![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Sociology, social studies > Crime & criminology > Criminal investigation & detection
The legendary FBI criminal profiler and international bestselling author of Mindhunter and The Killer Across the Table returns with this timely, relevant book that goes to the heart of extremism and domestic terrorism, examining in-depth his chilling pursuit of, and eventual prison confrontation with Joseph Paul Franklin, a White Nationalist serial killer and one of the most disturbing psychopaths he has ever encountered. Worshippers stream out of an Midwestern synagogue after sabbath services, unaware that only a hundred yards away, an expert marksman and avowed racist, antisemite and member of the Ku Klux Klan, patiently awaits, his hunting rifle at the ready. The October 8, 1977 shooting was a forerunner to the tragedies and divisiveness that plague us today. John Douglas, the FBI's pioneering, first full-time criminal profiler, hunted the shooter-a white supremacist named Joseph Paul Franklin, whose Nazi-inspired beliefs propelled a three-year reign of terror across the United States, targeting African Americans, Jews, and interracial couples. In addition, Franklin bombed the home of Jewish leader Morris Amitay, shot and paralyzed Hustler magazine publisher Larry Flynt, and seriously wounded civil rights leader Vernon Jordan. The fugitive supported his murderous spree robbing banks in five states, from Georgia to Ohio. Douglas and his writing partner Mark Olshaker return to this disturbing case that reached the highest levels of the Bureau, which was fearful Franklin would become a presidential assassin-and haunted him for years to come as the threat of copycat domestic terrorist killers increasingly became a reality. Detailing the dogged pursuit of Franklin that employed profiling, psychology and meticulous detective work, Douglas and Olshaker relate how the case was a make-or-break test for the still-experimental behavioral science unit and revealed a new type of, determined, mission-driven serial killer whose only motivation was hate. A riveting, cautionary tale rooted in history that continues to echo today, The Killer's Shadow is a terrifying and essential exploration of the criminal personality in the vile grip of extremism and what happens when rage-filled speech evolves into deadly action and hatred of the "other" is allowed full reign. The Killer's Shadow includes an 8-page color photo insert.
This one-of-a-kind collection consists of actual cases written by fraud examiners out in the field. These cases were hand selected from hundreds of submissions and together form a comprehensive picture of the many types of computer fraud how they are investigated, across industries and throughout the world. Topics included are email fraud, on-line auction fraud, security breaches, counterfeiting, and others.
Not all monsters remain fictional... Percy Shelley's legendary poetry lives on long after his death in 1850s England. But when his son and famed widow, Mary, are approached by a stranger offering to sell rare papers allegedly by Percy, Charles Maddox is called to look at the suspicious texts. But the case is not as simple as it appears, with Mary's bitter stepsister, Claire Clairmont, also on the scene. As the investigation grows more disturbing, shocking evidence of foul play is discovered, leaving Maddox hunting for an even darker truth... Taking inspiration from Mary Shelley's classic Frankenstein, Lynn Shepherd turns a literary legend into an otherworldly tale. Previously called A Treacherous Likeness.
The words "identity", "diversity", "multiculturalism", and "Eurocentrism" have become familiar to us through a process of political and cultural transformation. In the United States, a great national debate rages over fears that the country will fall apart and sacrifice its free speech to "political correctness". In Europe, a related discussion has focused on the resurgence of xenophobia and ethnic nationalism. Undoubtedly, these debates touch on issues which, after the collapse of Cold War geopolitics, are likely to remain with us for some time. "The Identity in Question" provides a theoretical analysis of this issue and the questions it raises about critical theory. The contributors to this collection look behind the familiar words of the discourse to rethink notions of universality and agency and the traditions of liberalism, nationalism and pluralism. They investigate the meanings of democracy and "radical democracy". They also ask how such notions relate to questions of sexual orientation. More generally, the book explores how the new critical theories and methods that have taken shape over the last 20 years figure in these debates, along with their conceptions of "otherness".
In the early hours of Valentine's Day 2013, Olympic athlete Oscar Pistorius killed his girlfriend Reeva Steenkamp, shooting her multiple times while she cowered behind the locked door of their bathroom. His trial has attracted more international media attention and public scrutiny than any since that of OJ Simpson. What went on behind the scenes though? And what was the real Reeva like, away from the photo shoots and the attention of the media? A beautiful 29 year old from Port Elizabeth, Reeva graduated as a lawyer and campaigned for human rights causes before deciding to try the world of modelling in South Africa's most vibrant city. Her relationship with international hero Oscar Pistorius seemed like a fairy tale of triumph over adversity - double amputee turned champion athlete meets small town girl with beauty and brains wanting to make her mark on the world. No one could have predicted the tragic and horrifying conclusion to that fairy tale. Reeva's mother, June Steenkamp, has kept a dignified silence throughout the long months since she received the phone call every mother dreads. In this painfully honest and unflinching account of Reeva's life, she talks about what really went on in her mind as she sat in the packed Pretoria court room day after day and how she is coping in the aftermath of the verdict. Reeva: A Mother's Story is the only true insider's account of this tragic story.
What are the theoretical and conceptual framings of rural criminology across the world? Thinking creatively about the challenges of rural crime and policing, in this stimulating collection of essays experts in this emerging field draw from theories of modernity, feminism, climate change, left realism and globalisation. This first book in the Research in Rural Crime series offers state-of-the-art scholarship from across the globe, and considers the future agenda for the discipline.
Statistically-derived algorithms, adopted by many jurisdictions in an effort to identify the risk of reoffending posed by criminal defendants, have been lambasted as racist, de-humanizing, and antithetical to the foundational tenets of criminal justice. Just Algorithms argues that these attacks are misguided and that, properly regulated, risk assessment tools can be a crucial means of safely and humanely dismantling our massive jail and prison complex. The book explains how risk algorithms work, the types of legal questions they should answer, and the criteria for judging whether they do so in a way that minimizes bias and respects human dignity. It also shows how risk assessment instruments can provide leverage for curtailing draconian prison sentences and the plea-bargaining system that produces them. The ultimate goal of Christopher Slobogin's insightful analysis is to develop the principles that should govern, in both the pretrial and sentencing settings, the criminal justice system's consideration of risk.
Statistically-derived algorithms, adopted by many jurisdictions in an effort to identify the risk of reoffending posed by criminal defendants, have been lambasted as racist, de-humanizing, and antithetical to the foundational tenets of criminal justice. Just Algorithms argues that these attacks are misguided and that, properly regulated, risk assessment tools can be a crucial means of safely and humanely dismantling our massive jail and prison complex. The book explains how risk algorithms work, the types of legal questions they should answer, and the criteria for judging whether they do so in a way that minimizes bias and respects human dignity. It also shows how risk assessment instruments can provide leverage for curtailing draconian prison sentences and the plea-bargaining system that produces them. The ultimate goal of Christopher Slobogin's insightful analysis is to develop the principles that should govern, in both the pretrial and sentencing settings, the criminal justice system's consideration of risk.
This book explains the emerging system of domination and the exercise of power in the Third World society of Guyana. It is concerned with the police as a bureaucratic inheritance.
'... undoubtedly a first-rate companion for any undergraduate or post-graduate law course.' John Taggart, Criminal Law Review This outstanding account of modern English criminal law combines detailed exposition and analysis of the law with a careful exploration of its theoretical underpinnings. Primarily, it is written for undergraduate students of criminal law, covering all subjects taught at undergraduate level. The book's philosophical approach ensures students have a deeper understanding of the law that goes beyond a purely doctrinal knowledge As a result, over its numerous editions, it has become required reading for many criminal law courses. The 8th edition covers all statutory law including the Assaults on Emergency Workers Act 2018 and Domestic Abuse Act, s 71. Case law discussions now cover: Grant (complicity); Barton (dishonesty); Broughton, Field, Kuddus, and Rebelo (homicide) and AG's Ref (No 1 of 2020) (sexual offences).
Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of open source tools on Mac, Linux and Windows systems as a platform for performing computer forensics. Both well-known and novel forensic methods are demonstrated using command-line and graphical open source computer forensic tools for examining a wide range of target systems and artifacts. Written by world-renowned forensic practitioners, this book uses the most current examination and analysis techniques in the field. It consists of 9 chapters that cover a range of topics such as the open source examination platform; disk and file system analysis; Windows systems and artifacts; Linux systems and artifacts; Mac OS X systems and artifacts; Internet artifacts; and automating analysis and extending capabilities. The book lends itself to use by students and those entering the field who do not have means to purchase new tools for different investigations. This book will appeal to forensic practitioners from areas including incident response teams and computer forensic investigators; forensic technicians from legal, audit, and consulting firms; and law enforcement agencies.
'A hugely impressive achievement.' - Hadley Freeman, author of House of Glass At 8.00am on Monday 18th June 2001, Danielle Jones left home dressed in her school uniform - and promptly vanished. The 15-year old's body was never recovered, but Danielle's parents soon learned that her 'Uncle Stuart', a close family friend, had concealed a decades-long history of sexual violence against teenage girls. Despite the absence of a body, Stuart Campbell was sentenced to life in prison for Danielle's abduction and murder. But what set him on his path as a violent sexual predator? And how do you come to terms with his actions if he's your own flesh and blood? In My Brother the Killer, Stuart's older brother Alix Sharkey chronicles the violent childhood and troubled teens that helped shape a bright and handsome little boy into one of Britain's most notorious killers, and led to one of the UK's most unusual murder trials. Sharkey also poses several terrifying questions: what happens when you discover a deadly sexual predator in your family? Is it possible to trace the root of his heinous crimes? And with the clock ticking towards his possible parole, can Stuart Campbell be convinced to reveal the location of Danielle's remains? A devastating hybrid of true crime and family memoir, My Brother the Killer examines the true cost of keeping dark family secrets.
What are the current and future challenges in criminal investigation carried out by the police in the UK? How has the role of the detective changed over time and is there a real journey towards professionalism? Written by an author with extensive practical and training experience, this book provides a comprehensive overview and critical analysis of the development and practice of criminal investigation. It examines decision-making within criminal investigations, from volume crime through to major and serious crime investigations and links investigative influences on policing with the evidence-based agenda. The book: * discusses the move from the art and craft of detective work to a new science-based professionalism; * contextualises the current position of investigation within the context of government austerity measures and the College of Policing and Government agendas; * critically examines models of investigation such as the Core Investigative Doctrine and the Murder Investigation Manual; * explores the legal framework for modern critical investigations and the role of the IPCC. Part of Key themes in policing, a textbook series of evidence-based policing books for use within Higher Education curriculums and in practice, this book is suitable for policing and criminal justice programmes at undergraduate and postgraduate level.
Since its introduction in the late 1980s, DNA analysis has revolutionized the forensic sciences: it has helped to convict the guilty, exonerate the wrongfully convicted, identify victims of mass atrocities, and reunite families whose members have been separated by war and repressive regimes. Yet, many of the scientific, legal, societal, and ethical concepts that underpin forensic DNA analysis remain poorly understood, and their application often controversial. Told by over twenty experts in genetics, law, and social science, Silent Witness relates the history and development of modern DNA forensics and its application in both the courtroom and humanitarian settings. Across three thematic sections, Silent Witness tracks the scientific advances in DNA analysis and how these developments have affected criminal and social justice, whether through the arrests of new suspects, as in the case of the Golden State Killer, or through the ability to identify victims of war, terrorism, and human rights abuses, as in the cases of the disappeared in Argentina and the former Yugoslavia and those who perished during the 9/11 attacks. By providing a critical inquiry into modern forensic DNA science, Silent Witness underscores the need to balance the benefits of using forensic genetics to solve crime with the democratic right to safeguard against privacy invasion and unwarranted government scrutiny, and raises the question of what it means to be an autonomous individual in a world where the most personal elements of one's identity are now publicly accessible.
There are a limited number of intelligence analysis books available on the market. Intelligence Analysis Fundamentals is an introductory, accessible text for college level undergraduate and graduate level courses. While the principles outlined in the book largely follow military intelligence terminology and practice, concepts are presented to correlate with intelligence gathering and analysis performed in law enforcement, homeland security, and corporate and business security roles. Most of the existing texts on intelligence gathering and analysis focus on specific types of intelligence such as ‘target centric’ intelligence, and many of these, detail information from a position of prior knowledge. In other words, they are most valuable to the consumer who has a working-level knowledge of the subject.
Domestic drug enforcement takes many forms, from the rural patrol officer who happens upon a small-scale mobile "shake and bake" methamphetamine lab during a routine traffic stop, to the city narcotics detective who initiates a low-level buy-bust operation that nets a few hits of crack cocaine on the street corner, to the local, state, and federal agents working in multiagency task forces that coordinate a sting operation that nets thousands of kilos of near-pure cocaine being transported by tractor-trailer. Regardless of the form, there is a high probability that these authorities have exploited access to known offenders and exerted pressure on those individuals to gather inside information on illicit drug sales. These confidential informants provide intelligence on the inner workings of drug operations in exchange for leniency or remuneration, providing a relatively cheap source of intelligence that fuels much of the ongoing war on drugs. In other instances, law enforcement authorities will reach out to members of the criminal underworld who are willing to provide valuable intelligence in exchange for money. Despite the central role of informants in contemporary police operations, little is known about the shadowy relationships among law enforcement, snitches, and offenders. Based on ethnographic fieldwork in the narcotics, homicide, and street-level vice operations in two major metropolitan police departments, Speaking Truth to Power takes readers to the front lines of the war on drugs to unravel this complex web of information exchange.
Some have estimated that healthcare fraud in the United States results in losses of approximately $80 billion a year. Although there are many books available that describe how to "detect" healthcare fraud, few address what must be done after the fraud is detected. Filling this need, Charles Piper's Healthcare Fraud Investigation Guidebook details not only how to detect healthcare fraud, but also how to "investigate" and prove the wrongdoing to increase the likelihood of successful prosecution in court. The book starts by covering the history of healthcare insurance and the various types of fraud schemes. It presents Charles Piper's unique approach to investigating (The Piper Method) which allows readers to conduct as many as 10 simultaneous investigations for each case. It emphasizes the importance of simultaneously searching for waste and abuse as well as systemic weaknesses and deficiencies that caused or contributed to the problem or wrongdoing under investigation and then make recommendations for improvement. It also provides: Questions to ask whistleblowers, complainants, employers, employees, and healthcare providers who are suspects Tips on investigative case planning, goals, and strategies Sample visual aids for use when briefing others about your investigative findings Guidance on presenting information obtained from healthcare investigations and on how to testify in court Techniques for uncovering previously undetected fraud The book includes a sample case study that walks readers through a mock case-from the time the case is received through the end. The case study demonstrates how to initiate, plan, and conduct a thorough and complete healthcare fraud investigation while incorporating Piper's proven methodology. Sharing insights gained through Charles Piper's decades of experience as a federal special agent and certified fraud examiner, the Healthcare Fraud Investigation Guidebook aims to revolutionize the way that healthcare fraud investigations are conducted. It provides the understanding you need to not only put a bandage on the problem of healthcare fraud, but to actually start curing the greed that is poisoning the healthcare industry.
*** "One of the marvels of this furious book is how insolent and funny Lavin is; she refuses to soft-pedal the monstrous views she encounters." - The New York Times "Shocking, angry, funny and wise... Talia Lavin takes no prisoners." - Danny Wallace, bestselling author of Yes Man "Lavin writes like her hands are on fire, forcing us to take a hard look at our ugliest truths." - Pamela Collof, The New York Times Magazine & Pro Publica White supremacists, Incels, White nationalists, National Socialists, Proud Boys, Christian extremists... In order to showcase their behaviour in their natural habitat, Talia Lavin goes undercover online as a blonde Nazi babe, a forlorn incel and a violent Aryan femme fatale. Lavin is every fascist's worst nightmare. She is loud, Jewish and unapologetically anti-racist, with the investigative skills to expose online hatemongers. While searching the dark web, she discovers a whites-only dating site, a popular extremist YouTube channel run by a teenager, the everyday heroes of the anti-fascist movement and much more. Lavin then turns the lens of anti-Semitism, racism, and white supremacy back on itself in an attempt to dismantle the online hate movement from the inside. Shocking, humorous, and merciless in equal measure, Culture Warlords explores some of the vilest subcultures on the Web - and shows us how we can fight back. Perfect for fans of Louis Theroux, Jon Ronson and Michael Moore, Lavin's debut book is a seamless balance of hard-hitting research, humour and shocking stories. It is a fascinating expose of the dark web and how it harbours the rage and views of far-right extremists today.
A thorough revision of the landmark book that standardized the language, terminology, and classifications used throughout the criminal justice system, Crime Classification Manual, Third Edition now adds new coverage of areas affected by globalization and new technologies, as well as new crime scene examples and analyses. Coauthored by accomplished experts in the field, it is the definitive crime classification text for law enforcement personnel, mental health professionals, forensic scientists, and those whose work brings them into contact with either offenders or victims of violent crime.
Effective Interviewing and Interrogation Techniques believably answers the question, How do you know when someone is lying? It also provides a guide for interviewing probable suspects and interrogating likely perpetrators on techniques and tradecraft. This book covers topics about searching for truth and revealing lies. It presents forensic assessments based on psychophysiology, and assessments on the basis of non-verbal behavior. The book also covers interview and interrogation preparation, as well as question formulation. It discusses the Morgan Interview Theme Technique or MITT, and the Forensic Assessment Interview or FAINT. The book addresses techniques for interviewing children and the mentally challenged, and offers information about pre-employment interviews. It also explains how to understand aggressive behavior and how to deal with angry people. The 4th Edition adds several Chapters on how to ascertain maximum information from victims and witnesses. The book concludes by presenting future methods for searching for the truth. Law enforcement and security professionals, as well as prosecutors, criminal defense lawyers, and civil litigators will find this book invaluable.
Many cities, towns, and municipalities across the United States have criminal organizations operating within their jurisdictions. This book gives the investigator a guide to probing, evaluating, and analyzing local criminal organizations, with the goal of disrupting and dismantling criminal operations. Subjects covered include investigative field techniques, identification of enterprise vulnerabilities, and an in-depth look into FBI task forces. Intended for law enforcement and other criminal justice professionals, Criminal Enterprise Investigation provides readers with a critical "how to" guide to overcoming criminal enterprise in their communities. Features: Provides step-by-step guide to dismantling criminal organizations Includes real-life examples of successful investigations Covers a wide range of criminal groups, including domestic terrorists, drug cartels, gangs, white-collar criminals, and robbery and extortion rings For those working to combat criminal organizations, this book is an essential guide to best practices. Criminal Enterprise Investigation provides the theory, techniques, and real-world examples necessary to overcome criminal activity for those of any level of expertise, from seasoned criminal justice professionals to those just beginning their careers.
Based primarily upon information from the UK Special Branch Counterterrorism Unit, Policing Terrorism: Research Studies into Police Counterterrorism Investigations takes you through the mechanics of a counterterrorism investigation. A combination of legal and empirical research, this entry in the Advances in Police Theory and Practice book series examines subjects that include surveillance, intelligence gathering, and informants. It also addresses practical obstacles in counterterrorist investigations. The first section of the book conducts a comparative study of laws governing terrorist investigations in the UK, US, Canada, and Australia. It compares the legal definition of terrorism in each country and how it has been incorporated into the statutes regarding terrorism-except in the case of the US, which has not established a definition of terrorism. The book locates similarities in the legal jurisdictions of cooperating countries and discusses how legal gaps can create difficulties for international cooperation. The second section contains empirical studies on practical aspects of terrorist investigations and the activities of terrorist organizations. It evaluates operational officers' discretion in using the powers granted to them and analyzes terrorist organizations' methods in radicalizing and recruiting people to their causes. It also explores the critical role of informants in gathering intelligence, covering a broad range of issues including integrity, risk assessment, ethics of handling informants, police interrogation of suspects, and the use of informants at trial. With many governments currently at a high threat level, increased international cooperation among counterterrorism agencies is imperative. Policing Terrorism presents several pathways to generating more effective cooperation. It provides you with information on factors that help or hurt cooperation while suggesting what can be done to improve curr
All too often, professional investigations fail because those involved jump to conclusions and draw faulty premises that leave the trail cold. Correct conclusions are not the result of guessing, but by applying efficient thought processes. Logical Investigative Methods: Critical Thinking and Reasoning for Successful Investigations is designed to help investigators, detectives, special agents, and prosecutors avoid assumptions and false premises by using logic, reasoning, critical thinking, and the scientific method in their investigations. Topics covered in this text include: Finding facts instead of making assumptions Understanding how our cognitive skills can affect investigations Using philosophy and logic to come to proper conclusions and probable inferences Using critical thinking and logical reasoning effectively Outlining the criminal investigation skills required of detectives and investigators Profiling to analyze personality types and to interpret artifacts of a crime scene Interviewing, interrogation, and detecting deception Using tools to analyze and graphically display organized, understandable information about complex crimes Documenting and presenting a case using all of the tools learned This organized text of methods, practices, techniques, and tactics provides concrete instruction that can be applied to any investigation. By learning to become trained observers who make logical inferences from their observations, users of this text can effectively streamline their investigations for a successful result.
Enemy Of The People is the first definitive account of Zuma’s catastrophic misrule, offering eyewitness descriptions and cogent analysis of how South Africa was brought to its knees – and how a nation fought back. When Jacob Zuma took over the leadership of the ANC one muggy Polokwane evening in December 2007, he inherited a country where GDP was growing by more than 6% per annum, a party enjoying the support of two-thirds of the electorate, and a unified tripartite alliance. Today, South Africa is caught in the grip of a patronage network, the economy is floundering and the ANC is staring down the barrel of a defeat at the 2019 general elections. How did we get here? Zuma first brought to heel his party, Africa’s oldest and most revered liberation movement, subduing and isolating dissidents associated with his predecessor Thabo Mbeki. Then saw the emergence of the tenderpreneur and those attempting to capture the state, as well as a network of family, friends and business associates that has become so deeply embedded that it has, in effect, replaced many parts of government. Zuma opened up the state to industrial-scale levels of corruption, causing irreparable damage to state enterprises, institutions of democracy, and the ANC itself. But it hasn’t all gone Zuma’s way. Former allies have peeled away. A new era of activism has arisen and outspoken civil servants have stepped forward to join a cross-section of civil society and a robust media. As a divided ANC square off for the elective conference in December, where there is everything to gain or to lose, award-winning journalists Adriaan Basson and Pieter du Toit offer a brilliant and up-to-date account of the Zuma era.
Incident response and digital forensics require a balancing act to get right, but both are essential when an information security incident occurs. In this practical guide, the relationship between incident response and digital forensics is explored and you will learn how to undertake each and balance them to meet the needs of an organisation in the event of an information security incident. Best practice tips and real-life examples are included throughout. |
You may like...
Mechanics - Microstructure - Corrosion…
Christine Blanc, Isabelle Aubert
Hardcover
R5,444
Discovery Miles 54 440
Principles Of Management Accounting - A…
C. Cairney, R. Chivaka, …
Paperback
|