Law Enforcement News

Special LEN Supplement A publication of John Jay College of Criminal Justice/CUNY April 30, 2002

[LEN Home] - [Masthead] - [Past Issues] SUBSCRIBE

Books by Topic
  • Administration, Management & Supervision

  • Community- & Problem-Oriented Policing

  • Corporate & White-Collar Crime

  • Crime: General

  • Criminology

  • Cyber-Crime

  • Drugs

  • Forensic Science/Criminalistics

  • Gangs

  • History/Biography

  • International/Comparative Policing

  • Integrity/Oversight

  • Juvenile Crime & Delinquency

  • Miscellaneous

  • Organized Crime

  • Police Brutality & Misconduct

  • Police Culture

  • Profiling

  • Recruitment, Training & Education

  • Sex Crimes

  • Strategies & Tactics

  • Technology

  • Terrorism/Extremism

  • Violence

  • Weapons/Equipment

  • Directory of Publishers


    Brown, Mark and Pratt, John (2000). DANGEROUS OFFENDERS: PUNISHMENT AND SOCIAL ORDER. New York: Routledge, ISBN: 04152000474
         In this era of unparalleled affluence, the dangerous offender has become a figure of collective anxiety for the citizens of rationalized Western societies. Questions of why sexual and violent offenses seem so ubiquitous, and of how we should protect ourselves, has produced a glut of political and media rhetoric in recent years. This volume aims to place the issue of danger and threat in a broader social and disciplinary context than is commonly offered in criminological treatments of this subject. (From the publisher)

    Colvin, Mark (2000). CRIME AND COERCION: AN INTEGRATED THEORY OF CHRONIC CRIMINALITY. New York: St. Martin’s Press, ISBN: 0312233892
         In a major new theory of criminal behavior, Mark Colvin argues that chronic criminals emerge from a developmental process characterized by recurring, erratic episodes of coercion. Colvin’s differential coercion theory, which integrates several existing criminological perspectives, lays out a compelling argument that coercive forces create social and psychological dynamics that lead to chronic criminal behavior. While Colvin’s presentation focuses primarily on chronic street criminals, the theory is also applied to exploratory offenders and white-collar criminals. In addition, Colvin presents a critique of current crime control measures, which rely heavily on coercion, and offers in their place a comprehensive crime reduction program based on consistent, non-coercive practices. (Editors of

         Former FBI agent Douglas and novelist and filmmaker Olshaker take a stab at solving the cases that continue to haunt us, taking the reader through eight controversial cases that include the Lindbergh baby kidnapping, the Boston Strangler, the Zodiac Killer, and the JonBenet Ramsey killing. Each case is exhaustively presented, with coverage of motive, characteristics and “post-offensive” behavior of the UNSUB (unknown subject or perpetrator of the crimes), the victim and why she/he was chosen, witnesses, original correspondence, and prime suspects. Douglas approaches each case as he “would have as a profiler and criminal investigative analyst for the FBI.” Using information gleaned from interviews with criminals, he claims to be able to “predict” what action a particular type of criminal might engage in, and he also considers what type of criminal the police are seeking. The authors use this knowledge to reveal the type of criminal responsible for these cases. (From the Library Journal)

    Knepper, Paul. (2001) EXPLAINING CRIMINAL CONDUCT: THEORIES AND SYSTEMS IN CRIMINOLOGY. Durham, N.C.: Carolina Academic Press, ISBN: 0890896070
         The author outlines theories of crime that originally have derived from seven original ideas: human nature, the human body, the mind, society, language, race, and the heart. He argues that the social scientific approach of the 20th century towards criminal conduct should coexist with other criminological approaches: political, biological, psychological, sociological, linguistic, racial, and spiritual. Each particular approach is valuable in the formation of public policy.


    Arnaldo, Carlos A. (Ed.) (2001). CHILD ABUSE ON THE INTERNET: ENDING THE SILENCE. New York: Berghahn Books; ISBN: 1571812458
         The subjects of this volume are materials submitted to the “Expert Meeting on Sexual Abuse of Children, Child Pornography and Paedophilia on the Internet” held by UNESCO in 1999 in Paris. The Internet has added a late-twentieth century twist, a new ‘virtual’ variable to the problem of sexual abuse of children. The contributors consider the strategies that are being adopted to combat these problems in various countries all over the world. These may be legal and regulatory approaches imposed by the governments; policies of self-regulation by the Internet industry; and action by individuals, parents, civic groups, NGOs, etc. The need for further research is underlined.

    Kruse, Warren G. and Heiser, Jay G. (2001). COMPUTER FORENSICS: INCIDENT RESPONSE ESSENTIALS. Boston, MA: Addison-Wesley, ISBN: 0201707195
         Computer forensics, the newest branch of computer security, focuses on the aftermath of a computer security incident. The goal of computer forensics is to conduct a structured investigation to determine exactly what happened, who was responsible, and to perform the investigation in such a way that the results are useful in a criminal proceeding. Written by two experts in digital investigation, Computer Forensics provides extensive information on how to handle the computer as evidence. Kruse and Heiser walk the reader through the complete forensics process—from the initial collection of evidence through the final report. Topics include an overview of the forensic relevance of encryption, the examination of digital evidence for clues, and the most effective way to present your evidence and conclusions in court. Unique forensic issues associated with both the Unix and theWindows NT/2000 operating systems are thoroughly covered. (From the publisher)

    Mandia, Kevin and Prosise, Chris (2001). INCIDENT RESPONSE: INVESTIGATING COMPUTER CRIME. Berkeley, Calif.: McGraw-Hill, ISBN: 0072131829
         Charles Keating, Michael Milken, Robert Hanssen — all highly visible criminals whose activities once turned the corporate and diplomatic world upside down. But the information age, there exists a new kind of stealth criminal who is capable of wreaking even greater havoc! In order to catch these cyber-criminals, new strategies have been developed by an elite group of computer security specialists. Now two of them are sharing that knowledge with the rest of us. This “one-stop” read is filled with understandable information and frequently illustrated with FBI and other real world case studies, which show how to resolve computer security incidents. It focuses on the following topics: How to evaluate a computer security incident involving insider threat, Internet fraud, ransom letters/extortion, unauthorized access, denial of service, theft of information, to name a few; Ways to determine the best response; How to implement that strategy, including detailed checklists and tool kit (From the publisher)

    Marcella, Albert J. and Greenfield, Robert (2002). CYBER FORENSICS: A FIELD MANUAL FOR COLLECTING, EXAMINING, AND PRESERVING EVIDENCE OF COMPUTER CRIMES. Boca Raton, Fla.: Auerbach Publications, ISBN: 0849309557
         Given our increasing dependency on computing technology in daily business processes, and the growing opportunity to use engineering technologies to engage in illegal, unauthorized, and unethical acts aimed at corporate infrastructure, every organization is at risk. Traditional forensics professionals use fingerprints, DNA typing, and ballistics analysis to make their case. Infosec professionals have to develop new tools for collecting, examining, and evaluating data in an effort to establish intent, culpability, motive, means, methods and loss resulting from e-crimes. The field bible for infosecurity professionals, this book introduces you to the broad field of cyber-forensics and presents the various tools and techniques designed to maintain control over your organization. You will understand how to: Identify inappropriate uses of corporate IT, Examine computing environments to identify and gather electronic evidence of wrongdoing, Secure corporate systems from further misuse, Identify individuals responsible for engaging in inappropriate acts taken with or without corporate computing systems, Protect and secure electronic evidence from intentional or accidental modification or destruction. (From the publisher)

    Meinel, Carolyn (2000). ÜBERHACKER: HOW TO BREAK INTO COMPUTERS. Port Townsend, Wash: Loompanics Unlimited, ISBN: 155950207X
         Contents Include: • The Basics of Setting up Your Hacker Laboratory • How to Break Into Computers: The Foundation • How to Set Up a Windows 95/98 ME Hacker Lab • How to Get Windows95/98, Windows NT, and Linux on One Computer • Your Linux Attack Computer • How to Build Your Windows Attack Computer • Exploration • Basic Exploration Concepts • Ethernet • How to Explore the Internet • How to Learn Anything — About Anyone or Anything • Breaking in • How to Install Tools and Exploits on Linux • How to Break Into Almost any Unix-type Computer • How to Break Into Windows 98/98 • How to Break Into Windows NT/2000 • How to Deface, Traumatize, and Otherwise Make Merry With Web Sites • Network Hacking • Modem Hacking • Ethernet Hacking • Routers and Firewalls • Everything Else • The Quest for 0-Day • Social Engineering

    Power, Richard (2000). TANGLED WEB: TALES OF DIGITAL CRIME FROM THE SHADOWS OF CYBERSPACE. Indianapolis: Que, ISBN: 078972443X
         With the intense growth of e-business, we hear about an increase in hacking and technology-based criminal incidents. Institutions such as Citibank and Ebay have faced intrusions that have cost them millions of dollars in damages. With the onset of these criminal attacks, there is an increase in demand for products and services that provide more information for people. This book takes you into the lairs of hackers, crackers, researchers, private investigators, law enforcement agents and intelligence officers. The book covers what kinds of cyber-crimes are going to affect business on the Internet, their cost, how they are investigated, and the motivation of hackers and virus writers. Also covered are the problems faced by law enforcement, corporate cyber-security professionals, and real-world examples of cyber-crimes and lessons learned. (From the publisher)

    Schneier, Bruce (2000). SECRETS AND LIES: DIGITAL SECURITY IN A NETWORKED WORLD. New York: John Wiley, ISBN: 0471253111
         A computer virus shuts down your corporate e-mail for a day. Hackers deface your Web site with pornography. The need to share data with customers and vendors exposes critical corporate information to online theft. With your business ever more dependent on safe use of the Internet, security savvy has become as important as understanding marketing or finance. Such savvy, however, has been hard for non-techie executives to acquire. Books and articles on security generally came in two equally useless varieties: incomprehensible or sensationalized. Remember all those books on how the Y2K bug would end civilization as we knew it? Now, Bruce Schneier, a highly respected security expert, has stepped into the breach with Secrets Lies: Digital Security in a Networked World. The book is of value to anyone whose business depends on safe use of e-mail, the Web, or other networked communications. If that’s not yet everybody, it soon will be. (From Business Week)

    Sofaer, Abraham D. (ed.) (2001). THE TRANSNATIONAL DIMENSION OF CYBER CRIME TERRORISM. Stanford, CA: Hoover Institution Press, ISBN: 0817999825
         After the Sept. 11 attacks on the U.S., some observers warned of the serious and continuing vulnerability of the cyberspace infrastructure to terrorism; the worldwide damage from network viruses and other attacks on the Internet’s ability to carry messages, facilitate commerce, and process information is now estimated in the billions of dollars each year. This timely collection, the result of a December 1999 conference sponsored by the Hoover Institution, addresses the nature and threat of cyber-crime and how to combat, deter, identify, and control it, with a strong emphasis on the need for international cooperation. (From

    Cyber Crime

    Schiffman, Mike (2001). HACKER’S CHALLENGE: TEST YOUR INCIDENT RESPONSE SKILLS USING 20 SCENARIOS. New York: McGraw-Hill, ISBN: 0072193840
         Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and incident response skills with 20 real-world hacks presented by upper-echelon security experts. Important topics are covered, including Denial of Service, wireless technologies, Web attacks, and malicious code. Each challenge includes a detailed explanation of the incident—how the break-in was detected, evidence and possible clues, technical background such as log files and network maps, and a series of questions for you to solve. Then, in Part II, you get a detailed analysis of how the experts solved each incident. (From the publisher)

    Stephenson, Peter (2000). INVESTIGATING COMPUTER-RELATED CRIME. Boca Raton, Fla.: CRC Press; ISBN 0849322189
         Computer crimes are nowadays far-reaching. The wide acceptance of the personal computer and the Internet in the corporate world has created major concerns for security. This books deals with practical methods and techniques that have proven to be effective in law enforcement and military circles for years. The investigation process is presented in a step-by-step manner; laws and policies that may impact an investigation are discussed. Issues involving evidence collection, maintaining chain of custody, and marking evidence are reviewed.

         Now the software secrets that have been the exclusive domain of hackers and other computer-savvy surfers are out of the bag. In straightforward, non-technical terms, you’ll get the low-down on an amazing array of computer resources: electronic document shredders, a new electronic truth serum that rivals the polygraph, detection and identification of electronic intruders, professional forensics software and image enhancement software to assist in law enforcement investigations, file viewers that provide instant access to files that can’t be opened, software that searches the Net to uncover what is being said about you and where, all-in-one computer security programs and much more. (From the publisher)