Bombs, IEDs, and Explosives: Identification, Investigation, and Disposal Techniques

CRC Press
Free sample

A guide on procedures, administration, and equipment, Bombs, IEDs, and Explosives: Identification, Investigation, and Disposal Techniques introduces concepts, basic knowledge, and necessary skill sets for bomb technicians. It covers topics such as training resources, bomb threat and incident response, legal aspects of bomb disposal, explosives and improvised explosive devices (IEDs), bomb technology, bomb disposal equipment, and explosive evidence handling.

The book outlines where bomb squads and technicians have historically been placed within the public safety system and suggests where they should ideally fit according to their function. It details specific standard operating procedures (SOPs) for various bomb threat and response scenarios, discusses protocols for requesting and supporting a bomb squad response, and addresses legal and forensic aspects of handling and associated recordkeeping.

With the growing threat of chemical, biology, and radiological terrorism, the book recommends a stronger alliance of bomb disposal and hazardous materials response teams. Such alliances—in conjunction with increased interorganizational coordination between public safety divisions, such as police and fire departments—will lead to more effective responses to incidents and threats.

The field of bomb disposal is constantly evolving. Bombers and bombmakers, especially those associated with terrorist organizations, study emergency responses to incidents to modify their devices for increased effectiveness. This book stresses the need for flexibility and creativity in response. Bombs, IEDs, and Explosives provides a ready reference on a wide variety of technical, administrative, and legal information that makes it indispensable to bomb disposal professionals and units.

Read more

About the author

Paul R. Laska holds a BS in criminology from Florida State University. He served with the police department of Belle Glade, Florida as an identification officer until moving to the Martin County Sheriff’s Office as a detective with the Crime Scene Unit. In 1979, he attended the Hazardous Devices School and then established the bomb disposal function for the MCSO. In his 25-year career in Martin County he was a crime scene investigator, fingerprint specialist, bomb technician, bomb squad commander, supervisor of the Forensic Science and Records Units, and environmental investigator. Since his retirement he has been active in the United States Department of State Anti-Terrorism Assistance Program as an instructor in postblast investigation and explosives incident countermeasures classes. He has also published a number of articles for a variety of law enforcement and other public safety periodicals.

Read more

Reviews

Loading...

Additional Information

Publisher
CRC Press
Read more
Published on
Aug 10, 2015
Read more
Pages
285
Read more
ISBN
9781498714501
Read more
Read more
Best For
Read more
Language
English
Read more
Genres
Law / Forensic Science
Political Science / Terrorism
Read more
Content Protection
This content is DRM protected.
Read more
Eligible for Family Library

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
Paul R. Laska
Val McDermid
Val McDermid is one of the finest crime writers we have, whose novels have captivated millions of readers worldwide with their riveting narratives of characters who solve complex crimes and confront unimaginable evil. In the course of researching her bestselling novels McDermid has become familiar with every branch of forensics, and now she uncovers the history of this science, real-world murders and the people who must solve them.

The dead talk—to the right listener. They can tell us all about themselves: where they came from, how they lived, how they died, and, of course, who killed them. Forensic scientists can unlock the mysteries of the past and help serve justice using the messages left by a corpse, a crime scene, or the faintest of human traces. Forensics draws on interviews with some of these top-level professionals, ground-breaking research, and McDermid’s own original interviews and firsthand experience on scene with top forensic scientists.

Along the way, McDermid discovers how maggots collected from a corpse can help determine one’s time of death; how a DNA trace a millionth the size of a grain of salt can be used to convict a killer; and how a team of young Argentine scientists led by a maverick American anthropologist were able to uncover the victims of a genocide. It’s a journey that will take McDermid to war zones, fire scenes, and autopsy suites, and bring her into contact with both extraordinary bravery and wickedness, as she traces the history of forensics from its earliest beginnings to the cutting-edge science of the modern day.
Rafay Baloch
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but dont know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.
Eoghan Casey
Digital Evidence and Computer Crime, Third Edition, provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation.

It offers a thorough explanation of how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In particular, it addresses the abuse of computer networks as well as privacy and security issues on computer networks.

This updated edition is organized into five parts. Part 1 is about digital forensics and covers topics ranging from the use of digital evidence in the courtroom to cybercrime law. Part 2 explores topics such as how digital investigations are conducted, handling a digital crime scene, and investigative reconstruction with digital evidence. Part 3 deals with apprehending offenders, whereas Part 4 focuses on the use of computers in digital investigation. The book concludes with Part 5, which includes the application of forensic science to networks.

New to this edition are updated information on dedicated to networked Windows, Unix, and Macintosh computers, as well as Personal Digital Assistants; coverage of developments in related technology and tools; updated language for search warrant and coverage of legal developments in the US impacting computer forensics; and discussion of legislation from other countries to provide international scope. There are detailed case examples that demonstrate key concepts and give students a practical/applied understanding of the topics, along with ancillary materials that include an Instructor's Manual and PowerPoint slides.

This book will prove valuable to computer forensic students and professionals, lawyers, law enforcement, and government agencies (IRS, FBI, CIA, CCIPS, etc.).

Named The 2011 Best Digital Forensics Book by InfoSec ReviewsProvides a thorough explanation of how computers & networks function, how they can be involved in crimes, and how they can be used as evidence Features coverage of the abuse of computer networks and privacy and security issues on computer networks
Paul R. Laska
©2018 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.