Terrorism an investigator's handbook
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London ; New York
Routledge
2012
|
Ausgabe: | Fourth edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043730098 | ||
003 | DE-604 | ||
005 | 20161012 | ||
007 | t | ||
008 | 160824s2012 |||| 00||| eng d | ||
020 | |z 9781437734874 |9 978-1-4377-3487-4 | ||
035 | |a (OCoLC)964455175 | ||
035 | |a (DE-599)BVBBV043730098 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
084 | |a PR 2375 |0 (DE-625)139583: |2 rvk | ||
100 | 1 | |a Dyson, William E. |d 1941- |e Verfasser |0 (DE-588)137526466 |4 aut | |
245 | 1 | 0 | |a Terrorism |b an investigator's handbook |c William E. Dyson |
250 | |a Fourth edition | ||
264 | 1 | |a London ; New York |b Routledge |c 2012 | |
300 | |a XX, 504 Seiten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Terrorism | |
650 | 4 | |a Terrorism investigation / United States | |
650 | 7 | |a Terrorism |2 fast | |
650 | 7 | |a Terrorism investigation |2 fast | |
650 | 4 | |a Terrorismus | |
651 | 7 | |a United States |2 fast | |
651 | 4 | |a USA | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029141982&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029141982&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
999 | |a oai:aleph.bib-bvb.de:BVB01-029141982 |
Datensatz im Suchindex
_version_ | 1804176528619077632 |
---|---|
adam_text | Contents
Dedication v
Foreword xvii
Preface xix
Section I. The Nature of Terrorism and the Threat It Presents 1
1. An Overview of Terrorism 3
Historical Terrorism 5
Modern Terrorism 6
The New Breed of Terrorists 12
The 21st-Century Challenge to Law Enforcement 13
How Law Enforcement Addresses the Current Terrorist Threat 15
2. Defining, Delineating, and Dissecting Terrorism 19
Issues Related to Terrorism 21
Types of Terrorism 22
Specific Types of Terrorism 25
The Concepts of Revolution and Civil War 32
The Concept of Guerrilla Warfare 33
Recent Terrorist Tactics 33
Summary 34
3. Religious-Based Terrorism 37
Foreign Religious-Based Terrorism 37
Domestic Religious-Based Terrorism 38
4. What Investigators Need to Know about Terrorists 45
Summary 50
vii
viii CONTENTS
Section II. Investigative Techniques 51
5. An Overview of Investigative Techniques as They
Apply to Terrorism 53
Summary 55
6. What the Terrorist Knows about Law Enforcement 57
Terrorist Training Materials 58
Why Political Extremists Study Security-Related Manuals 61
Why Law Enforcement Officers Should Study Extremist
Materials 62
How to Locate Terrorist Manuals and Guides and Determine
Security Procedures 63
Terrorist Training 64
Summary 65
7. Interviewing 67
What Is Sought during an Interview 72
Location of Interviews 85
Use of Deception during Interviews 87
Others Present during Interviews 90
Recording Interviews 93
Unique Features of Interviews with Terrorists 95
Encouraging Unwilling Subjects to Submit to an Interview 96
Documentation 100
Pretext Interviews 101
Summary 103
8. Polygraph Examinations 105
Contents ix
9. Records Checks 111
Agency Records Checks 111
Other Law Enforcement Agency Records Checks 113
Credit Bureaus 114
City, County, and State Agencies 115
City Records 115
County and State Records 117
Courts 118
Schools 118
Public Utilities (Gas, Water, Electricity, Sewer) 119
Employment 119
Banking and Financial Institutions 120
Telephone 120
Military 121
Medical Records 121
Newspapers, Magazines, and Other Publications 121
Directories 121
The Internet 122
Summary 124
10. Surveillance 127
The Value of Surveillance 127
Drawbacks of Surveillance 128
Common Criminal Surveillance versus Terrorist Surveillance 129
Types of Surveillance 132
Methods of Conducting Surveillance 135
When to Conduct a Terrorist Surveillance 138
x CONTENTS
What to Do if Confronted during Surveillance 148
Other Investigative Techniques Used during Surveillance 157
Overt Surveillance 158
Summary 159
11. Informants 161
Short-Term/Limited-Use Informants 162
Informant Targets and Their Development 163
Motivation 172
Documenting Informant Information 186
Operating an Informant 188
Informant Security and Confidentiality Issues 192
Vetting the Informant 194
Honesty and the Informant Relationship 195
Illegal Activities and the Informant 197
Drugs and Informants 198
Subsources 198
The Pretext Informant 199
Summary 201
12. Trash Cover 203
The Planned Trash Cover 205
Unplanned Trash Covers 211
Final Comments Concerning the Trash Cover Technique 212
13. Pretext Telephone Calls 215
Information Sought in Pretext Telephone Calls 215
Types of Pretext Telephone Calls 216
Accuracy with Respect to Pretext Telephone Call Information 217
Contents xi
Improving Pretext Telephone Calls 219
Sample Pretext Telephone Calls 220
Documenting Pretext Telephone Calls 220
Pretext Telephone Calls and Caller ID Technology 221
The Internet 221
Summary 222
14. Physical Evidence 223
Steps Involved in Handling Physical Evidence 225
Packaging and Shipping of Evidence to Crime Laboratory 227
Expert Examination of Evidence in Crime Laboratory 229
When to Dispose of Physical Evidence 231
Summary 232
15. The Crime Scene 233
Problems Facing Law Enforcement Officers at the Crime Scene 233
When to Begin the Crime Scene Investigation 236
Beginning the Crime Scene Search 237
Crime Scene Witnesses 238
The Crime Scene and Security Cameras 240
Summary 241
16. Mail Cover 243
Summary 245
17. The Investigative Task Force 247
History of the Task Force Concept 248
What Is Required to Make a Task Force Function 251
Task Force Management and Operation 255
Summary 255
xii CONTENTS
18. Undercover Operations 257
Advantages of the Undercover Technique 258
Disadvantages of the Undercover Technique 258
Types of Undercover Operations 259
Questions to Be Asked before Beginning a Semideep
or Deep Undercover Project 262
Creating the Undercover Project 267
Selecting the Undercover Officer 269
Female Officers as Terrorist Undercover Operatives 271
The Handling Officer 272
Securing False Identification 273
Assembling the Props 279
Some “Gray Area” Undercover Projects 279
Final Considerations 280
19. Technical Investigative Techniques 283
Advantages of Technical Investigative Techniques 284
Disadvantages of Technical Investigative Techniques 284
Types of Electronic Coverage 285
The Future 294
20. Investigative Review 297
The Concept behind the Investigative Review Technique 299
Who Should Conduct the Investigative Review? 300
What Should Be Included in the Investigative Review? 300
Concluding the Investigative Review 303
Subsequent Investigative Review 303
Partial Investigative Review 303
Summary 303
Contents xiii
21. Locating Clandestine and Fugitive Terrorists 305
Types of Clandestine Terrorists 305
The Nature of the Terrorist “Underground” 306
Seeking Fugitive Terrorists 307
Summary 315
Section III. Factors to Consider When Implementing Investigative
Techniques against Terrorists 317
22. The Terrorist in Court 319
Trial 319
What Occurs in the Courtroom during Many
Terrorism Trials 319
Other Courtroom Tactics Used by Terrorists 322
Leaderless Resistance Subjects 324
Summary 324
23. Ethical Issues and Investigative Techniques 327
Professional Conduct 327
The Concept of Common Sense 331
Use of Questionable Investigative Techniques 333
Foreign Investigative Techniques 336
Summary 338
24. The Law Enforcement Offsite Location 339
How an Offsite Can Be Used 340
Making an Offsite Believable 348
Summary 351
xiv CONTENTS
Section IV. Applying Investigative Techniques to Terrorism
Investigations 353
25. When a Clandestine Terrorist Is Identified 355
A Possible Terrorist Scenario 356
Summary 368
26. Handling a Terrorist Attack 371
The Immediate Response 372
Crime Scene 373
Witnesses 375
Claim of Credit for the Attack 376
Records Checks 377
Informants 378
Creating and Organizing a Command Center 378
Summary 385
27. Crisis Preparation 387
Contingency Plans 388
Responsibility Agreements 390
Mutual Aid Agreements 390
The Tabletop Exercise 391
Full Field-Training Exercise 394
Summary 398
Section V. The Future 399
28. The Future of Terrorism Investigation 401
The Nature of the Current Threat 403
An Amazing 2 Years of Law Enforcement Success
in Response to the Terrorist Threat 409
Successes against Terrorists Continued into 2011 418
The Law Enforcement Response to the Terrorist Threat 418
Contents xv
Appendix I
Appendix II
Appendix III
Appendix IV
Appendix V
Appendix VI
Index 487
What to Do in Response to a Terrorist Attack 421
What A lot to Do in Response to a Terrorist Attack 425
In a Nutshell: Bringing Terrorists to Justice 429
Domestic Terrorist Attacks from
2008 through 2010 433
Key Terms and Concepts 469
Selected Extremist Terms 475
A detailed guide to conducting investigation in the area of terrorism that also describes
the current terrorist threat.
The threat of terrorism should be of concern to all law enforcement officers because political extremists
can function and attack anywhere. This handbook introduces the reader to the field of terrorism
investigation. Describing how terrorists operate and how they differ from other criminals, it provides an
outline of how terrorism investigations should be conducted. By helping investigators develop necessary
skills and knowledge, this guide helps them prepare prosecutable cases against terrorists. A practical
handbook, it contains extensive appendices that cover what to do in response to a terrorist attack, what
not to do in response to a terrorist attack, bringing terrorists to justice, domestic terrorist attacks in
2008-2010, key terms and concepts, and selected extremist terms.
■ Provides information on investigative techniques in general and, more specifically,
on terrorism of value to those conducting criminal investigations.
■ Contains current information with respect to the current threat presented by terrorists.
■ Provides easy-to-follow directions with respect to what to do and not to do in response
to terrorism attacks.
|
any_adam_object | 1 |
author | Dyson, William E. 1941- |
author_GND | (DE-588)137526466 |
author_facet | Dyson, William E. 1941- |
author_role | aut |
author_sort | Dyson, William E. 1941- |
author_variant | w e d we wed |
building | Verbundindex |
bvnumber | BV043730098 |
classification_rvk | PR 2375 |
ctrlnum | (OCoLC)964455175 (DE-599)BVBBV043730098 |
discipline | Rechtswissenschaft |
edition | Fourth edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01610nam a2200385 c 4500</leader><controlfield tag="001">BV043730098</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20161012 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">160824s2012 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781437734874</subfield><subfield code="9">978-1-4377-3487-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)964455175</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043730098</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PR 2375</subfield><subfield code="0">(DE-625)139583:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Dyson, William E.</subfield><subfield code="d">1941-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)137526466</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Terrorism</subfield><subfield code="b">an investigator's handbook</subfield><subfield code="c">William E. Dyson</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Fourth edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London ; New York</subfield><subfield code="b">Routledge</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XX, 504 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism investigation / United States</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">United States</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029141982&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029141982&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029141982</subfield></datafield></record></collection> |
geographic | United States fast USA |
geographic_facet | United States USA |
id | DE-604.BV043730098 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:33:37Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029141982 |
oclc_num | 964455175 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | XX, 504 Seiten |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Routledge |
record_format | marc |
spelling | Dyson, William E. 1941- Verfasser (DE-588)137526466 aut Terrorism an investigator's handbook William E. Dyson Fourth edition London ; New York Routledge 2012 XX, 504 Seiten txt rdacontent n rdamedia nc rdacarrier Terrorism Terrorism investigation / United States Terrorism fast Terrorism investigation fast Terrorismus United States fast USA Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029141982&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029141982&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext |
spellingShingle | Dyson, William E. 1941- Terrorism an investigator's handbook Terrorism Terrorism investigation / United States Terrorism fast Terrorism investigation fast Terrorismus |
title | Terrorism an investigator's handbook |
title_auth | Terrorism an investigator's handbook |
title_exact_search | Terrorism an investigator's handbook |
title_full | Terrorism an investigator's handbook William E. Dyson |
title_fullStr | Terrorism an investigator's handbook William E. Dyson |
title_full_unstemmed | Terrorism an investigator's handbook William E. Dyson |
title_short | Terrorism |
title_sort | terrorism an investigator s handbook |
title_sub | an investigator's handbook |
topic | Terrorism Terrorism investigation / United States Terrorism fast Terrorism investigation fast Terrorismus |
topic_facet | Terrorism Terrorism investigation / United States Terrorism investigation Terrorismus United States USA |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029141982&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029141982&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT dysonwilliame terrorismaninvestigatorshandbook |