Profiling Violent Crimes: An Investigative Tool


Ronald M. Holmes - 1989
    New chapters cover criminal behavior theories and psychological profiling; autoerotic deaths, and occult crimes, plus two new chapters detailing infamous unsolved crimes/criminals: Jack the Ripper and the Jon Benet Ramsey case. The authors′ continuing research and activities in the field result in a multitude of new case studies for this book, often included as boxed inserts.

The Art of Intelligence


Henry A. Crumpton - 2012
    In the days after 9/11, the CIA tasked Crumpton to organize and lead the Afghanistan campaign. With Crumpton's strategic initiative and bold leadership, from the battlefield to the Oval Office, U.S. and Afghan allies routed al Qaeda and the Taliban in less than ninety days after the Twin Towers fell. At the height of combat against the Taliban in late 2001, there were fewer than five hundred Americans on the ground in Afghanistan, a dynamic blend of CIA and Special Forces. The campaign changed the way America wages war. This book will change the way America views the CIA.The Art of Intelligence draws from the full arc of Crumpton's espionage and covert action exploits to explain what America's spies do and why their service is more valuable than ever. From his early years in Africa, where he recruited and ran sources, from loathsome criminals to heroic warriors; to his liaison assignment at the FBI, the CIA's Counterterrorism Center, the development of the UAV Predator program, and the Afghanistan war; to his later work running all CIA clandestine operations inside the United States, he employs enthralling storytelling to teach important lessons about national security, but also about duty, honor, and love of country.No book like The Art of Intelligence has ever been written-not with Crumpton's unique perspective, in a time when America faced such grave and uncertain risk. It is an epic, sure to be a classic in the annals of espionage and war.

Information is Beautiful


David McCandless - 2001
    We need a brand new way to take it all in. 'Information is Beautiful' transforms the ideas surrounding and swamping us into graphs and maps that anyone can follow at a single glance.

How America Lost Its Secrets: Edward Snowden, the Man and the Theft


Edward Jay Epstein - 2017
    After details of American government surveillance were published in 2013, Edward Snowden, formerly a subcontracted IT analyst for the NSA, became the center of an international controversy: Was he a hero, traitor, whistle-blower, spy? Was his theft legitimized by the nature of the information he exposed? When is it necessary for governmental transparency to give way to subterfuge? Edward Jay Epstein brings a lifetime of journalistic and investigative acumen to bear on these and other questions, delving into both how our secrets were taken and the man who took them. He makes clear that by outsourcing parts of our security apparatus, the government has made classified information far more vulnerable; how Snowden sought employment precisely where he could most easily gain access to the most sensitive classified material; and how, though he claims to have acted to serve his country, Snowden is treated as a prized intelligence asset in Moscow, his new home."

CRACK99: The Takedown of a $100 Million Chinese Software Pirate


David Locke Hall - 2015
    Navy intelligence officer, David Locke Hall was a federal prosecutor when a bizarre-sounding website, CRACK99, came to his attention. It looked like Craigslist on acid, but what it sold was anything but amateurish: thousands of high-tech software products used largely by the military, and for mere pennies on the dollar. Want to purchase satellite tracking software? No problem. Aerospace and aviation simulations? No problem. Communications systems designs? No problem. Software for Marine One, the presidential helicopter? No problem. With delivery times and customer service to rival the world’s most successful e-tailers, anybody, anywhere—including rogue regimes, terrorists, and countries forbidden from doing business with the United States—had access to these goods for any purpose whatsoever.But who was behind CRACK99, and where were they? The Justice Department discouraged potentially costly, risky cases like this, preferring the low-hanging fruit that scored points from politicians and the public. But Hall and his colleagues were determined to find the culprit. They bought CRACK99's products for delivery in the United States, buying more and more to appeal to the budding entrepreneur in the man they identified as Xiang Li. After winning his confidence, they lured him to Saipan—a U.S. commonwealth territory where Hall’s own father had stormed the beaches with the marines during World War II. There they set up an audacious sting that culminated in Xiang Li's capture and imprisonment. The value of the goods offered by CRACK99? A cool $100 million.An eye-opening look at cybercrime and its chilling consequences for national security, CRACK99 reads like a caper that resonates with every amazing detail.

Slow Train to Guantanamo: A Rail Odyssey Through Cuba in the Last Days of the Castros


Peter Millar - 2012
    Starting in the ramshackle but romantic capital of Havana, Peter Millar travels with ordinary Cubans, sharing anecdotes, life stories and political opinions to the far end of the island, the Guantanamo naval base and detention camp.

Structured Analytic Techniques For Intelligence Analysis


Richards J. Heuer Jr. - 2010
    Heuer Jr. and Randolph H. Pherson turn a lifetime of expertise toward formalizing, adapting, and standardizing a set of 50 of the most robust analytic techniques in use in intelligence analysis today. This ready reference showcases current and cutting-edge best practices and represents a significant leap forward in depth, detail, and utility from existing handbooks.Logically organized and richly illustrated, Structured Analytic Techniques makes it easy to navigate, reference, and put the tools to use right away. Each technique is clearly and systematically explained: when to use, value added, the method, potential pitfalls, examples of how it can be used, its relationship to other techniques, and its origins. THE TECHNIQUES Getting Started Checklist Customer Checklist Issue Redefinition Chronologies and Timelines Sorting Ranking, Scoring, Prioritizing Matrices Network Analysis Mind Maps and Concept Maps Process Maps and Gantt Charts Structured Brainstorming Virtual Brainstorming Nominal Group Technique Starbursting Cross-Impact Matrix Morphological Analysis Quadrant Crunching Basic Scenario Analysis Alternative Futures Analysis Multiple Scenario Generation Indicators Indicators Validator Simple Hypothesis Multiple Hypotheses Generator Quadrant Hypothesis Generation Diagnostic Reasoning Analysis of Competing Hypotheses Argument Mapping Deception Detection Key Assumptions Check Structured Analogies Role Playing Red Hat Analysis Outside-In Thinking Policy Outcomes Forecasting Model Prediction Markets Premortem Analysis Structured Self-Critique What If? Analysis High Impact/Low Probability Analysis Devil's Advocacy Red Team Analysis Delphi Method Adversarial Collaboration Structured Debate Complexity Manager Decision Matrix Force Field Analysis Pros-Cons-Faults-and-Fixes SWOT Analysis

Integrating Educational Technology Into Teaching


Margaret D. Roblyer - 1996
    It shows teachers how to create an environment in which technology can effectively enhance learning. It contains a technology integration framework that builds on research and the TIP model.

ServSafe Essentials


National Restaurant Association - 1999
    ServSafe(R) Essentials, 5th edition was designed with managers' needs in mind. This edition has been updated to reflect the changing needs of a diverse and expanding workforce in the foodservice and restaurant industry. The streamlined delivery of food safety content in the Fifth Edition will create a learning experience that is activity-based and easily comprehended by a variety of learners. The updated book will help readers prepare for examinations, and more importantly, it will promote adherence to food safety practices in the operation. Based on a new job task analysis revised exclusively for the Fifth Edition, the book reflects the latest updates to the "FDA Food Code," new science-based and industry best practices and prepares readers for the ServSafe(R) Food Protection Manager Certification Exam.

Reading Laurell K. Hamilton


Candace R. Benefiel - 2011
    Hamilton was reshaping the image of the vampire with her own take on the vampire mythos in her Anita Blake, Vampire Hunter fantasy novel series. While Hamilton's work draws on traditional vampire and fairy lore, her interpretation of these subjects brought new dimensions to the genres, influencing the direction of urban fantasy over the past two decades.Reading Laurell K. Hamilton focuses upon Hamilton's two bestselling series, the Anita Blake, Vampire Hunter series and the Merry Gentry series. The volume is intended as a resource for leaders of book clubs or discussion groups, containing chapters that examine Hamilton's role in the current vampire literature craze, the themes and characters in her work, and responses to Hamilton on the Internet. The book also provides a brief overview of Hamilton's life.

Sinatra: Up and Running


Alan Harris - 2011
    With this concise book, you will quickly gain working knowledge of Sinatra and its minimalist approach to building both standalone and modular web applications. Sinatra serves as a lightweight wrapper around Rack middleware, with syntax that maps closely to functions exposed by HTTP verbs, which makes it ideal for web services and APIs. If you have experience building applications with Ruby, you’ll quickly learn language fundamentals and see under-the-hood techniques, with the help of several practical examples. Then you’ll get hands-on experience with Sinatra by building your own blog engine. Learn Sinatra’s core concepts, and get started by building a simple application Create views, manage sessions, and work with Sinatra route definitions Become familiar with the language’s internals, and take a closer look at Rack Use different subclass methods for building flexible and robust architectures Put Sinatra to work: build a blog that takes advantage of service hooks provided by the GitHub API

Germs: Biological Weapons and America's Secret War


Judith Miller - 2001
    In Germs, three veteran reporters draw on top sources inside and outside the U.S. government to lay bare Washington's secret strategies for combating this deadly threat.Featuring an inside look at how germ warfare has been waged throughout history and what form its future might take (and in whose hands), Germs reads like a gripping detective story told by fascinating key figures: American and Soviet medical specialists who once made germ weapons but now fight their spread, FBI agents who track Islamic radicals, the Iraqis who built Saddam Hussein's secret arsenal, spies who travel the world collecting lethal microbes, and scientists who see ominous developments on the horizon. With clear scientific explanations and harrowing insights, Germs is a masterfully written—and timely—work of investigative journalism.

The Ten Ancient Scrolls for Success


Og Mandino - 1997
    Handy pocket-sized edition.

Rack, Rope and Red-Hot Pincers: A History of Torture and Its Instruments


Geoffrey Abbott - 1993
    This bloodcurdling account of instruments of torture through the ages includes descriptions of cells too cramped to allow for lying down, skull crushers, the pendulum, the gridiron, and other gruesome devices.

Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door


Brian Krebs - 2014
    Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies and countless viruses, phishing, and spyware attacks he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.Blending cutting-edge research, investigative reporting, and firsthand interviews, this terrifying true story reveals how we unwittingly invite these digital thieves into our lives every day. From unassuming computer programmers right next door to digital mobsters like "Cosma" who unleashed a massive malware attack that has stolen thousands of Americans' logins and passwords, Krebs uncovers the shocking lengths to which these people will go to profit from our data and our wallets.Not only are hundreds of thousands of Americans exposing themselves to fraud and dangerously toxic products from rogue online pharmacies, but even those who never open junk messages are at risk. As Krebs notes, spammers can—and do—hack into accounts through these emails, harvest personal information like usernames and passwords, and sell them on the digital black market. The fallout from this global epidemic doesn't just cost consumers and companies billions, it costs lives too.Fast-paced and utterly gripping, Spam Nation ultimately proposes concrete solutions for protecting ourselves online and stemming this tidal wave of cybercrime, before it's too late."Krebs's talent for exposing the weaknesses in online security has earned him respect in the IT business and loathing among cybercriminals. His track record of scoops has helped him become the rare blogger who supports himself on the strength of his reputation for hard-nosed reporting." Bloomberg Businessweek