Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Sociology, social studies > Crime & criminology > Criminal investigation & detection
Computerized crime mapping or GIS in law enforcement agencies has experienced rapid growth, particularly since the mid 1990s. There has also been increasing interests in GIS analysis of crime from various academic fields including criminology, geography, urban planning, information science and others. This book features a diverse array of GIS applications in crime analysis, from general issues such as GIS as a communication process and inter-jurisdictional data sharing to specific applications in tracking serial killers and predicting juvenile violence. Geographic Information Systems and Crime Analysis showcases a broad range of methods and techniques from typical GIS tasks such as geocoding and hotspot analysis to advanced technologies such as geographic profiling, agent-based modeling and web GIS. Contributors range from university professors, criminologists in research institutes to police chiefs, GIS analysts in police departments and consultants in criminal justice.
This book presents a critical portrait of the British police
through a detailed ethnography of their work at football matches.
Megan O'Neill not only sheds light on a topic of intense media
interest, football hooliganism, but also presents the police in a
totally fresh perspective. By using the work of Erving Goffman, she
demonstrates how the police are a far from unified force. Their
informal interaction "teams" divide them operationally and
socially.
Police interviewing is a critical part of the justice process, and more attention is now being paid to training in interview techniques. This new study uses tools drawn from interactional sociolinguistics and conversation analysis for a detailed study of some police questioning of adult suspects, and work undertaken in the training of police in interviewing children - in which quite different approaches seem to be adopted. Critical discourse analytic techniques are used in interpreting the outcome and the implications for training are explored.
Several years ago on a whim, Culleton requested James Joyce's FBI file. Hoover had Joyce under surveillance as a suspected Communist, and the chain of cross references that Culleton followed from Joyce's file lead her to obscenity trials and, less obviously, to a plot to assassinate Irish labour leader Philip Larkin. However devoted a great deal of energy to keeping watch on intellectuals and considered literature to be dangerous on a number of levels. Joyce and the G Men explores how these linkages are indicative of the culture of the FBI under Hoover, and the resurgence of American anti intellectualism. MARKET 1: American History; Political History; Communism
A comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. It also covers the principles and processes for handling evidence from digital sources effectively and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy.
- Represents the latest advances of the role of psychological factors in inducing potentially unreliable self-incriminating behavior - Chapters are authored by a diverse group psychologists, criminologists, and legal scholars who have contributed significantly to the collective understanding of the pressures that insidiously operate when the goal of law enforcement is to elicit self-incriminating behavior from suspected criminals - Reviews and analyzes the extant literature in this area as well as discussing how this knowledge can be used to help bring about needed changes in the legal system
CCTV provides new insights from the latest research findings on different aspects of CCTV. This book is essential reading for businesses, local authorities, policy makers, security professionals, police and anyone who manages or works with CCTV. The chapters are written by recognized experts and include original research into the use of effects of CCTV.
Kunst und Antiquitaten GmbH, a company in the shade of the GDR export trade generated foreign exchange with the export of works of art. The book works off the occurrences ten years after the reunification from a jurisprudential point of view. How was art export organised and where did the works of art come from? The book is about the prosecution of private art dealers and collectors in the GDR in the seventies and eighties on the one hand and the export of cultural possessions especially from GDR museums on the other hand."
This book provides an overview of how the genetic information contained in DNA is used for identification, and a discussion of issues associated with those uses. It begins by discussing the unique properties of genetic information that make it a powerful tool for identification and what is involved in making identifications from DNA. Next is a description of current federal programs and activities, followed by discussion of issues raised by the development of this new technology. Major issues include the use of DNA identification in the criminal justice system (including sample backlogs, databases, and post-conviction DNA analysis), impacts of technological improvements, and privacy. DNA evidence is a powerful forensic tool in criminal cases. Its use and capabilities have increased substantially since it was first introduced in the late 1980s. A DNA profile may provide powerful evidence in many criminal investigations, either to incriminate or exculpate a suspect. DNA evidence is very stable and can be extracted and profiled from a sample many years after being deposited. The technologies used are increasingly sensitive, powerful, fast, and cost-effective. The cost of performing analyses and the time required continue to decline. Those features of the technology are likely to continue to improve over the next decade.
The United States has the highest incarceration and execution rate in the industrialized world; 70 percent of the nearly two million incarcerated in prisons and immigration detention centers are people of color. States of Confinement uncovers the political, social, and economic biases in policing and punishment. The distinguished contributors— Angela Y. Davis, Manning Marable, Gary Marx, Robert Meeropol, Julie Su, and Judi Bari—discuss abuses of police powers in American society. They expose racial profiling and sentencing disparities that target African Americans and Latinos, the sexual exploitation of women, racist and homophobic violence, the policing of Asian Americans and Arabs, the conditions of HIV-positive prisoners, the use of the Grand Jury and police to undermine political activity, and environmental activism.
Showing informants in a variety of contexts provides a broader picture of them, and highlights the potential pitfalls associated with their use within our criminal justice system. Police depend on insiders to prosecute the perpetrators of many of the so-called "victimless" crimes like drug dealing, money laundering and political corruption. As victimless crimes have grown, so has the use of informants. Providing insights into law enforcement techniques as well as the Court's response to them, Bloom illuminates the pernicious legal ramifications that can result from the justice system's relationship to and use of informers. Law professors, criminologists, and law enforcement scholars will find Bloom's account of this much used and abused but under-reported aspect of America's law enforcement efforts both edifying and sobering. There are different kinds of informants. Some are used to infiltrate and destroy organized crime operations, and others, such as Linda Tripp, are used to investigate government officials. Informants are motivated by a variety of reasons, including financial gain, political power, elimination of competition, and avoiding criminal punishment. Some are even imaginary, fabricated by police to justify their activity. Bloom discusses each type of informer, grounding his commentary in real cases, some well known, others obscure. He then concludes by suggesting how potential and real abuses of the informant system can be curbed.
The drug problem in South Asia is mounting. This work provides an inside story of the pro-revenue drug policies pursued both by the British colonial authorities and post-independent governments in South Asia. It examines the resurgence of Indian traffickers in international drug trafficking in recent years, and presents an extensive overview of the Afghan crisis that endorsed money from heroin trafficking to support the war in Afghanistan. The dangers of the drug trade in South Asia have now become global the author assesses international efforts against drug trafficking and the factors constraining this.
'... undoubtedly a first-rate companion for any undergraduate or post-graduate law course.' John Taggart, Criminal Law Review This outstanding account of modern English criminal law combines detailed exposition and analysis of the law with a careful exploration of its theoretical underpinnings. Primarily, it is written for undergraduate students of criminal law, covering all subjects taught at undergraduate level. The book's philosophical approach ensures students have a deeper understanding of the law that goes beyond a purely doctrinal knowledge As a result, over its numerous editions, it has become required reading for many criminal law courses. The 8th edition covers all statutory law including the Assaults on Emergency Workers Act 2018 and Domestic Abuse Act, s 71. Case law discussions now cover: Grant (complicity); Barton (dishonesty); Broughton, Field, Kuddus, and Rebelo (homicide) and AG's Ref (No 1 of 2020) (sexual offences).
This exploration of the full diversity of the Italian Antimafia draws on primary sources and interviews to provide a complete analysis of social, political and grassroots efforts since 1922. The murders of judges Falcone and Borsellino in 1992 caused an institutional crisis in Italy, aggravated by evidence of rampant corruption in political and business life. Since then, exceptional law enforcement successes have been undermined by inadequate efforts to address the underlying social and economic conditions that facilitate the expansion of the Mafia. This study looks at Antimafia initiatives within the context of international initiatives against organized crime.
As security professionals, lawyers, personnel directors, and
corporate executives are confronted by the demands of loss
prevention, asset protection, and ever-expanding employee rights,
there is a growing demand for more up-to-date information about
workplace investigations. This book defines and explores the
process of undercover investigations as well as delving into the
legal aspects of undercover and the role of an effective litigation
avoidance strategy. Undercover Investigations makes a rational and
authoritative plea for legitimacy of undercover in the workplace.
Practical yet authoritative, Private Security and the Investigative
Process, Second Edition, is an important reference tool for private
investigators and security professionals. Both students and
seasoned security practitioners alike will benefit from the
resources, ideas, and suggestions for tactics and security strategy
contained within this book. Charles P. Nemeth expertly blends
practice with theory to show students how to be professional when
confronted with the rigors of the real world, in both the public
and private sectors. Private Security and the Investigative
Process, is ideally suited for private security organizations,
criminal justice libraries, corporate security personnel, and law
enforcement personnel.
This perceptive examination reveals how the Justice Department operates--from its role in history to critical evaluations of its wars against the Cali cocaine cartel, violent gangs in Shreveport and Chicago, high-level government espionage, and international terrorism.
Inviting students to assume the role of a lead investigator on a case, Murder at 144: Student Investigative File is an active problem-solving text containing hypothetical crimes and fact patterns. The opening section of the text describes a crime that has been called into the local police department. Students review crime scene illustrations, follow case updates, and use example legal documentation to build their case. The investigation culminates in a charge and other court-related outcomes that require the research of relevant case law. Throughout the text, students learn how to solve the crime while using appropriate investigative techniques and correct application of the law. Investigative updates and worksheets are included to help students organize and build their case while learning professional record-keeping and report writing skills. This affordable text/workbook helps students foster their knowledge of crime scene procedures, investigative techniques, interviews, subpoenas, probable cause, search warrants, complaints, arrest warrants, direct versus indirect evidence, plain view evidence, and more. Murder at 144: Student Investigative File is part of the From the Files of Fanelli and Moscato: An Investigative Criminal Justice Series, a collection of scenario-based textbooks and active learning materials that help students cultivate critical thinking and investigative skills while applying their knowledge of key criminal justice principles, techniques, and theories. New teaching resource coming soon! In early 2023, audio and video narration by leaders in the field and subject matter experts will be available for each title in the series. The narration walks students through each section of the investigation process, providing them with a mentor-like learning experience and a unique perspective on both theory and practice.
When Charles Whitman sprayed bullets in a brutal killing spree from the heights of the University of Texas clock tower in 1966, he single-handedly made history by dashing the security of millions and changing law enforcement forever. In the wake of this horrifying event, SWAT - Special Weapons and Tactics - teams were born. Since that time, such desperate, bloody face-offs with police have steadily increased, making SWAT an invaluable and necessary part of law enforcement. Captain Snow, author of the acclaimed Protecting Your Life, Home, and Property, and a police officer with over 25 years experience, delivers to the reader the immediacy of actual SWAT events - including both the notorious and the bizarre. We get a chilling glimpse into the desperate, twisted mind of the hostage taker - often hovering precariously between violence and suicide - and witness the brilliant, life-saving strategies SWAT commanders put into action to stop them. As Captain Snow demonstrates, whether intervening during a tension-filled hostage showdown or serving an arrest warrant to a heavily armed drug lord, SWAT teams are, in general, uniquely prepared to handle the most volatile and life-threatening police situations with poise, speed, and - when necessary - deadly force. From the unnerving events in Waco to the thousands of successes every year, Snow analyzes what works and doesn't work in a SWAT team. When the smoke clears, we find at the heart of this book the inspiring story of professionals who have dedicated their lives to saving others. Captain Snow gives us the real story behind the Hollywood image - at once exciting and sobering - of this relatively new and increasingly vital branch of law enforcement.
Undercover Investigations 3ed will serve as a training text for anyone entering the undercover field. Its previous editions have been used to train police officers, and intelligence agents in addition to private security personnel. Undercover Investigations has a dual purpose; it can be used as a blueprint for any security manager or other handler of undercover agents. Undercover Investigations, which has been recognized by judges as the definitive work in this field, is now completely updated and expanded to include more information on drugs in the workplace, and entrapment. Its principles serve as the standard against which undercover operations are measured.
The relationship of scientific research on human sexuality (sexology) to society's legal, judicial, and law enforcement systems (forensics) is the focus of this encyclopaedic volume. Editors James J. Krivacska and John Money have assembled contributions by leading experts, covering a wide range of legal and medical issues pertaining to the interconnection between law and sexual behaviour. Section one examines the nature of paraphilic behaviour and the social framework within which some of it becomes illegal. The topics discussed include sodomy, paedophilia, incest, sexual abuse, rape, exhibitionism, prostitution, and sexual harassment. Section two looks at current strategies for assessing the problems of sex offenders and victims. Among the areas addressed are 'real' sexual abuse vs. 'manufactured' allegations of abuse memories, allegations of satanism and ritual sexual abuse, and the difficulties of treating sex offenders within a legal framework. The final section argues that sexology has much to contribute to the debate of the appropriate role of government in regulating the private sexual behaviour of the citizenry. Sex education, contraception, abortion, AIDS, pornography, social tolerance vs. criminalisation, and a comparative view of public sex policy in China and Russia are among the subjects reviewed.
This book attempts to develop a recognition of the scale of the problem of prison suicide internationally, and to set in the context of the prison as an institution. The sequel to this book, "Deaths in Custody: Caring for people at risk" is, also published by Whiting and Birch.
Neighbourhood policing is one of the most significant and high profile innovations in UK policing in recent times. It has also been one of the most successful, garnering widespread political and public support for its objectives and the processes of policing that it has sought to embed. Indeed, it has recently been described as the 'bedrock' of the British policing model. But it was not always so lauded. At the time of its initial development it encountered considerable opposition and scepticism from both within and outside of the police. This book tells the story of how and why the neighbourhood policing model was originally designed and implemented, and then, what has led to a decline in its prominence in terms of everyday police practice. To do this, Neighbourhood Policing draws upon unparalleled empirical data from the authors' ten-year programme of research to provide unique and compelling insights into the key practices and processes associated with the concept and implementation of neighbourhood policing. The chapters describe how: key processes and practices have evolved and matured; the ways neighbourhood policing delivers a range of local policing services; as well as how, in some towns and cities, it has provided a platform for tackling violent extremism and organised crime. This approach is used to set out a broader analytic frame that addresses the conditions under which innovative policing models emerge, are developed and decline. In so doing, the book engages with wider and deeper questions about the police function in contemporary society. |
You may like...
Op Die Duiwel Se Spoor - Hoe Ek Die…
Ben "Bliksem" Booysen
Paperback
(1)
Heist - South Africa's Cash-In-Transit…
Anneliese Burgess
Paperback
(2)
The Thabo Bester Story - The Facebook…
Marecia Damons, Daniel Steyn
Paperback
Risking Life For Death - Lessons For The…
Ryan Blumenthal
Paperback
(1)
Rogue - The Inside Story Of SARS's Elite…
Johann van Loggerenberg, Adrian Lackay
Paperback
(2)
Enemy Of The People - How Jacob Zuma…
Adriaan Basson, Pieter du Toit
Paperback
(17)
|