![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Sociology, social studies > Crime & criminology > Criminal investigation & detection
It's different when it's your daughter. DI Gravel's daughter Emily has landed her dream job working for high profile solicitor Charles Turner. But the job turns deadly when she attracts the attention of a serial killer. Gravel is already on the case, the bodies are piling up and the killer's sick fantasies are enough to give the detective nightmares. However, the killer's obsession with Emily raises the stakes. Can Gravel and Emily survive the case? This is the third book in the dark, edge-of-your-seat Carmarthen Crime thriller series set in the stunning West Wales countryside. *Previously published as A Cold Cold Heart*
A comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. It also covers the principles and processes for handling evidence from digital sources effectively and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy.
Easy-to-read and practical, this text uses a survey approach and numerous examples to illustrate interviewing skills and techniques. Using his years of experience as an instructor at the FBI Academy, the author dispels some of the mystery surrounding the interview process by sharing techniques and ideas that have been used successfully. The author has years of experience as an FBI academy instructor.
The drug problem in South Asia is mounting. This work provides an inside story of the pro-revenue drug policies pursued both by the British colonial authorities and post-independent governments in South Asia. It examines the resurgence of Indian traffickers in international drug trafficking in recent years, and presents an extensive overview of the Afghan crisis that endorsed money from heroin trafficking to support the war in Afghanistan. The dangers of the drug trade in South Asia have now become global the author assesses international efforts against drug trafficking and the factors constraining this.
In 1956, Clarence van Buuren was found guilty of the murder of Myrna Joy Aken and executed - despite insisting on his innocence right until the end. And despite evidence proclaiming that Van Buuren was a narcissistic psychopath and a sadist, women queued to attend his trial. What secret did Van Buuren take with him to the grave? Fifty years after the events, Chris Marnewick tries to solve this mystery.
As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. "iPhone and iOS Forensics" takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner. All of the methods and procedures outlined in the book can be taken into any court room. This book details the iPhone with information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators.
Entire chapter focused on Data and Application Security that can assist not only forensic investigators, but also application developers and IT security managers In-depth analysis of many of the common applications (both default and downloaded), including where specific data is found within the file system
XBOX 360 Forensics is a complete investigation guide for the XBOX game console. Because the XBOX 360 is no longer just a video game console - it streams movies, connects with social networking sites and chatrooms, transfer files, and more - it just may contain evidence to assist in your next criminal investigation. The digital forensics community has already begun to receive game consoles for examination, but there is currently no map for you to follow as there may be with other digital media. XBOX 360 Forensics provides that map and presents the information in an easy-to-read, easy-to-reference format. This book is organized into 11 chapters that cover topics such as Xbox 360 hardware; XBOX LIVE; configuration of the console; initial forensic acquisition and examination; specific file types for Xbox 360; Xbox 360 hard drive; post-system update drive artifacts; and XBOX Live redemption code and Facebook. This book will appeal to computer forensic and incident response professionals, including those in federal government, commercial/private sector contractors, and consultants.
Computerized crime mapping or GIS in law enforcement agencies has experienced rapid growth, particularly since the mid 1990s. There has also been increasing interests in GIS analysis of crime from various academic fields including criminology, geography, urban planning, information science and others. This book features a diverse array of GIS applications in crime analysis, from general issues such as GIS as a communication process and inter-jurisdictional data sharing to specific applications in tracking serial killers and predicting juvenile violence. Geographic Information Systems and Crime Analysis showcases a broad range of methods and techniques from typical GIS tasks such as geocoding and hotspot analysis to advanced technologies such as geographic profiling, agent-based modeling and web GIS. Contributors range from university professors, criminologists in research institutes to police chiefs, GIS analysts in police departments and consultants in criminal justice.
"Forensic Criminology" the scientific study of crime and
criminals for the purposes of addressing investigative and legal
issues. It is a science, a behavioral science, and a forensic
science. This text is intended to educate students in an applied
fashion regarding the nature and extent of forensic casework that
is supported by, dependent upon, and interactive with research,
theory, and knowledge derived from criminology. It is also intended
to act as a preliminary guide for practitioners working with and
within related criminal justice professions. Particularly those
involved with assisting investigations, administrative inquiries,
legal proceedings or providing expert findings or testimony under
oath. It is offered as an applied scientific sub-discipline within
the domain of general criminology, as well as a roadmap to the
forensic realm for the uninitiated. Written by the authors of the
best-selling Criminal Profiling, now in its third edition, and the
groundbreaking Forensic Victimology, "Forensic Criminology"
provides a bridge between the broad constructs of theoretical
criminology and the forensic examination of individual cases. It
serves as a textbook for college and university coursework, as a
manual for practitioners, and as career guide for students.
This revealing and compelling title analyzes the illegal trade in endangered species from a criminological viewpoint and presents specific crime reduction techniques that could help save thousands of species from extinction. The illegal trade in endangered species is a worldwide problem that involves not only animals but also plants, and it contributes to troubling factors such as organized crime as well as the further decline of the earth's natural climate. This book explores the extensive endangered species illegal market, spotlighting the worldwide nature and extent of the problem, and presents revealing case studies of terrestrial, marine, plant, and avian species. Sold into Extinction: The Global Trade in Endangered Species focuses attention on the plight of endangered wild flora and fauna as well as the specific illegal acts committed against them that have long and largely been ignored by criminology. The author provides a fresh look at the topic by presenting it within a crime reduction framework, an approach rarely taken by those with traditional criminological or conservation backgrounds, demonstrating how an innovative strategy to reduce illegal market activities can simultaneously further the conservation of these endangered species. International treaties, national and domestic laws, and international policing efforts pertaining to crimes involving endangered species are also examined. Illustrations, maps, and charts elucidate crime theory, import/export data on seizures of endangered species and products, and range states Photographs depict the grim reality of the global trade in endangered species An extensive bibliography contains over 30 pages of source materials
When it comes to computer crimes, the criminals got a big head
start. But the law enforcement and IT security communities are now
working diligently to develop the knowledge, skills, and tools to
successfully investigate and prosecute Cybercrime cases. When the
first edition of "Scene of the Cybercrime" published in 2002, it
was one of the first books that educated IT security professionals
and law enforcement how to fight Cybercrime. Over the past 5 years
a great deal has changed in how computer crimes are perpetrated and
subsequently investigated. Also, the IT security and law
enforcement communities have dramatically improved their ability to
deal with Cybercrime, largely as a result of increased spending and
training. According to the 2006 Computer Security Institute's and
FBI's joint Cybercrime report: 52% of companies reported
unauthorized use of computer systems in the prior 12 months. Each
of these incidents is a Cybecrime requiring a certain level of
investigation and remediation. And in many cases, an investigation
is mandates by federal compliance regulations such as
Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data
Security Standard.
Things are not always as they appear, as Cyril Wecht shows in this behind-the-scenes look at nine famous murder cases. Drawing on police reports, deopsitions, trial testimony, and autopsy reports, he raises important issues and offers fresh perspectives on each case.
This book explores current and emerging trends in policy, strategy, and practice related to cyber operations conducted by states and non-state actors. The book examines in depth the nature and dynamics of conflicts in the cyberspace, the geopolitics of cyber conflicts, defence strategy and practice, cyber intelligence and information security.
Armed groups have played a predominant role in the violations of international humanitarian law and international human rights law committed in conflict settings. The increase in the number of non-international armed conflicts during the past decades has emphasised the need to address the multiple legal challenges posed by the actions of armed groups. In particular, there is considerable uncertainty regarding the framework of responsibility for armed groups in international law. While much has been written regarding their international (primary) obligations, the possibility of developing a responsibility framework for armed groups under international law has been underexplored. Consequently, the aim of this book is to examine how the principles of international responsibility could be developed and adjusted to account for armed groups as collective entities. This general aim has been divided into three specific objectives. First, the book analyses the concept of responsibility in international law and assesses the legal and practical reasons in favour of developing such a regime for armed groups. Second, it examines the viability of establishing a responsibility regime for armed groups based on rules of attribution. Third, it explores the possible legal consequences of responsibility applicable to armed groups, with a particular focus on the obligation to provide reparations to victims. In doing so, this book will argue that certain non-traditional sources of international law could be used to interpret and adapt international law to the current conditions of contemporary armed conflict.
This book attempts to develop a recognition of the scale of the problem of prison suicide internationally, and to set in the context of the prison as an institution. The sequel to this book, "Deaths in Custody: Caring for people at risk" is, also published by Whiting and Birch.
An easy-to-understand synopsis of identification systems,
presenting in simple language the process of fingerprint
identification, from the initial capture of a set of finger images,
to the production of a Rapsheet. No other single work exists which
reviews this important identification process from beginning to
end. We examine the identification process for latent (crime scene)
prints and how they are identified with these systems. While the
primary focus is automated fingerprint identifications, the book
also touches on the emergence and use of fingerprints in other
biometric systems.
Contemporary philosophy still lacks a satisfying theory of punishment, one that adequately addresses our basic moral concerns. Yet, as the crisis of incarceration in the United States and elsewhere shows, the need for a deeper understanding of punishment's purpose has never been greater. In Punishment and the History of Political Philosophy, Arthur Shuster offers an insightful study of punishment in the works of Plato, Hobbes, Montesquieu, Beccaria, Kant, and Foucault. Through careful interpretation of their key texts, he argues that continuing tensions over retribution's role in punishment reflect the shift in political philosophy from classical republicanism to modern notions of individual natural rights and the social contract. This book will be vital reading for political theorists, philosophers, criminologists, and legal scholars looking for a new perspective on the moral challenges faced by the modern criminal justice system.
Forensic Speaker Recognition: Law Enforcement and Counter-Terrorism is an anthology of the research findings of 35 speaker recognition experts from around the world. The volume provides a multidimensional view of the complex science involved in determining whether a suspect's voice truly matches forensic speech samples, collected by law enforcement and counter-terrorism agencies, that are associated with the commission of a terrorist act or other crimes. While addressing such topics as the challenges of forensic case work, handling speech signal degradation, analyzing features of speaker recognition to optimize voice verification system performance, and designing voice applications that meet the practical needs of law enforcement and counter-terrorism agencies, this material all sounds a common theme: how the rigors of forensic utility are demanding new levels of excellence in all aspects of speaker recognition. The contributors are among the most eminent scientists in speech engineering and signal processing; and their work represents such diverse countries as Switzerland, Sweden, Italy, France, Japan, India and the United States. Forensic Speaker Recognition is a useful book for forensic speech scientists, speech signal processing experts, speech system developers, criminal prosecutors and counter-terrorism intelligence officers and agents.
Surveillance, privacy and public trust form a burgeoning presence within debates surrounding technological developments, particularly in the current 'war on terror' environment. Social, economic and political issues are invoked in collecting, categorizing, scrutinizing and mobilizing information on the everyday activities of the population. These are implicated in new legislative developments, ways of conceptualizing society and a growth in the industry of protest. However, what do we know about the day to day detail of these developments? This book situates these issues in a detailed study of CCTV to offer a timely, robust and incisive contribution to knowledge.
- Represents the latest advances of the role of psychological factors in inducing potentially unreliable self-incriminating behavior - Chapters are authored by a diverse group psychologists, criminologists, and legal scholars who have contributed significantly to the collective understanding of the pressures that insidiously operate when the goal of law enforcement is to elicit self-incriminating behavior from suspected criminals - Reviews and analyzes the extant literature in this area as well as discussing how this knowledge can be used to help bring about needed changes in the legal system
The relationship of scientific research on human sexuality (sexology) to society's legal, judicial, and law enforcement systems (forensics) is the focus of this encyclopaedic volume. Editors James J. Krivacska and John Money have assembled contributions by leading experts, covering a wide range of legal and medical issues pertaining to the interconnection between law and sexual behaviour. Section one examines the nature of paraphilic behaviour and the social framework within which some of it becomes illegal. The topics discussed include sodomy, paedophilia, incest, sexual abuse, rape, exhibitionism, prostitution, and sexual harassment. Section two looks at current strategies for assessing the problems of sex offenders and victims. Among the areas addressed are 'real' sexual abuse vs. 'manufactured' allegations of abuse memories, allegations of satanism and ritual sexual abuse, and the difficulties of treating sex offenders within a legal framework. The final section argues that sexology has much to contribute to the debate of the appropriate role of government in regulating the private sexual behaviour of the citizenry. Sex education, contraception, abortion, AIDS, pornography, social tolerance vs. criminalisation, and a comparative view of public sex policy in China and Russia are among the subjects reviewed.
CCTV provides new insights from the latest research findings on different aspects of CCTV. This book is essential reading for businesses, local authorities, policy makers, security professionals, police and anyone who manages or works with CCTV. The chapters are written by recognized experts and include original research into the use of effects of CCTV.
The book assesses the adoption of counterterrorism measures in the Netherlands and the United States, which facilitate criminal investigations with a preventive focus (anticipative criminal investigations), from the perspective of rule of law principles. Anticipative criminal investigation has emerged in the legal systems of the Netherlands and the United States as a consequence of counterterrorism approaches where the objective of realizing terrorism prevention is combined with the objective to eventually prosecute and punish terrorists. This book has addressed this new preventive function of criminal justice and identified the rule of law principles limiting the role of criminal investigation in terrorism prevention. The possibilities and limits of criminal investigation in general and of cooperation and the division of responsibilities between law enforcement and intelligence have been addressed in a manner transcending differences between national legal systems. Valuable for academics and practitioners interested in criminal investigation, rule of law and counterterrorism.
Canada is actively involved through various agencies in the domestic affairs of countries in the Global South. Over time, these practices - rationalized as a form of humanitarian assistance - have become increasingly focused on enhancing regimes of surveillance, policing, prisons, border control, and security governance. Drawing on an array of previously classified materials and interviews with security experts, Security Aid presents a critical analysis of the securitization of humanitarian aid. Jeffrey Monaghan demonstrates that, while Canadian humanitarian assistance may be framed around altruistic ideals, these ideals are subordinate to two overlapping objectives: the advancement of Canada's strategic interests and the development of security states in the "underdeveloped" world. Through case studies of the major aid programs in Haiti, Libya, and Southeast Asia, Security Aid provides a comprehensive analysis and reinterpretation of Canada's foreign policy agenda and its role in global affairs. |
You may like...
Object Relations and the Family Process
Randall Klein
Hardcover
Advances in Embedded Computer Vision
Branislav Kisacanin, Margrit Gelautz
Hardcover
Cyber Crime and Forensic Computing…
Gulshan Shrivastava, Deepak Gupta, …
Hardcover
R4,522
Discovery Miles 45 220
Biodegradation Technology of Organic and…
Kassio Ferreira Mendes, Rodrigo Nogueira de Sousa, …
Hardcover
R3,635
Discovery Miles 36 350
Resource Recovery in Drinking Water…
Mika Sillanpaa, Ali Khadir, …
Paperback
R4,448
Discovery Miles 44 480
|