Terrorism an investigator's handbook

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Dyson, William E. 1941- (VerfasserIn)
Format: Buch
Sprache:English
Veröffentlicht: London ; New York Routledge 2012
Ausgabe:Fourth edition
Schlagworte:
Online-Zugang:Inhaltsverzeichnis
Klappentext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV043730098
003 DE-604
005 20161012
007 t
008 160824s2012 |||| 00||| eng d
020 |z 9781437734874  |9 978-1-4377-3487-4 
035 |a (OCoLC)964455175 
035 |a (DE-599)BVBBV043730098 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-739 
084 |a PR 2375  |0 (DE-625)139583:  |2 rvk 
100 1 |a Dyson, William E.  |d 1941-  |e Verfasser  |0 (DE-588)137526466  |4 aut 
245 1 0 |a Terrorism  |b an investigator's handbook  |c William E. Dyson 
250 |a Fourth edition 
264 1 |a London ; New York  |b Routledge  |c 2012 
300 |a XX, 504 Seiten 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
650 4 |a Terrorism 
650 4 |a Terrorism investigation / United States 
650 7 |a Terrorism  |2 fast 
650 7 |a Terrorism investigation  |2 fast 
650 4 |a Terrorismus 
651 7 |a United States  |2 fast 
651 4 |a USA 
856 4 2 |m Digitalisierung UB Passau - ADAM Catalogue Enrichment  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029141982&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
856 4 2 |m Digitalisierung UB Passau - ADAM Catalogue Enrichment  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029141982&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA  |3 Klappentext 
999 |a oai:aleph.bib-bvb.de:BVB01-029141982 

Datensatz im Suchindex

_version_ 1804176528619077632
adam_text Contents Dedication v Foreword xvii Preface xix Section I. The Nature of Terrorism and the Threat It Presents 1 1. An Overview of Terrorism 3 Historical Terrorism 5 Modern Terrorism 6 The New Breed of Terrorists 12 The 21st-Century Challenge to Law Enforcement 13 How Law Enforcement Addresses the Current Terrorist Threat 15 2. Defining, Delineating, and Dissecting Terrorism 19 Issues Related to Terrorism 21 Types of Terrorism 22 Specific Types of Terrorism 25 The Concepts of Revolution and Civil War 32 The Concept of Guerrilla Warfare 33 Recent Terrorist Tactics 33 Summary 34 3. Religious-Based Terrorism 37 Foreign Religious-Based Terrorism 37 Domestic Religious-Based Terrorism 38 4. What Investigators Need to Know about Terrorists 45 Summary 50 vii viii CONTENTS Section II. Investigative Techniques 51 5. An Overview of Investigative Techniques as They Apply to Terrorism 53 Summary 55 6. What the Terrorist Knows about Law Enforcement 57 Terrorist Training Materials 58 Why Political Extremists Study Security-Related Manuals 61 Why Law Enforcement Officers Should Study Extremist Materials 62 How to Locate Terrorist Manuals and Guides and Determine Security Procedures 63 Terrorist Training 64 Summary 65 7. Interviewing 67 What Is Sought during an Interview 72 Location of Interviews 85 Use of Deception during Interviews 87 Others Present during Interviews 90 Recording Interviews 93 Unique Features of Interviews with Terrorists 95 Encouraging Unwilling Subjects to Submit to an Interview 96 Documentation 100 Pretext Interviews 101 Summary 103 8. Polygraph Examinations 105 Contents ix 9. Records Checks 111 Agency Records Checks 111 Other Law Enforcement Agency Records Checks 113 Credit Bureaus 114 City, County, and State Agencies 115 City Records 115 County and State Records 117 Courts 118 Schools 118 Public Utilities (Gas, Water, Electricity, Sewer) 119 Employment 119 Banking and Financial Institutions 120 Telephone 120 Military 121 Medical Records 121 Newspapers, Magazines, and Other Publications 121 Directories 121 The Internet 122 Summary 124 10. Surveillance 127 The Value of Surveillance 127 Drawbacks of Surveillance 128 Common Criminal Surveillance versus Terrorist Surveillance 129 Types of Surveillance 132 Methods of Conducting Surveillance 135 When to Conduct a Terrorist Surveillance 138 x CONTENTS What to Do if Confronted during Surveillance 148 Other Investigative Techniques Used during Surveillance 157 Overt Surveillance 158 Summary 159 11. Informants 161 Short-Term/Limited-Use Informants 162 Informant Targets and Their Development 163 Motivation 172 Documenting Informant Information 186 Operating an Informant 188 Informant Security and Confidentiality Issues 192 Vetting the Informant 194 Honesty and the Informant Relationship 195 Illegal Activities and the Informant 197 Drugs and Informants 198 Subsources 198 The Pretext Informant 199 Summary 201 12. Trash Cover 203 The Planned Trash Cover 205 Unplanned Trash Covers 211 Final Comments Concerning the Trash Cover Technique 212 13. Pretext Telephone Calls 215 Information Sought in Pretext Telephone Calls 215 Types of Pretext Telephone Calls 216 Accuracy with Respect to Pretext Telephone Call Information 217 Contents xi Improving Pretext Telephone Calls 219 Sample Pretext Telephone Calls 220 Documenting Pretext Telephone Calls 220 Pretext Telephone Calls and Caller ID Technology 221 The Internet 221 Summary 222 14. Physical Evidence 223 Steps Involved in Handling Physical Evidence 225 Packaging and Shipping of Evidence to Crime Laboratory 227 Expert Examination of Evidence in Crime Laboratory 229 When to Dispose of Physical Evidence 231 Summary 232 15. The Crime Scene 233 Problems Facing Law Enforcement Officers at the Crime Scene 233 When to Begin the Crime Scene Investigation 236 Beginning the Crime Scene Search 237 Crime Scene Witnesses 238 The Crime Scene and Security Cameras 240 Summary 241 16. Mail Cover 243 Summary 245 17. The Investigative Task Force 247 History of the Task Force Concept 248 What Is Required to Make a Task Force Function 251 Task Force Management and Operation 255 Summary 255 xii CONTENTS 18. Undercover Operations 257 Advantages of the Undercover Technique 258 Disadvantages of the Undercover Technique 258 Types of Undercover Operations 259 Questions to Be Asked before Beginning a Semideep or Deep Undercover Project 262 Creating the Undercover Project 267 Selecting the Undercover Officer 269 Female Officers as Terrorist Undercover Operatives 271 The Handling Officer 272 Securing False Identification 273 Assembling the Props 279 Some “Gray Area” Undercover Projects 279 Final Considerations 280 19. Technical Investigative Techniques 283 Advantages of Technical Investigative Techniques 284 Disadvantages of Technical Investigative Techniques 284 Types of Electronic Coverage 285 The Future 294 20. Investigative Review 297 The Concept behind the Investigative Review Technique 299 Who Should Conduct the Investigative Review? 300 What Should Be Included in the Investigative Review? 300 Concluding the Investigative Review 303 Subsequent Investigative Review 303 Partial Investigative Review 303 Summary 303 Contents xiii 21. Locating Clandestine and Fugitive Terrorists 305 Types of Clandestine Terrorists 305 The Nature of the Terrorist “Underground” 306 Seeking Fugitive Terrorists 307 Summary 315 Section III. Factors to Consider When Implementing Investigative Techniques against Terrorists 317 22. The Terrorist in Court 319 Trial 319 What Occurs in the Courtroom during Many Terrorism Trials 319 Other Courtroom Tactics Used by Terrorists 322 Leaderless Resistance Subjects 324 Summary 324 23. Ethical Issues and Investigative Techniques 327 Professional Conduct 327 The Concept of Common Sense 331 Use of Questionable Investigative Techniques 333 Foreign Investigative Techniques 336 Summary 338 24. The Law Enforcement Offsite Location 339 How an Offsite Can Be Used 340 Making an Offsite Believable 348 Summary 351 xiv CONTENTS Section IV. Applying Investigative Techniques to Terrorism Investigations 353 25. When a Clandestine Terrorist Is Identified 355 A Possible Terrorist Scenario 356 Summary 368 26. Handling a Terrorist Attack 371 The Immediate Response 372 Crime Scene 373 Witnesses 375 Claim of Credit for the Attack 376 Records Checks 377 Informants 378 Creating and Organizing a Command Center 378 Summary 385 27. Crisis Preparation 387 Contingency Plans 388 Responsibility Agreements 390 Mutual Aid Agreements 390 The Tabletop Exercise 391 Full Field-Training Exercise 394 Summary 398 Section V. The Future 399 28. The Future of Terrorism Investigation 401 The Nature of the Current Threat 403 An Amazing 2 Years of Law Enforcement Success in Response to the Terrorist Threat 409 Successes against Terrorists Continued into 2011 418 The Law Enforcement Response to the Terrorist Threat 418 Contents xv Appendix I Appendix II Appendix III Appendix IV Appendix V Appendix VI Index 487 What to Do in Response to a Terrorist Attack 421 What A lot to Do in Response to a Terrorist Attack 425 In a Nutshell: Bringing Terrorists to Justice 429 Domestic Terrorist Attacks from 2008 through 2010 433 Key Terms and Concepts 469 Selected Extremist Terms 475 A detailed guide to conducting investigation in the area of terrorism that also describes the current terrorist threat. The threat of terrorism should be of concern to all law enforcement officers because political extremists can function and attack anywhere. This handbook introduces the reader to the field of terrorism investigation. Describing how terrorists operate and how they differ from other criminals, it provides an outline of how terrorism investigations should be conducted. By helping investigators develop necessary skills and knowledge, this guide helps them prepare prosecutable cases against terrorists. A practical handbook, it contains extensive appendices that cover what to do in response to a terrorist attack, what not to do in response to a terrorist attack, bringing terrorists to justice, domestic terrorist attacks in 2008-2010, key terms and concepts, and selected extremist terms. ■ Provides information on investigative techniques in general and, more specifically, on terrorism of value to those conducting criminal investigations. ■ Contains current information with respect to the current threat presented by terrorists. ■ Provides easy-to-follow directions with respect to what to do and not to do in response to terrorism attacks.
any_adam_object 1
author Dyson, William E. 1941-
author_GND (DE-588)137526466
author_facet Dyson, William E. 1941-
author_role aut
author_sort Dyson, William E. 1941-
author_variant w e d we wed
building Verbundindex
bvnumber BV043730098
classification_rvk PR 2375
ctrlnum (OCoLC)964455175
(DE-599)BVBBV043730098
discipline Rechtswissenschaft
edition Fourth edition
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01610nam a2200385 c 4500</leader><controlfield tag="001">BV043730098</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20161012 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">160824s2012 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781437734874</subfield><subfield code="9">978-1-4377-3487-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)964455175</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043730098</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PR 2375</subfield><subfield code="0">(DE-625)139583:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Dyson, William E.</subfield><subfield code="d">1941-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)137526466</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Terrorism</subfield><subfield code="b">an investigator's handbook</subfield><subfield code="c">William E. Dyson</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Fourth edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London ; New York</subfield><subfield code="b">Routledge</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XX, 504 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism investigation / United States</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">United States</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=029141982&amp;sequence=000003&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=029141982&amp;sequence=000004&amp;line_number=0002&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029141982</subfield></datafield></record></collection>
geographic United States fast
USA
geographic_facet United States
USA
id DE-604.BV043730098
illustrated Not Illustrated
indexdate 2024-07-10T07:33:37Z
institution BVB
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-029141982
oclc_num 964455175
open_access_boolean
owner DE-739
owner_facet DE-739
physical XX, 504 Seiten
publishDate 2012
publishDateSearch 2012
publishDateSort 2012
publisher Routledge
record_format marc
spelling Dyson, William E. 1941- Verfasser (DE-588)137526466 aut
Terrorism an investigator's handbook William E. Dyson
Fourth edition
London ; New York Routledge 2012
XX, 504 Seiten
txt rdacontent
n rdamedia
nc rdacarrier
Terrorism
Terrorism investigation / United States
Terrorism fast
Terrorism investigation fast
Terrorismus
United States fast
USA
Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029141982&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis
Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029141982&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext
spellingShingle Dyson, William E. 1941-
Terrorism an investigator's handbook
Terrorism
Terrorism investigation / United States
Terrorism fast
Terrorism investigation fast
Terrorismus
title Terrorism an investigator's handbook
title_auth Terrorism an investigator's handbook
title_exact_search Terrorism an investigator's handbook
title_full Terrorism an investigator's handbook William E. Dyson
title_fullStr Terrorism an investigator's handbook William E. Dyson
title_full_unstemmed Terrorism an investigator's handbook William E. Dyson
title_short Terrorism
title_sort terrorism an investigator s handbook
title_sub an investigator's handbook
topic Terrorism
Terrorism investigation / United States
Terrorism fast
Terrorism investigation fast
Terrorismus
topic_facet Terrorism
Terrorism investigation / United States
Terrorism investigation
Terrorismus
United States
USA
url http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029141982&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029141982&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA
work_keys_str_mv AT dysonwilliame terrorismaninvestigatorshandbook