Criminal Investigation A Method for Reconstructing the Past 6th Edition by Osterburg, James, Ward, Richard – Ebook PDF Instant Download/Delivery: 1437778941, 9781437778946
Full dowload Criminal Investigation A Method for Reconstructing the Past 6th Edition after payment
Product details:
ISBN 10: 1437778941
ISBN 13: 9781437778946
Author: Osterburg, James W.; Ward, Richard H.
This text presents the fundamentals of criminal investigation and provides a sound method for reconstructing a past event (i.e., a crime) based on three major sources of information – people, physical evidence and records. More than a simplistic introductory text, yet written in an easy-to-read, user-friendly format, it offers a broad approach to criminal investigation.
- Dozens of photographs, graphics, table, charts and diagrams supplement the text.
- A glossary elaborates on terms found in the text, gathered into one handy reference.
Criminal Investigation A Method for Reconstructing the Past 6th Table of contents:
SECTION I: The Foundation and Principles of Criminal Investigation
PART A: Sources and Uses of Information
CHAPTER 1: The Investigator: Responsibilities and Attributes; Origins and Trends
Criminal Investigation Defined
Determine if a Crime Has Been Committed
Verify Jurisdiction
Discover All Facts and Collect Physical Evidence
Recover Stolen Property
Identify the Perpetrator
Locate and Apprehend the Perpetrator
Aid the Prosecution by Providing Evidence of Guilt Admissible in Court
Testify Effectively as a Witness in Court
Attributes Desirable in an Investigator
Abilities and Skills
Qualifications of Mind, Personality, Attitude, and Knowledge
Origins of Criminal Investigation
Figure 1.1
Figure 1.2
Figure 1.3
Figure 1.4
Figure 1.5
Shift in Investigative Methods
Figure 1.6
Trends in Investigation
Notes
Supplemental Readings
CHAPTER 2: Physical Evidence: Development, Interpretation, Investigative Value
Forensic Science
Criminalistics: The Development and Interpretation of Physical Evidence
Report of the National Academy of Sciences
Recommendation 1:
Recommendation 2:
Recommendation 3:
Recommendation 4:
Recommendation 5:
Recommendation 6:
Recommendation 7:
Recommendation 8:
Recommendation 9:
Recommendation 10:
Recommendation 11:
Recommendation 12:
Recommendation 13:
Basic Concepts—Details in Physical Evidence
What Are They?
Figure 2.1
Figure 2.2
Figure 2.3
Figure 2.4
Figure 2.5
Figure 2.6
Figure 2.7
Morphology
How Are They Developed?
Contrast
Optical Instruments
Analytical Instruments
Table 2.1: Instrumental Methods: Type of Sample—How Effected and Information Acquired
Table 2.2: Some Examples of Clue Materials Characterized as Organic or Inorganic Substances
Basic Concepts—Identification and Identity
Figure 2.8
Figure 2.9
Figure 2.10
Figure 2.11
Table 2.3: Class and Individual Characteristics in Various Types of Evidence
The Role of the Crime Laboratory
Are the Facts Consistent with the Story?
Induce an Admission or Confession
Protect the Innocent
Provide Expert Testimony in Court
The O.J. Simpson Case: The Sock Evidence Reconstructed
Forensic Medicine: Investigative Value
Forensic Pathology
Toxicology
Forensic Odontology
Forensic Psychiatry
Law Enforcement
The Courts
The Correctional System
Clue Materials As Information Sources
Figure 2.12
Fingerprints
Figure 2.13
Figure 2.14
Latent Fingerprints—Constituents and their Sources
Natural Sources
Environmental Sources
Latent Fingerprints—Controlling Factors
Surface
Finger Pressure
Other Kinds of Fingerprints
How Are Latent Fingerprints Made Visible?
Powders
Chemical Methods
Alternate Light Sources (ALSs)
Figure 2.15
Preserving Fingerprint Evidence
Figure 2.16
How is a Fingerprint Classified and Identified?
Ridge Line Details
—Ridge Counting: Loops
Figure 2.17
—Ridge Tracing: Whorls
Figure 2.18
Individualization by Ridge Line Deviations
—Fingerprint Exemplars: Sources
—Comparison of a Latent with a Known Fingerprint
—Number of Points Necessary for an Identification
Automated Fingerprint Identification Systems (AFISs)
Evidentiary Value
How Long Do Fingerprints Last?
Additional Factors to be Considered
Levels of Expertise
Probative Value
Firearms
Crime Scene Bullet or Cartridge and Suspected Weapon
Figure 2.19
Make and Mechanical Condition of Gun
Description of a Weapon
Operating Condition of a Weapon
Bullet Trajectory
Accidental Discharge
Trigger Pull
Restoration of Serial Numbers
Shooting Distance
Figure 2.20
Powder Traces on Gun Hand
Weapon Recently Fired?—How Many Shots?
Type and Model of Weapon Used
Blood
Investigative Uses
Locate the Crime Scene
Identify the Weapon or Instrument
Develop Associative Evidence
Reconstruct How the Crime was Committed
Figure 2.21
Corroborate or Disprove an Alibi
Interrogate a Suspect
Evidentiary Value
Semen, Other Biological Material, and DNA Profiling
DNA—What Is It?
DNA—How Is It Analyzed?
Figure 2.22
Newer DNA Technology
Short Tandem Repeats (STRs)
Mitochondrial DNA
DNA—Investigative Use
DNA Results—Evidence and Proof
Documents
Handwriting and Hand-Printing Examinations
Typewriting and Computer Printing Examinations
Paper and Other Examinations
Glass
Figure 2.23
Direction of Break
Figure 2.24
Figure 2.25
Figure 2.26
Which Bullet Hole Was Made First?
Figure 2.27
Trace Evidence
Conclusion
Notes
Supplemental Readings
General
Blood and Other Physiological Fluids
Glass
Hair Evidence
Fiber Evidence
Paint
Fingerprint Evidence
Handwriting and Document Examination
Narcotics and Drugs of Abuse
Bitemarks
Arson and Fire Evidence
Toolmark and Firearm Evidence
Criminalistics
Forensic Medicine
Forensic Dentistry (Odontology)
Forensic Science
Crime Scenes and Reconstruction
Document Examinations
Soil Evidence Examinations
Police Photography
Ethical Issues in Forensic Science
CHAPTER 3: The Crime Scene: Discovery, Preservation, Collection, and Transmission of Evidence
Defining the Limits of the Crime Scene
Figure 3.1
The Crime Scene as an Evidence Source
The CSI Effect
Opportunity for Discovery
Figure 3.2
Purpose of Search
Arrival of the First Police Officer
Arrival of the Investigator
Other Sources of Physical Evidence
Discovery of Physical Evidence
Figure 3.3
Figure 3.4
Overview, Walk-Through, and Search
Recording Conditions and Evidence Found at the Crime Scene
Notes
Photographs
Figure 3.5
Sketches
Figure 3.6
Figure 3.7
Figure 3.8
Figure 3.9
Figure 3.10
Collection and Preservation
Preservation—Legal Requirements
Identification
Figure 3.11
Continuity of Possession/Chain of Custody
Vulnerability
Preservation—Scientific Requirements and Means
Scientific Requirements
Figure 3.12
Collection—Scientific Requirements and Means
Scientific Requirements
Control of Variables
Background Material
Sample Sufficiency
Means
Tools
Containers
Figure 3.13
Figure 3.14
Figure 3.15
Figure 3.16
Collection—Special Considerations
Trace Evidence
AIDS as a Concern for Crime Scene Investigators
Transmission of Evidence to the Laboratory
Finding Physical Evidence by Canvassing
Notes
Supplemental Readings
CHAPTER 4: People as a Source of Information
The Criminal
Motive
Modus Operandi (MO)
Identification
Apprehension
Psychological Profiling
Figure 4.1
Clues from Evidence Brought to Crime Scene
Confession
The Victim
Witnesses
The Five Senses
Describing the Perpetrator
Describing Vehicles or Weapons
Vehicles
Weapons
Persons Acquainted with the Suspect
Informants
Follow-Up Activities
Surveillance
Locating Suspect
Determining Activities of Suspect
Concluding Existence of Probable Cause for Search Warrant—Based on Behavior of Suspect
Obtaining Information for Interrogation
Lineup (Identification Parade)
Neighborhood Canvass
Questioning People: Proposed Refinements
Lie Detection by Polygraph
Figure 4.12
Lie Detection by Voice Stress Analysis
Hypnosis
Nonverbal Communication
Box 4.3: Nonverbal Communications
Kinesics
Paralinguistics
Proxemics
The Value of Nonverbal Signals
Notes
Supplemental Readings
General
Psychological Profiling
Neighborhood Canvassing
Interrogation
Nonverbal Communication
Detection of Deception
PART B: Seeking and Obtaining information: People and Records
CHAPTER 5: Records And Files: Investigative Uses and Sources
Records as Investigative Aids
Follow Up or Provide New Leads
Identify the Perpetrator
Figure 5.1
Trace and Locate a Suspect, Criminal, or Witness
Recover Stolen or Lost Property
Ascertain Information Concerning Physical Evidence
Types and Sources of Recorded Information
Law Enforcement Records
Information Science
Crime Pattern Analysis
Modus Operandi
Organization of a Modus Operandi File
Photographs
Electronic Data Processing
Geospatial Analysis
Figure 5.2
Public and Private Organizations
Federal Government Agencies
State and Local Government Agencies
Business Organizations
Public Utility Companies
Credit Reporting Agencies
Insurance Companies
Labor Unions
Fraternal Organizations
Miscellaneous Sources
Where to Find Records
Case Illustration: Using Records and Files in Investigating the Assassination of Dr. Martin Luther King Jr.
Notes
Supplemental Readings
CHAPTER 6: Interviews: Obtaining Information from Witnesses
Questioning People
Interviewing
Acquiring the Facts
Describing the Offender
Figure 6.1
Figure 6.2
Figure 6.3
Describing Stolen or Lost Property
Dealing with the Reluctant, Fearful, or Unaware Witness
Securing Cooperation
The Reluctant Witness
The Fearful Witness
Generating Long-Term Cooperation
The Unaware Witness
Canvass
Indifferent Complainants
Behavioral Analysis Interviews
Hypnosis
The Future of Hypnosis
Eyewitness Evidence: The Role of Perception and Memory
Sensory Input
Memory
Information Retrieval
Witness Errors
Environmental Conditions
Personal Factors
The Cognitive Interview
Memory-Event Similarity
Focused Retrieval
Extensive Retrieval
Witness-Compatible Questioning
Notes
Supplemental Readings
Interviewing
Dealing with Witnesses
Nonverbal Communication
Hypnosis
Perception, Memory, and Witness Error
CHAPTER 7: Informants: Cultivation and Motivation
A Background on Informants
Usefulness
Table 7.1: Types of Informants; Information and Motivation
Types of Informants
Motives for Informing
Self-Serving Reasons
Cutting a Deal
Elimination of Competition
Building a Line of Credit
Mercenary Reasons
Self-Aggrandizement
Emotions
Fear
Revenge and Jealousy
Repentance
Gratitude
Civic Duty
Opportunity
Cultivation of Informants
Dealing with Informants
The Investigator-Informant Relationship
Handling Informants
Interviewing Informants
Potential Problems and Precautions
Similar Problems in Other Fields
Box 7.1: Cultivating Informants
Guidelines for the Use of Informants
Legality of Evidence Based on Informant-Supplied Information
Probable Cause
Preservation of Confidentiality
Entrapment
Retrospective
Notes
Supplemental Readings
PART C: Follow-Up Measures: Reaping Information
CHAPTER 8: Surveillance: A Fact-finding Tool—Legality And Practice
Box 8.1: Surveillance Terms to Know
Kinds of Surveillance
The Legality Issue
Fixed and Moving Surveillance
Electronic and Technical Surveillance and the USA PATRIOT Act
Wiretapping
Mail Covers
Bugs, Pen Registers, Beepers
Monitoring Conversations
Monitoring Telephone Usage
Monitoring Movement of Vehicles and Items of Commerce
Visual Enhancement Devices
Figure 2.11
Practical Considerations
Tactics
Loose Surveillance
Close Surveillance
Planning
Preparation
Familiarization
Equipment
Blending In
Discontinuing the Surveillance
Procedure for Interception of Wire or Oral Communications
Computer Surveillance
Notes
Supplemental Readings
CHAPTER 9: Eyewitness Identification: Guidelines and Procedures
Photo Files
Computerized Mug Photographs
Using a Photo File
Sketches and Composite Images
Figure 9.1
Figure 9.2
Figure 9.3
Figure 9.4
Figure 9.5
Using the Police Artist
Using Composite Kits
Lineups
Lineup Procedure
Composition of the Lineup
Number and Position of Participants
Outward Appearance of Participants
Conduct of Lineups
Suppressing Suggestions
Recording the Procedure
Uncooperative Suspects
Right to an Attorney
Pictorial Identifications
Lineups
Advising the Suspect
Waiver of Right
Role of the Suspect’s Attorney
One-on-One Confrontations (Show-Ups)
Reliability of Eyewitness Identifications
Jury Instructions on Eyewitness Identification
Notes
Supplemental Readings
CHAPTER 10: Interrogation: Purpose and Principles
The Purpose of Interrogation
Why People Confess
Figure 10.1
Horowitz: Basic Concepts
Pavlov: Basic Concepts
Figure 10.2
Why Some Do Not Confess
Conclusion
Notes
Supplemental Readings
CHAPTER 11: Interrogation of Suspects and Hostile Witnesses: Guidelines and Procedures
Miranda Guidelines
Congressional Action
Implementing the Miranda Warnings
Figure 11.1
Waiving One’s Rights
Figure 11.2
Interrogation in Practice
Preparation
The Setting
Privacy
The Room
Creating the Tone
Dress and Appearance
Diction
Mannerisms
Attitude
Taking Command of the Situation
Conducting the Interrogation
Preliminaries
Beginning the Interrogation
The Body of the Interrogation
Evaluation of Responses
The “Break”
Documenting the Interrogation
Recording the Confession
Types of Cases Videotaped
A Consensus Favoring Videotaping
Reducing the Confession to Writing
Witnessing the Confession
Time and Personal Needs Register
Notes
Supplemental Readings
Interrogation
Nonverbal Communication
Detection of Deception
SECTION II: Applying the Principles to Criminal Investigation
CHAPTER 12: Managing Criminal Investigations
Introduction
Historical Antecedents
Conventional Investigative Arrangements
Managing Criminal Investigations (MCI)
The Elements of MCI
The Initial Investigation
Case Screening
Management of the Continuing Investigation
Police-Prosecutor Relations
Investigative Monitoring System
Potential Benefits of MCI
CompStat
Managing the Investigation of Crime
The Psychology of Crime Investigation
Social-Psychological Issues
Cognition
Personality
Observation
Notes
Supplemental Readings
CHAPTER 13: Reconstructing the Past: Methods, Evidence, Examples
Methods of Inquiry
The Scientific Method
Definitions
Box 13.1: Some Key Definitions
Problem Identification
Scientific Reasoning Applied to a Criminal Investigation
Reconstructing the Past: Sources of Information
Table 13.1: History and Criminal Investigation as Methods of Study of Past Events: Sources of Information Common to Both; Available Ancillary Disciplines
People
Physical Evidence
Records
Innovative Applications
Industrial Archeology
Garbageology
Theological Detective Work
Data Mining
Further Commentary on the Investigative Process
Luck or Creativity
Investigative Mind-Set
The 9/11 World Trade Center Attack
Figure 13.1
The Development of Mind-Set
Table 13.2: Evidence and Proof: In Science, Law, and Criminal Investigationa
Evidence and Proof
Investigation—Art or Science?
Summary of the Scientific Method and its Application to Criminal Investigation
Notes
Supplemental Readings
CHAPTER 14: Crime and Constitutional Law: The Foundations of Criminal Investigation
Crime
Criminal Law
Substantive Criminal Law
The Elements of a Crime
Corpus Delicti
Procedural Criminal Law
Case Law
The Model Penal Code
Sources of State Law
Theories on Crime3
Control Over Investigations Through Constitutional Law
Criminal Justice in the Articles and Amendments
The Bill of Rights
The Supreme Court and Criminal Justice
Incorporating the Bill of Rights through the Fourteenth Amendment
Milestone Decisions Affecting Investigative Practice
Probable Cause: Its Evolution and Significance
Control Over Investigative Practice
Table 14.1: Milestone Decisions Affecting Investigative Practice Under the 4th, 5th, and 6th Amendments of the United States Constitution
Notes
Supplemental Readings
CHAPTER 15: Evidence andEffective Testimony
Introduction
What Is Evidence?
Historical Background of the Rules of Evidence
Developments in the United States
The Rules of Evidence
Relevant Evidence
Material Evidence
Competent Evidence
Constitutional Grounds
Statutory Incompetence
What Is Effective Testimony?
Understandable Testimony
Believable Testimony
Behavior and Appearance
Cross-Examination
The Purpose
Facts Favorable to the Defense
Discrediting the Witness
Destroying the Witness’s Testimony
Strategy and Tactics
Miscellaneous Comments
Objections as to Form and Substance
Alleged Prior Statements
Use of Notes
Use of Audio or Video Recordings
“Yes or No” Answers
Timing the Response
Conclusion
Notes
Supplemental Readings
CHAPTER 16: Homicide
Introduction
Definitions
Corpus Delicti
Demographics
Figure 16.1
Overview of Investigative Activities
Partitioning Responsibilities
Table 16.1: Dividing Up Investigative Responsibilities
Motive
Importance
Categorizing Motives
Financial Gain
Sexual Gratification
Apparently Sex-Connected Homicides
Emotional Factors
Self-Protection
Interrupted Crimes
Eliminating an Eyewitness
Slaying a Potential Informant
Removal of an Inconvenience or Impediment
Apparently Motiveless Crimes
Stranger Killing Stranger
“Thrill” Killing
Mistaken Identity
Determining Motive
Crime Scene
People
Records
The Crime Scene as the Focus of the Investigation
Is This an Unlawful Homicide?
Is This Homicide Simulated as Suicide?
Who is the Deceased?
What Was the Motive?
Is There Associative Evidence Present?
Reconstructing What Happened
The Body as the Focus of the Investigation
Who is the Deceased?
Figure 16.2
Figure 16.3
Establishing the Cause and Manner of Death—The Autopsy
The External Examination
Figure 16.4
The Internal Examination
Reconstructing the Crime
Circumstances and Where Found
Postmortem Lividity
Forensic Entomology
What Time or Times are Involved?
Last Person to See the Victim Alive
Checking a Witness’s Story
Time of Death
Rigor Mortis
Body Temperature21
Other Factors
Victim’s Residence
Personal Habits
Time Sequence
Accuracy
Was There Sufficient Time?
Delayed Departure—Its Significance
Time Line
What Occurred?—How Did It Occur?
Figure 16.5
Gunshot Wounds
Figure 16.6
Figure 16.7
Figure 16.8
Entrance Wounds—Firing Distance
Figure 16.9
Figure 16.10
Characteristics of Entrance and Exit Wounds
Figure 16.11A
Figure 16.11B
Figure 16.11C
Figure 16.11D
Figure 16.12
Number of Wounds
Cutting and Stabbing Wounds
Figure 16.13
Figure 16.14
Figure 16.15
Suicidal Wounds
Figure 16.16
Homicidal Wounds
Figure 16.17A
Figure 16.17B
Figure 16.17C
Figure 16.17D
Figure 16.18
Blunt Force Wounds
Asphyxiation
Smothering
Strangulation
Figure 16.19
Figure 16.20
Figure 16.21
Poisoning26
Drowning27
Burns28
Are the Remains of Human Origin?
Figure 16.22
Figure 16.23
The Victim—Alive or Dead When the Fire Started?
Antemortem and Postmortem Injuries
People: Those Who Knew the Victim
Canvassing
Informants
Questioning Suspects
The Value of Records in Homicide Investigation
Insight into Motive
Who Benefits?
Written Materials
Computer Records
Tracing Ownership
Previously Recorded Activities
Follow-Up Action
Cover-Up Attempts
Accidental Means
Vehicles
Firearms
Fire
Poisons
Explainable Means
Simulated Felony
Self-Defense
Diversionary Means
First Person to Report the Crime
Contrived Alibi
Ruse
Partial Cover-ups
Missing Persons
Apparently Involuntary Disappearances
Children
Adults
Adolescents
Misleading Reports
Multiple Deaths
Several Mortalities—All Part of One Event
Double Homicide
Family/Residence Murders
Intrafamily Killings
Home and Workplace Invasions
Mass Murders
Random Shootings—All Victims Die in One Event
Table 16.2: Selected Cases of Random Killings—All Victims Die in One Event
Multiple Killings—Separate Events Spread Over Time
Table 16.3: Selected Cases of Crime-Spree Killings—Victims Die in Several Events Spread Over Time
Crime-Spree Mass Murders
Serial Murders
Table 16.4: Some Notorious Serial Murders
The Violent Criminal Apprehension Program (ViCAP)
The Role of Routine Police Work in Solving a Serial Murder
Table 16.5: Circumstances Leading to the Solution of Some Serial Murder Cases
“Lonely Hearts” Killings
Poisonings
Table 16.5: Effects of Some Poisons After and Before Death
Investigating a Suspected Poisoning
Dying Declarations
Concluding Commentary
Notes
Supplemental Readings
Homicide Investigation
Crime Scene Investigation
Medico-Legal Investigation
Forensic Odontology
Miscellaneous Topics
CHAPTER 17: Robbery
Introduction
Definitions
People
Victims and Witnesses
Figure 17.1
Table 17.1: Distinguishing Professional and Amateur Bank Robbers
Figure 17.2
The Robbery Suspect
Conducting the Investigation
Physical Evidence
Records and Other Sources of Information
Follow-Up Activities
Notes
Supplemental Readings
CHAPTER 18: Rape and Other Sex Crimes
Introduction
Definitions
Corpus Delicti
Stalking
Table 18.1: Types of Stalkers
People
Victims and Witnesses
Figure 18.1
Follow-Up Interviews
Interviewing Children
Conducting the Investigation
Physical Evidence
Figure 18.2
Records and Other Sources of Information
Profiling Offenders
Figure 18.3
Follow-Up Activities
Notes
Supplemental Readings
CHAPTER 19: Burglary
Introduction
Definitions
People
Victims
Figure 19.1
The Public
The Burglary Suspect
Figure 19.2
Figure 19.3
Figure 19.4
Conducting the Investigation
Table 19.1: The Burglar’s Career Path
Physical Evidence
Figure 19.5
Records and Other Sources of Information
Follow-Up Activities
Figure 19.5
Notes
Supplemental Readings
CHAPTER 20: Arson And Explosives
Introduction
Figure 20.1
Definitions
Corpus Delicti
Why is Arson Suspected?
People as a Source of Information
Who Discovered the Fire?
Firefighters
Owner or Manager of the Structure
Employees
Insurance and Financial Personnel
Business Competitors
Other Possible Witnesses
Conducting the Investigation
Physical Evidence
Combustion5
Fuels6
Oxygen
Heat Sources7
Accidental Heat Sources
Figure 20.2
Figure 20.3
Natural Heat Sources
Investigative Significance
Accelerants
Figure 20.4
Point of Origin
Locating the Initial Site
Figure 20.5
Fire Patterns9
Figure 20.6
Figure 20.7
Figure 20.8
Figure 20.9
Figure 20.10
Heat Distortion
Figure 20.11
Figure 20.12
Significance of Finding Point of Origin
Ignition Sources
Plants (Sets)
Figure 20.13
Figure 20.14
Accelerants
Figure 20.15
Figure 20.16
Motive
Financial Gain
Intimidation
Emotional Reasons
Concealment of Another Crime
Pyromania
Recognition as a Hero
Vandalism
Records
Fire Records
Straw Owners
Follow-Up Activities
Bombing Investigations
Explosives
Figure 20.17
Notes
Supplemental Readings
SECTION III: Special Topics
CHAPTER 21: Increasing Threats and Emerging Crime
Introduction
Identity Theft
Box 21.1: Phishing and Spoofing
Internet Fraud
Exploitation of Women and Children
Box 21.2: INTERPOL
Home Invasions
Con Games
Theft of Paintings and Cultural objects
Box 21.3: FBI Art Crime Team
Copies and “Knockoffs”
Figure 21.1
Body Parts
Table 21.1: Approximate Prices for Fresh or Frozen Body Parts
School and Workplace Violence
Figure 21.2
Satanism, Cults, and Ritual Crime
Figure 21.3
Figure 21.4
Satanic Cults
Figure 21.5
Table 21.2: Occult Symbols
Investigative Efforts
People
Figure 21.6
Physical Evidence
Box 21.4: The West Memphis Three
Figure 21.7
Figure 21.8
Records
Notes
Supplemental Readings
CHAPTER 22: Terrorism and Urban Disorder
Introduction
Box 22.1: Mission Statement of the Department of Homeland Security
Overview
Figure 22.1
Defining Terrorism
Legal Aspects
Intelligence Reform and Terrorism Prevention Act of 2004
Box 22.2: Web Resources on the Patriot Act
Constraints on Intelligence-Gathering Activities
Court Proceedings
Terrorism Investigations
Terrorist Suspects
Physical Evidence
Figure 22.2
Weapons of Mass Destruction
Proactive Investigations
Information and Intelligence
Conducting the Investigation
Box 22.3: The Psychological Motives for Terrorism
Reactive Investigations
Figure 22.3
Types of Terrorism and Violent Groups
Supporters of al-Qaeda
Figure 22.4
Ecological Movements and Animal Rights Groups
Figure 22.5
Agro-Terrorist Activities
Anti-Abortion Violent Offenders
Urban Violence and Street Gang Investigations
Figure 22.6
Types of Attacks
Assassination
Kidnapping
Random Violence
Strategic Initiatives
Notes
Supplemental Readings
CHAPTER 23: Computers and Technological Crime
Introduction
Cybercrime: Information Technology and Criminal Activity
Figure 23.1
Systemic Components
Legal Issues
Home Computers
Workplace Computers
Internet Service Providers
Chat Rooms and Social Networking
Web Sites
Investigating High-Tech and IT Crime
Box 23.1: NIJ Guides on Digital Evidence
Child Exploitation
Stalking and Harassment
Economic Crimes—Fraud, Embezzlement, and Identity Theft
Computer Hacking/Cracking and Sabotage
Table 23.1: Computer Terminology
Illegal Drug Activity
Terrorism
Computer Crime Investigation and the Electronic Crime Scene
Figure 23.2
Notes
Supplemental Readings
CHAPTER 24: Enterprise Crime: Organized, Economic, and White-Collar Crime
Introduction
The Enterprise Criminal
Box 24.1: United Nations List of Transnational Crimes (by category)
Conducting the Investigation
Organization and Structure
Membership
Sphere of Influence
Goals and Means
A Typology of Enterprise Criminality
The Mafia
Figure 24.1
Drug-Trafficking Organizations
Figure 24.2
Jamaican Posses
Figure 24.3
Asian Criminal Groups
Chinese Criminal Organizations
Figure 24.4
Viet Ching and Vietnamese Gangs
Triads
Government Corruption in the United States
New Developments in Crime
The Investigation of Illegal Drugs and Drug Trafficking
Drugs
Traditional Investigations
Surveillance
Undercover and Informant Operations
Cooperative Investigations
International Investigations
RICO and Asset Forfeiture
Investigations of Government Corruption
Notes
Supplemental Readings
Back Matter
People also search for Criminal Investigation A Method for Reconstructing the Past 6th:
what are the methods of criminal investigation
criminal investigation techniques
steps in a criminal investigation
criminal investigation methods and techniques
Reviews
There are no reviews yet.