Author: Dr Henry Prunckun and Dr Troy Whitford
Publication Date: 2019
Publisher: Boulder, CO: Lynne Rienner Publishers;
What is terrorism? How do terrorists operate—what are their means, targets, and motivations? How can governments prevent terrorist attacks from happening? Doctors Prunckun and Whitford address these questions in their systematic, comprehensive exploration of terrorism and counterterrorism. Notably, this authoritative text:
Designed to appeal to both students and instructors, the text enables readers to deepen their understanding of terrorism today and learn what is being done to combat it.
Author: Patrick F Walsh
Publication Date: 2018
Publisher: Palgrave Macmillan, UK
This book explores how potential bio-threats and risks may evolve post 9/11 given the rapid changes in biotechnology and synthetic biology. It also explores what role intelligence communities can play in understanding threats and risks. It argues that although bio-threats and risks are largely low probability and high impact in nature, intelligence in ‘Five Eyes’ countries remain insufficiently prepared to understand them. This book identifies key areas where intelligence reforms need to take place including a more strategic and systematic collaboration between national security/law enforcement intelligence and the scientific community. It is aimed at intelligence analysts, those in the scientific community working on health security threats, policy makers and researchers working on biosecurity and bioterrorism threats and risks.
Patrick F. Walsh is a former intelligence analyst and has worked in Australia’s national security and law enforcement environments. He is Associate Professor in Intelligence and Security Studies at Charles Sturt University, Australia.Book may be ordered here:
Author: Dr Henry Prunckun
Publication Date: 2018
Publisher: Springer, New York
There is little doubt that cyber-space has become the battle space for confrontations. However, to conduct cyber operations, a new armory of weapons needs to be employed. No matter how many, or how sophisticated an aggressor’s kinetic weapons are, they are useless in cyberspace. This book looks at the milieu of the cyber weapons industry, as well as the belligerents who use cyber weapons. It discusses what distinguishes these hardware devices and software programs from computer science in general. It does this by focusing on specific aspects of the topic—contextual issues of why cyber-space is the new battleground, defensive cyber weapons, offensive cyber weapons, dual-use weapons, and the implications these weapons systems have for practice. Contrary to popular opinion, the use of cyber weapons is not limited to nation states; though this is where the bulk of news reporting focuses. The reality is that there isn’t a sector of the political-economy that is immune to cyber skirmishes. So, this book looks at cyber weapons not only by national security agencies and the military, but also by law enforcement, and the business sector—the latter includes administrations termed non-government organisations (NGOs). This book offers study material suitable for a wide-ranging audience—students, professionals, researchers, policy officers, and ICT specialists.
Author: Dr Susan Robinson and Tracy Cussen
Publication Date: 2017
Publisher: Palgrave, London
Criminology is a vast and diverse discipline: the many forms of crime, with equally many ways of thinking about its causes, consequences and responses ensure that every student's journey is unique. The Criminology and Criminal Justice Companion provides useful information about how every student can make the most of their study experience.
This guide offers a user-friendly and practical introduction to the various aspects of studying and researching criminology such as critical thinking, planning, organising, reading and writing. Its wide-ranging but concise coverage of theories and issues clearly outlines the historical development of the discipline and highlights more current debates. Throughout, reflective questions encourage the reader to think more deeply about the material and its application in the real world.
Packed with helpful features such as case studies, research debates, 'Let's Consider' boxes and biographical synopses of important thinkers, this is an essential resource for students with no prior exposure to criminology, as well as for those who want a handy reference book at any point in their study.
Author: Dr Henry Prunckun
Publication Date: 2015
Publisher: Pen & Sword Books, London
How to Undertake Surveillance and Reconnaissance offers you a systemic way to learn about these fascinating subjects—what they are and what they are not. In doing so, it will teach you how to employ the unique tradecraft associated with this interesting occupation in order to help you plan and carry out your own recon missions. In a world of growing complexity, you cannot afford to learn by trial-and-error or guess-work. This book steps you through the background to surveillance and reconnaissance, describes their use, and explains how they are conducted. It also looks at the essential pieces of equipment and training necessary to carry-out a successful mission. In addition, it discusses what's required to plan for a recon mission. Moreover, you'll learn how you can effectively deal with the reconnaissance efforts of your opposition who are targeting you - counter reconnaissance. Each chapter of this well referenced and thoroughly indexed book contains a list of key words and phrases, study questions, and a few learning activities that will assist you with your study of reconnaissance
Author: Hank Prunckun, PhD
Publication Date: 2015
Publisher: Rowman & Littlefield
Since 9/11, the needs of intelligence agencies as well as the missions they conduct have increased in number, size, and complexity. As such, government and private security agencies are recruiting staff to analyse the vast amount of data collected in this missions. Therefore, the demand for trained analysts who can process these data into finished, focused intelligence is reflected in the growing number of intelligence programs offered by colleges and universities. This textbook offers students a way to gain the essential analytical skills needed to undertake this intelligence work.
This revised edition of the popular text has been expanded and updated significantly, but is still grounded in the scientific method of inquiry that is used in applied research within the social sciences. It explains key concepts and methods to provide a thorough understanding of intelligence research and analysis. Each chapter contains boxed definitions, review questions, and learning exercises. There are many illustrations as well as a comprehensive subject index.
Author: Dr Hank Prunckun
Publication date: July 2013
Publisher:Charles C Thomas Ltd
While many books have been written about private investigation, this text is different in that it does not deal with the subject from traditional perspectives. It examines how private investigation has grown, particularly since 9-11, into an exacting and sophisticated occupation. The book looks at the key issues in what it describes as private intelligence; that is, intelligence activities practiced by operatives other than law enforcement, national security, or the military. Eleven world experts contribute chapters addressing key practice issues concerning the skills, abilities, and knowledge necessary in the new realm of private intelligence. These include Charles Sturt University lecturers Dr Patrick F Walsh, Dr Troy Whitford, Tony Buffett, and Levi West. The initial three chapters provide a report on present-day private intelligence and offer an overview of the specifics of intelligence issues that follow. Eleven subsequent chapters take the reader progressively through various intelligence-related subjects. Major topics presented include: skills for intelligence-led private investigators, open source intelligence, target profiling, fraud intelligence, political intelligence, anti-terrorist and anti-gang intelligence, illicit organizations and financial intelligence, counterintelligence, clandestine communication methods, preparing a prosecution brief, legal issues for intelligence-led private investigators, and ethical issues for intelligence-led private investigators. Additionally, the text contains several features that will appeal to both students and instructors. These include a set of key terms and phrases, a number of study questions, and learning activities in each chapter. Written in a clear and concise style, the text provides a foundation of practical and useful information. It will be a most important and unique resource for students in private investigation courses as well as intelligence practitioners and general readers interested in self-development study.
Author: Dr Garth den Heyer
Publication Date: December 2012
Publisher: Police Foundation
From the foreword: Civilian police were first deployed by the United Nations more than 50 years ago. After a lull of approximately two decades, the number of police on peacekeeping operations increased by 10,000 officers in 2009. The role of police has continued to broaden from monitoring general elections and providing training and basic security to patrolling and developing local police.
The inclusion of police in peacekeeping missions is an accepted mantra by both academia and practitioners. However, the role of police in peacekeeping missions is not well understood by policy and decision makers.
The purpose of this book is to understand the role that police play in the post-conflict context, especially in regard to reforming local police. Through the examination of 23 United Nations and European Union peacekeeping missions. which took place between 1999 and 2007, this book develops responsive operational tools and policies that will support the effective use of deployed police in their delivery of service and when developing the capacity of local police. The analysis of these operational tools and policies lead to the designing of a generic police peacekeeping model for future peacekeeping or reform missions.
The police peacekeeping model consists of a number of dynamic components that take account of flexibility and local culture. Included in the model's components are the implementation of a pre-deployment planning phase and the necessity of objectives and evaluation.
It is intended that this study will assist in improving peace-building outcomes by increasing post-conflict security, stability, and development.
Author: Hank Prunckun, PhD
Publication Date: 2012
Publisher: The Scarecrow Press Inc
Counterintelligence Theory and Practice fills a long-standing void in counterintelligence literature.
From the foreword: I am extremely proud to say that this book is one of the few unclassified publications that actually describes what constitutes a successful counterintelligence operation, as well as the elements that comprise such an operation. In essence, counterintelligence is about a government's ability to keep secrets, and this book explains how to do it from both an academic and practitioners' point of view, which makes this a very special publication.
— Dr Jan Goldman, Georgetown University; series editor, Security and Professional Intelligence Education Series
Edited by: Kenneth Kostyo
Author: Chapter 8, 'Capacity Building', was written by Alan Beckley, Senior Lecturer, Policing & Law Enforcement, AGSP, Charles Sturt University Publication Date: 2012
The Geneva Centre for the Democratic Control of Armed Forces (DCAF) initiated and developed the Toolkit on Police Integrity identifying key measures and strategies for tackling police corruption. This toolkit includes nine chapters written by internationally recognized authors and addresses several key topics related to tackling corruption, including:
Edited by: S. Black, G. Sunderland, L. Hackman, X. Mallett
Publication Date: 2011
Publisher: CRC Press
Disaster management has become an increasingly global issue, and victim identification is receiving greater attention. By raising awareness through past events and experiences, practitioners and policymakers can learn what works, what doesn't work, and how to avoid future mistakes. Disaster Victim Identification: Experience and Practice presents a selection of key historical incidents in the United Kingdom and includes candid discussions of potential areas for improvement in preparedness and future deployment capabilities.
Real disasters and lessons learned
Each chapter in the book addresses a specific disaster and covers a number of main points in relation to the incident. For each event, the book presents data such as the manpower available at the time of the disaster, the number of officers involved in the deployment, and their relevant experience at the time. Details of the disaster follow, as well as the recovery and identification methods employed, the number of fatalities and casualties, and lessons learned. The book also explores the short- and long-term effects that the disaster had on the response team and the community. Finally, each chapter examines important present-day developments in relation to the event. The book summarizes important aspects of the particular disaster in terms of legislative, moral, practical, or other contribution to the field of mass disaster planning, preparation, and deployment on a wider scale.
Viewing disaster management from a global perspective, this volume contains the combined input of academics, forensic specialists, trainers, and law enforcement professionals who focus on actual cases to honestly assess events and provide recommendations for improvement.
A good-practice guide for managing internal reporting of wrongdoing in public sector organisations
Authors: Peter Roberts, A. J. Brown, Jane Olsen
Publication Date: 2011
Publisher: Co-published with the Australia and New Zealand School of Government This guide sets out results from four years of research into how public sector organisations can better fulfil their missions, maintain their integrity and value their employees by adopting a current best-practice approach to the management of whistleblowing.
This guide focuses on: the processes needed for public employees and employees of public contractors to be able to report concerns about wrongdoing in public agencies and programs; and managerial responsibilities for the support, protection and management of those who make disclosures about wrongdoing, as part of an integrated management approach.
The guide is designed to assist with the special systems needed for managing 'public interest' whistleblowing-where the suspected or alleged wrongdoing affects more than the personal or private interests of the person making the disclosure. As the guide explains, however, an integrated approach requires having good systems for managing all types of reported wrongdoing-including personal, employment and workplace grievances-not least because these might often be interrelated with 'public interest' matters.
Author: Jane Goodman-Delahunty, J.D, PhD, and William E. Foote, PhD
Publication Date: 2011
Publisher: Oxford University Press
Forensic mental health assessment (FMHA) has grown into a specialization informed by research and professional guidelines. This book addresses the evaluation of damage for discrimination or harassment claims. Specific ethical issues that may arise when conducting these assessments are discussed, along with suggestions to address and resolve them. A helpful review of empirical research related to the frequency and types of workplace discrimination and its potential effects on employees is also included. In making recommendations for best practice, authors consider empirical support, legal relevance, and consistency with ethical and professional standards.
The volume is part of the American Board of Forensic Psychology series on Best Practices in Forensic Mental Health Assessment. It outlines a 5-stage model for evidence-based evaluations of sexual harassment and other victims. It contains a thorough discussion of the relevant legal and psychological concepts, followed by a step-by-step description of the assessment process from preparing for the evaluation to writing the report and testifying in court. The book includes the following helpful features:
This series presents up-to-date information on the most important and frequently conducted forms of FMHA. The 19 topical volumes address best approaches to practice for particular types of evaluation in the criminal, civil, and juvenile/family areas. These volumes offer invaluable guidance for anyone involved in conducting or using forensic evaluations.
Authors: Brian Ord, Gary Shaw, Tracey Green
Publication Date: 2011
Investigative Interviewing Explained is a practical reference book offering expert guidance to anyone involved in investigative interviewing. It provides a step-by-step guide to best practice investigative interviewing of victims, witnesses and suspects and deals with a range of essential interview skills and techniques. This book is appropriate for the inexperienced investigator as well as those interested in further honing their skills and professionalism in this critical area of investigative practice.
Author: Patrick F. Walsh
This book tracks post 9/11 developments in national security and policing intelligence and their relevance to new emerging areas of intelligence practice such as: corrections, biosecurity, private industry and regulatory environments. Developments are explored thematically across three broad sections:
Issues explored include: understanding intelligence models; the strategic management challenges of intelligence; intelligence capacity building; and the ethical dimensions of intelligence practice. Using case studies collected from wide-ranging interviews with leaders, managers and intelligence practitioners from a range of practice areas in Australia, Canada, New Zealand, the UK and US, the book identifies examples of good practice across countries and agencies that may be relevant to other settings.
Uniquely bringing together significant theoretical and practical developments in a sample of traditional and emerging areas of intelligence, this book provides readers with a more holistic and inter-disciplinary perspective on the evolving intelligence field across several different practice contexts.
Intelligence and Intelligence Analysis will be relevant to a broad audience including intelligence practitioners and managers working across all fields of intelligence (national security, policing, private industry and emerging areas) as well as students taking courses in policing and intelligence analysis.
Author: Phillip Birch University of New South Wales, Victoria Herrington, PhD, Charles Sturt University
Publisher: Macmillan Publishers Australia
Policing in Practice is an edited collection of writings which present a multidisciplinary consideration of historical and contemporary policing practice. With contributions from an array of academics as well as reflections from practitioners, this text provides a comprehensive body of literature which considers the theoretical underpinnings of the practical issues facing a police officer in the modern day. Divided into two parts, this book considers both the operational and organisational environments and details the processes, as well as challenges, facing police officers in both of these sectors. Policing in Practice addresses the policing profession broadly and has been specifically developed for the new or aspiring police officer.