Atjaunināt sīkdatņu piekrišanu

Looseleaf for Criminal Investigation 11th ed. [Loose-leaf]

3.93/5 (88 ratings by Goodreads)
(Univ of Georgia Athens), (Univ of North Texas Denton), , (Univ of South Florida Tampa)
  • Formāts: Loose-leaf, 752 pages, height x width x depth: 277x203x23 mm, weight: 1256 g
  • Izdošanas datums: 16-Dec-2011
  • Izdevniecība: McGraw-Hill Education
  • ISBN-10: 0077606434
  • ISBN-13: 9780077606435
  • Formāts: Loose-leaf, 752 pages, height x width x depth: 277x203x23 mm, weight: 1256 g
  • Izdošanas datums: 16-Dec-2011
  • Izdevniecība: McGraw-Hill Education
  • ISBN-10: 0077606434
  • ISBN-13: 9780077606435
Widely recognized as the most accurate and comprehensive text in the field, this practical, step-by-step introduction to criminal investigation gives students a logical framework for understanding the investigative process. Major sections cover current issues such as environmental crime, the looting of archaeological sites, videotaping of crime scenes, street gangs, and drugs. Case studies throughout the text emphasize the applied technique of criminal investigation. Graphs, charts, and compelling photographs found throughout the text depict the practical aspects of investigation and help to clarify difficult scientific concepts.
Dedication iii
About the Authors iii
Preface xvii
1 The Evolution of Criminal Investigation and Forensic Science
1(16)
Introduction
2(1)
Jurisdiction
2(1)
Criminal Investigation and Forensic Science
2(1)
The Evolution of Criminal Investigation
3(6)
The Impact of the Agricultural and Industrial Revolutions
3(1)
The Fieldings: Crime Information and the Bow Street Runners
3(1)
The Metropolitan Police Act of 1829
3(1)
American Initiatives
3(1)
Pinkerton's National Detective Agency
4(2)
The Emergence of Municipal Detectives
6(1)
Federal and State Developments
6(2)
The Police and the U.S. Supreme Court
8(1)
Historical Milestones of Forensic Science
9(6)
Biometric Based Personal Identification
9(3)
DNA
12(2)
Firearms Identification
14(1)
Other Contributors
15(1)
Recent Developments
15(1)
Key Terms
16(1)
Review Questions
16(1)
Internet Activities
16(1)
2 Legal Aspects of Investigation
17(19)
Introduction
18(1)
The Bill of Rights and the States
19(2)
Evolution of the Fourteenth Amendment
20(1)
The Fourth Amendment
20(1)
Arrest
21(4)
Ingredients of Arrest
21(1)
Arrest Distinguished from Detention
21(1)
Arrest Distinguished from Charging
21(1)
Arrest Procedures
22(1)
The Arrest Warrant
22(2)
Probable Cause
24(1)
Search and Seizure
25(10)
Legal Searches and Seizures
26(1)
Search with a Warrant
26(2)
Search with Consent
28(1)
Search Incident to Arrest
28(2)
Search of a Motor Vehicle
30(1)
Emergency (Exigent Circumstances)
31(1)
Plain View Seizures
32(1)
Stop and Frisk
33(1)
Fruits of the Poisonous Tree
34(1)
Key Terms
35(1)
Review Questions
35(1)
Internet Activities
35(1)
3 Investigators, the Investigative Process, and the Crime Scene
36(44)
Introduction
37(1)
Types of Offenses
37(1)
The Investigator and the Importance of Investigation
37(11)
Essential Qualities of the Investigator
38(1)
Organization of the Investigative Process
39(1)
The Preliminary Investigation
40(1)
1 Receipt of Information, Initial Response, and Officer Safety Procedures
40(2)
2 Emergency Care
42(1)
3 Secure Scene and Control Persons and Evidence
42(1)
4 Issue a Be-on-the-Lookout
43(1)
5 Conduct Neighborhood and Vehicle Canvass
44(2)
6 Administrative Procedures for Processing Crime Scenes
46(1)
7 The Incident/Offense Report
46(2)
Types of Crime Scenes
48(1)
Organization of the Crime Scene Investigation
49(8)
Overall Coordination
49(2)
Forensic Services
51(5)
Investigative Services
56(1)
Types of Evidence
57(1)
Corpus Delicti Evidence
57(1)
Associative Evidence
57(1)
Tracing Evidence
57(1)
Typical Crime Scene Problems
57(1)
Rules for the Crime Scene Investigator
57(7)
Maintain Control
58(1)
Conceptualize Events
59(2)
Proceed with Caution
61(1)
Apply Inclusiveness
61(1)
Maintain Documentation
62(2)
Infectious Disease Risks and Precautions for Investigators
64(2)
The Crime Scene Search
66(3)
1 Boundary Determination
67(1)
2 Choice of Search Pattern
67(1)
3 Instruction of Personnel
68(1)
4 Coordination
68(1)
Suspended Searches, Debriefing, and Release of the Scene
69(1)
Collection and Care of Evidence
69(1)
Visual Documentation of the Crime Scene
69(8)
Digital Video Recording
69(1)
Digital Still Photography
70(1)
Digital Image Management Systems
71(1)
Crime Scene Sketching and Forensic Mapping
71(6)
Submission of Evidence to the Crime Laboratory
77(1)
Investigative Success
78(1)
Key Terms
79(1)
Review Questions
79(1)
Internet Activities
79(1)
4 Physical Evidence
80(41)
Introduction
81(1)
Class versus Individual Characteristics
81(1)
Comparison Samples
82(1)
Soil and Pollen
83(1)
Locating and Handling Soil Evidence
84(1)
Footwear, Foot, and Tires: Prints and Impressions
84(3)
Preserving Residue Prints
85(1)
Preserving Impressions
86(1)
Preserving Shoe Impressions in Snow
87(1)
Paint
87(2)
Glass
89(3)
Handling Glass Evidence
91(1)
Fibers, Cloth Fragments, and Impressions
92(1)
String, Cord, Rope, and Tape
93(1)
Fingerprints
93(7)
Basis for Fingerprint Identification
94(1)
Latent Fingerprints
94(1)
Conditions Affecting the Quality of Latent Fingerprints
95(1)
Locating Latent Fingerprints
96(1)
Methods of Developing Latent Fingerprints
96(1)
Chemicals
97(2)
Developing Latent Fingerprints on Bodies
99(1)
Collecting and Preserving Latent Prints
99(1)
Marking and Identifying Print Lifts
100(1)
Forensic Odontology
100(4)
Identification
101(1)
Dental Profiling
101(1)
Bite Marks
102(2)
Hair
104(1)
Blood
105(5)
The Appearance of Bloodstains
105(1)
Using Bloodstains to Reconstruct the Crime
106(1)
Locating Blood Evidence
107(3)
Laboratory Determinations
110(1)
Lip Cosmetics, DNA, and Lip Prints
110(1)
Firearms
110(5)
Laboratory Determinations
111(3)
Collecting Firearm Evidence
114(1)
Marking and Packaging Firearm Evidence
115(1)
Tool Marks
115(1)
Questioned Documents
116(3)
Handwriting Samples and Examinations
117(2)
Laboratory Determinations
119(1)
Collecting and Packaging Evidence
119(1)
Key Terms
119(1)
Review Questions
120(1)
Internet Activities
120(1)
5 Interviewing and Interrogation
121(32)
Introduction
122(1)
Interviews and Interrogations: Similarities and Differences
122(1)
Objectives of Interviewing
123(1)
Objectives of Interrogation
124(1)
Qualifications of Interviews and Interrogators
124(1)
Time, Place, and Setting of Interviewing and Interrogation
125(1)
The Interrogation Room
126(1)
Preparation for the Interview or Interrogation
127(1)
The Witness
127(1)
The Offense
127(1)
The Victim
127(1)
The Suspect
127(1)
Witnesses: Motivations, Perceptions, and Barriers
128(1)
Persons with Physical Infirmities
129(1)
Reliability of Eyewitness Identification
129(2)
Witness Intimidation
131(1)
Forms of Witness Intimidation
131(1)
Response Strategies for Addressing Witness Intimidation
131(1)
Deterring Intimidators
132(1)
Documenting Interviews
132(1)
Documenting Interrogations
133(3)
The Use of Electronic Recordings for Interrogations
133(1)
Benefits of Recording for Police Officers and Prosecutors
134(1)
The Written Statement
134(2)
Why People Confess
136(1)
False Confessions
136(2)
Voluntary False Confessions
136(1)
Coerced--Compliant False Confessions
137(1)
Coerced--Internalized False Confessions
137(1)
Recommendations to Reduce the Possibility of False Confessions
137(1)
Admissibility of Confessions and Admissions
138(1)
The Free-and-Voluntary Rule
138(1)
The Delay-in-Arraignment Rule
138(1)
Interviewing and Interrogation: Legal Requirements
139(4)
Preinterrogation Legal Requirements
139(1)
Miranda v. Arizona
139(1)
Suspect's Response: Waiver and Alternatives
140(2)
In-Custody Interrogation
142(1)
Miranda and Misdemeanors
142(1)
Interrogation as Defined by the U.S. Supreme Court
142(1)
Most Recent U.S. Supreme Court Decision on the Right to Remain Silent
143(1)
Court Proceedings
143(1)
Right to Remain Silent--Invocation
143(1)
Right to Remain Silent--Waiver
144(1)
Detection of Deception
144(5)
The Critical Role of the Comfort/Discomfort Equation in Detecting Deception
144(1)
Establishing a Comfort Zone for Detecting Deception
144(1)
Defining Signs of Comfort
145(1)
Signs of Discomfort in an Interaction
145(2)
Pacifying Behaviors
147(1)
Specific Behaviors to Consider in Detecting Deception
148(1)
Use of Technological Instruments to Detect Deception
149(2)
Polygraph
149(2)
Computer Voice Stress Analysis
151(1)
Key Terms
151(1)
Review Questions
151(1)
Internet Activities
152(1)
6 Field Notes and Reporting
153(17)
Introduction
154(1)
Field Notes
154(2)
Guidelines for Note-Taking
155(1)
Note-Taking Equipment
155(1)
Six Interrogatory and Basic Investigative Questions
156(1)
Incident Reports
157(7)
Formats for Incident Reports
157(2)
NIBRS-Compliant Incident Reports
159(1)
Computer-Generated Reports
159(1)
Handwritten Reports
159(1)
Common Elements of Incident Reports
159(5)
Writing Effective Reports: The Narrative
164(3)
The Narrative
164(3)
Supervisory Review and Disposition of Incident Reports
167(1)
Follow-Up Investigation and Supplemental Reports
168(1)
Key Terms
168(1)
Review Questions
168(1)
Internet Activities
169(1)
7 The Follow-Up Investigation and Investigative Resources
170(34)
Introduction
171(1)
The Decision to Initiate a Follow-Up Investigation
171(1)
The Follow-Up Investigation Process
172(2)
Reviewing the Incident and Supplemental Reports
174(1)
Jail Booking Report
175(1)
Vehicle Impoundment Report
175(1)
Field Interview/Information Reports
175(1)
Traffic Citations
175(1)
Examining Physical Evidence
175(1)
Reinterviewing Victims and Witnesses
175(2)
Leads
177(1)
Using Databases
177(5)
International
178(1)
National
178(2)
Regional Information Sharing Systems (RISS)
180(1)
State and Local Systems
180(1)
Nonprofit and Private Sources
181(1)
Informants
182(1)
Surveillance
182(2)
Purposes of Surveillance
182(1)
Planning and Preparing for Surveillance Operations
182(1)
Termination of Surveillance Operations
183(1)
Guidelines for Conducting Photo Lineups, Live Lineups, and Field Show-Ups
184(2)
Photo Lineups
184(2)
Live Lineups
186(1)
Show-Ups
186(1)
Staged Crime Scenes
186(4)
Cold Case Investigation
190(1)
Investigative Support and Analytical Tools
191(12)
Fusion Centers
191(1)
Intelligence Units
191(1)
The Intelligence/Analytical Cycle
191(1)
1 Planning and Direction
192(1)
2 Collection
192(1)
3 Processing
193(1)
4 Analysis and Production
193(1)
5 Dissemination
193(1)
6 Reevaluation
193(1)
Surveillance Cameras and Facial Recognition Software
193(1)
Crime Analysis
194(1)
Crime Scene Reconstruction
195(3)
Criminal Profiling
198(2)
Geographical Profiling
200(1)
Remote Sensing
200(1)
Time-Event Charting and Link Analysis
201(1)
The Internet
202(1)
Key Terms
203(1)
Review Questions
203(1)
Internet Activities
203(1)
8 The Crime Laboratory
204(29)
Introduction
205(1)
Crime Laboratories
206(3)
The Morgue
207(1)
Digital Crime Labs
207(1)
Expectations
208(1)
Measures of Crime Laboratory Effectiveness
209(4)
Quality
209(1)
Proximity
209(2)
Timeliness
211(1)
Responding to the National Academies of Science (NAS) Report
212(1)
Admissibility of Examination Results
212(1)
Technologies
213(9)
DNA Analysis
214(3)
The Innocence Project
217(3)
Next Generation Identification (NGI) Program
220(1)
National Integrated Ballistic Information Network Program
221(1)
Handling Evidence in the Laboratory
222(1)
Human Factors
222(1)
Instrumental Analysis
222(1)
ATF Forensic Science Laboratories
222(1)
The FBI Crime Laboratory
223(3)
Reference Files
225(1)
Problems in Crime Laboratories
226(6)
Lack of Training
227(1)
Lack of Accreditation
227(1)
DNA Contamination
228(1)
Sentencing Mistakes and Poor Training
228(1)
Backlog of Cases
229(1)
Scandals and Mistakes within the FBI Crime Lab: The Madrid Bombing Case
229(2)
Code of Ethics
231(1)
Key Terms
232(1)
Review Questions
232(1)
Internet Activities
232(1)
9 Injury and Death Investigations
233(35)
Introduction
234(1)
The Law
234(1)
The Medico-Legal Examination
235(1)
The Autopsy
235(1)
Dead Body Evidence Checklist
235(1)
Postmortem Changes and Time of Death
236(4)
Estimating Time of Death
236(1)
Algor Mortis (Body Cooling)
236(1)
Ocular Changes
237(1)
Stomach Contents
237(1)
Rigor Mortis
237(1)
Livor Mortis
237(1)
Cadaveric Spasm
238(1)
Decomposition
238(2)
Forensic Entomology
240(2)
Evidence from Wounds
242(8)
Firearm Wounds
242(5)
Incised and Stab Wounds
247(1)
Puncture Wounds
247(1)
Lacerations
247(2)
Defense Wounds
249(1)
Strangulation Wounds
249(1)
Suicide
250(8)
Methods and Evidence of Suicide
251(7)
Gender Differences in Suicidal Behavior
258(1)
Fire Deaths
258(3)
Coordination and Cooperation
258(1)
Degrees of Burning
259(1)
Identification of Remains
259(1)
Scene Considerations
259(1)
Examination of the External Body
259(1)
Signs of Trauma
259(1)
Examination of the Internal Body
260(1)
Motives in Fire Deaths
261(1)
Serial Murder
261(5)
Defining Serial Murder
262(1)
Myths and Misconceptions about Serial Killers
263(1)
Causality and the Serial Murderer
264(1)
Serial Murder and the NCAVC
265(1)
Vicap Crime Report
265(1)
Key Terms
266(1)
Review Questions
266(1)
Internet Activities
267(1)
10 Sex-Related Offenses
268(30)
Introduction
269(1)
The Law
269(1)
Sex-Related Investigations
269(4)
Interview of the Rape Victim
270(1)
Type and Sequence of Sexual Acts during an Assault
271(2)
Deaf Victims of Sexual Assault
273(1)
Reluctance to Reach Out
273(1)
Improving Police Response
274(1)
Elder Sexual Abuse
274(2)
Signs and Symptoms of Sexual Abuse
274(1)
Assisted-Living Facilities
274(1)
Nursing Homes
274(1)
Early Recognition and Detection
275(1)
Interviewing Elder Victims of Sexual Abuse
275(1)
Signs of Physical Trauma
275(1)
Why Women Do Not Report Rape to the Police
276(1)
False Rape Allegations
276(2)
The Victim and Physical Evidence
278(4)
Instructions to the Victim
278(1)
Semen and Hair as Evidence
279(1)
Information for the Examining Physician/Sexual-Assault Nurse Examiner
279(1)
Collection of the Victim's Clothing
279(1)
The Role of the Investigator in Securing the Rape Scene
280(1)
Incidence of Errors in the Collection of Evidence
281(1)
Collecting Samples for DNA Analysis from Suspects
281(1)
Sexual-Battery Examination
282(1)
Condom Trace Evidence
282(3)
Exchangeable Traces
283(1)
The Value of Condom Trace Evidence
284(1)
Guidelines for Evidence Collection
285(1)
Record of Injuries
285(1)
Drug-Facilitated Sexual Assault
285(4)
Drugs of Choice
286(1)
Males as Rape Victims
287(1)
Other Date-Rape Drugs
288(1)
Evidence Collection and Processing
288(1)
The Investigation
288(1)
Evidence
288(1)
Homosexual Lifestyles and Homicide Investigation
289(5)
Interpersonal Violence-Oriented Disputes and Assaults
289(1)
Murders Involving Forced Anal Sex and/or Sodomy
290(1)
Extreme Sexual Self-Mutilation
290(2)
Lust, Murders, and Other Acts of Sexual Perversion
292(1)
Homosexual/Heterosexual Murder/Suicide
292(1)
Fisting
293(1)
Autoerotic Deaths/Sexual Asphyxia
294(3)
The Psychological Autopsy
296(1)
Key Terms
297(1)
Review Questions
297(1)
Internet Activities
297(1)
11 Crimes against Children
298(43)
Introduction
299(1)
Assaults against Children
300(1)
Burn Injuries and Child Abuse
300(5)
Typologies of Burns
301(1)
Medical Classification of Burn Severity
302(1)
Causes of Burn Injuries
302(3)
Unexplained Child Fatalities
305(2)
Sudden Infant Death Syndrome
305(1)
The Police Officer's Role
306(1)
Criminal Homicide as a Possibility
307(1)
Traumatic Brain Injuries and Death
307(4)
"Coup-Contrecoup" Injuries
308(1)
Shaken-Baby Syndrome
308(3)
Munchausen Syndrome by Proxy
311(2)
Investigative Guidelines
312(1)
The Role of the Physician in Child-Abuse Cases
312(1)
Child Sexual Exploitation
313(13)
Child Molestation
313(8)
Child Pornography
321(3)
Sex Tourism
324(1)
Use of the Computer and the Internet in Child Pornography
325(1)
Internet Crimes against Children
326(2)
Bullying and Cyberbullying
328(1)
Child Abduction
328(4)
The Parental Interview
329(1)
Victimology of the Missing Child
329(1)
Abduction Patterns
330(1)
Checklist for Law Enforcement
330(1)
Amber Alert Plan
331(1)
Sex Offender Registration and Notification
332(1)
Crime in Schools
333(7)
Threat Assessment
333(3)
Classification of Threats
336(1)
The Role of Law Enforcement
337(1)
Investigating School Violence
337(3)
Key Terms
340(1)
Review Questions
340(1)
Internet Activities
340(1)
12 Human Trafficking
341(15)
Introduction
342(1)
United States Law
342(1)
State Law
343(1)
Antitrafficking Task Force
343(1)
Training of Law-Enforcement Officers
343(1)
Trafficking versus Smuggling
344(1)
When Smuggling Becomes Trafficking
344(1)
Forced Labor, Involuntary Servitude, Peonage, and Debt Bondage
345(2)
Estimated Numbers of Victims
345(1)
Types of Victims
345(1)
Typical Characteristics of Traffickers
345(1)
Industries Involved in Forced Labor
346(1)
Sex Trafficking
347(2)
Recruitment of Foreign Women for the Sex Trade
347(1)
Delivery and Marketing of Trafficked Women
348(1)
Locating Sex-Trafficking Victims
349(1)
Investigative Considerations in Sex-Trafficking Cases
349(5)
Victim-Centered Approach
349(1)
Victim Interview Considerations
350(1)
Interview Preparation
350(1)
How to Dress
350(1)
Immigration Status
351(1)
The U-Visa
351(1)
The T-Visa
352(1)
Victim Living/Working Conditions
352(1)
Confirming the Type of Employment
352(1)
Things Victims May Be Lacking
352(1)
Physical Indicators of Sex Trafficking
352(1)
Psychological Effects of Sex Trafficking
352(1)
Indications of Brothels
352(1)
Social Networks and Personal Safety
353(1)
Information That Helps Identify Trafficking Offenders
353(1)
Search Warrants
353(1)
A Single Lawyer for Multiple Trafficking Victims
353(1)
The Role of Nongovernmental Organizations in Sex-Trafficking Cases
354(1)
Key Terms
354(1)
Review Questions
354(1)
Internet Activities
355(1)
13 Robbery
356(20)
Introduction
357(1)
Elements of the Crime
357(2)
Taking
357(1)
Carrying Away
358(1)
Personal Property
358(1)
Another
358(1)
Intent to Deprive Permanently
358(1)
Use of Force, Fear, or Threat of Force
358(1)
Overview: The Offense, the Victim, and the Offender
359(1)
Typology of Robberies
360(10)
Visible Street Robberies
360(1)
Use of Surveillance Cameras to Prevent Street Robberies
360(1)
Carjackings
360(1)
Home-Invasion Robberies
361(1)
Automatic-Teller-Machine Robberies
362(1)
Taxicab Robberies
362(2)
Convenience-Store Robberies
364(1)
Truck-Hijacking Robberies
365(1)
Bank Robbery
365(2)
Bank Robbery Prevention
367(3)
Responding to the Scene
370(2)
Action Stereotyping
371(1)
Physical Stereotyping
371(1)
Situational Stereotyping
371(1)
Follow-Up Robbery Investigative Procedures
372(2)
Initial Investigation
372(1)
Generating a Likeness of a Suspect
373(1)
Key Terms
374(1)
Review Questions
375(1)
Internet Activities
375(1)
14 Burglary
376(23)
Introduction
377(2)
The Offense and Offenders
379(3)
The Law
382(1)
Approaching the Scene and Initial Actions
382(1)
Investigative Considerations at the Scene
383(4)
Recognition of Burglary Tools
384(2)
Surreptitious Entries
386(1)
Importance of the Time Factor
386(1)
Safe Burglaries
387(2)
Types of Safes
387(1)
Attack Methods for Safes
388(1)
Safe-Burglary Evidence
388(1)
ATM Attacks
389(1)
Residential Burglary
389(2)
Car, RV, and Trailer Burglaries
391(1)
Investigating Criminal Fences and Other Outlets for Stolen Property
392(3)
The Investigator's Crime Prevention Role
395(2)
Reducing the Risk of Commercial Burglary
396(1)
Reducing the Risk of Residential Burglary
397(1)
Key Terms
397(1)
Review Questions
397(1)
Internet Activities
398(1)
15 Larceny/Theft and White-Collar Crime
399(36)
Introduction
400(2)
The Offense and the Offender
402(1)
Elements of the Crime
402(1)
Shoplifting and Organized Retail Crime (ORC)
403(3)
Shoplifting
403(1)
Organized Retail Crime (ORC)
403(2)
Copper and Other Precious Metal Theft
405(1)
Investigative Points
405(1)
Identity Theft and Follow-On Crimes
406(5)
How Identity Theft Occurs
406(3)
Follow-On Crimes
409(2)
Investigation of Identity Theft and Follow-On Cases
411(1)
Credit Card Fraud
411(3)
Check Fraud
414(1)
Counterfeiting
415(1)
Frauds, Scams, and Cons
416(8)
Vendor Fraud
416(1)
Charity and Disaster Frauds
416(1)
Insurance Fraud
416(1)
Health-Care and Medicare Fraud
417(2)
Workers Compensation Fraud
419(1)
Mortgage Fraud
419(1)
Home Improvement and Repair Frauds
419(1)
Internet Frauds and Scams
419(3)
Other Frauds: Pigeon-Drop and Bank-Examiners Cons
422(1)
Victims of Fraud: Senior Citizens
423(1)
Money Laundering
424(2)
Placement
424(2)
Layering
426(1)
Integration
426(1)
Security and Investment Frauds
426(5)
Ponzi/Pyramid Schemes
427(1)
Pump and Dump Schemes
428(1)
Affinity Fraud
428(2)
Pay Phones/ATM Machine Investments
430(1)
One-Year Callable Certificates of Deposit
430(1)
Promissory Notes
430(1)
Prime Bank Notes
430(1)
Viatical Settlements
431(1)
Telephone Scams
431(1)
1-900 and Foreign Exchange Numbers
431(1)
Mexican Collect Call Scheme
431(1)
Cramming
431(1)
Telemarketing and Postal Frauds
432(1)
Land Fraud
432(1)
Franchise Cons
433(1)
Unsolicited Merchandise
433(1)
Fees Charged for Normally Free Services
433(1)
Missing Relatives
433(1)
Phony Inheritance Schemes
433(1)
Key Terms
433(1)
Review Questions
434(1)
Internet Activities
434(1)
16 Vehicle Thefts and Related Offenses
435(37)
Introduction
436(1)
Motor Vehicle Theft
437(6)
Miscellaneous Statistics and Notes
437(1)
Types of Theft
438(1)
Methods of Operation---The Professional
439(1)
Fraudulent Theft Schemes
440(3)
Theft of Heavy Construction Equipment
443(2)
Commercial-Vehicle and Cargo Theft
445(1)
Investigative Tools and Techniques
445(16)
Major Investigative Resources
446(2)
Aamvanet
448(3)
Locating and Handling Vehicles
451(1)
Vehicle Identification
451(8)
Investigation of Vehicle Fires
459(2)
Contact with the Owner
461(1)
Prevention Programs
461(3)
Auto Theft
461(2)
Car Rentals
463(1)
Heavy Equipment
463(1)
Fraud
463(1)
Odometer Fraud
464(1)
Marine Theft
465(3)
Hull Identification
466(1)
Title and Registration Issues
467(1)
NCIC Boat File
467(1)
Investigative Resources
468(1)
Preventive Measures
468(1)
Aircraft and Avionics Theft
468(3)
Resources
469(1)
Theft Techniques
469(1)
Aircraft Identification
470(1)
Theft Prevention Techniques
470(1)
Key Terms
471(1)
Review Questions
471(1)
Internet Activities
471(1)
17 Cybercrime
472(16)
Introduction
473(1)
Cybercrime: An Overview
473(1)
Cybercrime Tools and Services Related to Theft and Fraud
474(1)
Offenders and Offenses
475(1)
Computer Intrusions
475(5)
Investigation of Cybercrimes
480(5)
Federal Efforts
480(2)
State and Local Efforts
482(1)
Legal Considerations
482(1)
Consent Searches
482(3)
The Crime Scene
485(2)
Computer and Peripheral Evidence
485(1)
Crime Scene Processing
485(2)
Key Terms
487(1)
Review Questions
487(1)
18 Agricultural, Wildlife, and Environmental Crimes
488(21)
Introduction
489(1)
Dimensions of Agricultural, Wildlife, and Environmental Crimes
490(2)
Timber Theft
492(1)
Theft of Agrichemicals
493(1)
Livestock and Tack Theft
494(4)
Cattle Rustling
496(1)
Horse Rustling
497(1)
Tack Theft
497(1)
Livestock Identification
498(1)
Physical Evidence
499(1)
Crime Prevention Methods
500(1)
Farm Equipment Theft
500(1)
Timber Theft
500(1)
Agrichemical Theft
500(1)
Livestock and Tack Theft
500(1)
Wildlife Crimes
500(4)
Major Threats to Wildlife
501(2)
Investigations
503(1)
Environmental Crime
504(4)
The Legal and Enforcement Framework
505(1)
Provisions of State RCRA Laws
505(2)
Investigative Methods
507(1)
Key Terms
508(1)
Review Questions
508(1)
Internet Activities
508(1)
19 Arson and Explosives Investigations
509(37)
Introduction
510(1)
Preliminary Investigation
511(1)
Where and How Did The Fire Start?
511(2)
Two Factors Needed to Cause A Fire
511(1)
Accidental Fires
512(1)
Spontaneous Heating and Ignition
513(1)
Burn Indicators
513(3)
Alligatoring
513(1)
Depth of Char
513(1)
Breaking of Glass
514(1)
Collapsed Furniture Springs
514(1)
Distorted Light Bulbs
515(1)
Temperature Determination
516(1)
Fire Setting and Related Mechanisms
516(3)
Ignition Devices
516(1)
Telltale Signs of Accelerants
516(3)
Plants
519(1)
Trailers
519(1)
Missing Items
519(1)
Arson for Profit
519(5)
Financial Stress as the Primary Cause
519(3)
Arson Generated by Third Parties
522(2)
Other Motives for Arson
524(1)
Revenge-Motivated Arson
524(1)
Detection and Recovery of Fire-Accelerant Residues
524(1)
Alternative Fuels in Fire Debris Analysis
525(1)
Scientific Methods in Arson Investigation
525(2)
Detection of Fire Accelerants
526(1)
Interviews
527(3)
Possible Witnesses
527(1)
Firefighters at the Scene
527(1)
Insurance Personnel
527(2)
Other Witnesses Concerning Finances of the Insured
529(1)
News Media Personnel
529(1)
The Medical Examiner
529(1)
Interviewing a Suspect
529(1)
Interviewing the Target and the Owner
529(1)
Interviewing a Potential Informant Who Is Not a Suspect
530(1)
The Arson Suspect
530(1)
Photographing the Arson Scene
531(1)
Still Photography
531(1)
Videotape
531(1)
Explosives Investigation
531(2)
Know Your Explosives
531(1)
Computerized Tomography
532(1)
Sniffers
532(1)
Types of Explosions
532(1)
Improvised Explosive Devices (IEDs)
533(8)
Factors Affecting IED Construction
533(1)
Basic Components of the IED
533(1)
Primary Effect by Type of IED
534(2)
The United States as a Target of IEDs
536(1)
Investigating the Explosion Scene
536(1)
Locating and Identifying Articles of Evidence
537(1)
Collecting Evidence at the Explosion Scene
538(2)
Analyzing the Fuel Source
540(1)
Suspicious Packages and Letters
541(1)
Use of Robotic Devices in Moving and Destroying Dangerous Objects
541(1)
Bomb Threat Standoff
542(1)
Reading The Bomber's Signature
542(3)
Similarities between Bombings
544(1)
Association of Bombings through Forensic Examination
544(1)
Key Terms
545(1)
Review Questions
545(1)
Internet Activities
545(1)
20 Recognition, Control, and Investigation of Drug Abuse
546(44)
Introduction
547(1)
Drugs and Scheduling
548(1)
Opiates
548(5)
Opium
548(1)
Morphine
548(2)
Heroin (Diacetylmorphine)
550(1)
"Cheese" Heroin
551(1)
Codeine
551(1)
OxyContin
552(1)
Other Opium Derivatives
552(1)
Opiate Overdoses
552(1)
Synthetic Narcotics
553(1)
Meperidine (Demerol)
554(1)
Methadone
554(1)
Stimulants
554(5)
Cocaine
554(2)
Amphetamines
556(1)
Phenmetrazine (Preludin), Methylphenidate (Ritalin), and Pemoline (CYLERT)
556(1)
Crystallized Methamphetamine
556(2)
Methcathinone
558(1)
Khat
559(1)
Depressants (Sedatives)
559(1)
Glutethimide (Doriden)
559(1)
Methaqualone
560(1)
Speedballing
560(1)
Hallucinogens
560(3)
Phencyclidine (PCP)
560(1)
Methylenedioxy Methamphetamine
561(1)
Lysergic Acid Diethylamide (LSD 25)
561(1)
Mescaline (Peyote)
561(1)
Psilocybin and Psilocyn
561(1)
Foxy and 5-MeO-AMT
562(1)
Ketamine
562(1)
Cannabis
563(3)
Marijuana
563(2)
Hashish
565(1)
Hashish Oil
565(1)
Synthetic Marijuana
565(1)
Drug Paraphernalia
566(1)
Inhalants
566(1)
Major Countries of Origin and Trafficking Patterns
566(4)
Mexico
567(2)
Colombia
569(1)
The Golden Crescent
569(1)
The Golden Triangle
569(1)
Europe
569(1)
Drug Investigations
570(1)
Gathering Information
570(1)
Confidential Informants
570(8)
Informants: Motivations and Types
570(1)
Department Policy
571(2)
Other Sources for Information
573(1)
Surveillance
574(1)
Undercover Operations
575(2)
High-Intensity Drug Trafficking Area (HIDTA) Programs
577(1)
Searches, Seizures, and Warrants
578(6)
Probable Cause
578(1)
Search Warrants
578(1)
Past Reliability of the Confidential Informant
579(1)
Information Supplied by the Informant
579(1)
Corroboration of the Information Supplied
579(1)
The Exclusionary Rule
579(1)
Warrantless Searches
579(2)
Search Procedures
581(1)
Evidence Handling
581(2)
Pharmaceutical Diversions
583(1)
Clandestine Drug Laboratories
584(4)
Identifying Laboratory Operations
584(1)
Meth Labs
584(1)
Catching Cooks: Meth Monitors
585(1)
Lab Seizure and Forfeiture
586(1)
Conducting a Laboratory Raid
586(2)
Conspiracy Investigations
588(1)
Gangs and Drugs
588(1)
Paradigm Shift
588(1)
Key Terms
589(1)
Review Questions
589(1)
Internet Activities
589(1)
21 Terrorism
590(41)
Introduction
591(1)
International Terrorism
592(12)
Radical Islam
592(2)
Radical Islamic Groups
594(7)
Other Active International Groups
601(2)
Other International Threats: Mexico
603(1)
Homegrown Terrorism
604(73)
Who Is the "Homegrown Terrorist"?
605(1)
Attacks from Inside the United States
606(1)
The Threat
607(70)
Domestic Terrorism
677
Right-Wing Terrorists
607(2)
Left-Wing Terrorists
609(2)
Financing Terrorist Organizations
611(6)
New Laws and Legal Tools
612(1)
Drug Smuggling
612(2)
Arms Smuggling
614(1)
Credit Card Fraud and Theft
614(1)
Charities Fraud and Linkages
615(2)
National Counterterrorism Intelligence Structures
617(6)
Other Criminal Activities Linked to Terrorist Groups
617(1)
Investigation of Terrorist Activities
617(6)
Terrorist Crime Scenes
623(5)
Limited Biological Attacks: Anthrax
624(3)
Chemical Attacks: Mass Casualties
627(1)
Terrorism and the Future
628(1)
Key Terms
629(1)
Review Questions
629(1)
Internet Activities
630(1)
22 The Trial Process and the Investigator as a Witness
631(21)
Introduction
632(1)
Evaluating a Case
632(2)
The Investigator
632(1)
The Prosecutor
633(1)
The Trial Process
634(2)
Jury Selection
634(1)
The Trial
635(1)
The Rules of Evidence
636(9)
Evidence Defined
636(1)
The First Rule of Evidence
636(1)
Proof
637(1)
Testimony
637(1)
Relevance
637(1)
Materiality
637(1)
Competence of Evidence
637(1)
Competence of Witnesses
637(1)
Weight of Evidence
638(1)
Presumptions
638(1)
Inferences
638(1)
Burden of Proof
638(1)
Burden of Going Forward
638(1)
Preponderance of Evidence
639(1)
Order of Proof
640(1)
Judicial Notice
640(1)
Types of Evidence
640(2)
The Hearsay Rule
642(1)
Exceptions to the Hearsay Rule
643(1)
Evidentiary Privileges
644(1)
Witnesses
645(5)
The Investigator as a Witness
645(5)
Key Terms
650(1)
Review Questions
650(1)
Internet Activities
651(1)
Glossary 652(15)
Notes 667(36)
Index 703