{"id":3683,"date":"2026-01-03T23:42:33","date_gmt":"2026-01-03T23:42:33","guid":{"rendered":"https:\/\/epub-book.com\/download\/crime-classification-manual-douglas-john\/"},"modified":"2026-01-03T23:42:33","modified_gmt":"2026-01-03T23:42:33","slug":"crime-classification-manual-douglas-john","status":"publish","type":"post","link":"https:\/\/epub-book.com\/download\/crime-classification-manual-douglas-john\/","title":{"rendered":"Crime Classification Manual &#8211; Douglas, John"},"content":{"rendered":"<div class='book-preview'>\n<h3>Book Preview<\/h3>\n<div>\n<p class=\"toctitle\">Contents<\/p>\n<p class=\"contentschaptertitle\">Cover<\/p>\n<p class=\"contentschaptertitle\">Title Page<\/p>\n<p class=\"contentschaptertitle\">Copyright<\/p>\n<p class=\"contentschaptertitle\">Dedication<\/p>\n<p class=\"contentschaptertitle\">Preface<\/p>\n<p class=\"contentsparttitle\">Part I: Crime Analysis and Investigation<\/p>\n<p class=\"contentschaptertitle\">Chapter 1: Crime Classification: Past and Present<\/p>\n<p class=\"contentsh1\">Historical Perspective<\/p>\n<p class=\"contentsh1\">Crime Characteristics and Crime Classification Today<\/p>\n<p class=\"contentsh1\">Crime Classification: The Decision Process<\/p>\n<p class=\"contentsh1\">Classification by Type, Style, and Number of Victims<\/p>\n<p class=\"contentsh1\">Crime Classification Numbering System<\/p>\n<p class=\"contentsh1\">References<\/p>\n<p class=\"contentschaptertitle\">Chapter 2: Criminal Investigative Concepts in Crime Scene Analysis<\/p>\n<p class=\"contentsh1\">The Assessment<\/p>\n<p class=\"contentsh1\">The Modus Operandi<\/p>\n<p class=\"contentsh1\">The Signature Aspect<\/p>\n<p class=\"contentsh1\">Modus Operandi or Signature?<\/p>\n<p class=\"contentsh1\">Linking Cases<\/p>\n<p class=\"contentsh1\">Cases Linked by Offender Signature<\/p>\n<p class=\"contentsh1\">Serial Killers and Signature Crime<\/p>\n<p class=\"contentsh1\">Personation<\/p>\n<p class=\"contentsh1\">Staging<\/p>\n<p class=\"contentsh1\">Objectivity<\/p>\n<p class=\"contentsh1\">Conclusion<\/p>\n<p class=\"contentsh1\">References<\/p>\n<p class=\"contentschaptertitle\">Chapter 3: The Impact of the Internet, Technology, and Forensics on Crime Investigation<\/p>\n<p class=\"contentsh1\">Internet Serial Murder Case: John E. Robinson Sr.<\/p>\n<p class=\"contentsh1\">Advances in Technology<\/p>\n<p class=\"contentsh1\">Advances in Forensics<\/p>\n<p class=\"contentsh1\">Solving Homicides by Virtual Crime Scene Analysis<\/p>\n<p class=\"contentsh1\">Conclusion<\/p>\n<p class=\"contentsh1\">References<\/p>\n<p class=\"contentschaptertitle\">Chapter 4: Local, Federal, and International Agencies<\/p>\n<p class=\"contentsh1\">Types of U.S. Law Enforcement Agencies<\/p>\n<p class=\"contentsh1\">Federal Bureau of Investigation (FBI)<\/p>\n<p class=\"contentsh1\">FBI&#8217;s Behavior Science Unit<\/p>\n<p class=\"contentsh1\">History of VICAP<\/p>\n<p class=\"contentsh1\">VICAP&#8217;S Mission<\/p>\n<p class=\"contentsh1\">VICAP Case Types<\/p>\n<p class=\"contentsh1\">VICAP Today<\/p>\n<p class=\"contentsh1\">Additional Federal Agencies<\/p>\n<p class=\"contentsh1\">International Agencies<\/p>\n<p class=\"contentsh1\">Combating Cybercrime<\/p>\n<p class=\"contentsh1\">Conclusion<\/p>\n<p class=\"contentsh1\">References<\/p>\n<p class=\"contentschaptertitle\">Chapter 5: Classifying Crimes by Severity From Aggravators to Depravity<\/p>\n<p class=\"contentsh1\">The Crime<\/p>\n<p class=\"contentsh1\">The Appeal<\/p>\n<p class=\"contentsh1\">Aggravators Relating to the Crime Itself<\/p>\n<p class=\"contentsh1\">A Framework for Defining the Worst of Crimes<\/p>\n<p class=\"contentsh1\">Toward a Depravity Standard for Criminal Sentencing<\/p>\n<p class=\"contentsh1\">Defining the Depravity Standard Items: Implications for Investigators<\/p>\n<p class=\"contentsh1\">Using the Depravity Standard<\/p>\n<p class=\"contentsh1\">References<\/p>\n<p class=\"contentsparttitle\">Part II: The Classifications<\/p>\n<p class=\"contentschaptertitle\">Chapter 6: Criminal Enterprise Homicide<\/p>\n<p class=\"contentsh1\">The Uniform Crime Reporting Program<\/p>\n<p class=\"contentsh1\">Homicide Classification by Victims, Type, and Style<\/p>\n<p class=\"contentsh1\">Investigative Profiling<\/p>\n<p class=\"contentsh1\">CCM: A Motivational Model for Classification of Homicide<\/p>\n<p class=\"contentsh1\">100: Criminal Enterprise<\/p>\n<p class=\"contentsh1\">101: Contract Murder (Third Party)<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">102: Gang-Motivated Murder<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Common Forensic Findings<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">103: Criminal Competition<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Common Forensic Findings<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">104: Kidnap Murder<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">105: Product Tampering<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">106: Drug Murder<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">107: Insurance-Related Death<\/p>\n<p class=\"contentsh1\">107.01: Individual Profit<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">107.02: Commercial Profit<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">108: Felony Murder<\/p>\n<p class=\"contentsh1\">108.01: Indiscriminate Murder<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">108.02: Situational Murder<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">References<\/p>\n<p class=\"contentschaptertitle\">Chapter 7: Personal Cause Homicide<\/p>\n<p class=\"contentsh1\">120: Personal Cause Homicide<\/p>\n<p class=\"contentsh1\">121: Erotomania-Motivated Murder<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">122: Domestic Homicide<\/p>\n<p class=\"contentsh1\">122.01: Spontaneous Domestic Homicide<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">122.02: Staged Domestic Homicide<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">122.03: Neonaticide<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Common Forensic Findings<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">123: Argument\/Conflict Murder<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">123.01: Argument Murder<\/p>\n<p class=\"contentsh1\">123.02: Conflict Murder<\/p>\n<p class=\"contentsh1\">124: Authority Murder<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">125: Revenge<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">126: Nonspecific Motive Murder<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentschaptertitle\">Chapter 8: Sexual Homicide<\/p>\n<p class=\"contentsh1\">130: Sexual Homicide<\/p>\n<p class=\"contentsh1\">131: Sexual Homicide, Organized<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">132: Sexual Homicide, Disorganized<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">133: Sexual Homicide, Mixed<\/p>\n<p class=\"contentsh1\">134: Sexual Homicide, Sadistic<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">135: Elder Female Sexual Homicide<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Considerations<\/p>\n<p class=\"contentsh1\">References<\/p>\n<p class=\"contentschaptertitle\">Chapter 9: Extremist and Medical Homicide<\/p>\n<p class=\"contentsh1\">127: Individual Extremist Homicide<\/p>\n<p class=\"contentsh1\">Extremist Typologies<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">127.02: Religion-Inspired Homicide<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">128: Medical Murders<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">128.01: Pseudo-Mercy Homicide<\/p>\n<p class=\"contentsh1\">128.02: Pseudo-Hero Homicide<\/p>\n<p class=\"contentsh1\">References<\/p>\n<p class=\"contentschaptertitle\">Chapter 10: Group Cause Homicide<\/p>\n<p class=\"contentsh1\">140: Group Cause Homicide<\/p>\n<p class=\"contentsh1\">141: Group Cause Homicide, Cult<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">142: Extremist Homicide<\/p>\n<p class=\"contentsh1\">Extremist Groups Using the Internet<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">142.01: Extremist Homicide, Political<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">143: Group Excitement<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentschaptertitle\">Chapter 11: Arson\/Bombing<\/p>\n<p class=\"contentsh1\">11.1 Arson: General Characteristics<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">200: Vandalism-Motivated Arson<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">210: Excitement-Motivated Arson<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">220: Revenge-Motivated Arson<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">230: Crime Concealment Arson<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">240: Profit-Motivated Arson<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">250: Extremist-Motivated Arson<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">251: Extremist-Motivated Arson, Terrorism<\/p>\n<p class=\"contentsh1\">260: Serial Arson<\/p>\n<p class=\"contentsh1\">Serial Arsonist and MO<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">270: Serial Bombing<\/p>\n<p class=\"contentschaptertitle\">Chapter 12: Rape and Sexual Assault<\/p>\n<p class=\"contentsh1\">Victim Contact<\/p>\n<p class=\"contentsh1\">Fixation<\/p>\n<p class=\"contentsh1\">General Forensic Evidence Collections<\/p>\n<p class=\"contentsh1\">300: Criminal Enterprise Rape<\/p>\n<p class=\"contentsh1\">301: Felony Rape<\/p>\n<p class=\"contentsh1\">301.01: Primary Felony Rape<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">301.02: Secondary Felony Rape<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">310: Personal Cause Sexual Assault<\/p>\n<p class=\"contentsh1\">311: Indirect Offenses<\/p>\n<p class=\"contentsh1\">311.01: Isolated\/Opportunistic Offense<\/p>\n<p class=\"contentsh1\">311.02: Preferential Offense<\/p>\n<p class=\"contentsh1\">311.03: Transition Offense<\/p>\n<p class=\"contentsh1\">311.04: Preliminary Offense<\/p>\n<p class=\"contentsh1\">312: Domestic Sexual Assault<\/p>\n<p class=\"contentsh1\">312.01: Adult Domestic Sexual Assault<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">312.02: Child Domestic Sexual Abuse<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">313: Opportunistic Rape<\/p>\n<p class=\"contentsh1\">Sexualization Motive<\/p>\n<p class=\"contentsh1\">Sadistic Types<\/p>\n<p class=\"contentsh1\">Nonsadistic Types<\/p>\n<p class=\"contentsh1\">Vindictive Motivation<\/p>\n<p class=\"contentsh1\">313.01: Social Acquaintance Rape<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">313.02: Authority Rape<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigation<\/p>\n<p class=\"contentsh1\">Search Warrant Considerations<\/p>\n<p class=\"contentsh1\">313.02.03: Authority Rape, Child<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">313.03: Power\u2013Reassurance Rape<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">313.03.02: Power\u2013Reassurance Rape, Adolescent<\/p>\n<p class=\"contentsh1\">313.04: Exploitative Rape<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">314: Anger Rape<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">314.01: Anger Rape, Gender<\/p>\n<p class=\"contentsh1\">314.02: Anger Rape, Age<\/p>\n<p class=\"contentsh1\">314.02.01: Anger Rape, Elderly Victim<\/p>\n<p class=\"contentsh1\">314.02.02: Anger Rape, Child Victim<\/p>\n<p class=\"contentsh1\">314.03: Anger Rape, Racial<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">314.04: Anger Rape, Global<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">315: Sadistic Rape<\/p>\n<p class=\"contentsh1\">Comparison of Rapist Types<\/p>\n<p class=\"contentsh1\">315.01: Sadistic Rape, Adult<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">315.02: Sadistic Rape, Adolescent<\/p>\n<p class=\"contentsh1\">315.04: Sadistic Rape, Elder<\/p>\n<p class=\"contentsh1\">319: Abduction Rape<\/p>\n<p class=\"contentsh1\">330: Group-Cause Sexual Assault<\/p>\n<p class=\"contentsh1\">331: Formal Gang Sexual Assault<\/p>\n<p class=\"contentsh1\">332: Informal Gang Sexual Assault<\/p>\n<p class=\"contentsh1\">333: Military Sexual Trauma<\/p>\n<p class=\"contentsh1\">333.01: Military Sexual Harassment<\/p>\n<p class=\"contentsh1\">333.02: Military Sexual Assault\/Rape<\/p>\n<p class=\"contentsh1\">390: Sexual Assault Not Classified Elsewhere<\/p>\n<p class=\"contentsh1\">References<\/p>\n<p class=\"contentschaptertitle\">Chapter 13: Nonlethal Crimes<\/p>\n<p class=\"contentsh1\">400: Nonlethal Crimes<\/p>\n<p class=\"contentsh1\">401: Communication Threats<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">401.01: Direct Threats<\/p>\n<p class=\"contentsh1\">401.02: Indirect Threats<\/p>\n<p class=\"contentsh1\">401.03: Conditional Threats<\/p>\n<p class=\"contentsh1\">401.04: Nonspecific Threats<\/p>\n<p class=\"contentsh1\">402: Threat Delivery<\/p>\n<p class=\"contentsh1\">402.01: Threat Delivery, Visual Communication<\/p>\n<p class=\"contentsh1\">402.02: Threat Delivery, Verbal Communication<\/p>\n<p class=\"contentsh1\">402.03: Threat Delivery, Written Communication<\/p>\n<p class=\"contentsh1\">402.03.01: Letter Threat<\/p>\n<p class=\"contentsh1\">402.03.02: Symbolic Threat<\/p>\n<p class=\"contentsh1\">402.04: Physical Communication Threats<\/p>\n<p class=\"contentsh1\">410: Stalking Crimes<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">411: Domestic Stalker<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">412: Nondomestic Stalker<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">413: Erotomania Stalker<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">420: Robbery<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">421: Bank Robbery<\/p>\n<p class=\"contentsh1\">422: Home Invasion Robbery<\/p>\n<p class=\"contentsh1\">Criminal Profile<\/p>\n<p class=\"contentsh1\">Dangerous Trends<\/p>\n<p class=\"contentsh1\">Method of Operation<\/p>\n<p class=\"contentsh1\">430: Burglary<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigation Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">440: Assault<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">450: Battery\/Abuse<\/p>\n<p class=\"contentsh1\">Reference<\/p>\n<p class=\"contentschaptertitle\">Chapter 14: Computer Crimes<\/p>\n<p class=\"contentsh1\">500: Computer Crimes<\/p>\n<p class=\"contentsh1\">510: Computers as the Target<\/p>\n<p class=\"contentsh1\">511: Malignant Software<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">512: Computer Data as the Target<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">513: Denial of Service<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">520: The Computer User as the Target<\/p>\n<p class=\"contentsh1\">521: Identity Theft<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">522: Invasion of Privacy<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">523: Cyberstalking<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">524: Crimes<\/p>\n<p class=\"contentsh1\">524.1: Online Solicitation of Children<\/p>\n<p class=\"contentsh1\">524.2: Child Pornography<\/p>\n<p class=\"contentsh1\">524.2.1: Possession of Child Pornography<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">524.2.2: Distribution of Child Pornography<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">524.2.3: Production of Child Pornography<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">530: Criminal Enterprise<\/p>\n<p class=\"contentsh1\">White-Collar Crime<\/p>\n<p class=\"contentsh1\">531: Money Laundering<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">532: Child Pornography<\/p>\n<p class=\"contentsh1\">533: Internet Fraud<\/p>\n<p class=\"contentsh1\">533.01: Bank Fraud<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">533.02: Fraudulent Internet Transactions<\/p>\n<p class=\"contentsh1\">540: Threats via the Internet<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">541: Internet-Initiated Homicide<\/p>\n<p class=\"contentsh1\">543: Cybergangs<\/p>\n<p class=\"contentsh1\">References<\/p>\n<p class=\"contentschaptertitle\">Chapter 15: Increased Globalization of Crime<\/p>\n<p class=\"contentsh1\">600: Global Crimes<\/p>\n<p class=\"contentsh1\">601: Illegal Migration<\/p>\n<p class=\"contentsh1\">601.01: Autonomous Migrant Entries<\/p>\n<p class=\"contentsh1\">601.01: Human Trafficking<\/p>\n<p class=\"contentsh1\">Exploitation<\/p>\n<p class=\"contentsh1\">Types of Trafficking Operations<\/p>\n<p class=\"contentsh1\">Process of Trafficking Migrants<\/p>\n<p class=\"contentsh1\">601.01.01: Trafficking Migrants<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">Human Smuggling<\/p>\n<p class=\"contentsh1\">601.01.02: Human Smuggling<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">601.02: Visa Overstayer<\/p>\n<p class=\"contentsh1\">602: Cross-Border Organized Crime<\/p>\n<p class=\"contentsh1\">602.01: Cigarette Smuggling<\/p>\n<p class=\"contentsh1\">602.02: Cross-Border Smuggling of Weapons<\/p>\n<p class=\"contentsh1\">602.03: Trafficking of Narcotics<\/p>\n<p class=\"contentsh1\">603: Biological Attacks and Bioterrorism<\/p>\n<p class=\"contentsh1\">603.01: Biological Attacks<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">604: Chemical Attacks and Terrorism<\/p>\n<p class=\"contentsh1\">604.01: Chemical Attacks<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">605: Hostage Taking<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">606: Bombings and Explosive Attacks and Terrorism<\/p>\n<p class=\"contentsh1\">606.01: Explosive Attacks and Terrorism<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">607: Aerial Hijackings<\/p>\n<p class=\"contentsh1\">Defining Characteristics<\/p>\n<p class=\"contentsh1\">Investigative Considerations<\/p>\n<p class=\"contentsh1\">Search Warrant Suggestions<\/p>\n<p class=\"contentsh1\">References<\/p>\n<p class=\"contentschaptertitle\">Chapter 16: Mass and Serial Homicide<\/p>\n<p class=\"contentsh1\">Mass Murder<\/p>\n<p class=\"contentsh1\">Serial Murder<\/p>\n<p class=\"contentsh1\">References<\/p>\n<p class=\"contentschaptertitle\">Chapter 17: Poison and Biological Agents as Weapons<\/p>\n<p class=\"contentsh1\">Poisoning<\/p>\n<p class=\"contentsh1\">Biological Agents as Weapons<\/p>\n<p class=\"contentsh1\">Moving Forward<\/p>\n<p class=\"contentsh1\">References<\/p>\n<p class=\"contentsparttitle\">Part III: Legal Issues<\/p>\n<p class=\"contentschaptertitle\">Chapter 18: Interviewing, Interrogation, and Criminal Confessions<\/p>\n<p class=\"contentsh1\">The Prosecution&#8217;s Arsenal<\/p>\n<p class=\"contentsh1\">Preparing for the Prescriptive Interview<\/p>\n<p class=\"contentsh1\">Challenges to Confessions (FBI, 2002)<\/p>\n<p class=\"contentsh1\">Category 1: Behavior<\/p>\n<p class=\"contentsh1\">Category 2: Traits<\/p>\n<p class=\"contentsh1\">Category 3: Statements<\/p>\n<p class=\"contentsh1\">Category 4: Options<\/p>\n<p class=\"contentsh1\">Category 5: Consequences<\/p>\n<p class=\"contentsh1\">Personal Dignity<\/p>\n<p class=\"contentsh1\">Conclusion<\/p>\n<p class=\"contentsh1\">References<\/p>\n<p class=\"contentschaptertitle\">Chapter 19: Wrongful Convictions: Causes, Solutions, and Case Studies<\/p>\n<p class=\"contentsh1\">False Confessions<\/p>\n<p class=\"contentsh1\">Junk Science<\/p>\n<p class=\"contentsh1\">Overzealous Prosecution<\/p>\n<p class=\"contentsh1\">Conclusion<\/p>\n<p class=\"contentsh1\">References<\/p>\n<p class=\"contentschaptertitle\">About the Editors<\/p>\n<p class=\"contentschaptertitle\">About the Contributors<\/p>\n<p class=\"contentschaptertitle\">Citation Index<\/p>\n<p class=\"contentschaptertitle\">Name Index<\/p>\n<p class=\"contentschaptertitle\">Subject Index<\/p>\n<\/div>\n<\/div>\n<hr style='margin: 30px 0; border-top: 1px solid #eee;'>\n<p style='text-align:center;'>Read the full book by downloading it below.<\/p>\n<p><a href='https:\/\/epub-book.com\/download\/download-is-starting\/?url=https%3A\/\/mega.co.nz\/%23%211pYmjLqR%21tb-G4PD3QKKi2q07y57lq09EAHMWupoJBDyxOmmYKPU' class='download-btn' target='_blank'>DOWNLOAD EPUB<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Book Preview Contents Cover Title Page Copyright Dedication Preface Part I: Crime Analysis and Investigation Chapter 1: Crime Classification: Past and Present Historical Perspective Crime Characteristics and Crime Classification Today Crime Classification: The Decision Process Classification by Type, Style, and Number of Victims Crime Classification Numbering System References Chapter 2: Criminal Investigative Concepts in Crime &#8230; <a title=\"Crime Classification Manual &#8211; Douglas, John\" class=\"read-more\" href=\"https:\/\/epub-book.com\/download\/crime-classification-manual-douglas-john\/\" aria-label=\"Read more about Crime Classification Manual &#8211; Douglas, John\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":3682,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[206],"class_list":["post-3683","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-john-douglas"],"_links":{"self":[{"href":"https:\/\/epub-book.com\/download\/wp-json\/wp\/v2\/posts\/3683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/epub-book.com\/download\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/epub-book.com\/download\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/epub-book.com\/download\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/epub-book.com\/download\/wp-json\/wp\/v2\/comments?post=3683"}],"version-history":[{"count":0,"href":"https:\/\/epub-book.com\/download\/wp-json\/wp\/v2\/posts\/3683\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/epub-book.com\/download\/wp-json\/wp\/v2\/media\/3682"}],"wp:attachment":[{"href":"https:\/\/epub-book.com\/download\/wp-json\/wp\/v2\/media?parent=3683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/epub-book.com\/download\/wp-json\/wp\/v2\/categories?post=3683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/epub-book.com\/download\/wp-json\/wp\/v2\/tags?post=3683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}