Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
3,745,449 result(s) for "Criminal investigations"
Sort by:
Criminal Investigation
Criminal investigation is an essential topic, running through the new national policing curriculum from volume crime to serious organised criminality. This book provides accessible and comprehensive coverage, with case studies and examples to embed understanding, clear links between theory and practice, and a range of critical thinking and review activities. It examines investigation from inception to conclusion, detailing methods, explaining legal requirements and reflecting on past investigations. The contributory roles of specialists and forensic support are examined to provide an inclusive overview of the whole investigative process.The Professional Policing Curriculum in Practice is a new series of books that match the requirements of the new pre-join policing qualifications. The texts reflect modern policing, are up-to-date and relevant, and grounded in practice. They reflect the challenges faced by new students, linking theory to real-life operational practice, while addressing critical thinking and other academic skills needed for degree-level study.
Investigator and fraud fighter guidebook : operation war stories /
\"Investigator and Fraud Fighter Guidebook provides investigative insight and guidance on how to conduct thorough and complete investigations. The methods taught will allow investigators to solve more cases - even with fewer resources. The author teaches how investigators should perform as many as ten different types of investigations simultaneously: 1. Criminal , 2. Civil, 3. Administrative, 4. ID similar wrongful acts by same suspect, 5. ID other wrongful acts by same suspect, 6. ID others who have committed same wrongs as suspect, 7. Project others who might commit similar acts in future, 8. ID Waste/Abuse, 9. ID Systemic Weaknesses (Cause/Contributing Factors), 10. Consider improvements/corrections to be made (to ensure the wrong does not reoccur)\"-- Provided by publisher.
An empirical assessment of pretextual stops and racial profiling
This Article empirically illustrates that legal doctrines permitting police officers to engage in pretextual traffic stops may contribute to an increase in racial profiling. In 1996, the U.S. Supreme Court held in 'Whren v. United States' that pretextual traffic stops do not violate the Fourth Amendment. As long as police officers identify an objective violation of a traffic law, they may lawfully stop a motorist-even if their actual intention is to use the stop to investigate a hunch that by itself does not amount to probable cause or reasonable suspicion. Scholars and civil rights activists have sharply criticized 'Whren', arguing that it gives police officers permission to engage in racial profiling. But social scientists have struggled to empirically evaluate how 'Whren' has influenced police behavior. A series of court decisions in the State of Washington presents an opportunity to test the effects of pretextual-stop doctrines on police behavior. In the years since the 'Whren' decision, Washington has experimented with multiple rules that provide differing levels of protection against pretextual stops. In 1999, the Washington Supreme Court held in 'State v. Ladson' that the state constitution barred police from conducting pretextual traffic stops. However, in 2012, the court eased this restriction on pretextual stops in 'State v. Arreola'.
Link Prediction in Criminal Networks: A Tool for Criminal Intelligence Analysis
The problem of link prediction has recently received increasing attention from scholars in network science. In social network analysis, one of its aims is to recover missing links, namely connections among actors which are likely to exist but have not been reported because data are incomplete or subject to various types of uncertainty. In the field of criminal investigations, problems of incomplete information are encountered almost by definition, given the obvious anti-detection strategies set up by criminals and the limited investigative resources. In this paper, we work on a specific dataset obtained from a real investigation, and we propose a strategy to identify missing links in a criminal network on the basis of the topological analysis of the links classified as marginal, i.e. removed during the investigation procedure. The main assumption is that missing links should have opposite features with respect to marginal ones. Measures of node similarity turn out to provide the best characterization in this sense. The inspection of the judicial source documents confirms that the predicted links, in most instances, do relate actors with large likelihood of co-participation in illicit activities.
Making Surveillance Public
'In Making Surveillance Public law and philosophy scholar Marc Schuilenburg delivers a cogent, crisp, and convincing book on the challenges brought by AI and big data applications with respect to crime control and security.
Do professional facial image comparison training courses work?
Facial image comparison practitioners compare images of unfamiliar faces and decide whether or not they show the same person. Given the importance of these decisions for national security and criminal investigations, practitioners attend training courses to improve their face identification ability. However, these courses have not been empirically validated so it is unknown if they improve accuracy. Here, we review the content of eleven professional training courses offered to staff at national security, police, intelligence, passport issuance, immigration and border control agencies around the world. All reviewed courses include basic training in facial anatomy and prescribe facial feature (or 'morphological') comparison. Next, we evaluate the effectiveness of four representative courses by comparing face identification accuracy before and after training in novices (n = 152) and practitioners (n = 236). We find very strong evidence that short (1-hour and half-day) professional training courses do not improve identification accuracy, despite 93% of trainees believing their performance had improved. We find some evidence of improvement in a 3-day training course designed to introduce trainees to the unique feature-by-feature comparison strategy used by facial examiners in forensic settings. However, observed improvements are small, inconsistent across tests, and training did not produce the qualitative changes associated with examiners' expertise. Future research should test the benefits of longer examination-focussed training courses and incorporate longitudinal approaches to track improvements caused by mentoring and deliberate practice. In the absence of evidence that training is effective, we advise agencies to explore alternative evidence-based strategies for improving the accuracy of face identification decisions.
The Steiner tree Prosecutor: Revealing and disrupting criminal networks through a single suspect
Disrupting a criminal organization requires a significant deployment of human resources, time, information, and financial investment. In the early stages of an investigation, details about a specific crime are typically scarce, often with no known suspect. The literature has shown that an effective approach for analyzing criminal organizations is social network analysis. This approach allows the use of traditional social network tools for analyzing criminal networks, as well as more sophisticated and recent tools. This article introduces a model called StPro , which enables the identification of members of a criminal organization starting from a single suspect. It utilizes linear optimization modeling based on Steiner trees. A suspect is used as the root node, and the resulting tree reveals a probable configuration of the criminal organization to which the suspect may belong. Its application to a real-world case demonstrates that there are no significant differences in effectiveness between the proposed model and the state-of-the-art in the literature, despite requiring less information. It also demonstrates how its application aided in the identification of a gang dedicated to violent crimes in Chile. These results highlight the strong capability of the proposed model to support criminal investigations.
Closing cases with open-source: Facilitating the use of user-generated open-source evidence in international criminal investigations through the creation of a standing investigative mechanism
Digital open-source evidence has become ubiquitous in the context of modern conflicts, leading to an evolution in investigative practices within the context of mass atrocity crimes and international criminal law. Despite its extensive promulgation, international criminal tribunals have had few opportunities to address the admissibility of user-generated open-source evidence. Through semi-structured interviews with experts and analyses of primary and secondary sources, this article examines the current standards and practices governing the use of user-generated open-source evidence. Current practices illuminate a number of gaps in the realm of digital open-source evidence in international criminal law. This article posits the establishment of a standing international, investigative mechanism as a solution to a need for increased standardization and co-ordination within the realm of user-generated open-source evidence. By standardizing the collection and use of such evidence, investigative bodies will be prepared to more effectively serve the international justice community.