper's unique approach to investigating (The Piper Method) which allows readers to conduct as many as 10 simultaneous investigations for each case. It emphasizes the importance of simultaneously searching for waste and abuse as well as systemic weaknesses and deficiencies that caused or contributed to the problem or wrongdoing under investigation and then make recommendations for improvement. It also provides: Questions to ask whistleblowers, complainants, employers, employees, and healthcare providers who are suspects Tips on investigative case planning, goals, and strategies Sample visual aids for use when briefing others about your investigative findings Guidance on presenting information obtained from healthcare investigations and on how to testify in court Techniques for uncovering previously undetected fraud The book includes a sample case study that walks readers through a mock case-from the time the case is received through the end. The case study demonstrates how to initiate, plan, and conduct a thorough and complete healthcare fraud investigation while incorporating Piper's proven methodology. Sharing insights gained through Charles Piper's decades of experience as a federal special agent and certified fraud examiner, the Healthcare Fraud Investigation Guidebook aims to revolutionize the way that healthcare fraud investigations are conducted. It provides the understanding you need to not only put a bandage on the problem of healthcare fraud, but to actually start curing the greed that is poisoning the healthcare industry.
From the private files of Scotland Yard's in house museum come 19th and 20th century talkes of murder which mark some of the most infamous cases ever investigated by one of the world's premier investigative forces. Included are the first use of finger print technology; the first time `The Yard' used the Press to help hunt down a killer; the first use of the now well-known `wanted poster'; the early use of photography; the call box and the teaming up of Inspector and Sergeant as an investigative team. Method of murder are also explored as detectives uncover murders by poison, a Victorian favorite, dismemberment, axe, acid, rope, gas, gunshot and knife. All areas of British society are included from the lowest dressmaker, the poor farmer, the travelling salesman and the truck driver to the gentleman gambler, the well paid attorney and even a police officer. And even though the detectives of Scotland Yard rarely miss their man, or woman for that matter, cases which have yet to be stamped-case closed-are also part of the history and files of this most interesting collection of tales from the exhibits and files deeply held within the walls of the Black Museum.
Based primarily upon information from the UK Special Branch Counterterrorism Unit, Policing Terrorism: Research Studies into Police Counterterrorism Investigations takes you through the mechanics of a counterterrorism investigation. A combination of legal and empirical research, this entry in the Advances in Police Theory and Practice book series examines subjects that include surveillance, intelligence gathering, and informants. It also addresses practical obstacles in counterterrorist investigations. The first section of the book conducts a comparative study of laws governing terrorist investigations in the UK, US, Canada, and Australia. It compares the legal definition of terrorism in each country and how it has been incorporated into the statutes regarding terrorism-except in the case of the US, which has not established a definition of terrorism. The book locates similarities in the legal jurisdictions of cooperating countries and discusses how legal gaps can create difficulties for international cooperation. The second section contains empirical studies on practical aspects of terrorist investigations and the activities of terrorist organizations. It evaluates operational officers' discretion in using the powers granted to them and analyzes terrorist organizations' methods in radicalizing and recruiting people to their causes. It also explores the critical role of informants in gathering intelligence, covering a broad range of issues including integrity, risk assessment, ethics of handling informants, police interrogation of suspects, and the use of informants at trial. With many governments currently at a high threat level, increased international cooperation among counterterrorism agencies is imperative. Policing Terrorism presents several pathways to generating more effective cooperation. It provides you with information on factors that help or hurt cooperation while suggesting what can be done to improve curr
All too often, professional investigations fail because those involved jump to conclusions and draw faulty premises that leave the trail cold. Correct conclusions are not the result of guessing, but by applying efficient thought processes. Logical Investigative Methods: Critical Thinking and Reasoning for Successful Investigations is designed to help investigators, detectives, special agents, and prosecutors avoid assumptions and false premises by using logic, reasoning, critical thinking, and the scientific method in their investigations. Topics covered in this text include: Finding facts instead of making assumptions Understanding how our cognitive skills can affect investigations Using philosophy and logic to come to proper conclusions and probable inferences Using critical thinking and logical reasoning effectively Outlining the criminal investigation skills required of detectives and investigators Profiling to analyze personality types and to interpret artifacts of a crime scene Interviewing, interrogation, and detecting deception Using tools to analyze and graphically display organized, understandable information about complex crimes Documenting and presenting a case using all of the tools learned This organized text of methods, practices, techniques, and tactics provides concrete instruction that can be applied to any investigation. By learning to become trained observers who make logical inferences from their observations, users of this text can effectively streamline their investigations for a successful result.
Many cities, towns, and municipalities across the United States have criminal organizations operating within their jurisdictions. This book gives the investigator a guide to probing, evaluating, and analyzing local criminal organizations, with the goal of disrupting and dismantling criminal operations. Subjects covered include investigative field techniques, identification of enterprise vulnerabilities, and an in-depth look into FBI task forces. Intended for law enforcement and other criminal justice professionals, Criminal Enterprise Investigation provides readers with a critical "how to" guide to overcoming criminal enterprise in their communities. Features: Provides step-by-step guide to dismantling criminal organizations Includes real-life examples of successful investigations Covers a wide range of criminal groups, including domestic terrorists, drug cartels, gangs, white-collar criminals, and robbery and extortion rings For those working to combat criminal organizations, this book is an essential guide to best practices. Criminal Enterprise Investigation provides the theory, techniques, and real-world examples necessary to overcome criminal activity for those of any level of expertise, from seasoned criminal justice professionals to those just beginning their careers.
At a time when resources are scarce, not every crime may be investigated as fully as is desirable. Police generally use experience to guide their case screening. This volume demonstrates a new, research-based approach, exploring innovative research on crime solvability as a factor for crime investigation and prevention. Crime solvability is the interplay between forensic science, decision-making, and prediction to determine the likelihood that a crime will be solved. This text discusses recent studies of how solvable cases may be identified, using original sets of police data. It focuses on high-volume crimes such as burglary, assault, metal theft, and cyberfraud. By targeting more cases that can be solved, police departments can manage their resources better and have the greatest effect on arrests, as well as preventing future crimes by these offenders. Topics covered include: Research into the effects of crime solvability and detection outcomes. Studies ranging from less severe, high-volume crimes to severe offences. Effects of resources on investigating and detecting crime. Theoretical resourcing-solvability model of crime detection. Detection complements preventive approaches in containing criminal activity. Chapters on incident solvability and measured use of resources in different investigative stages. Predictive approaches for improving crime solvability. Property, violent, and sexual offenses. Crime Solvability Factors: Police Resources and Crime Detection will be of interest to researchers in criminology and criminal justice, particularly with an interest in quantitative and experimental research and police studies. It will also be of interest to policymakers and police organizations.
This book discusses privatization of law enforcement in relation to suspected corporate crime and recommends guidelines for successful fraud examinations. There is a growing business for global auditing and local law firms to conduct internal investigations at client organizations when there is suspicion of white-collar misconduct and crime. This book reflects on the work by these private fraud examiners in terms of an evaluation of their investigation reports. The book brings an original theoretical and methodological approach to investigations of white-collar crime. It develops the theory of convenience as an explanation for motive, opportunity, and willingness to commit and conceal white-collar crime. This theory is then related to the case studies. Structured in such a way as to allow the reader to use the text as a nonsequential reference source or guide to a set of connected issues, the book illustrates the practice of privatization by cases and presents guidelines for successful fraud examination. As an investigation can lead to conviction and incarceration, this privatization of crime investigation feeds into the larger issue of privatization of policing. The work will be a valuable resource for students, academics, and practitioners working in the areas of Criminal Justice, Corporate Law, and Business.
The core baseline of Intelligence-led Policing is the aim of increasing efficiency and quality of police work, with a focus on crime analysis and intelligence methods as tools for informed and objective decisions both when conducting targeted, specialized operations and when setting strategic priorities. This book critically addresses the proliferation of intelligence logics within policing from a wide array of scholarly perspectives. It considers questions such as: How are precautionary logics becoming increasingly central in the dominant policing strategies? What kind of challenges will this move entail? What does the criminalization of preparatory acts mean for previous distinctions between crime prevention and crime detection? What are the predominant rationales behind the proactive use of covert cohesive measures in order to prevent attacks on national security? How are new technological measures, increased private partnerships and international cooperation challenging the core nature of police services as the main providers of public safety and security? This book offers new insights by exploring dilemmas, legal issues and questions raised by the use of new policing methods and the blurred and confrontational lines that can be observed between prevention, intelligence and investigation in police work.
Detecting Deception offers a state-of-the-art guide to the detection of deception with a focus on the ways in which new cognitive psychology-based approaches can improve practice and results in the field. * Includes comprehensive coverage of the latest scientific developments in the detection of deception and their implications for real-world practice * Examines current challenges in the field - such as counter-interrogation strategies, lying networks, cross-cultural deception, and discriminating between true and false intentions * Reveals a host of new approaches based on cognitive psychology with the potential to improve practice and results, including the strategic use of evidence, imposing cognitive load, response times, and covert lie detection * Features contributions from internationally renowned experts
Although on the face of it the Federal Bureau of Investigation and the Ku Klux Klan seem to be very different organizations, they have more in common than one might imagine. In fact, the Bureau and the Klan share a long and complicated history.Beginning with their first confrontation in 1922, this book examines the similarities, covert collaborations and common goals of the FBI and the KKK. After briefly describing the history of each, it explores the development of their association and the specific ways in which each organization furthered the other's goals.The book traces eighty years of parallel development and the conservative attitudes that drew the FBI and the KKK together, especially in the area of civil rights. Political, societal and historical contributions to the atmosphere that encouraged this complicity are explored in detail. Statistics regarding Klan membership, racial violence and a suspicious lack of federal involvement lend support to the author's analysis of events. Special emphasis is placed on the leaders of each group, especially J. Edgar Hoover, who shaped the very foundation of the FBI. The final chapters cover more recent events, up-to and including those following the 1995 bombing of the federal building in Oklahoma City.
Well-informed and skilled interviewing is a key factor in dealing with suspects, victims and witnesses. Experienced police and investigators know this from their own practice, and there is now a substantial body of research and theory in psychology which supports this practice and can guide both training and the development of investigative work. The purpose of this book is to provide a concise and clearly written guide to the psychological concepts and research-based knowledge that can support and guide investigative interviewing. It deals in particular with:
Contract and procurement fraud, collusion, and corruption are worldwide problems. Such wrongdoing causes federal, state, and local governments, as well as private-sector corporations and businesses, to lose funds and profits, while the wrongdoers unjustly benefit. Bid riggers conspire to eliminate fair and open competition and unjustly increase prices, allowing some to monopolize industries. Too often, contracting officials and others responsible for placing orders or awarding contracts compromise their integrity and eliminate fair and open competition to favor vendors offering bribes or gifts. This results in unfair playing fields for vendors and causes financial losses for businesses, government agencies, and taxpayers. Charles Piper's Contract and Procurement Fraud and Corruption Investigation Guidebook educates readers on fraud and corruption schemes that occur before, during, and after contracts are awarded. This book teaches not only how to identify such wrongdoing, but also how to investigate it and prevent reoccurrence. Piper shares the Piper Method of Conducting Thorough and Complete Investigations, his innovative and proven method of investigating contract and procurement fraud, and demonstrates its principles with personal, on-the-job examples (which he calls "War Stories") woven throughout the text. Intended for criminal justice students, as well as investigators, auditors, examiners, business owners, policy-makers, and other professionals potentially affected by fraud, this book is a must-read guide to effective procurement and contract fraud investigations from inception to testimony.
Techniques in the investigative interviewing and interrogation of victims, witnesses and suspects of crime vary around the world, according to a country's individual legal system, religion and culture. Whereas some countries have developed certain interview protocols for witnesses (such as the ABE Guidelines and the NICHD protocol when interviewing children) and the PEACE model of interviewing suspects, other countries continue to use physical coercion and other questionable tactics to elicit information. Until now, there has been very little empirical information about the overall interview and interrogation practices in non-western countries, especially the Middle and Far East. This book addresses this gap, bringing together international experts from over 25 countries and providing in-depth coverage of the various interview and interrogation techniques used across the globe. Volume 2 focuses on the interviewing of crime suspects, aiming to provide the necessary information for an understanding of how law enforcement agencies around the world gain valuable information from suspects in criminal cases. Together, the chapters that make up this volume and the accompanying volume on interviewing witnesses and victims, draw on specific national case studies and practices, examine contemporary challenges and identify best practice to enable readers to develop an international, as well as a comparative, perspective of developments worldwide in this important area of criminal investigation. This book will be an essential resource for academics and students engaged in the study of policing, criminal investigation, forensic psychology and criminal law. It will also be of great interest to practitioners, legal professionals and policymakers around the world.
Techniques in the investigative interviewing and interrogation of victims, witnesses and suspects of crime vary around the world, according to a country's individual legal system, religion and culture. Whereas some countries have developed certain interview protocols for witnesses (such as the ABE Guidelines and the NICHD protocol when interviewing children) and the PEACE model of interviewing suspects, other countries continue to use physical coercion and other questionable tactics to elicit information. Until now, there has been very little empirical information about the overall interview and interrogation practices in non-western countries, especially the Middle and Far East. This book addresses this gap, bringing together international experts from over 25 countries and providing in-depth coverage of the various interview and interrogation techniques used across the globe. Volume 1 focuses on the interviewing of victims and witnesses, aiming to provide the necessary information for an understanding of how law enforcement agencies around the world gain valuable information from victims and witnesses in criminal cases. Together, the chapters that make up this volume and the accompanying volume on interviewing suspects, draw on specific national case studies and practices, examine contemporary challenges and identify best practice to enable readers to develop an international, as well as a comparative, perspective of developments worldwide in this important area of criminal investigation. This book will be an essential resource for academics and students engaged in the study of policing, criminal investigation, forensic psychology and criminal law. It will also be of great interest to practitioners, legal professionals and policymakers around the world.
This ambitious multidisciplinary volume surveys the science, forensics, politics, and ethics involved in responding to missing persons cases. International experts across the physical and social sciences offer data, case examples, and insights on best practices, new methods, and emerging specialties that may be employed in investigations. Topics such as secondary victimization, privacy issues, DNA identification, and the challenges of finding victims of war and genocide highlight the uncertainties and complexities surrounding these cases as well as possibilities for location and recovery. This diverse presentation will assist professionals in accessing new ideas, collaborating with colleagues, and handling missing persons cases with greater efficiency-and potentially greater certainty. Among the Handbook's topics: *A profile of missing persons: some key findings for police officers. *Missing persons investigations and identification: issues of scale, infrastructure, and political will. *Pregnancy and parenting among runaway and homeless young women. *Estimating the appearance of the missing: forensic age progression in the search for missing persons. *The use of trace evidence in missing persons investigations. *The Investigation of historic missing persons cases: genocide and "conflict time" human rights abuses. The depth and scope of its expertise make the Handbook of Missing Persons useful for criminal justice and forensic professionals, health care and mental health professionals, social scientists, legal professionals, policy leaders, community leaders, and military personnel, as well as for the general public.
One winter's evening in 1821, stung by his girlfriend Eliza's rejection, 17-year-old John Horwood picked up a stone and flung it at her. That thoughtless act of fury was to cost both those young people their lives. A prominent surgeon who clearly placed his own reputation above the care of his patients carried out an operation on Eliza which he must have known would probably kill her - as it did. Smith kept her skull for teaching purposes, and when John was sentenced to hang for her death he made sure the youth's body would be his to dismember. He even had a book bound with John Horwood's skin. When Mary Halliwell, a descendant of John Horwood, unearthed this grotesque and shocking story, she and her husband Dave went into action. 190 years after the fateful day when John's young life was so unjustly snuffed out, they finally managed to arrange a Christian burial for his remains.
This book explores current and emerging trends in policy, strategy, and practice related to cyber operations conducted by states and non-state actors. The book examines in depth the nature and dynamics of conflicts in the cyberspace, the geopolitics of cyber conflicts, defence strategy and practice, cyber intelligence and information security. |
![]() ![]() You may like...
Land, Memory, Reconstruction and Justice…
Anna Bohlin, Ruth Hall, …
Paperback
Puzzles in contemporary political…
L. Vincent, J. Steyn-Kotze, …
Paperback
R498
Discovery Miles 4 980
Borate Phosphors - Processing to…
S. K. Omanwar, R. P. Sonekar, …
Hardcover
R5,757
Discovery Miles 57 570
|