![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Sociology, social studies > Crime & criminology > Criminal investigation & detection
Second edition of an established text on common procedures for the identification and processing of evidence at scenes of crime * Includes chapters on quality assurance and credibility of practices and processes * issues surrounding major and complex crime * Forensic handling of mass fatalities * Crime scene reconstruction and impact on evidence recovery processes
Contract and procurement fraud, collusion, and corruption are worldwide problems. Such wrongdoing causes federal, state, and local governments, as well as private-sector corporations and businesses, to lose funds and profits, while the wrongdoers unjustly benefit. Bid riggers conspire to eliminate fair and open competition and unjustly increase prices, allowing some to monopolize industries. Too often, contracting officials and others responsible for placing orders or awarding contracts compromise their integrity and eliminate fair and open competition to favor vendors offering bribes or gifts. This results in unfair playing fields for vendors and causes financial losses for businesses, government agencies, and taxpayers. Charles Piper's Contract and Procurement Fraud and Corruption Investigation Guidebook educates readers on fraud and corruption schemes that occur before, during, and after contracts are awarded. This book teaches not only how to identify such wrongdoing, but also how to investigate it and prevent reoccurrence. Piper shares the Piper Method of Conducting Thorough and Complete Investigations, his innovative and proven method of investigating contract and procurement fraud, and demonstrates its principles with personal, on-the-job examples (which he calls "War Stories") woven throughout the text. Intended for criminal justice students, as well as investigators, auditors, examiners, business owners, policy-makers, and other professionals potentially affected by fraud, this book is a must-read guide to effective procurement and contract fraud investigations from inception to testimony.
Techniques in the investigative interviewing and interrogation of victims, witnesses and suspects of crime vary around the world, according to a country's individual legal system, religion and culture. Whereas some countries have developed certain interview protocols for witnesses (such as the ABE Guidelines and the NICHD protocol when interviewing children) and the PEACE model of interviewing suspects, other countries continue to use physical coercion and other questionable tactics to elicit information. Until now, there has been very little empirical information about the overall interview and interrogation practices in non-western countries, especially the Middle and Far East. This book addresses this gap, bringing together international experts from over 25 countries and providing in-depth coverage of the various interview and interrogation techniques used across the globe. Volume 1 focuses on the interviewing of victims and witnesses, aiming to provide the necessary information for an understanding of how law enforcement agencies around the world gain valuable information from victims and witnesses in criminal cases. Together, the chapters that make up this volume and the accompanying volume on interviewing suspects, draw on specific national case studies and practices, examine contemporary challenges and identify best practice to enable readers to develop an international, as well as a comparative, perspective of developments worldwide in this important area of criminal investigation. This book will be an essential resource for academics and students engaged in the study of policing, criminal investigation, forensic psychology and criminal law. It will also be of great interest to practitioners, legal professionals and policymakers around the world.
Techniques in the investigative interviewing and interrogation of victims, witnesses and suspects of crime vary around the world, according to a country's individual legal system, religion and culture. Whereas some countries have developed certain interview protocols for witnesses (such as the ABE Guidelines and the NICHD protocol when interviewing children) and the PEACE model of interviewing suspects, other countries continue to use physical coercion and other questionable tactics to elicit information. Until now, there has been very little empirical information about the overall interview and interrogation practices in non-western countries, especially the Middle and Far East. This book addresses this gap, bringing together international experts from over 25 countries and providing in-depth coverage of the various interview and interrogation techniques used across the globe. Volume 2 focuses on the interviewing of crime suspects, aiming to provide the necessary information for an understanding of how law enforcement agencies around the world gain valuable information from suspects in criminal cases. Together, the chapters that make up this volume and the accompanying volume on interviewing witnesses and victims, draw on specific national case studies and practices, examine contemporary challenges and identify best practice to enable readers to develop an international, as well as a comparative, perspective of developments worldwide in this important area of criminal investigation. This book will be an essential resource for academics and students engaged in the study of policing, criminal investigation, forensic psychology and criminal law. It will also be of great interest to practitioners, legal professionals and policymakers around the world.
Every day the American government, the United Nations, and other
international institutions send people into non-English speaking,
war-torn, and often minimally democratic countries struggling to
cope with rising crime and disorder under a new regime. These
assistance missions attempt to promote democratic law enforcement
in devastated countries. But do these missions really facilitate
the creation of effective policing? Renowned criminologist David H.
Bayley here examines the prospects for the reform of police forces
overseas as a means of encouraging the development of democratic
governments. In doing so, he assesses obstacles for promoting
democratic policing in a state-of-the-art review of all efforts to
promote democratic reform since 1991. Changing the Guard offers an
inside look at the achievements and limits of current American
foreign assistance, outlining the nature and scope of the police
assistance program and the agencies that provide it. Bayley
concludes with recommendations for how police assistance could be
improved in volatile countries across the world. This book is
required reading as an instruction manual for building democratic
policing overseas.
One winter's evening in 1821, stung by his girlfriend Eliza's rejection, 17-year-old John Horwood picked up a stone and flung it at her. That thoughtless act of fury was to cost both those young people their lives. A prominent surgeon who clearly placed his own reputation above the care of his patients carried out an operation on Eliza which he must have known would probably kill her - as it did. Smith kept her skull for teaching purposes, and when John was sentenced to hang for her death he made sure the youth's body would be his to dismember. He even had a book bound with John Horwood's skin. When Mary Halliwell, a descendant of John Horwood, unearthed this grotesque and shocking story, she and her husband Dave went into action. 190 years after the fateful day when John's young life was so unjustly snuffed out, they finally managed to arrange a Christian burial for his remains.
Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Internet Crime Investigations, Live Forensics, Advanced Forensic Techniques, and Forensic Tools. This book is the sixth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-one edited papers from the Sixth Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the University of Hong Kong, Hong Kong, China, in January 2010.
This book by Roger W. Shuy, the senior figure in forensic linguistics, is the first to explain in an accessible way the vital role that linguistic evidence and its proper analysis play in criminal investigations. Shuy provides compelling case studies of how language functions in investigations involving, among others, wired undercover operatives, and the interrogation of suspects. He makes the point that language evidence can be as important as physical evidence, but yet does not enjoy the same degree of scrutiny by investigators, attorneys, and the courts. Beyond this, however, his more controversial thesis is that police frequently misuse or manipulate language, using various powerful controversial strategies, in order to intentionally create an impression of the targets' guilt or even to get them to confess. attorneys, law enforcement officers, judges, and juries This book makes its case by analyzing a dozen criminal cases involving a variety of crimes, such as fraud, bribery, stolen property, murder, and others. About half involve co-operating witnesses who do the tape recording, and the other half undercover police officers. These cases demonstrate how undercover operatives use different conversational strategies, such as overlapping conversation, ambiguity, interruption, refusing to take "no" for an answer, and others to create a negative impression of the targets on later listeners. Creating Language Crimes provides a fascinating window into a little-known and discussed facet of law enforcement. It will appeal to anyone concerned with language (particularly sociolinguists and discourse analysts), as well as to those involved in law enforcement and criminal cases. the appearance of such crime is created, law enforcement has not reached its evidentiary goal. Eleven conversational strategies were used in the twelve actual criminal cases described in this book.
Traditionally, forensic investigation has not been fully utilized in the investigation of property crime. This ground-breaking book examines the experiences of patrol officers, command staff, detectives, and chiefs as they navigate the expectations of forensic evidence in criminal cases, specifically property crimes cases. DNA and Property Crime Scene Investigation looks at the current state of forensic technology and, using interviews with police officers, command staff, forensic technicians, and prosecutors, elucidates who is doing the work of forensic investigation. It explores how better training can decrease backlogs in forensic evidence processing and prevent mishandling of crucial evidence. Concluding with a police chief's perspective on the approach, DNA and Property Crime Scene Investigation provides insight into an emerging and important approach to property crime scene investigation. Key Features Provides practical information on implementing forensic investigation for property crimes Examines the current state of forensic technology and points to future trends Includes a police chief's perspective on the forensic approach to investigating property crimes Utilizes interviews with professionals in the field to demonstrate the benefits of the approach
In the wake of 2001, terrorism laws and their policing have been charged with eroding civil liberties and discriminating against Muslim and ethnic minority peoples. Traces of Terror: Counter-Terrorism Law, Policing, and Race goes further and asks how counter-terrorism reproduces the social relations of race: what police and legal practice, what knowledge and what power makes over-policing normal. Based on field work in Australia, this book investigates the effects of counter-terrorism law and policing on Muslim, Somali, Turkish Kurds and Sri Lankan Tamil communities. Drawing together in-depth interviews with members of Victoria Police and those who are being policed, participant observations of community forums, and a detailed investigation of government and police policy, legislation and case law, the author explains how processes of criminalization and racialization are sustained. The study analyses preparatory terrorism offences and 'terrorist organization' laws, as well as the application of contentious concepts including extremism, radicalization and counter-radicalization. The book explains the management of difference, identity and belonging through expanding police and intelligence powers as well as through community policing and multicultural social policy. Above all, this book traces the persistence of race, racialization and racism in practices presented, on the surface, as 'race neutral', consensual and inclusive. From raids and prosecutions, to informal questioning and communitarian forms of regulation, it demonstrates the enduring and shifting meanings of these concepts as practices and their lived, often contradictory effects on the populations who experience them. Traces of Terror is not a study of police racism nor of experiences of discrimination, but rather an explanation of the enduring organisation of racial power reflected in, and produced by, counter-terrorism.
By its very nature digital crime may present a number of specific detection and investigative challenges. The use of steganography to hide child abuse images for example, can pose the kind of technical and legislative problems inconceivable just two decades ago. The volatile nature of much digital evidence can also pose problems, particularly in terms of the actions of the 'first officer on the scene'. There are also concerns over the depth of understanding that 'generic' police investigators may have concerning the possible value (or even existence) of digitally based evidence. Furthermore, although it is perhaps a cliche to claim that digital crime (and cybercrime in particular) respects no national boundaries, it is certainly the case that a significant proportion of investigations are likely to involve multinational cooperation, with all the complexities that follow from this. This groundbreaking volume offers a theoretical perspective on the policing of digital crime in the western world. Using numerous case-study examples to illustrate the theoretical material introduced this volume examine the organisational context for policing digital crime as well as crime prevention and detection. This work is a must-read for all academics, police practitioners and investigators working in the field of digital crime.
Welcome to Eldey, an island with deadly secrets.Mona is a carefree artist, staying at The Cloister to work on her illustrations. Beth is the harried mother of a toddler, on the remote Welsh island for a weekend escape with her family. Charlotte wanted a romantic getaway with her husband, not a trip with his troubled teenage stepdaughter. One of them is a serial killer who poisoned three of her friends at her eleventh birthday party. When one of the hotel guests is found dead, it becomes clear to Mallory Dawson - the night manager of the boutique island hotel and former police detective - that The Birthday Girl is among them. Three guests who fit the profile, but which of them would risk everything to kill again? An absolutely gripping Welsh crime novel, perfect for fans of Sarah Pearce and Lucy Foley.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics II describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include:
This book is the second volume in the anual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the First Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2006. Advances in Digital Forensics is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Martin S. Olivier is a Professor of Computer Science and co-manager of the Information and Computer Security Architectures Research Group at the University of Pretoria, Pretoria, South Africa. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org. "
This volume addresses interrogation and torture at a unique moment. Emerging scientific research reveals non-coercive methods to be the most effective interrogation techniques. And efforts are now being made to integrate this science and practice into international law and global policing initiatives. Contributors present cutting-edge research on non-coercive interrogation techniques and show how this knowledge is brought to bear on the realm of international law. Such advancements have the potential to transform the conversation on interrogation and torture in many disciplines, and the contributions in this edited volume are meant to spark those discussions. Moreover, this book can serve as a guide for policymakers who seek lawful, ethical, human-rights compliant-and the most effective-methods to obtain reliable information from those perceived to pose a threat to public safety. To achieve these aims the editors have brought together highly experienced practitioners and leading scholars in law, philosophy, psychology, neuroscience, social science, national security, and government.
With the rise of surveillance technology in the last decade, police departments now have an array of sophisticated tools for tracking, monitoring, even predicting crime patterns. In particular crime mapping, a technique used by the police to monitor crime by the neighborhoods in their geographic regions, has become a regular and relied-upon feature of policing. Many claim that these technological developments played a role in the crime drop of the 1990s, and yet no study of these techniques and their relationship to everyday police work has been made available. Noted scholar Peter K. Manning spent six years observing three American police departments and two British constabularies in order to determine what effects these kinds of analytic tools have had on modern police management and practices. While modern technology allows the police to combat crime in sophisticated, detail-oriented ways, Manning discovers that police strategies and tactics have not been altogether transformed as perhaps would be expected. In The Technology of Policing, Manning untangles the varying kinds of complex crime-control rhetoric that underlie much of today's police department discussion and management, and provides valuable insight into which are the most effective and which may be harmful-in successfully tracking criminal behavior. The Technology of Policing offers a new understanding of the changing world of police departments and information technology's significant and undeniable influence on crime management.
One of the key methods of reducing and dealing with criminal activity is to accurately gauge and then analyse the geographical distribution of crime (from small scale to large scale areas). Once the police and government know what areas suffer most from criminal activity they can assess why this is the case and then deal with it in the most effective way. Crime mapping and the spatial analysis of crime data have become recognised as powerful tools for the study and control of crime. Much of the emerging demand for more information and detailed crime pattern analysis have been driven by legislative changes, such as the UK's new Crime and Disorder Act which has placed a joint statutory duty on Police Forces and Local Authorities to produce crime and disorder audits for their areas. The book sets out methods used in the fields of Geographical Information Systems and highlights areas of best practice, examines the types of problems to which spatial crime analysis can be applied, reviews the capabilities and limitations of existing techniques, and explores the future directions of spatial crime analysis and the need for training. It centres on a series of case studies highlighting the experiences of academics and practitioners in agencies centrally involved in the partnership approach to crime prevention. Practitioners and academics not only in the UK but also worldwide should be interested in the book as an up-to-date information resource and a practical guide.
This book, now in paperback, focuses on the world's first publicly-funded body to review alleged miscarriages of justice, set up in the wake of notorious cases such as the Guildford Four and the Birmingham Six. Bringing together critical perspectives from campaigners, prominent criminal appeal practitioners and academic specialists, it centres on the different aspects of the CCRC's tasks, in particular, the limitations placed on it by its governing statute that hinder its claimed independence from the appeal courts and its working practices which prevents the referral of cases in which victims may be factually innocent. The book compares the CCRC with existing systems in Scotland, the US and Canada that deal with alleged wrongful convictions. Thoroughly undermining its operations, this study argues that the CCRC's help to innocent victims of wrongful conviction is merely incidental.
This book is about the highly controversial use of supergrasses from loyalist and republican paramilitary organizations in Northern Ireland during the 1980s. 'Supergrasses' are informers or suspects prepared to testify in court against their alleged ex-confederates in return for rewards such as immunity from prosecution, lenient sentences, and new identities. The trials in Northern Ireland in which they featured were some of the largest ever conducted in the United Kingdom. In this thought-provoking study, Steven Greer analyses these proceedings and traces their origins in the murky world of counter-terrorism and intelligence-gathering. The case for stronger legal safeguards receives particularly strong support from the extensive comparisons with similar processes in other countries. The publication of this book could hardly be more timely; Northern Ireland is once again at the top of the political agenda in the United Kingdom and Ireland, and recent developments have ensured that the Troubles are once again the focus of widespread international attention. The current mood of optimism provides an ideal opportunity for the lessons contained in this book to be properly learned and applied.
Criminal investigation has a high profile in the media, and has attracted widespread interest. Within the police it has been a rapidly developing field. Important scientific and technological developments have had a considerable impact on practice, and significant steps have been taken in the direction of professionalizing the whole process of investigation. Within police studies criminal investigation has now emerged as an important sub-discipline. Criminal Investigation provides an authoritative and highly readable introduction to the subject from somebody ideally placed to write about it, focusing on how police practitioners carry out investigations. It looks systematically at the purpose and role of criminal investigation; the legal, policy and organizational context in which criminal investigation takes place; the evidence and information that criminal investigators seek; the process and methods of criminal investigation; the knowledge, techniques and decision making abilities that practitioners require to carry out criminal investigations; how and why it is that some crimes are solved and some are not; the supervision of criminal investigation; and a review of some of the key contemporary issues that have a bearing on criminal investigation. Criminal Investigation will be essential reading for both policing practitioners (student police officers as well as officers taking higher levels of CPD within the police service) and students taking courses in criminal investigation, forensic sciences and investigation, police studies and police science, and other courses where a knowledge of criminal investigation is required.
Although on the face of it the Federal Bureau of Investigation and the Ku Klux Klan seem to be very different organizations, they have more in common than one might imagine. In fact, the Bureau and the Klan share a long and complicated history.Beginning with their first confrontation in 1922, this book examines the similarities, covert collaborations and common goals of the FBI and the KKK. After briefly describing the history of each, it explores the development of their association and the specific ways in which each organization furthered the other's goals.The book traces eighty years of parallel development and the conservative attitudes that drew the FBI and the KKK together, especially in the area of civil rights. Political, societal and historical contributions to the atmosphere that encouraged this complicity are explored in detail. Statistics regarding Klan membership, racial violence and a suspicious lack of federal involvement lend support to the author's analysis of events. Special emphasis is placed on the leaders of each group, especially J. Edgar Hoover, who shaped the very foundation of the FBI. The final chapters cover more recent events, up-to and including those following the 1995 bombing of the federal building in Oklahoma City.
Drawing on Foucauldian theory and 'social harm' paradigms, Naughton offers a radical redefinition of miscarriages of justice from a critical perspective. This book uncovers the limits of the entire criminal justice process and challenges the dominant perception that miscarriages of justices are rare and exceptional cases of wrongful imprisonment.
This book is about the increasing significance of DNA profiling for crime investigation in modern society. It focuses on developments in the UK as the world-leader in the development and application of forensic DNA technology and in the construction of DNA databases as an essential element in the successful use of DNA for forensic purposes. The book uses data collected during the course of Wellcome Trust funded research into police uses of the UK National DNA Database (NDNAD) to describe the relationship between scientific knowledge and police investigations. It will be illustrated throughout by reference to some of the major UK criminal cases in which DNA evidence has been presented and contested. Chapters in the book explain the scientific developments which have enabled DNA profiling to be applied to criminal investigation, the ways in which the state has directed this and how genetic technology has risen to such preeminence; how DNA evidence moved from its use in individual prosecutions to a major role in intelligence led policing, and saw the development of the UK National DNA Database; how legislative support for the NDNAD was mobilized, enabling the police to obtain and use genetic information on individuals. Finally, the authors examine the ways in which the DNA Expansion Programme, built on the supposed potential for the NDNAD to contribute to criminal detection, has been incorporated into a broader crime reduction strategy, and explore the implications for policing, governance and security of the continued expansion of the range and scope of the NDNAD.
View the Table of Contents. Read the Introduction. aAs a recognized expert in the field, Hamm is eminently
qualified to prepare this text on the subject of terrorism from the
criminal law perspective. . . . The text is written in a clear,
lively manner.a aDrawing on six case studies of terrorist attacks by radical
Islamists and right-wing racists, Hamm writes that American
counterterrorist agencies have neglected some basic insights from
scholarly criminology.a "Read this book to understand the important nexus between
terrorism and crime! This cutting edge analysis suggests a new
approach to defeat the terrorist threat to the United
States." "Hamm's clear writing style, careful research and theoretical
insights promise to make this a classic in criminology." "[Provides] the first detailed account of how crime provides
logistical support for terrorist strikes. By blending the study of
terrorism and criminology, Hamm offers the possibility of detecting
and stopping terrorism through the pursuit of conventional methods
of criminal investigation." Car bombing, suicide bombing, abduction, smuggling, homicide, and hijacking are all profoundly criminal acts. In Terrorism as Crime Mark S. Hamm presents an understanding of terrorism from a criminological point of view, arguing that the most successful way to understand, detect, prosecute and deter these acts is to use conventional criminal investigation methods. Whether in Oklahoma City or London, Terrorism as Crime demonstrates that criminal activity is the lifeblood of terrorist groups and that there are simple common denominators at work that can remove the mystery surrounding many of these terrorist groups. Once understood the vulnerabilities of these organizations can be exposed. This important volume focuses in on six case studies of crimes committed by jihad and domestic right wing groups, including biographies of more than two dozen terrorists along with descriptions of their organizations, strategies, and terrorist plots. Terrorism as Crime offers an original and significant framework for explaining international and domestic terrorism, as well as how future acts might be detected or exposed.
- Represents the latest advances of the role of psychological factors in inducing potentially unreliable self-incriminating behavior - Chapters are authored by a diverse group psychologists, criminologists, and legal scholars who have contributed significantly to the collective understanding of the pressures that insidiously operate when the goal of law enforcement is to elicit self-incriminating behavior from suspected criminals - Reviews and analyzes the extant literature in this area as well as discussing how this knowledge can be used to help bring about needed changes in the legal system |
![]() ![]() You may like...
Op Die Duiwel Se Spoor - Hoe Ek Die…
Ben "Bliksem" Booysen
Paperback
![]()
The Thabo Bester Story - The Facebook…
Marecia Damons, Daniel Steyn
Paperback
To The Wolves - How Traitor Cops Crafted…
Caryn Dolley
Paperback
![]()
Rogue - The Inside Story Of SARS's Elite…
Johann van Loggerenberg, Adrian Lackay
Paperback
![]() R578 Discovery Miles 5 780
Risking Life For Death - Lessons For The…
Ryan Blumenthal
Paperback
![]()
Samurai Sword Murder - The Morne Harmse…
Nicole Engelbrecht
Paperback
|