Art Bowker began his career in criminal justice as a probation officer for the Cuyahoga County Adult Probation Department.  In 1989, he went to work as a law enforcement investigator for the US Department of Labor where he was responsible for financial investigations of labor organizations.   Currently, he is a Special Offender Specialist focusing on cybercrime.   An expert in cybercrime, he has been both the Secretary and President of the High Technology Crime Investigation Association.  Art Bowker is the author of The Cybercrime Handbook for Community Corrections: Managing Offender Risk in the 21st Century.

According to the book description of The Cybercrime Handbook for Community Corrections: Managing Offender Risk in the 21st Century, “In the early 1990s, professionals began to question how to address offender computer use while on supervision, but in the past ten years, tools emerged that were specifically developed for triage and field forensics. As these were rapidly embraced, it was still unclear what professionals could look for, how to look for it, and how to interpret what they found. This unique book resolves those issues. The book provides a clear outline of what can and should be done regarding the management of offender computer use. Not only does the text help community corrections professionals understand how to monitor computer use, but it helps realize how information gained during monitoring can assist in overall case management. The book takes the reader through all the paces of managing offender cyber-risk and is meant specifically for pretrial, probation, parole, and community sanction officers. The chapters are organized by major areas, such as community corrections and cyberspace, understanding the options, condition legality, operational legality, accessing cyber-risk, computer education, principles of effective computer monitoring, search and seizure, deploying monitoring software, and online investigations. Additionally, numerous appendices provide a wealth of information regarding model forms, questionnaires, and worksheets. This book moves the reader toward a more informed use of the technology that is now readily available to effectively manage offenders’ digital behavior.”

Police Books

Computer and Cyber Crime Investigations

Home | By Police Department | By Police Officer | By Police Subjects | Law Enforcement Books by State | Other Law Enforcement Writers | Watering Hole | Poetry, Prayers & Articles | Police Leadership | Police Officer Gifts | Police Training | FAQs | Resource Directory | Contact Us | Site Map


Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Anthony Reyes  More Info

Richard Brittson is a retired Detective with the New York City Police Departments Computer Crimes Squad. He has been a panelist at several conferences including Gartner 2004 and RSA 2005. He is a board member of Northeast Chapter of the High Technology Crime Investigation Association, and was a co-recipient of the 2004 HTCIA Case of the Year.

 

Anthony Reyes is a retired Detective with the New York City Police Departments Computer Crimes Squad. During his assignment with the Computer Crimes Squad, he investigated computer intrusion, fraud, identity theft, child exploitation, and software piracy. Detective Reyes previously sat as an alternate member of New York Governor George E. Pataki's Cyber-Security Task Force. Mr. Reyes is a member of the New York State Internet Crimes Against Children Taskforce. He is also a member of the National Institute of Justice Electronic Crime Partnership Initiative (ECPI). Additionally, he is a member of the High Technology Crime Investigation Association (HTCIA), and served as the President in 2005 of the Associations Northeast Chapter.  Anthony Reyes and Richard Brittson are the co- authors of Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors.

 

According to the book description of Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors, “The book begins with the chapter What is Cyber Crime? This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. Issues relating to cyber crime definitions, the electronic crime scene, computer forensics, and preparing and presenting a cyber crime investigation in court will be examined. Not only will these topics be generally be discussed and explained for the novice, but the hard questions the questions that have the power to divide this community will also be examined in a comprehensive and thoughtful manner. This book will serve as a foundational text for the cyber crime community to begin to move past current difficulties into its next evolution.”


Police Technology
Raymond E. Foster  More Info

Raymond E. Foster was a sworn member of the Los Angeles Police Department for 24 years.  He retired in 2003 at the rank of Lieutenant.  He holds a bachelor’s from the Union Institute and University in Criminal Justice Management and a Master’s Degree in Public Financial Management from California State University, Fullerton.  He is near the end of his doctoral studies in business research. Raymond is a graduate of the West Point Leadership program and has attended law enforcement, technology and leadership programs such as the National Institute for Justice, Technology Institute, Washington, DC.

 

Raymond is currently a part-time lecturer at California State University, Fullerton and the Union Institute and University.  He has experience teaching upper division courses in law enforcement, public policy, technology and leadership.  Raymond is an experienced author who has published numerous articles in a wide range of venues including magazines such as Government Technology, Mobile Government, Airborne Law Enforcement Magazine, and Police One.  He has appeared on the History Channel and radio programs in the United States and Europe as subject matter expert in technological applications in law enforcement.  For instance, he was recently interviewed by the London Independent on the use of cellular telephone technology in explosive devices.

 

His first book, “Police Technology (Prentice Hall, July 2004)” is used in over 40 colleges and universities nationwide.  Raymond has two additional contracts with Prentice Hall to publish works on global terrorism and an introduction to policing.  As an outgrowth of his writing, Raymond maintains two websites and acts as the editor of a monthly newsletter with a growing subscriber base.  


Pocket Guide To Identity Theft
Lou Savelli  More Info

Lou Savelli, who has spent all of his 23 years in law enforcement in the streets, is one of the most decorated officers in NYPD history and has received over 100 medals for bravery, outstanding police work, life saving rescues, and record setting investigations. He retired in 2004 as the Detective Squad Commander of the NYPD's Terrorism Interdiction Unit, which he co-founded after 9-11-01 as a proactive counter-terrorism investigative unit responsible to aggressively seek out and investigate terrorist cells in New York.

 

Lou Savelli was chosen as one of the top 10 of NYPD's most effective leaders of all ranks (out of nearly 20,000 qualified supervisors) and the first supervisor featured in NYPD's Leadership Training School newsletter because of his innovation and success in the field of leadership. He created NYPD's first citywide gang unit called CAGE (Citywide Anti Gang Enforcement) which was awarded the National Gang Crime Research Center's award for The Most Effective Gang Unit in the US.  Lou Savelli is the author of eight books in the “Pocket Guide Series:” Guide to Basic Crime Scene Investigation; Gangs Across American and the Symbols; Graffiti Pocket Guide; Street Drugs Pocket Guide; Practical Spanish for Law Enforcement; Identity Theft; Cop Jokes; and A Proactive Law Enforcement Guide for the War on Terror.

 

According to the description of Identity Theft, “From understanding the basics of ID theft and learning to spot ID theft situations to knowing the specific questions to ask a theft victim and using documentation to enhance prosecutorial efforts, this pocket-sized gem gives you quick reference to the basics of handling this fast-growing crime. Includes specific crime report samples; financial dispute letters for victims use; listings of state and federal statutes relevant to ID theft; plus specific prevention methods that even you should use.”


Investigating High-Tech Crime
Michael Knetzger  More Info

Michael R. Knetzger is a fourteen-year law enforcement veteran and currently a Lieutenant and Field Training Supervisor with the Green Bay Police Department (Wisconsin). Michael Knetzger began his law enforcement career as a patrol officer and detective for the Town of Brookfield Police Department.  He is a certified State of Wisconsin Technical College Instructor and teaches criminal justice courses at Northeast Wisconsin Technical College, Colorado Technical University Online and ITT Technical Institute. 

 

Michael Knetzger has successfully completed the International Association of Computer Investigative Specialists forensic examiner program, Basic Data Recovery & Analysis course, and several other courses and seminars on investigating internet crimes.  He is also a certified tactical instructor and teaches defensive and arrest tactics, firearms, and professional communications skills courses to new law enforcement recruits.  Michael Knetzger has a BA in Justice and Public Policy and a Masters in Public Administration.  He is the co-author of True Crime in Titletown, USA: Cold Cases and Investigating High-Tech Crime.

 

Jeremy A. Muraski is an eight-year law enforcement veteran and currently an Advanced Patrol Officer, Webmaster and Field Training Officer with the Green Bay Police Department (Wisconsin).  He has worked as a Network Administrator for Kimberly Clark Corporation and at various jobs as a Computer Support Engineer and Help Desk Specialist supporting online investors for Fidelity Investments.  Jeremy A. Muraski is certified to teach for The Wisconsin Technical College System and teaches criminal justice courses at Northeast Wisconsin Technical College, including Investigating High Tech Crimes, and Juvenile Law. 

 

Jeremy A. Muraski has completed AccessData's Forensic Toolkit Course, the National White Collar Crime Center's Basic Data Recovery & Analysis (BDRA) course, and several other courses and seminars on investigating Internet crimes. In addition to having developed college level course work in computer crime, he holds a number of computer certifications such as Microsoft Access Database Design and Administration and Website Design and Computer Network Administration. Jeremy Muraski is a co-author of Investigating High-Tech Crime.

 

Dave Pettinari, Colorado State University, said of Investigating High-Tech Crime, “Computers have become an integral part of our daily lives.  It should come as no surprise that the criminal minds have turned to computers and the Internet to commit crimes.  New crimes and criminals are enduring as each new technology is introduced. This text never loses touch with the reality that not every investigator is computer savvy, while still offering advanced knowledge in an easy to understand manner.  Everything is based upon a building block approach, with each chapter forming a foundation for the next.  Written in everyday language, this text demystifies the often complex world of computer technology, translating it into a format that can be easily understood by a computer novice, while striving to incorporate concepts and references useful for the experienced investigator.  It doesn’t end there, it continues with exploring high-tech crimes demonstrating all of the tools and methods used by criminals, while teaching the techniques used by investigators to catch and prosecute them.”

© 2011 - 2014 High Priority Targeting, Inc.

 

Criminal Justice Online

Home/Join | List | Next | Previous | Random

Sponsored by Criminal Justice Online

2006 Hi Tech Criminal Justice, Raymond E. Foster

Disclaimer