The book outlines where bomb squads and technicians have historically been placed within the public safety system and suggests where they should ideally fit according to their function. It details specific standard operating procedures (SOPs) for various bomb threat and response scenarios, discusses protocols for requesting and supporting a bomb squad response, and addresses legal and forensic aspects of handling and associated recordkeeping.
With the growing threat of chemical, biology, and radiological terrorism, the book recommends a stronger alliance of bomb disposal and hazardous materials response teams. Such alliances—in conjunction with increased interorganizational coordination between public safety divisions, such as police and fire departments—will lead to more effective responses to incidents and threats.
The field of bomb disposal is constantly evolving. Bombers and bombmakers, especially those associated with terrorist organizations, study emergency responses to incidents to modify their devices for increased effectiveness. This book stresses the need for flexibility and creativity in response. Bombs, IEDs, and Explosives provides a ready reference on a wide variety of technical, administrative, and legal information that makes it indispensable to bomb disposal professionals and units.
Paul R. Laska holds a BS in criminology from Florida State University. He served with the police department of Belle Glade, Florida as an identification officer until moving to the Martin County Sheriff’s Office as a detective with the Crime Scene Unit. In 1979, he attended the Hazardous Devices School and then established the bomb disposal function for the MCSO. In his 25-year career in Martin County he was a crime scene investigator, fingerprint specialist, bomb technician, bomb squad commander, supervisor of the Forensic Science and Records Units, and environmental investigator. Since his retirement he has been active in the United States Department of State Anti-Terrorism Assistance Program as an instructor in postblast investigation and explosives incident countermeasures classes. He has also published a number of articles for a variety of law enforcement and other public safety periodicals.
It offers a thorough explanation of how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In particular, it addresses the abuse of computer networks as well as privacy and security issues on computer networks.
This updated edition is organized into five parts. Part 1 is about digital forensics and covers topics ranging from the use of digital evidence in the courtroom to cybercrime law. Part 2 explores topics such as how digital investigations are conducted, handling a digital crime scene, and investigative reconstruction with digital evidence. Part 3 deals with apprehending offenders, whereas Part 4 focuses on the use of computers in digital investigation. The book concludes with Part 5, which includes the application of forensic science to networks.
New to this edition are updated information on dedicated to networked Windows, Unix, and Macintosh computers, as well as Personal Digital Assistants; coverage of developments in related technology and tools; updated language for search warrant and coverage of legal developments in the US impacting computer forensics; and discussion of legislation from other countries to provide international scope. There are detailed case examples that demonstrate key concepts and give students a practical/applied understanding of the topics, along with ancillary materials that include an Instructor's Manual and PowerPoint slides.
This book will prove valuable to computer forensic students and professionals, lawyers, law enforcement, and government agencies (IRS, FBI, CIA, CCIPS, etc.).Named The 2011 Best Digital Forensics Book by InfoSec ReviewsProvides a thorough explanation of how computers & networks function, how they can be involved in crimes, and how they can be used as evidence Features coverage of the abuse of computer networks and privacy and security issues on computer networks