Criminal investigators have a long list of duties. They must identify and secure a crime scene, conduct interviews of witnesses and victims, interrogate suspects, identify and properly collect evidence, and establish and maintain a chain of custody. Once an investigation is underway, the criminal investigator must demonstrate thorough knowledge of
United for Truth: The ACFEI story recounts the founding and the growth of the American College of Forensic Examiners Institute, the world's leading forensic science association. It includes fascinating forensic science case stories as well as profiles of leading forensic science professionals.
The third edition of Security Careers is the authoritative reference for current job descriptions and pay practices of security, compliance, and ethics occupations. The job descriptions and compensation ranges in this report are drawn from research from the Foushée Group, which has been conducting this research since 1980. Security Careers includes more than 75 job descriptions for security-related positions, which range from the entry-level security guard to the top global corporate executive. It also provides four years of compensation trend data to give a thorough understanding of competitive pay practices across the industry. This book can be used by anyone who manages security personnel or by security professionals who want to develop their careers. Security Careers is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. - Fills the need for solid information based on accurate job descriptions and surveys of industry compensation professionals - Created for hands-on use: readers may use the job descriptions in their own hiring and staffing plans - Sheds light on compensation practices and shows security executives how to influence them
Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! System Forensics, Investigation, and Response, Third Edition examines the fundamentals concepts readers must know as they prepare for a career in the cutting-edge field of system forensics.
Terrorism is a thoroughly researched collection of information on how to prevent, avoid, cope with, recover from, and analyze criminal kidnapping and hostage-taking. Filled with the stories of successful hostages, along with statistics from intelligence files and international reports, this book is intended as a scholarly yet practical approach to this world-wide issue. The author interviews well-known former hostages, such as David Dodge, General and Mrs. James Dozier, Richard Grover, Gordon Kennedy, Larry and Sis Levin, Roy Libby, Bruce Olson and Lloyd Van Vactor. Based on fifteen years of research and Quarles' experience as a negotiator for missionaries taken hostage, Terrorism is a book that is appropriate for political theorists as well as those in the field.
Anti–Money Laundering in a Nutshellis a concise, accessible, and practical guide to compliance with anti–money laundering law for financial professionals, corporate investigators, business managers, and all personnel of financial institutions who are required, under penalty of hefty fines, to get anti–money laundering training. Money laundering is endemic. As much as 5 percent of global GDP ($3.6 trillion) is laundered by criminals each year. It’s no wonder that every financial institution in the United States—including banks, credit card companies, insurers, securities brokerages, private funds, and money service businesses—must comply with complex examination, training, and reporting requirements mandated by a welter of federal anti–money laundering (AML) laws. Ignorance of crime is no excuse before the law. Financial institutions and businesses that unknowingly serve as conduits for money laundering are no less liable to prosecution and fines than those that condone or abet it. In Anti–Money Laundering in a Nutshell: Awareness and Compliance for Financial Personnel and Business Managers, Kevin Sullivan draws on a distinguished career as an AML agent and consultant to teach personnel in financial institutions what money laundering is, who does it, how they do it, how to prevent it, how to detect it, and how to report it in compliance with federal law. He traces the dynamic interplay among employees, regulatory examiners, compliance officers, fraud and forensic accountants and technologists, criminal investigators, and prosecutors in following up on reports, catching launderers, and protecting the integrity and reputations of financial institutions and businesses. In particular, corporate investigators will gain rich insights winnowed from the author's experiences as a New York State and federal investigator.
Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.The book begins with the chapter "What is Cyber Crime? This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. Issues relating to cyber crime definitions, the electronic crime scene, computer forensics, and preparing and presenting a cyber crime investigation in court will be examined. Not only will these topics be generally be discussed and explained for the novice, but the hard questions —the questions that have the power to divide this community— will also be examined in a comprehensive and thoughtful manner. This book will serve as a foundational text for the cyber crime community to begin to move past current difficulties into its next evolution. - This book has been written by a retired NYPD cyber cop, who has worked many high-profile computer crime cases - Discusses the complex relationship between the public and private sector with regards to cyber crime - Provides essential information for IT security professionals and first responders on maintaining chain of evidence
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals. Covers high-level strategies, what they can achieve, and how to implement them Shows discovery and mitigation methods using examples, court cases, and more Explores how social media sites and gaming technologies can be used for illicit communications activities Explores the currently in-use technologies such as TAILS and TOR that help with keeping anonymous online