Who did it? How did they do it? Why did they do it? How do you prove it? Cast your students in the roles of reporters, lawyers, and detectives at the scene of a crime with this complete guide of detailed instructions and reproducibles. Excitement builds as participants examine clues, make a case, and go to trial. These interdisciplinary activities, based on an award-winning unit, help build valuable thinking and problem-solving skills while developing knowledge in areas of language, science, history, and more.
Geographic Profiling introduces and explains this cutting-edge investigative methodology in-depth. Used to analyze the locations of a connected series of crimes to determine the most likely area of offender residence, geographic profiling allows investigators and law enforcement officers to more effectively manage information and focus their investigations.
This extensive and exhaustive work explains geographic profiling theories and principles, and includes an extensive review of the literature and research in the areas of criminal profiling, forensic behavioral science, serial violent crime, environmental criminology, and the geography of crime. For investigators and police officers deployed in the field, as well as criminal analysts, Geographic Profiling is a "must have" reference.
This book examines the workings of organized criminals and criminal groups that transcend national boundaries. Discussions include methods used by criminal groups to internationally launder money; law enforcement efforts to counteract such schemes; and new methods and tactics to counteract transnational money laundering.
A PRACTICAL GUIDE TO FACETS OF INTERNATIONAL CRIME AND MEASURES TO COMBAT THEM
Intended for law enforcement personnel, bank compliance officers, financial investigators, criminal defense attorneys, and anyone interested in learning about the basic concepts of international crime and money laundering, this timely text explains:
money laundering terms and phrases
an overview of relevant federal agencies, transnational criminal organizations, and basic investigatory techniques
the intricacies of wire transfers and cyberbanking
the phenomenon of the "World Wide Web"
- Roy Huber, author
A definitive review of handwriting identification, this book presents, in a general manner, how to approach document examination and then, in particular, how to apply handwriting identification to the document. Types of handwriting are discussed in detail.
For the first time in the field of questioned document examination, Handwriting Identification: Facts and Fundamentals consolidates the pertinent information from published and unpublished sources respecting writing, that is essential to the expansion of a practitioner's general knowledge of handwriting identification and to the proper education of novices. Written in a question and answer format, the book suggests some of the questions that one might ask of an examiner and provides the answers that knowledgeable and competent examiners should be expected to give.
This book is a valuable addition to law libraries and to every practicing document examiner, as well as every lawyer handling cases in which the authenticity of handwriting might be disputed.
Cadaver Dog Handbook sets out the principles and procedures for the training and handling of dogs for the location of human remains. It explains scent theory and its applications, introduces basic training and searching strategies/tactics, and covers the legal and taphonomic issues associated with dog searches. Intended for those who train and handle cadaver dogs, this book also encompasses information for those who work closely with them, such as police, death investigators, and anthropologists. Its interdisciplinary approach is useful to any member of a forensic team who regularly participates in or evaluates the results of the human remains search effort.
The book provides an overview of handgun use in general but focuses on firearm handling in unintentional and inadvertent shootings. It describes the discipline of human factors and ergonomics and includes available statistics on shootings, examines their limitations, and reviews actual cases to determine human causes in unintentional and inadvertent shootings. It provides a history of firearms and details the components and mechanics of handguns and ammunition to reveal safety problems in current designs. It explains the fundamentals of shooting and how violation of those principles can result in unintentional or inadvertent shootings.
The authors stress the importance of firearms safety training. They evaluate various safety training programs (including those from the National Rifle Association), investigate inconsistencies in basic safety rules, and make suggestions to improve safety training. The importance of instructor training is also emphasized. The book concludes with a summary and application of the previous topics to forensic and investigative settings and gives advice for human factors/ergonomics professionals as expert witnesses. The book comes with an accompanying DVD with hundreds of color photos to support the topics covered in the text.
Drawing on the expertise of several of the nation’s leading reseachers and policy experts, Terrorism and Homeland Security: Thinking Strategically About Policy provides policymakers with a much needed starting point for the creation of an effective coherent national security strategy. Its origins pre-dating 9-11, this volume grew out of an extensive project featuring the participation of various institutions including the Army War College.
The primary goal: develop a strategy that optimizes security with minimal infringement on rights and liberties
After addressing points salient to a central strategy, the book then identifies the domestic and external elements that need to be addressed in building such a strategy. To this end, it examines the nature of terrorist threats, looks at challenges specific to various weapons of mass destruction, and then goes beyond terrorism to discuss safeguarding society and its infrastructure from natural disasters.
In concluding, the editors present a number of preliminary suggestions. It is hoped that policymakers and others may take these suggestions into account when developing a comprehensive national security strategy.
Written by one of the most respected consultants in the area of data mining and security, Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies reviews the tangible results produced by these systems and evaluates their effectiveness. While CSI-type shows may depict information sharing and analysis that are accomplished with the push of a button, this sort of proficiency is more fiction than reality. Going beyond a discussion of the various technologies, the author outlines the issues of information sharing and the effective interpretation of results, which are critical to any integrated homeland security effort.
Organized into three main sections, the book fully examines and outlines the future of this field with an insider’s perspective and a visionary’s insight.
Section 1 provides a fundamental understanding of the types of data that can be used in current systems. It covers approaches to analyzing data and clearly delineates how to connect the dots among different data elements Section 2 provides real-world examples derived from actual operational systems to show how data is used, manipulated, and interpreted in domains involving human smuggling, money laundering, narcotics trafficking, and corporate fraud Section 3 provides an overview of the many information-sharing systems, organizations, and task forces as well as data interchange formats. It also discusses optimal information-sharing and analytical architectures
Currently, there is very little published literature that truly defines real-world systems. Although politics and other factors all play into how much one agency is willing to support the sharing of its resources, many now embrace the wisdom of that path. This book will provide those individuals with an understanding of what approaches are currently available and how they can be most effectively employed.
Kidnap for Ransom: Resolving the Unthinkable removes the veil of mystery and dispels some of the myths surrounding kidnapping. The book provides security professionals, families, and law enforcement personnel with the modern tools needed to understand and effectively respond to the crime of kidnapping.
This volume traces the historical development of kidnapping for ransom and studies the behaviors of perpetrators, victims, and families. The author makes extensive use of case histories, and includes comments and anecdotes from those who have actually suffered at the hands of kidnappers. Based on his vast experience managing these incidents, the author provides an overview of the series of activities that represent the best opportunity for a successful resolution of a kidnap for ransom scenario. This tried and tested methodology for confronting kidnapping situations enables victims, families, and organizations to have a fighting chance.
In addition, the book examines how kidnappers operate and describes the methods they use to select, target and abduct their victims. The work also details preventive measures that an individual can take to avoid becoming a victim, and the strategies that one must apply to survive a kidnapping.
This is the first book to examine the kidnap for ransom phenomenon and to reveal the process from the moment of the kidnapping until the victim’s safe return. The author’s experience as the principal consultant and manager in the successful resolution of numerous kidnapping and extortion incidents makes this book an invaluable tool for those charged with the responsibility of kidnap prevention, as well as for those law enforcement agents called on to mitigate the potential consequences of an abduction in progress.
Written for professionals, academics, and policymakers working at the forefront of counterterrorism efforts, Jihadists and Weapons of Mass Destruction is an authoritative and comprehensive work addressing the threat of weapons of mass destruction (WMD) in the hands of jihadists, both historically and looking toward the future threat environment. Providing insight on one of the foremost security issues of the 21st century, this seminal resource effectively:
Documents current trends in the ideology, strategy, and tactics of jihadists as these relate to WMD
Includes a section devoted to jihadist involvement with chemical, biological, radiological, and nuclear weapons
Explores the role of intelligence, law enforcement, and policymakers in anticipating, deterring, and mitigating WMD attacks
Provides an overview of nonproliferation policies designed to keep WMD out of the hands of jihadists
Conducts a groundbreaking quantitative empirical analysis of jihadist behavior
Elicits leading experts’ estimates of the future WMD threat from jihadists
Leading international experts clearly differentiate between peaceful Muslims and jihadists, exploring how jihadists translate their extreme and violent ideology into strategy. They also focus on WMD target selection and the spread of WMD knowledge in jihadist communities. Devoid of sensationalism, this multidimensional evaluation adds a heightened level of sophistication to our understanding of the prospects for and nature of jihadist WMD terrorism.
About the Editors
Gary Ackerman is Research Director of the National Consortium for the Study of Terrorism and Responses to Terrorism (START), a Department of Homeland Security National Center of Excellence based at the University of Maryland. His research work focuses on threat assessment and terrorism involving unconventional weapons.
Jeremy Tamsett is a consultant for Henley-Putnam University and an analyst at the Center for Terrorism and Intelligence Studies (CETIS), a research center dedicated to identifying, better comprehending, and accurately assessing the present and future security threats stemming from a variety of violence-prone extremists and their enablers. He has served as Project Manager for the U.S. Government funded Critical Infrastructure Terrorist Attack database and Global Terrorism Database (GTD).
New in this Edition:
Information on detonation pressure and its effects on the body Instructions on how to collect additional information from the scene in order to provide an estimate of the explosives weight of the IED A glossary for a more in-depth understanding of the terms associated with explosives and the investigation processes A greatly expanded IED component identification chapter A chapter on how to expeditiously investigate a post-blast scene in a hostile environment Information on how to prepare an Investigative Report