Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Sociology, social studies > Crime & criminology > Criminal investigation & detection
Detection of Drugs and Their Metabolites in Oral Fluid presents the analytical chemistry methods used for the detection and quantification of drugs and their metabolites in human oral fluid. The authors summarize the state of the science, including its strengths, weaknesses, unmet methodological needs, and cutting-edge trends. This volume covers the salient aspects of oral fluid drug testing, including specimen collection and handling, initial testing, point of collection testing (POCT), specimen validity testing (SVT), and confirmatory and proficiency testing. Analytes discussed include amphetamines, cannabinoids, cocaine, opiates, phencyclidine, cannabimimetics, and miscellaneous drugs. This practical guide helps users turn knowledge into practice, moving logically from an outline of the problem, to the evaluation of the appropriateness of oral fluid as a test medium, and finally to a consideration of detection methods and their validation and employment.
On 9 November 1966, popular GP Dr Helen Davidson was battered to death in dense woodland while birdwatching and exercising her dog a few miles from her Buckinghamshire home. Her body was found the next day, her eyes having been pushed into her skull. 'She had binoculars round her neck, spied illicit lovers, was spotted, and one or both of them killed her,' surmised Detective Chief Superintendent Jack 'Razor' Williams of New Scotland Yard. He had received fifty police commendations in his career, yet not one for a murder enquiry. Unsurprisingly, within weeks the police operation was wound down, Williams retired, and another cold case hit the statistics. Fifty years later, amateur sleuth and author Monica Weller set about solving the murder - without the help of the prohibited files. As she sifted the evidence, a number of suspects and sinister motives began to emerge; it was clear it was not a random killing after all. Weller uncovered secret passions, deep jealousies, unusual relationships and a victim with a dark past. Her persistence and dedication were dramatically rewarded when she uncovered the identity of the murderer - revealed here for the first time.
This Brief provides an overview and history of the definition of serial homicide, from the perspectives of psychology, medicine, criminology and forensics. It reviews research to provide a standard definition of serial homicide (as opposed to multiple or mass homicide), and provide insights on profiles of victims and offenders for police practitioners. It also includes a discussion of the media approach to covering serial homicide. The Brief is divided into four major sections covering: definitions and overview of serial homicide, profiling perpetrators according to different typologies, profiling victims, applied case studies, and recommendations for investigation and prevention. The author's approach is aimed primarily at researchers in police studies, but will be of interest to researchers in related fields such as criminal justice, sociology, psychology, and public policy.
While confidential informants (CI's) can play a crucial role in police investigations, they also have the potential to cause great harm if they are dishonest. The process by which police agencies qualify a CI to work and the strength of agency policy may be the source of the problem. This Brief examines the integrity problem involving CIs in police operations within the United States, provides an overview of pitfalls and problems related to veracity and informant integrity including the difficulties in detecting when a CI is lying, and compares the provisions of actual published police policy to the model CI policy published by the International Association of Chiefs of Police (IACP). The analysis shows a wide divergence between actual police policy and the national standard promulgated by the IACP. The Brief provides policy recommendations for improving use of CIs that can potentially reduce or eliminate integrity problems that can lead to organizational accidents such as wrongful arrests and convictions, injuries or deaths. Some Courts have issued measures to ensure that information received from CIs is reliable by examining sworn testimony and documents related to their work. However, as this Brief explores, this judicial effort arises only after a police operation has taken place, and the use of force - even deadly force-has already been employed. The author proposes integrity testing beforehand, which would allow police to have a greater understanding of a CI's motivation, ability and veracity when conducting law enforcement operations. In addition, there are aspects of police policy that can enhance CI management such as training, supervision and entrapment that can further guard against integrity problems. Although integrity testing is not flawless, it does interpose an additional step in the CI management process that can help guard against wrongful conviction and perjury that harms the judicial process.
In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how the contents of computer systems can be recovered, even when hidden or subverted by criminals. Equally important, they demonstrate how to insure that computer evidence is admissible in court. Updated to meet ACPO 2003 guidelines, Forensic Computing: A Practitioner's Guide offers: methods for recovering evidence information from computer systems; principles of password protection and data encryption; evaluation procedures used in circumventing a system's internal security safeguards, and full search and seizure protocols for experts and police officers.
The Process of Investigation, Fourth Edition addresses the needs of today's private sector investigative professional by providing a full-spectrum treatment of the investigative process, from case inception and investigative strategy selection to executing complex investigative techniques, to creating reports useful for corporate, legal, and prosecutorial purposes. Continuing in the tradition of its previous editions, The Process of Investigation, Fourth Edition covers essential topics overlooked in books on the public aspects of investigation. Investigative skills such as surveillance techniques, interviewing and interrogation, collecting and documenting evidence, and taking confessions and written statements are all discussed, and supplemented with updated case studies and examples from the authors' own professional experiences.
The detective is a familiar figure in British history. This work looks at famous cases such as the Ripper murders and the beginnings of the Special Branch and Detective Branch of Scotland Yard. This history covers various aspects of crime history, including the career of Jim 'the Penman' Saward, a notorious forger, and more.
In the wake of 2001, terrorism laws and their policing have been charged with eroding civil liberties and discriminating against Muslim and ethnic minority peoples. Traces of Terror: Counter-Terrorism Law, Policing, and Race goes further and asks how counter-terrorism reproduces the social relations of race: what police and legal practice, what knowledge and what power makes over-policing normal. Based on field work in Australia, this book investigates the effects of counter-terrorism law and policing on Muslim, Somali, Turkish Kurds and Sri Lankan Tamil communities. Drawing together in-depth interviews with members of Victoria Police and those who are being policed, participant observations of community forums, and a detailed investigation of government and police policy, legislation and case law, the author explains how processes of criminalization and racialization are sustained. The study analyses preparatory terrorism offences and 'terrorist organization' laws, as well as the application of contentious concepts including extremism, radicalization and counter-radicalization. The book explains the management of difference, identity and belonging through expanding police and intelligence powers as well as through community policing and multicultural social policy. Above all, this book traces the persistence of race, racialization and racism in practices presented, on the surface, as 'race neutral', consensual and inclusive. From raids and prosecutions, to informal questioning and communitarian forms of regulation, it demonstrates the enduring and shifting meanings of these concepts as practices and their lived, often contradictory effects on the populations who experience them. Traces of Terror is not a study of police racism nor of experiences of discrimination, but rather an explanation of the enduring organisation of racial power reflected in, and produced by, counter-terrorism.
"The Art of Investigative Interviewing, Third Edition" can be used
by anyone who is involved in investigative interviewing. It is a
perfect combination of real, practical, and effective techniques,
procedures, and actual cases. Learn key elements of investigative
interviewing, such as human psychology, proper interview
preparation, tactical concepts, controlling the interview
environment, and evaluating the evidence obtained from the
interview. Inge Sebyan Black updated the well-respected work of
Charles L. Yeschketo provide everything an interviewer needs to
know in order to conduct successful interviews professionally, with
integrity, and within the law. This book covers the myriad factors
of an interview including issues of evidence, rapport, deception,
authority, and setting clearly and effectively. It also includes a
chapter on personnel issues and internal theft controls.
Criminal investigators need broad knowledge of such topics as criminal law, criminal procedure, and investigative techniques. The best resource for these professionals will distill the needed information into one practical volume. Written in an accessible style, the fourth edition of Criminal Investigation maintains the same reader friendly approach that made its predecessors so popular with students, professionals, and practitioners. Beginning with an overview of the history of criminal investigation, the book explores current investigative practices and the legal issues that constrain or guide them. It discusses the wide range of sources of information available, including the internet, individuals, state and local sources, and federal agencies and commissions. Next, the book discusses other investigative techniques, including interviewing and interrogation, informants, surveillance, and undercover operations. A chapter on report writing provides explicit instructions on how to capture the most critical information needed in an investigation. Additional chapters cover the crime scene investigation and the crime laboratory. The remainder of the book delves into the specific investigative protocols for individual crimes, including sex offenses, homicide, mass and serial murder, assault and robbery, property crimes, cybercrime, and narcotics. Concluding chapters focus on the police/prosecutor relationship and investigative trends. Each chapter includes a summary, a list of key terms, and review questions so that readers can test their assimilation of the material. Clear and concise, this book is an essential resource for every criminal investigator s toolbox.
Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to effectively investigate an Android phone. This book offers a thorough review of the Android platform, including the core hardware and software components, file systems and data structures, data security considerations, and forensic acquisition techniques and strategies for the subsequent analysis require d. this book is ideal for the classroom as it teaches readers not only how to forensically acquire Android devices but also how to apply actual forensic techniques to recover data. The book lays a heavy emphasis on open source tools and step-by-step examples and includes information about Android applications needed for forensic investigations. It is organized into seven chapters that cover the history of the Android platform and its internationalization; the Android Open Source Project (AOSP) and the Android Market; a brief tutorial on Linux and Android forensics; and how to create an Ubuntu-based virtual machine (VM). The book also considers a wide array of Android-supported hardware and device types, the various Android releases, the Android software development kit (SDK), the Davlik VM, key components of Android security, and other fundamental concepts related to Android forensics, such as the Android debug bridge and the USB debugging setting. In addition, it analyzes how data are stored on an Android device and describes strategies and specific utilities that a forensic analyst or security engineer can use to examine an acquired Android device. Core Android developers and manufacturers, app developers, corporate security officers, and anyone with limited forensic experience will find this book extremely useful. It will also appeal to computer forensic and incident response professionals, including commercial/private sector contractors, consultants, and those in federal government.
This book is a lucid and practical guide to understanding the core skills and issues involved in the criminal investigation process. Guiding students through a mock criminal investigation, each chapter introduces a layer of the crime scene and an investigative activity to allow students to develop a true comprehension of how forensic and criminal investigation takes place. Drawing on multiple disciplines and perspectives, the book promotes a critical awareness and practical comprehension of the intersections between criminology, criminal investigation, and forensic science and uses active learning strategies to help students build their knowledge and ensure that the veracity of evidence and decision making is made clear. The book is organised around the three key strategic phases in a criminal investigation: Instigation and Initial Response; The Investigation and Case Management, and each strategic phase of the investigative process is discussed to ensure the processes and responsibilities are relayed in a logical and practical structure. Alongside this practical approach theoretical perspectives and academic research are laid bare for students. Targeted at undergraduate students studying forensic and criminal investigation on criminology and policing course, this book is the perfect balance of practical and theoretical learning.
Fraud costs the United Kingdom a reported GBP198 billion per year and the Crime Survey for England and Wales (March 2016) estimates that there are over 5 million incidents of fraud and 2 million cyber-related crimes committed annually. Preventing and investigating fraud has become a priority for police officers and establishing successful, effective strategies to tackle this new volume crime represents a significant and persistent challenge for the police service. Investigation of Fraud and Economic Crime is written by experts from, and affiliated to, the City of London Police, the lead force for fraud in the UK and home to Action Fraud and the National Fraud Intelligence Bureau (NFIB). It offers practical, straightforward advice to law enforcement agencies dealing with fraud and economic crimes. The book identifies more than fifty different types of fraud and sets out the different strategic and tactical considerations in preventing, investigating, and disrupting each one. At the centre of the book is the Fraud Investigation Model (FIM), an effective framework encompassing multiagency working, recovery of evidence and victim management, as well as a range of useful features designed to demystify fraud terminology and provide accessible operational guidance. These include key point boxes, highlighting important learning points and investigation best practice; definition boxes, to cut through legal terminology and connect the law to everyday police work; and flow charts, which tackle complex operational and legal procedures and break them down into simple, easy to follow steps.
Tom Connolly joined An Garda Siochana in 1955, following in the footsteps of his father and grandfather. His early days on the force were spent in various villages and towns around Ireland, tracking petty thieves, raiding pubs and patrolling country roads on his bicycle. Back then, before the dawn of DNA profiling, policemen relied on local knowledge and intuition - as well as careful evidence-gathering and interrogation techniques - to make their cases. Over his forty-year career, Connolly rose to the rank of Detective Superintendent, working on high-profile thefts, assaults and murders with the National Technical Bureau. This fascinating memoir offers an insight into the day-to-day work of the gardai, and celebrates the courage and dedication of all those who risk their lives to keep us safe.
Two elderly shopkeepers bludgeoned to death, the only evidence - a smudged thumbprint inside a cashbox. A Quaker poisons his mistress in Slough and, confident he will evade justice, arrives at Paddington station unaware modern technology had alerted police who lay in wait. Great Britain has led the world in crime-detection methods and the forensic sciences; this volume examines real criminal cases that have tested the legality and admissibility of these crime-fighting methods as they pass through the British legal system. Together with many other examples encompassing police corruption, ballistics, entomology and riot, to name but a few, this volume demonstrates how crime has influenced present-day policing methods, Britain's criminal justice system and ultimately the detection and conviction of some of this country's most infamous men and women.
Adult Eyewitness Testimony provides an overview of current empirical research on eyewitness testimony and identification accuracy, covering both theory and application. The volume is organized to address three important issues: First, what are the cognitive, social, and physical factors that influence the accuracy of eyewitness reports? Second, how should lineups be constructed and verbal testimony be taken to improve the chances of obtaining accurate information? And third, whose testimony should be believed? Are there differences between accurate and inaccurate witnesses, and can jurors make such a distinction? Adult Eyewitness Testimony is crucial reading for memory researchers, as well as police officers, judges, lawyers, and other members of the judicial system. It will also be of interest to advanced undergraduates and graduate-level courses in applied social or cognitive psychology, criminal justice and forensics.
At approximately noon on Saturday 9 August 2014, Officer Darren Wilson of the Ferguson Police Department (FPD) shot and killed Michael Brown, an unarmed 18-year-old. The Criminal Section of the Department of Justice Civil Rights Division, the United States Attorney's Office for the Eastern District of Missouri, and the Federal Bureau of Investigation (FBI) (collectively, "The Department") subsequently opened a criminal investigation into whether the shooting violated federal law. The Department has determined that the evidence does not support charging a violation of federal law. This book details the Department's investigation, findings, and conclusions.
Serial killers like Seattle's Ted Bundy, Maryland's Beltway Sniper,
Atlanta's Wayne Williams, or England's Peter Sutcliffe usually
outsmart the task forces on their trail for long periods of time.
Keppel and Birnes take readers inside the operations of serial
killer task forces to learn why. What is the underlying psychology
of a serial killer and why this defeats task force investigations?
Make no mistake: modern information warfare is here and January 6th was just the first battle. That day, an unhinged mindset led to an attack on the Capitol, the most serious assault on American democracy since the end of the Civil War. And that thinking portends even darker days ahead. In The Breach, a former House Republican and the first member of Congress to sound the alarm about QAnon, Denver Riggleman, provides readers with an unprecedented behind-the-scenes look at the January 6th select committee's investigation. Riggleman, who joined the committee as senior technical advisor, lays out the full intent and scope of the plot to overturn the election. The book includes previously unpublished texts from key political leaders. And it also contains shocking details about the Trump White House's links to militant extremist groups?even during the almost-eight-hour period on January 6th when the White House supposedly had no phone calls. The man responsible for unearthing Mark Meadows's infamous texts shows how data analysis shapes the contours of our new war, telling how the committee uncovered many of its explosive findings and sharing revealing stories from his time in the Trump-era GOP. With unique insights from within the far-right movement and from the front lines of the courageous team investigating it, Riggleman shows how our democracy is balanced on a knife's edge between disinformation and truth. Here is a revelatory peek at the inner workings of the January 6th committee and a clear-eyed look at the existential threats facing the republic?and a blueprint for how America can fight to survive the darkest night before the dawn.
Not All Crimes Are Committed Equally And Therefore Not All Investigations Can Be Conducted Equally. Each Crime Type Requires Unique Investigative Techniques - From First Response To Evidence Collection And Interviewing The Victims And Suspects - Every Crime Type Necessitates Distinct Investigative Procedures And Reporting. Written For Criminal Investigation Courses And Specifically Sex Crime Investigation Courses, Investigating Sexual Assault Cases Presents The Basic Responsibilities Of First Responders And Highlights Specific Demands For Investigators And Prosecutors. Part Of The Jones & Bartlett Learning Guides To Law Enforcement Investigation Series, This Comprehensive Resource Provides Future Law Enforcement Professionals With The Information Necessary To Accurately Investigate And Analyze Sexual Assault Crimes, Improve Clearance Rates, Increase Rape And Sexual Assault Reporting, And Reduce The Number Of Wrongful Incarcerations. Key Features: -Serves As A How-To Guide While Maintaining The Theory So Readers Gain A Full Understanding Of The Entire Investigative Process Of A Sexual Assault Case. -Includes A Chapter On Common Mistakes Investigators Make When Conducting And Reporting On Sexual Assault Crimes. -Includes Discussion On The Victim And Victimology, Offender Typology And Special Offenders, The Investigative Interviewing Process, Working With Prosecutors, And More. -Contains Case Studies And Chapter Summaries To Ensure Comprehension, As Well As End-Of-Chapter References For Further Research On Specific Topics. About The Series Jones & Bartlett Learning Guides To Law Enforcement Investigation Series Is Designed For Undergraduate And Graduate-Level Criminal Investigation Courses And Provides Comprehensive And Detailed Information For Instructors Teaching The Specialized Topics. Crimes Vary Greatly By Type And Each Crime Category Demands Unique And Specialized Skills. The Books In This Series Present The Fundamental And Necessary Steps To Accurately Conduct An Investigation Specific To The Crime Type, Such As Sexual Assault, Child Abduction, Homicide, Etc. Authored By Leading Educators And Professionals, This Series Delivers Comprehensive Information On All Aspects Of Criminal Investigation Related To The Various Types Of Crime And Aims To Educate And Prepare Students For Careers In Law Enforcement, As Well As Reduce The Number Of Wrongful Incarcerations.
What makes a person confess to a crime he did not commit? Was he coerced? Is he trying to protect someone else? Interrogation has come under attack as opponents focus on false confessions. However, most cases are still resolved by confession, not forensic evidence. Among the new topics covered in the Second Edition of this bestselling book, Practical Aspects of Interview and Interrogation focuses on why false confessions exist and how to avoid them.
A one-of-a-kind resource walking you through one complete fraud investigation, from the original tip to conviction in court "Anatomy of a Fraud Investigation" is an engrossing read and a valuable resource for fraud investigators, auditors, or anyone who suspects fraud may be occuring in their organizations and is unsure as to how to act. It details all phases of a fraud investigation from the first suspicion of fraud to the final judgment in court, through the eyes of a forensic accountant. In each phase, the author provides insights based on his twenty-two years as a forensic accountant from where to sit at the table when you bring the suspected fraudster in for questioning, to how you protect the key sources of information that the suspect will try to destroy once he or she realizes they are under investigation. In-depth analysis of a fraud investigation Based on an actual investigation conducted by the author Each chapter contains valuable tips and key considerations, providing subtext for why decisions were made and bringing to light potential risks A fascinating, insider look at a fraud investigation, "Anatomy of a Fraud Investigation" helps you better understand fraud detection, investigation, and prevention-from the inside out. |
You may like...
The Thabo Bester Story - The Facebook…
Marecia Damons, Daniel Steyn
Paperback
Op Die Duiwel Se Spoor - Hoe Ek Die…
Ben "Bliksem" Booysen
Paperback
(1)
Risking Life For Death - Lessons For The…
Ryan Blumenthal
Paperback
(1)
The Profiler Diaries 2 - From Crime…
Gerard Labuschagne
Paperback
(2)
The Griekwastad Murders - The Crime That…
Jacques Steenkamp
Paperback
Rogue - The Inside Story Of SARS's Elite…
Johann van Loggerenberg, Adrian Lackay
Paperback
(2)
R552 Discovery Miles 5 520
|