For Callie Merton, one of Finders, Inc.'s best agents, discretion had become a way of life. Even when she married fellow agent Max Chambers, there were matters she couldn't bring herself to discuss with him. But now that withheld information is threatening to break up her marriage. As Callie and Max embark on a final case together, will Callie be able to reveal the truth and save her marriage—or will she allow her past to destroy her future?
Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim. Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover. Provides step-by-step instructions on how to investigate crimes online Covers how new software tools can assist in online investigations Discusses how to track down, interpret, and understand online electronic evidence to benefit investigations Details guidelines for collecting and documenting online evidence that can be presented in court
Menser Security and Detective Training Agency, Inc. (MSDTA) have amassed a wealth of knowledge and experience in the fi eld of security. A former Law Enforcement Offi cer, Detective James D. Menser Sr. Ph.D, President and C.E.O. of Menser Security founded the organization and Detective Training, Inc., comes from a long history of undercover operations security enforcement. Detective Menser was fi rst introduced to security in 1973 where he performed as a store detective. Due to his success, he gained employment at larger agencies providing additional responsibility, a wealth of knowledge and the inner workings of security. Menser has personally experienced every capacity of security from actual security guard service to middle and upper management services as well as sales representative for ERS Security and Detective Agency (bodyguard).
This book explains exactly what personality type is needed and what sorts of physical, emotional, and psychological skills are required for a career in undercover law enforcement.
Voices from Criminal Justice, Second Edition, gives students rich insight into the criminal justice system from the point of view of practitioners, as well as outsiders—citizens, clients, jurors, probationers, or inmates. These qualitative and teachable articles cover all three components of the criminal justice system, ensuring students will be better informed about the daily realities of criminal justice professionals in law enforcement, courts, and corrections. At the same time, the juxtaposition of insider and outsider views allows students to look beyond the actual content of the articles and develop their own views about the functions and flaws of the criminal justice system on a societal level. This innovative reader, now with seven new articles designed to stimulate discussions and promote critical thought, is perfect for undergraduate criminal justice courses in the United States, and has proven to be an effective companion or alternative to traditional introductory textbooks. Voices from Criminal Justice, Second Edition, also offers a framework for more advanced students in special issues or capstone courses to synthesize information from earlier courses and develop their own view of American justice.
Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies. The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool. The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations. The Tools section provides details of leading hardware and software The main Technology section provides the technical "how to" information for collecting and analysing digital evidence in common situations Case Examples give readers a sense of the technical, legal, and practical challenges that arise in real computer investigations