Search:

The fallen / by Baldacci, David.; Brewer, Kyf,narrator.; Cassidy, Orlagh,narrator.;
Read by Kyf Brewer and Orlagh Cassidy.While Amos Decker and his FBI colleague Alex Jamison visit Alex's sister in Baronville, Pennsylvania, Amos discovers two dead men in a nearby house, but finds the police and unseen forces are stonewalling the investigation.Produced and directed by Cheryl Smith.
Subjects: Audiobooks.; Thrillers (Fiction); Detective and mystery fiction.; Suspense fiction.; United States. Federal Bureau of Investigation; Decker, Amos (Fictitious character); Government investigators; International crimes; Murder; Memory disorders;
Available copies: 1 / Total copies: 1
unAPI

The future of violence : robots and germs, hackers and drones : confronting a new age of threat / by Wittes, Benjamin.; Blum, Gabriella.;
"From drone warfare in the Middle East to the NSA digital spying, the U.S. government has harnessed the power of cutting-edge technology to terrible effect. But what happens when ordinary people have the same tools at their fingertips? Benjamin Wittes and Gabriella Blum reveal that this new world is nearly upon us. Soon, our neighbors will be building armed drones capable of firing a million rounds a minute and cooking powerful viruses based on recipes found online. These new technologies will threaten not only our lives but the very foundation of the modern nation state. Wittes and Blum counterintuitively argue that only by increasing surveillance and security efforts will national governments be able to protect their citizens. The Future of Violence is at once an account of these terrifying new threats and an authoritative blueprint for how we must adapt to survive."--"The ability to inflict pain and suffering on large groups of people is no longer limited to the nation-state. New technologies are putting enormous power into the hands of individuals across the world--a shift that, for all its sunny possibilities, entails enormous risk for all of us, and may even challenge the principles on which the modern nation state is founded. In short, if our national governments can no longer protect us from harm, they will lose their legitimacy. Detailing the challenges that states face in this new world, legal scholars Benjamin Wittes and Gabriella Blum controversially argue in [Title TK] that national governments must expand their security efforts to protect the lives and liberty of their citizens. Wittes and Blum show how advances in cybertechnology, biotechnology, and robotics mean that more people than ever before have access to technologies--from drones to computer networks and biological data--that could possibly be used to extort or attack states and private citizens. Security, too, is no longer only under governmental purview, as private companies or organizations control many of these technologies: internet service providers in the case of cyber terrorism and digital crime, or academic institutions and individual researchers and publishers in the case of potentially harmful biotechnologies. As Wittes and Blum show, these changes could undermine the social contract that binds citizens to their governments"--Includes bibliographical references (pages 269-307) and index.The distribution of offensive capability -- The distribution of vulnerability -- The distribution of defense -- Technology, states, and the social order -- Rethinking privacy, liberty, and security -- Rethinking legal jurisdiction and the boundaries of sovereignty -- The security of platforms and the future of surveillance -- Options for domestic governance -- Options for international governance.
Subjects: National security.; Security, International.; Internal security.; Technology; Information technology; Civil rights.; Violence; Crime prevention.;
Available copies: 1 / Total copies: 1
unAPI

Rethinking the 21st century : 'new' problems, 'old' solutions / by Eckert, Amy.; Sjoberg, Laura,1979-;
Includes bibliographical references (p. [246]-270) and index.
Subjects: Security, International.; Security, International; Political crimes and offenses; War; Political ethics.; Sicherheitspolitik; Zukunft; Internationale Politik; Instabilität; Krise;
© 2009., Zed Books ; Distributed in the USA exclusively by Palgrave Macmillan,
Available copies: 1 / Total copies: 1
unAPI

Crime classification manual : a standard system for investigating and classifying violent crime / by Douglas, John E.; Burgess, Ann Wolbert.; Burgess, Allen G.;
Includes bibliographical references and indexes.Preface to the third edition -- The classifications -- Crime classification : past and present -- Criminal investigative concepts in crime scene analysis / John E. Douglas and Lauren K. Douglas -- The impact of the internet, technology and forensics on crime investigation / John E. Douglas, Lauren K. Douglas and Stefan R. Treffers -- Local, federal and international agencies -- About the editors -- About the contributors -- Author index -- Subject index.Part I.; Crime Analysis and Investigation -- Crime classification : past and present -- Criminal investigative concepts in crime scene analysis / John E. Douglas and Lauren K. Douglas -- The impact of the internet, technology and forensics on crime investigation / John E. Douglas, Lauren K. Douglas and Stefan R. Treffers -- Local, federal and international agencies -- Classifying crimes by severity from aggravators to depravity / Michael Welner -- Part II. The Classifications -- Criminal enterprise homicide -- Personal cause homicide -- Sexual homicide -- Extremist and medical homicide -- Group cause homicide -- Arson/bombing-- Rape and sexual assault -- Nonlethal crimes -- Computer crimes / Allen G. Burgess -- Increased globalization of crime / Stefan R. Treffers -- Mass and serial homicide -- Poison and biological agents as weapons / Arthur E. Westveer, John P. Jarvis, Carl J. Jensen, III, and Anner M. Berger -- Part III. Legal Issues -- Interviewing, interrogation, and criminal confessions / Gregory M. Cooper, Michael P. Napier, and Susan H. Adams -- Wrongful convictions : causes, solutions, and case studies / Peter Shellem.
Subjects: Crime; Crime;
Available copies: 1 / Total copies: 1
unAPI

Lost / by Patterson, James,1947-author.; Born, James O.,author.; Carthew, Corey,narrator.;
Read by Corey Carthew.Detective Tom Moon and his multi-talented team face off against an international crime ring looking to seize control of America's most vibrant city, Miami. The city of Miami is Detective Tom Moon's backyard. He's always kept it local, attending University of Miami on a football scholarship, and, as a Miami PD officer, protecting the city's most vulnerable. Now, as the new leader of an FBI task force called Operation Guardian, it's his mission to combat international crime. Moon's investigative team discovers that the opportunistic Blood Brothers, Russian nationals Roman and Emile Rostoff, have evaded authorities while building a vast, powerful, and deadly crime syndicate throughout Europe and metropolitan Miami. Moon played offense for U of M, but he's on the other side of the field this time. And as the Rostoff's zero in on a target dear to Tom, they're not playing by anyone's rules.
Subjects: Thrillers (Fiction); Detective and mystery fiction.; Audiobooks.; United States. Federal Bureau of Investigation; Organized crime; Detective and mystery stories.;
Available copies: 1 / Total copies: 1
unAPI

My life among the serial killers : inside the minds of the world's most notorious murderers / by Morrison, Helen,1942-; Goldberg, Harold.;
Baby-faced Richard Macek -- Dangerous terrain: hypnotizing a serial killer -- Breaking through Macek's mind -- Ed Gein and the history of serial killers -- John Wayne Gacy -- The Gacy interviews -- Taking the stand at the Gacy trial -- The Yorkshire Ripper and Wayne Williams -- Bobby Joe Long's letters and dreams -- Serial killers and their families -- The sadism of Robert Berdella -- The trigger: Michael Lee Lockhart -- Rosemary West and partners in serial crime -- The international phenomenon: child killer in Rio -- DNA and the Green River killer -- Epilogue: where do we go from here?
Subjects: Serial murderers; Criminal psychology;
© 2005., Avon,
Available copies: 1 / Total copies: 1
unAPI

Organized crime / by Haugen, David M.,1969-; Musser, Susan.; Chaney, Michael.;
Includes bibliographical references (pages 175-177) and index.This title explores whether organized crime presents a threat to the world today, how profitable some organized crime activities are, what policies should be implemented to address organized crime, and whether organized crime has moved to online. - See more at: http://www.cengage.com/search/productOverview.do?Ntt=191910543736754598214609775921354023794&N=197+4294904758&Ntk=P_EPI#sthash.46PB9NSI.dpuf.For over 25 years, the Greenhaven Press Opposing Viewpoints Series has developed and set the standard for current-issue studies. With more than 90 volumes covering nearly every controversial contemporary topic, Opposing Viewpoints is the leading source for libraries and classrooms in need of current-issue materials. Each title explores a specific issue by placing expert opinions in a unique pro/con format. The viewpoints are selected from a wide range of highly respected and often hard-to-find sources and publications. By choosing from such diverse sources and including both popular and unpopular views, the Opposing Viewpoints editorial team has adhered to its commitment to editorial objectivity. Readers are exposed to many sides of a debate, which promotes issue awareness as well as critical thinking. In short, Opposing Viewpoints is the best research and learning tool for exploring the issues that continually shape and define our turbulent and changing world.
Subjects: Organized crime.; Gangs.; Computer crimes.;
Available copies: 1 / Total copies: 1
unAPI

Crime types and criminals / by Hagan, Frank E.;
Includes bibliographical references (pages 410-445) and index.Preface -- Acknowledgments -- 1: Introduction -- Criminology -- Fads and fashions in crime -- Crime file 1-1: FBI's ten most wanted fugitives -- Emergence of criminology -- Crime and deviance -- Sumner's types of norms -- Mala in se and mala prohibita -- Social change and the emergence of law -- Crime file 1-2: Crimes of the twentieth century -- Consensus versus conflict model of law -- Crime and criminal law -- Who defines crime? criminological definitions -- Crime problem -- Cost of crime -- Summary -- Key concepts -- Review questions -- 2: General Characteristics Of Crime And Criminals -- Caution in interpreting crime data -- International variations in crime -- Prevalence of crime -- Trends in crime -- Age and crime -- Crime file 2-1: What is the relationship between age and crime? -- Gender differences in criminality -- Social class and crime -- Race and crime -- Crime file 2-2: Racial profiling -- Crime file 2-3: Native Americans and crime -- Regional variation in crime -- Urban/rural differences -- Institutions and crime -- Family and crime -- Education and crime -- Religion and crime -- War and crime -- Economy and crime -- Mass media and crime -- Criminal typologies -- Crime types 2-1: Some sociological typologies of criminal behavior -- Critique of typologies -- Defense of typologies -- Criminal behavior systems -- Theoretical range and criminological explanation -- Global fallacy -- Summary -- Key concepts -- Review questions -- 3: Overview Of Theory In Criminology -- Major theoretical approaches -- Demonological theory--Classical and neo-classical theory -- Crime file 3-1: Justifications for punishment -- Ecological theory -- Forerunners of modern criminological thought -- Economic theory -- Positivism -- Biological theory -- Psychological theory -- Crime file 3-2: Insanity defense -- Mainstream sociological theory -- Critical sociological theory -- Integrated theories of crime -- Summary -- Key concepts -- Review questions -- 4: Violent Crime -- History of violence in the United States -- Murder and mayhem -- Types of murders: multicide -- Crime types 4-1: Types of multiple murders: multicide -- Crime types 4-2: Types of serial murders -- Crime file 4-1: Virginia Tech massacre -- Crime file 4-2: DC snipers, BTK killer, and the Red Lake massacre -- Victim precipitation -- Crime types 4-3: Types of victims -- Typology of violent offenders -- Crime types 4-4: Types of violent offenders -- Legal aspects -- Homicide and assault statistics -- Patterns and trends in violent crime -- Workplace violence -- School violence -- Crime file 4-3: Deadly lessons: the secret service study of school shooters -- Guns -- Sexual assault -- Acquaintance rape -- Amir vs Brownmiller -- Rape as a violent act -- Crime types 4-5: Types of rapes and rapists -- Robbery -- Crime file 4-4: Name that bank robber -- Conklin's typology of robbers -- Crime types 4-6: Types of robbers -- Domestic violence -- Child abuse -- Spouse abuse -- Elder abuse -- Kidnapping -- Crime file 4-5: Bogeyman: online sexual predators -- Criminal careers of violent offenders -- Culture of violence -- Subculture of violence -- Career criminals/violent predators -- Crime types 4-7: Types of career criminals -- Societal reaction -- Summary -- Key concepts -- Review questions -- 5: Property Crime: Occasional, Conventional And Professional -- Occasional property crimes -- Shoplifting -- Crime types 5-1: Types of shoplifters -- Vandalism -- Crime types 5-2: Types of vandals -- Crime file 5-1: Graffiti -- Motor vehicle theft -- Crime types 5-3: Types of auto theft -- Check forgery -- Crime types 5-4: Types of check forgers -- Conventional property crimes -- Burglary -- Crime types 5-5: Types of burglars -- Fencing operations -- Stings -- Larceny/theft -- Arson: a special-category offense -- Crime types 5-6: Types of arson -- Criminal careers of occasional and conventional property criminals -- Crime types 5-7: Occasional vs conventional criminals -- Societal reaction -- Professional crime -- Concept of "professional crime" -- Characteristics of professional crime -- Argot -- Model of professional crime -- Edelhertz's typology -- Crime types 5-8: Examples from Edelhertz's (1970) categories of white collar crimes (professional crime) -- Scams -- Big cons -- Maurer's the big con -- Identity theft -- Ponzi schemes -- Pyramid schemes -- Religious cons -- Crime file 5-2: Emerging patterns of professional crime -- Boosters -- Crime file 5-3: Shoplifting -- Cannons -- Professional burglars -- Box man -- Professional fence -- Crime types 5-9: Types of fences -- Paper hangers -- Crime file 5-4: Intellectual property theft -- Crime file 5-5: Busting the biggest band of cable pirates in US history -- Professional robbers -- Professional arsonists -- Professional auto theft rings -- Crime file 5-6: Car cloning: a new twist on an old crime -- Professional killers -- Criminal careers of professionals -- Societal reaction -- Summary -- Key concepts -- Review questions.6: White Collar Crime: Occupational And Corporate -- White collar crime-the classic statement -- Related concepts -- Measurement and cost of occupational and corporate crime -- History of corporate, organizational, and occupational crime -- Crime types 6-1: Organizational/occupational crime grid -- Legal regulation -- Occupations and the law -- Organizations and the law -- Occupational crime -- Crimes by employees -- Crime types 6-2: Edelhertz's (1970) typology of white collar crime -- Crimes by employees against individuals (the public) -- Crimes by employees against employees -- Crimes by employees against organizations -- Crimes by individuals (or members of occupations) -- Corporate crime -- Crimes by organizations/corporations against individuals (the public) -- Crime file 6-1: Financial crimes: FBI releases annual report to the public -- Crime file 6-2: Great saving and loan scandal: the biggest white collar crime in US history -- Crime file 6-3: Donora fluoride death fog: a secret history of America's worst air pollution disaster -- Crimes by organizations against employees -- Crimes by organizations (corporations) against organizations -- Crime file 6-4: Pirates of the internet: criminal Warez groups -- Criminal careers of occupational and organizational offenders -- Corporate environment and crime -- Corporate concentration -- Rationalizations -- Societal reaction -- Why the leniency in punishment? -- Summary -- Key concepts -- Review questions -- 7: Political Crime And Terrorism -- Ideology -- Political crime: a definition -- Legal aspects -- Nuremburg principle -- Universal declaration of human rights -- International law -- Crimes by government -- Secret police -- Human rights violations -- Patriarchal crime -- Genocide -- Crimes by police -- Illegal surveillance, disruption, and experiments -- Scandal -- Crime file 7-1: White House crime and scandal: from Washington to George W Bush -- Crimes against government -- Protest and dissent -- Social movements -- Assassination -- Crime types 7-1: Types of assassins -- Espionage -- Crimes types 7-2: Types of spies -- Crime file 7-2: Hannsen spy case -- Political "whistle-blowing" -- Terrorism -- Crime types 7-3: Types of terrorists -- Crime file 7-3: Turner diaries, Z0G, and the silent brotherhood-the order -- Criminal careers of political criminals -- Doctrine of Raison d'Etat -- Terrorism and social policy -- Societal reaction -- Summary -- Key concepts -- Review questions -- 8: Organized Crime -- Organized crime: a problematic definition -- Sources of information on organized crime -- Types of organized crime (generic definitions) -- Crime types 8-1: Albini's basic types of organized crime -- Organized crime continuum -- Street gangs -- Crime types 8-2: Types of gang members -- International organized crime -- Yakuza -- Chinese triad societies -- Russian organized crime -- Nature of organized crime -- Ethnicity and organized crime -- Money laundering -- Drug trafficking -- Colombian cartels -- Underground empire -- Theories of the nature of syndicate crime in the United States -- Crime file 8-1: Origin of the mafia -- Cosa Nostra theory (the Cressey model) -- Patron theory (the Albini model) -- Italian-American syndicate (IAS) -- Classic pattern of organized crime -- Strategic and tactical crimes -- Illegal businesses and activities -- Crime file 8-2: Snakeheads and software mobsters -- Crime file 8-3: Mobsters, unions, and the feds -- Big business and government -- Brief history of organized crime in the United States -- Before 1930 -- Luciano period -- Genovese period -- Apalachian meetings -- Gambino period -- Commission trials -- Criminal careers of organized criminals -- Public and legal reaction -- Drug control strategies -- Investigative procedures -- Laws and organized crime -- Summary -- Key concepts -- Review questions -- 9: Public Order Crime -- Nuts, guts, sluts, and "preverts" -- Broken windows -- Prostitution -- Types of prostitution -- Crime types 9-1: Types of prostitution -- Massage parlors -- Johns -- Underaged prostitutes -- Homosexual behavior -- Crime types 9-2: Types of homosexuals -- Sexual offenses -- Paraphilia -- Crime types 9-3: Types of paraphilia -- Nonvictimless sexual offenses -- Sexual predators -- Crime file 9-1: Child sexual abuse by Catholic priests -- Crime types 9-4: Types of child molesters -- Crime file 9-2: Cracking down on sexual predators on the internet -- Incest -- Characteristics of sex offenders -- Drug abuse -- Drugs and history -- Crime file 9-3: Moral panics and the strange career of Captain Richmond Hobson-moral entrepreneur -- Drug use in the United States: the drug dip? -- Drug abuse and crime -- Drunkenness -- Special populations -- Societal reaction -- Overcriminalization -- Decriminalization -- Summary -- Key concepts -- Review questions -- 10: Computer Crime And The Future Of Crime -- Computer crime -- Types of computer crime -- Crime types 10-1: Types of computer crime -- Crime file 10-1: Operation: Bot roast: bot-herders charged as part of initiative -- Argot of computer crime -- Online predators -- Crime file 10-2: Protecting children in cyberspace: the ICAC task force program -- Cyberterrorism -- Public and legal reaction -- Crime file 10-3: Cyberspace security: breaking ground in the new frontier -- Crime file 10-4: Fine point: mapping intel sources -- Future of crime -- Predicting the future of crime: methods -- Other crime predictions -- Crimewarps -- Future of digital crime -- Other predictions -- British home office predictions -- Crime file 10-5: Anticipating future trends in crime and disorder audits -- Summary -- Key concepts -- Review questions -- Glossary -- References -- Index -- About the author.From the Publisher: Crime and Criminals is an essentials introduction to the study of criminology, focusing on crime types in particular. The book aims to provide broader coverage of all major crime types, as well as brief coverage of research methods and theory. The book can be used as both a stand alone and supplementary text in courses such as introduction to criminology, crime and society, deviant behavior, crime profiling, and many other seminars within the criminology and criminal justice discipline. Unlike many of the current criminology books on the market, this is a brief book that really talks about all kinds of crime and criminals in detail in a way to capture and retain student interest.
Subjects: Criminal psychology.; Criminal behavior.; Criminology.;
© ©2010., Sage Publications,
Available copies: 1 / Total copies: 1
unAPI

The 18th abduction / by Patterson, James,1947-; Paetro, Maxine,author.;
Detective Lindsay Boxer and her husband Joe Molinari team up to protect San Francisco from an international war criminal in the newest Women's Murder Club thriller. For a trio of colleagues, an innocent night out after class ends in a deadly torture session. They vanish without a clue -- until a body turns up. With the safety of San Francisco's entire school system as stake, Lindsay Boxer has never been under more pressure at work and could really use support at home. But her husband Joe is drawn into an encounter with a woman who's seen a ghost -- a notorious war criminal from her Eastern European home country, walking the streets of San Francisco. As Lindsay digs deeper, with help from intrepid journalist Cindy Thomas, there are revelations about the victims. The implications are shocking. And when Joe's mystery informant disappears, joining the ranks of missing women in grave danger, all evidence points to a sordid international crime operation. It will take the combined skills of Lindsay, Joe, and the entire Women's Murder Club to protect their city, and themselves, from a monster.
Subjects: Detective and mystery fiction.; Thrillers (Fiction); Boxer, Lindsay (Fictitious character); Women's Murder Club (Imaginary organization); Police; Policewomen; Serial murder investigation; War criminals; Transnational crime; Women detectives; Women teachers;
Available copies: 1 / Total copies: 1
unAPI

Protecting your children online : what you need to know about online threats to your children / by McCabe, Kimberly A.,1965-;
Addresses several types of cyber crimes, ranging from child pornography and solicitation to cyberbullying, cyberstalking, and sexting, giving parents the necessary information they need to protect their children in cyberspace. This book builds on the historical efforts to reduce child abuse in the United States and looks at the limitations of these efforts when attempting to address child abuse in cyberspace. By identifying these different types of cybercrimes against children, and offering the definitions of terms and law enacted to prohibit these crimes, Kimberly McCabe gives possible responses for attempting to end internet crime on a national, international, and personal level.Includes bibliographical references (pages 159-177) and index.Introducing cyberspace and internet crimes against children -- Welcome to children and cyberspace -- Enticement, sexual imposition, child solicitation, and child pornography -- Sexting and sextortion -- Cyberbullying -- Cyberstalking -- Facilitating hate and violence -- Preparing for the worst: sex rings, sex tourism, and child trafficking -- Warning signs -- Addressing victimization.
Subjects: Internet and children.; Internet and teenagers.; Cyberbullying; Cyberstalking; Child abuse; Child pornography; Internet;
Available copies: 1 / Total copies: 1
unAPI