Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Sociology, social studies > Crime & criminology > Criminal investigation & detection
Social Media is becoming an increasingly important and controversial investigative source for law enforcement. This project provides an overview of the current state of digital forensic investigation of Facebook and other social media networks and the state of the law, touches on hacktivism, and discusses the implications for privacy and other controversial areas. The authors also point to future trends. About Forensic Studies for Criminal Justice: The Forensic
Studies for Criminal Justice series consists of short-format
content on new developments, unique perspectives, or how-to
information on areas in forensic science all specifically designed
to meet the needs of the criminal justice community. Instructors
wishing to provide their students with more in-depth coverage on
certain forensic areas can add these digestible, inexpensive works
to their syllabi without having to completely redesign their
course, introduce overly complex material, or financially
overburden their students. Law enforcement and other criminal
justice professionals will find a wealth of valuable information to
improve training sessions. Written by experts in the disciplines
they are covering and edited by a senior scholar in criminal
justice, Forensic Studies for Criminal Justice opens up the world
of forensic science to the criminal justice community.
'Having a dad - for want of a better word - who was a wife-beater, a drunk, a thief, a burglar and an idle, lazy, work-shy, vain, narcissistic egotist encouraged me to start work early...' Nick Clements didn't just get a job, he became his criminal father's worst nightmare by joining the police force and becoming a fearless, determined and mould-breaking young copper. This is the story of how it happened, rich with humour and horror, danger and excitement, passion and illicit sex, marital joy and strife, triumphs and setbacks. Above all, the memoir tells of a young man's determination to escape his past (overcoming a crippling stutter along the way) and prove himself as a fearless representative of the law. 'Think of this as 'Billy Elliott' meets 'The Sweeney' and you'll have the gist of it.'
As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. "iPhone and iOS Forensics" takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner. All of the methods and procedures outlined in the book can be taken into any court room. This book details the iPhone with information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators.
Entire chapter focused on Data and Application Security that can assist not only forensic investigators, but also application developers and IT security managers In-depth analysis of many of the common applications (both default and downloaded), including where specific data is found within the file system
XBOX 360 Forensics is a complete investigation guide for the XBOX game console. Because the XBOX 360 is no longer just a video game console - it streams movies, connects with social networking sites and chatrooms, transfer files, and more - it just may contain evidence to assist in your next criminal investigation. The digital forensics community has already begun to receive game consoles for examination, but there is currently no map for you to follow as there may be with other digital media. XBOX 360 Forensics provides that map and presents the information in an easy-to-read, easy-to-reference format. This book is organized into 11 chapters that cover topics such as Xbox 360 hardware; XBOX LIVE; configuration of the console; initial forensic acquisition and examination; specific file types for Xbox 360; Xbox 360 hard drive; post-system update drive artifacts; and XBOX Live redemption code and Facebook. This book will appeal to computer forensic and incident response professionals, including those in federal government, commercial/private sector contractors, and consultants.
Tradecraft Primer: A Framework for Aspiring Interrogators is a timely and relevant reference manual for a new generation of professionals as we enter a new era in our nation's interrogation programs. A must-read for anyone thinking of entering the interrogation profession, whether in law enforcement, the military, or intelligence, it provides fresh insights from the latest empirical-based studies that will enhance your results and contribute to best practices. It challenges past beliefs and legacy interrogation practices of previous generations by capturing novel approaches that no longer rely on physical and psychological coercion, unethical or questionable ruses, or abusive mistreatment. Importantly, this primer also opens the door to valuable lessons from contemporary experts in human motivation and more effective social influence methodologies and tactics while you learn of the art and science behind rapport-building, effective communication constructs, and the influence of interpersonal and intrapersonal dynamics for use inside the interrogation room. In addition, it captures the "interrogation cycle" as a handy reference graphic. By reading this primer, you will learn how to reduce incidences of false confessions, mitigate eyewitness misidentification, and gain simple contemporary insights to outsmart liars and discern truth-tellers from deceivers. As an advocate for a sea change in the way our nation's interrogation programs are run and managed, this primer encourages a team approach to interrogations and emphasizes active engagement and oversight by supervisors in efforts to corroborate interrogation outcomes. It also asserts the need for the adoption of a common code of ethics shared among all practitioners-an ethical code created in deference to our nation's Constitution, statutes, international treaties, and the policies of our nation's leaders. One that encompasses the pledge and built on two underlying principles: Do no harm and respect human rights.
Now in its Third Edition, Practical Bomb Scene Investigation explores the investigative process that improvised explosive device (IED) specialists undertake at the scene of an explosion. Providing easy-to-understand, step-by-step procedures for managing and processing a bomb scene, it enables investigators to find the evidence and then make sense of what is found. The book is not only a roadmap on how to find and collect evidence and assess the scene, but also provides instruction on identifying the bombmaker's signature through latent print, DNA, explosive residue, metallurgical, and toolmark examination and forensic analysis.
Whether they appear in mystery novels or headline news stories, on
prime-time TV or the silver screen, few figures have maintained
such an extraordinary hold on the American cultural imagination as
modern police officers. Why are we so fascinated with the police
and their power? What relation do these pervasive media
representations bear to the actual history of modern policing?
"Forensic Criminology" the scientific study of crime and
criminals for the purposes of addressing investigative and legal
issues. It is a science, a behavioral science, and a forensic
science. This text is intended to educate students in an applied
fashion regarding the nature and extent of forensic casework that
is supported by, dependent upon, and interactive with research,
theory, and knowledge derived from criminology. It is also intended
to act as a preliminary guide for practitioners working with and
within related criminal justice professions. Particularly those
involved with assisting investigations, administrative inquiries,
legal proceedings or providing expert findings or testimony under
oath. It is offered as an applied scientific sub-discipline within
the domain of general criminology, as well as a roadmap to the
forensic realm for the uninitiated. Written by the authors of the
best-selling Criminal Profiling, now in its third edition, and the
groundbreaking Forensic Victimology, "Forensic Criminology"
provides a bridge between the broad constructs of theoretical
criminology and the forensic examination of individual cases. It
serves as a textbook for college and university coursework, as a
manual for practitioners, and as career guide for students.
In When Riot Cops Are Not Enough, sociologist and activist Mike King examines the policing, and broader political repression, of the Occupy Oakland movement during the fall of 2011 through the spring of 2012. King's active and daily participation in that movement, from its inception through its demise, provides a unique insider perspective to illustrate how the Oakland police and city administrators lost the ability to effectively control the movement. Drawn from King's intensive field work, the book focuses on the physical, legal, political, and ideological dimensions of repression-in the streets, in courtrooms, in the media, in city hall, and within the movement itself-When Riot Cops Are Not Enough highlights the central role of political legitimacy, both for mass movements seeking to create social change, as well as for governmental forces seeking to control such movements. Although Occupy Oakland was different from other Occupy sites in many respects, King shows how the contradictions it illuminated within both social movement and police strategies provide deep insights into the nature of protest policing generally, and a clear map to understanding the full range of social control techniques used in North America in the twenty-first century.
When it comes to computer crimes, the criminals got a big head
start. But the law enforcement and IT security communities are now
working diligently to develop the knowledge, skills, and tools to
successfully investigate and prosecute Cybercrime cases. When the
first edition of "Scene of the Cybercrime" published in 2002, it
was one of the first books that educated IT security professionals
and law enforcement how to fight Cybercrime. Over the past 5 years
a great deal has changed in how computer crimes are perpetrated and
subsequently investigated. Also, the IT security and law
enforcement communities have dramatically improved their ability to
deal with Cybercrime, largely as a result of increased spending and
training. According to the 2006 Computer Security Institute's and
FBI's joint Cybercrime report: 52% of companies reported
unauthorized use of computer systems in the prior 12 months. Each
of these incidents is a Cybecrime requiring a certain level of
investigation and remediation. And in many cases, an investigation
is mandates by federal compliance regulations such as
Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data
Security Standard.
Criminal investigation has a high profile in the media, and has attracted widespread interest. Within the police it has been a rapidly developing field. Important scientific and technological developments have had a considerable impact on practice, and significant steps have been taken in the direction of professionalizing the whole process of investigation. Within police studies criminal investigation has now emerged as an important sub-discipline. Criminal Investigation provides an authoritative and highly readable introduction to the subject from somebody ideally placed to write about it, focusing on how police practitioners carry out investigations. It looks systematically at the purpose and role of criminal investigation; the legal, policy and organizational context in which criminal investigation takes place; the evidence and information that criminal investigators seek; the process and methods of criminal investigation; the knowledge, techniques and decision making abilities that practitioners require to carry out criminal investigations; how and why it is that some crimes are solved and some are not; the supervision of criminal investigation; and a review of some of the key contemporary issues that have a bearing on criminal investigation. Criminal Investigation will be essential reading for both policing practitioners (student police officers as well as officers taking higher levels of CPD within the police service) and students taking courses in criminal investigation, forensic sciences and investigation, police studies and police science, and other courses where a knowledge of criminal investigation is required.
Some of the most important international security threats stem from terror groups, criminal enterprises, and other violent non-state actors (VNSAs). Because these groups are often structured as complex, dark networks, analysts have begun to use network science to study them. However, standard network tools were originally developed to examine companies, friendship groups, and other transparent networks. The inherently clandestine nature of dark networks dictates that conventional analytical tools do not always apply. Data on dark networks is incomplete, inaccurate, and often just difficult to find. Moreover, dark networks are often organized to undertake fundamentally different tasks than transparent networks, so resources and information may follow different paths through these two types of organizations. Given the distinctive characteristics of dark networks, unique tools and methods are needed to understand these structures. Illuminating Dark Networks explores the state of the art in methods to study and understand dark networks.
William Burns is best known as `America's Sherlock Holmes' and was director of the FBI, shortly before J. Edgar Hoover. But before he became director, Burns had a long, highly publicized career as a detective for the Secret Service, then led the famed Burns International Detective Agency, which competed with his rival, the Pinkerton Detective Agency.
Designed as an introduction and overview to the field, Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition integrates theory and practice to present the policies, procedures, methodologies, and legal ramifications and implications of a cyber forensic investigation. The authors guide you step-by-step through the basics of investigation and introduce the tools and procedures required to legally seize and forensically evaluate a suspect machine. Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition delineates the scope and goals of cyber forensics to reveal and track legal and illegal activity. Beginning with an introduction and definition of cyber forensics, chapters explain the rules of evidence and chain of custody in maintaining legally valid electronic evidence. They describe how to begin an investigation and employ investigative methodology, as well as establish standard operating procedures for the field and cyber forensic laboratory. The authors provide an in depth examination of the manipulation of technology to conceal illegal activities and the use of cyber forensics to uncover them. They discuss topics and issues such as conducting a cyber forensic investigation within both the local and federal legal framework, and evaluating the current data security and integrity exposure of multifunctional devices. Cyber Forensics includes details and tips on taking control of a suspect computer or PDA and its "operating" environment, mitigating potential exposures and risks to chain of custody, and establishing and following a flowchart for the seizure of electronic evidence. An extensive list of appendices include websites, organizations, pertinent legislation, further readings, best practice recommendations, more information on hardware and software, and a recap of the federal rules of civil procedure.
Considered the forensic document examiner's bible, Scientific Examination of Questioned Documents is an authoritative and comprehensive reference that focuses on the pertinent advancements made within the field. This newest edition presents the qualifications necessary for a well-trained examiner and details the most up-to-date methodologies used in the field. An essential guide for the novice and the seasoned professional, it is also an informative reference for the layperson who is interested in the subject. Featuring chapters written by several forensic document examination experts, this new edition is extensively revised to reflect post-1982 developments. Since that time, new avenues of written communication have emerged, as well as the proliferation of desktop computers and printers. Both of these factors have strongly impacted the nature of the examinations performed and the methodologies used. The book thoroughly explores the complexities involved in keeping current with these developments and does so, in some instances, aided by the presentation of a variety of documents and case studies. Discussion topics include infra-red exams, the use of computer hardware and software in document examination, and innovative chart making techniques. New chapters cover computer printer technologies, facsimiles, techniques for the detection of digitally manipulated documents and photocopies, ASTM standards for reporting conclusions along with advanced examination techniques. Updated chapters include expanded discussion of ESDA and other analytical tools, document dating, modern stamp making technology, and more.
An easy-to-understand synopsis of identification systems,
presenting in simple language the process of fingerprint
identification, from the initial capture of a set of finger images,
to the production of a Rapsheet. No other single work exists which
reviews this important identification process from beginning to
end. We examine the identification process for latent (crime scene)
prints and how they are identified with these systems. While the
primary focus is automated fingerprint identifications, the book
also touches on the emergence and use of fingerprints in other
biometric systems.
'A masterclass in crime fiction' Jane E James The BRAND NEW thriller from bestselling author Ross Greenwood! When DI Barton is asked to investigate a seemingly innocuous fire that kills, he believes it's either children fooling around or a worrying racially-motivated crime. As he delves deeper into the case, he soon realises that there is a history of similar blazes spread out over many years, all within a close area. An idea suggested by pathologist Mortis makes Barton suspect he has the arsonist's motives wrong. When a night worker comes forward with a tip, Barton narrows down the suspects. But with all of them acting suspiciously, he knows for sure that one or more of them must be lying. And when a huge house blaze shocks everyone, Barton fears the killer has lost all control. Who is The Fire Killer? What will be next to burn? DI Barton is back as Ross Greenwood continues with his bestselling series, perfect for fans of Mark Billingham and Ian Rankin. Praise for Ross Greenwood: 'Move over Rebus and Morse; a new entry has joined the list of great crime investigators in the form of Detective Inspector John Barton. A rich cast of characters and an explosive plot kept me turning the pages until the final dramatic twist.' author Richard Burke 'Master of the psychological thriller genre Ross Greenwood once again proves his talent for creating engrossing and gritty novels that draw you right in and won't let go until you've reached the shocking ending.' Caroline Vincent at Bitsaboutbooks blog 'Ross Greenwood doesn't write cliches. What he has written here is a fast-paced, action-filled puzzle with believable characters that's spiced with a lot of humour.' author Kath Middleton
'The Capitol riot was our Chernobyl.' (Guardian interview, Jan 19th 2021) 'An absolutely fascinating read.' Emily Maitlis James Comey, former FBI Director and Sunday Times number one bestselling author of A Higher Loyalty, uses his long career in federal law enforcement to explore issues of justice and fairness in the US justice system. James Comey might best be known as the FBI director that Donald Trump fired in 2017, but he's had a long, varied career in the law and justice system. He knows better than most just what a force for good the US justice system can be, and how far afield it has strayed during the Trump Presidency. In his much-anticipated follow-up to A Higher Loyalty, Comey uses anecdotes and lessons from his career to show how the federal justice system works. From prosecuting mobsters as an Assistant US Attorney in the Southern District of New York in the 1980s to grappling with the legalities of anti-terrorism work as the Deputy Attorney General in the early 2000s to, of course, his tumultuous stint as FBI director beginning in 2013, Comey shows just how essential it is to pursue the primacy of truth for federal law enforcement. Saving Justice is gracefully written and honestly told, a clarion call for a return to fairness and equity in the law.
Traditional techniques for detecting deception, such as the 'lie-detector test' (or polygraph), are based upon the idea that lying is associated with stress. However, it is possible that people telling the truth will experience stress, whereas not all liars will. Because of this, the validity of such methods is questionable. As an alternative, a knowledge-based approach known as the 'Concealed Information Test' has been developed which investigates whether the examinee recognizes secret information - for example a crime suspect recognizing critical crime details that only the culprit could know. The Concealed Information Test has been supported by decades of research, and is used widely in Japan. This is the first book to focus on this exciting approach and will be of interest to law enforcement agencies and academics and professionals in psychology, criminology, policing and law.
As the number of stranger-on-stranger crimes increases, solving these crimes becomes more challenging. Forensic illustration has become increasingly important as a tool in identifying both perpetrators and victims. Now a leading forensic artist, who has taught this subject at law enforcement academies, schools, and universities internationally, offers readers the benefit of her extensive knowledge and experience. Forensic Art and Illustration is the first book to provide complete coverage of all aspects of the field, and includes much previously unavailable information.
Interviewing children who may been sexually abused is a daunting
task fraught with far-reaching consequences for the children,
families, institutions, and professionals involved. With no room
for error, forensic and clinical interviewers must navigate the
complex and often contradictory evidence that informs their
decision making.
No criminal sparked as much fear and loathing among the public and law enforcement as underworld crime boss, Kenny Noye; a man with a central role in some of the most high-profile crimes of a generation. From the GBP125 million (current value) Brink's Mat gold bullion raid to the death of Covert Police Operative John Fordham, and road rage victim Stephen Cameron, the multimillionaire villain became universally known as 'Public Enemy: No 1'. He had spent more than a third of his life in jail, but for two years, with near unlimited resources, and underworld connections around the globe, Noye played a game of hide and seek with Scotland Yard, MI5, INTERPOL, The FBI, and other national police forces as he fled the UK after the death of twenty-one-year-old Stephen Cameron in a road rage incident in May 1996. From South America to Africa, from Cuba to Holland, France to Aruba, and beyond, Noye evaded capture despite the best efforts of some of the most powerful agencies and global security services. From dining with unwitting FBI officers on cruise ships to sitting on Castro's presidential seat in Havana, Noye's 'Grand Tour on the Run' was as unbelievable as it was unprecedented. It was life on the run but not as we know it. Back in the UK, the family of Stephen Cameron grieved under the weight of the life of impunity and privilege that Noye was covertly leading but the takedown was as dramatic and extraordinary as the secrets of Noye's life under the radar. The police would ultimately get their man. His downfall would be placed at the door of an informant. Was it his lover or a gangland rival? Or was it the secret services? When the Spanish police ultimately swooped down with their English counterparts and arrested the affluent and charming 'Mick the Builder' - they were armed with a secret weapon of their own - Stephen Cameron's fiance. With unique access to Noye, and key witnesses, the secret battle of wits between the underworld's 'Governor' and law enforcement is reported in chilling detail. The reader is given a 360' vista of one of the most expensive manhunts in British policing history. The authors deliver a compelling account of a major criminal, who shunned the effective discomfort of bunkers and safe houses to live a life on the run brimming with luxury, women, sun, sea, and Bacardi - and all while hiding in plain sight.
How do you trap someone in a lie? For centuries, all manner of truth-seekers have used the lie detector. In this eye-opening book, Geoffrey C. Bunn unpacks the history of this device and explores the interesting and often surprising connection between technology and popular culture. Lie detectors and other truth-telling machines are deeply embedded in everyday American life. Well-known brands such as Isuzu, Pepsi Cola, and Snapple have advertised their products with the help of the "truth machine," and the device has also appeared in countless movies and television shows. The Charles Lindbergh "crime of the century" in 1935 first brought lie detectors to the public's attention. Since then, they have factored into the Anita Hill-Clarence Thomas sexual harassment controversy, the Oklahoma City and Atlanta Olympics bombings, and one of the most infamous criminal cases in modern memory: the O. J. Simpson murder trial. The use of the lie detector in these instances brings up many intriguing questions that Bunn addresses: How did the lie detector become so important? Who uses it? How reliable are its results? Bunn reveals just how difficult it is to answer this last question. A lie detector expert concluded that O. J. Simpson was "one hundred percent lying" in a video recording in which he proclaimed his innocence; a tabloid newspaper subjected the same recording to a second round of evaluation, which determined Simpson to be "absolutely truthful." Bunn finds fascinating the lie detector's ability to straddle the realms of serious science and sheer fantasy. He examines how the machine emerged as a technology of truth, transporting readers back to the obscure origins of criminology itself, ultimately concluding that the lie detector owes as much to popular culture as it does to factual science.
Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of open source tools on Mac, Linux and Windows systems as a platform for performing computer forensics. Both well-known and novel forensic methods are demonstrated using command-line and graphical open source computer forensic tools for examining a wide range of target systems and artifacts. Written by world-renowned forensic practitioners, this book uses the most current examination and analysis techniques in the field. It consists of 9 chapters that cover a range of topics such as the open source examination platform; disk and file system analysis; Windows systems and artifacts; Linux systems and artifacts; Mac OS X systems and artifacts; Internet artifacts; and automating analysis and extending capabilities. The book lends itself to use by students and those entering the field who do not have means to purchase new tools for different investigations. This book will appeal to forensic practitioners from areas including incident response teams and computer forensic investigators; forensic technicians from legal, audit, and consulting firms; and law enforcement agencies. |
You may like...
The Thabo Bester Story - The Facebook…
Marecia Damons, Daniel Steyn
Paperback
Rogue - The Inside Story Of SARS's Elite…
Johann van Loggerenberg, Adrian Lackay
Paperback
(2)
R552 Discovery Miles 5 520
Framed - Astonishing True Stories Of…
John Grisham, Jim McCloskey
Paperback
(1)
The Profiler Diaries 2 - From Crime…
Gerard Labuschagne
Paperback
(2)
Op Die Duiwel Se Spoor - Hoe Ek Die…
Ben "Bliksem" Booysen
Paperback
(1)
|