Irish Travellers have never enjoyed a higher profile, at home and abroad, for good reasons and bad. On the one hand are the positive stories like the success of boxers such as John Joe Nevin and Tyson Fury, the popularity of Big Fat Gypsy Wedding and Paddy Doherty’s victory on Celebrity Big Brother. On the other are controversial news stories such as the Dale Farm stand-off and the recent convictions for slavery. Gypsy Empire delves into the heart of Traveller life, focusing on three aspects that have coloured perceptions of Travellers among the wider community: family feuds, bare-knuckle fights and trading. Many Irish Travellers are driven by the need to prove their status among their own, a powerful instinct epitomised by those who engage in brutal bare-knuckle fights. These bouts are fuelled by family feuds which sometimes erupt in vicious acts of violence. We meet many colourful characters, among them some of the world’s most prolific and gifted criminals, their self-reliance providing an edge over other crime gangs. This is a golden era for the Traveller clans which are expanding and growing like never before. Gypsy Empire takes the reader inside the hidden world of Irish Travellers.
A new investigation into the 1641 Irish rebellion, contrasting its myth with the reality. After an evening spent drinking with Irish conspirators, an inebriated Owen Connelly confessed to the main colonial administrators in Ireland that a plot was afoot to root out and destroy Ireland's English and Protestant population. Within days English colonists in Ireland believed that a widespread massacre of Protestant settlers was taking place. Desperate for aid, they began to canvass their colleagues in England for help, claiming that they were surrounded by an evil popish menace bent on destroying their community. Soon sworn statements, later called the 1641 depositions, confirmed their fears (despite little by way of eye-witness testimony). In later years, Protestant commentators could point to the 1641 rebellion as proof of Catholic barbarity and perfidy. However, as the author demonstrates, despite some of the outrageous claims made in the depositions, the myth of 1641 became more important than the reality. The aim of this book is to investigate how the rebellion broke out and whether there was a meaning in the violence which ensued. It also seeks to understand how the English administration in Ireland portrayed these events to the wider world, and to examine whether and how far their claims were justified. Did they deliberately construct a narrative of death and destruction that belied what really happened? An obvious, if overlooked, contextis that of the Atlantic world; and particular questions asked are whether the English colonists drew upon similar cultural frameworks to describe atrocities in the Americas; how this shaped the portrayal of the 1641 rebellion incontemporary pamphlets; and the effect that this had on the wider Wars of the Three Kingdoms between England, Ireland and Scotland. EAMON DARCY is an Irish Research Council Postdoctoral Fellow working at Maynooth University, Republic of Ireland.
The book discusses some basics about computer security and some of the strategies that personal computer users take to try to keep their machine safe. It also discusses the dangers that many people and governments face from people misusing computer resources and some of the strategies that the United States Federal Government is taking to help keep its citizens safe. The book also robotics used from a distance to help disabled people recreate and work across countries.
Approximately 80 percent of the worlds population now owns a cell phone, which can hold evidence or contain logs about communications concerning a crime. Cameras, PDAs, and GPS devices can also contain information related to corporate policy infractions and crimes. Aimed to prepare investigators in the public and private sectors, Digital Forensics
This book describes the history of video games and shows their evolution to the present. We survey a variety of common vintage Atari and Coleco games that can be used as part of a computer recreation plan for the disabled, senior citizens, and anyone else who wants to have fun. We also discuss some developments resulting from some computer games that were operated with electrodes for people with persistent vegetative state, spinal chord injured, and comatose. There are also some fascinating computer simulations used with doctors to help people recover from fear of driving, fear of height, and to distract them from pain experienced from severe burns. We also survey recreational/communication games in the Middle East.
This book discusses a variety of topics such as cell phone seizure and examination, electrical fire investigation, potential vulnerabilities when using historic electrical devices, interpersonal conduct in the Middle East, Russia, and the USA, intellectual property theft, spy cases, and various motivations for crime in a manner that everyone can understand. We also discuss various test equipment and software used for collecting evidence from both physical evidence and invisible radio frequency artifacts. We also discuss electronic equipment that is used to destroy various documents as well as both human and automated processes used to reconstruct small shreds of paper. We discuss real cases regarding document reconstruction such as the American Embassy in Iran and the recently discovered East German (secret police) Stasi shredded records. We also discuss the Hanssen spying case using a PDA and low tech techniques such as the dead drop. Lastly, Jeff Marsh, a brilliant man who became disabled due to an unfortunate accident, demonstrates with the help of Dr. Doherty, various devices such as clocks and mustard jars with concealed purposes that may be used by undercover surveillance professionals or private investigators in a variety of settings, once proper approval is given. Jeff also discusses recreation and conversation as a means of exercising our intellect and informally learning from other people.
March 2011: Enda Kenny and Eamon Gilmore have just formed a coalition government between Fine Gael and Labour. Ireland’s banks are broken, unemployment is heading for half a million, the public finances are in deficit, international lenders rate Ireland as ‘junk’ and the country is in an IMF bailout. As Tánaiste in the new Coalition, Eamon Gilmore was at the heart of every major economic decision taken during his term, and as Minister for Foreign Affairs and Trade was primarily responsible for restoring Ireland’s international reputation and trade connections. In his extraordinary political memoir of these dramatic and turbulent times, Eamon Gilmore writes frankly about the political price the Labour Party has paid for some of their choices, reflects on the circumstances that led to his own resignation and assesses the prospects for Ireland’s continued recovery, including the risks which could yet blow Ireland’s economy off course.
In this collection, actor and seanchaí (traditional storyteller) Éamon Kelly's finest stories are collected for the first time: stories of the real Kerry and the magical past of the Gobán Saor, the heartbreak of emigration, the stations, the priests, the courting and dancing, the war between the sexes. Kelly mines a rich seam of humour and sadness out of resilience of a people rich in hospitality and generosity, imagination, culture and tradition.
This "Everyone" book attempts to the guide the reader through the more essential steps of understanding the basic principles or elements that constitute the daily work of investigators in fields relating to computing and electrical loss. The chapter's are meant to set a foundation for people who may want to enter the field of investigations, or are at the beginning of a career in the area, or are seasoned investigators looking to delve into more contemporary areas of investigations, or for persons that are just interested in reading about matters or topics that are currently revealed in differing forms of media, such as in the successful TV drama series "CSI." The book is formatted sequentially so that the reader can review important legal matters that are a part of most investigations and then go on to peruse the elements of basic electrical principles as they apply to certain types of fire and fault losses. These beginning chapters set a broad stage for the various areas of computing that follow. The book does not necessarily have to be read in the order that it was written. In a sense, the reader may choose to use the book as a reference book. The chapters were written, for the most part, to be able to stand alone, as monographs. There are many chapters that review a broad range of more common topics and there are chapters concerned with more esoteric areas of computing and electronics. Some of these chapters discuss the high-tech methods that are sometimes deployed by thieves, terrorists, pedophiles, stalkers, etc. All of the co-authors reflect their experience as individuals that work closely with the criminal justice and civil institutions.
This book discusses the fundamentals of emergency management. The four phases of emergency management are discussed in detail throughout the book. These phases are mitigation, preparedness, response, and recovery with respect to floods, earthquakes, storms, and other man made as well as natural disasters. This book uses easy to understand examples that also include populations such as senior citizens and the disabled. There are numerous chapters that show the progression of emergency management equipment and how it was used through the last four centuries in the United States. There is also a section on the atomic age which explains radiation, fallout, and some warning systems that are in place to warn the public in case of nuclear accidents such as Three Mile Island. There are also some never seen photos of Nagasaki shortly after the blast in World War Two. We will also meet Uncle Bob who sometimes worked in the hot zone and was later electrocuted, injured his spine, and was in a coma for a while. We will also discuss some of the issues with electrical burns too. Later chapters include the topic of telemedicine and the technology used in telemedicine. Telemedicine becomes important to serve rural communities around the world where people may not have access to quality health care usually available in cities.
This series concentrates on women and the soldiers in the ranks whose lives they shared, assembling a wide body of evidence of their romantic entanglements and domestic concerns. The new military history of recent decades has demanded a broadening of the source base beyond elite accounts or those that concentrate solely on battlefield experiences. Armies did not operate in isolation, and men’s family ties influenced the course of events in a variety of ways. Campfollowing women and children occupied a liminal space in campaign life. Those who travelled "on the strength" of the army received rations in return for providing services such as laundry and nursing, but they could also be grouped with prostitutes and condemned as a ‘burden’ by officers. Parents, wives, and offspring left behind at home remained in soldiers’ thoughts, despite an army culture aimed at replacing kin with regimental ties. Soldiers’ families’ suffering, both on the march and back in Britain, attracted public attention at key points in this period as well. This series provides, for the first time in one place, a wide body of texts relating to common soldiers’ personal lives: the women with whom they became involved, their children, and the families who cared for them. It brings hitherto unpublished material into print for the first time, and resurrects accounts that have not been in wide circulation since the nineteenth century. The collection combines the observations of officers, government officials and others with memoirs and letters from men in the ranks, and from the women themselves. It draws extensively on press accounts, especially in the nineteenth century. It also demonstrates the value of using literary depictions alongside the letters, diaries, memoirs and war office papers that form the traditional source base of military historians. This fifth volume covers The Crimean War (1854-56).
Comprehensive, critical and accessible, Criminology: A Sociological Introduction offers an authoritative overview of the study of criminology, from early theoretical perspectives to pressing contemporary issues such as the globalisation of crime, crimes against the environment, terrorism and cybercrime. Authored by an internationally renowned and experienced group of authors in the Department of Sociology at the University of Essex, this is a truly international criminology text that delves into areas that other texts may only reference. It includes substantive chapters on the following topics: • Histories of crime; • Theoretical approaches to crime and the issue of social change; • Victims and victimisation; • Crime, emotion and social psychology; • Drugs, alcohol, health and crime; • Criminal justice and the sociology of punishment; • Green criminology; • Crime and the media; • Terrorism, state crime and human rights. The new edition fuses global perspectives in criminology from the contexts of post-Brexit Britain and America in the age of Trump, and from the Global South. It contains new chapters on cybercrime; crimes of the powerful; organised crime; life-course approaches to understanding delinquency and desistance; and futures of crime, control and criminology. Each chapter includes a series of critical thinking questions, suggestions for further study and a list of useful websites and resources. The book also contains a glossary of the criminological terms and concepts used in the book. It is the perfect text for students looking for a broad, critical and international introduction to criminology, and it is essential reading for those looking to expand their ‘criminological imagination’.
Since the 1970s people have been murdering their neighbours in Northern Ireland. This book is the true account of the small-town violence and terror which lies behind the headlines.
Written in prison in South Africa, Ireland and the United States, Enemy of the Empire was originally a device for keeping sane in a situation of extreme boredom and oppression. A trained aviation engineer, up-to-date with the latest technology, Eamon McGuire worked in countries that were extricating themselves from the bonds of empire such as Kenya and Malaysia. His mission was to keep ahead of the British army in terms of weapons and detection by procuring and designing systems. His activities forced him to go on the run, hiding in remote parts of Africa and eventually ending up in war-torn Mozambique. He was captured by the CIA in South Africa and subsequently spent several years in various prisons where he started to write what became the basis of this book.
This book takes both a historical and personal views of the atomic bombing of Nagasaki on August 9, 1945. The historical view is provided by Dr. Devine, Joel Liebesfeld, Todd Liebesfeld, Esq., and Prof. Schuber. The personal view is presented by Dr. Doherty who discusses the account of Robert J. Walsh, a U.S. Army 34th Infantry soldier telephone lineman, who was stationed near Nagasaki. Robert took approximately 275 pictures for his photo album with a simple Kodak camera. Many of the pictures are at ground zero and show the devastation of the atomic bomb as well as a marker for the epicenter. Robert was also electrocuted on high voltage wires and fell off a telephone pole to the ground. His back was broken in three places and he was put in a coma so that he would stay still and the back could be fused. While in a coma, Robert was lost in one of the nearby hospitals. His mother received a telegram that he was lost. His mother was completely beside herself and turned to Congressman Fred A. Hartley Jr. for help. Congressman Hartley launched an investigation and found Robert in a hospital in Japan. Robert was in a body cast for two years, part of it in a coma, but did not get a bed sore due to the results of a Japanese nurse named Snowball who invented a special medical instrument that she used with Robert. Robert was brought back home and brought back to Walter Reed Hospital where doctors used innovative techniques to help him heal and walk again. The book also ends with Robert as a senior citizen who lives a normal life leading a dance group at his retirement center.
This book discusses the process of investigating and analyzing electronic equipment, detecting devices, wireless signals, and the prosecution and prevention of high tech crime. The coauthors are from private industry and academia and really provide a wide variety of perspectives on the detection of electronic eavesdropping devices, wiretaps, various electronic signals, and the collection and examination of information from laptops, desktop computers, and PDAs. Kenneth Bruno does an excellent job teaching the reader about all the equipment used in electronic eavesdropping detection. We also introduce the reader to various pieces of electronic equipment used to detect and identify explosives, biochemical weapons, as well as historic unexploded ordinance. The reader is also introduced to the legal system by Mr. Joel Liebesfeld who does corporate investigations and is often employed by clients who are in the legal profession or insurance industry. Mr. Joel Liebesfeld and Dr. Doherty discuss the process of becoming an expert witness who may testify to what was found using scientific methods in combination with electronic signal detection or computer forensic equipment. We hope that the readership of the book will include high school students considering a career in private industry, law enforcement, intelligence agencies, or the military. A background in electronics, math, and computer science is helpful but not necessary in reading this book. Lockards Principle of Exchange specifies that two objects or people that come in contact with each other will change. We hope that this book changes you by increasing your understanding of electronic devices, investigation, and the justice system.
You've heard of a fairy. You've heard of an elf. You've heard of a dwarf, but not of one such as myself. I'm small and magical. And I am a frit. My only magic is to make you forget Your keys, your cell phone, your book bag too. I know this causes problems but I have problems just like you. I can't get back into the Magic Forest (the home of all magic kind). They won't let us back in, So here is what we must find. A way to regain our status as the most ancient magical creatures of all And as you hear our story, you will have a ball. You don't want to miss a leprechaun or being chased by evil gnomes. You'll want to hear all about it, how we sneak back into our rightful homes.
This book discusses the process of investigating and analyzing electronic equipment, detecting devices, wireless signals, and the prosecution and prevention of high tech crime. The coauthors are from private industry and academia and really provide a wide variety of perspectives on the detection of electronic eavesdropping devices, wiretaps, various electronic signals, and the collection and examination of information from laptops, desktop computers, and PDAs. Kenneth Bruno does an excellent job teaching the reader about all the equipment used in electronic eavesdropping detection. We also introduce the reader to various pieces of electronic equipment used to detect and identify explosives, biochemical weapons, as well as historic unexploded ordinance. The reader is also introduced to the legal system by Mr. Joel Liebesfeld who does corporate investigations and is often employed by clients who are in the legal profession or insurance industry. Mr. Joel Liebesfeld and Dr. Doherty discuss the process of becoming an expert witness who may testify to what was found using scientific methods in combination with electronic signal detection or computer forensic equipment. We hope that the readership of the book will include high school students considering a career in private industry, law enforcement, intelligence agencies, or the military. A background in electronics, math, and computer science is helpful but not necessary in reading this book. Lockards Principle of Exchange specifies that two objects or people that come in contact with each other will change. We hope that this book changes you by increasing your understanding of electronic devices, investigation, and the justice system.
This book discusses IPAD and desktop computer forensics and some of the tools that are used in order to identify, preserve, analyze, and report on digital evidence. It also discusses some of the academics such as language arts, mathematics, and science that should be encouraged since middle school so that future computer examiners will have an easier time with critical thinking, analysis, and report writing. This book also discusses some thoughts about the subject from students. Building a digital forensic resume is also explored. Some technical topics such as MAC addressing, forensic imaging, IP Spoofing, reverse look ups, GPS Metadata, write blockers, and examination machines are touched up. Some paperwork and procedural items such as chain of custody, test plan, and the Frye Test are also discussed. The book is written in any easy to understand language that has something of interest for everyone.
This "Everyone" book attempts to the guide the reader through the more essential steps of understanding the basic principles or elements that constitute the daily work of investigators in fields relating to computing and electrical loss. The chapter's are meant to set a foundation for people who may want to enter the field of investigations, or are at the beginning of a career in the area, or are seasoned investigators looking to delve into more contemporary areas of investigations, or for persons that are just interested in reading about matters or topics that are currently revealed in differing forms of media, such as in the successful TV drama series "CSI." The book is formatted sequentially so that the reader can review important legal matters that are a part of most investigations and then go on to peruse the elements of basic electrical principles as they apply to certain types of fire and fault losses. These beginning chapters set a broad stage for the various areas of computing that follow. The book does not necessarily have to be read in the order that it was written. In a sense, the reader may choose to use the book as a reference book. The chapters were written, for the most part, to be able to stand alone, as monographs. There are many chapters that review a broad range of more common topics and there are chapters concerned with more esoteric areas of computing and electronics. Some of these chapters discuss the high-tech methods that are sometimes deployed by thieves, terrorists, pedophiles, stalkers, etc. All of the co-authors reflect their experience as individuals that work closely with the criminal justice and civil institutions.
This book discusses the fundamentals of emergency management. The four phases of emergency management are discussed in detail throughout the book. These phases are mitigation, preparedness, response, and recovery with respect to floods, earthquakes, storms, and other man made as well as natural disasters. This book uses easy to understand examples that also include populations such as senior citizens and the disabled. There are numerous chapters that show the progression of emergency management equipment and how it was used through the last four centuries in the United States. There is also a section on the atomic age which explains radiation, fallout, and some warning systems that are in place to warn the public in case of nuclear accidents such as Three Mile Island. There are also some never seen photos of Nagasaki shortly after the blast in World War Two. We will also meet Uncle Bob who sometimes worked in the hot zone and was later electrocuted, injured his spine, and was in a coma for a while. We will also discuss some of the issues with electrical burns too. Later chapters include the topic of telemedicine and the technology used in telemedicine. Telemedicine becomes important to serve rural communities around the world where people may not have access to quality health care usually available in cities.
Approximately 80 percent of the worlds population now owns a cell phone, which can hold evidence or contain logs about communications concerning a crime. Cameras, PDAs, and GPS devices can also contain information related to corporate policy infractions and crimes. Aimed to prepare investigators in the public and private sectors, Digital Forensics
This book takes both a historical and personal views of the atomic bombing of Nagasaki on August 9, 1945. The historical view is provided by Dr. Devine, Joel Liebesfeld, Todd Liebesfeld, Esq., and Prof. Schuber. The personal view is presented by Dr. Doherty who discusses the account of Robert J. Walsh, a U.S. Army 34th Infantry soldier telephone lineman, who was stationed near Nagasaki. Robert took approximately 275 pictures for his photo album with a simple Kodak camera. Many of the pictures are at ground zero and show the devastation of the atomic bomb as well as a marker for the epicenter. Robert was also electrocuted on high voltage wires and fell off a telephone pole to the ground. His back was broken in three places and he was put in a coma so that he would stay still and the back could be fused. While in a coma, Robert was lost in one of the nearby hospitals. His mother received a telegram that he was lost. His mother was completely beside herself and turned to Congressman Fred A. Hartley Jr. for help. Congressman Hartley launched an investigation and found Robert in a hospital in Japan. Robert was in a body cast for two years, part of it in a coma, but did not get a bed sore due to the results of a Japanese nurse named Snowball who invented a special medical instrument that she used with Robert. Robert was brought back home and brought back to Walter Reed Hospital where doctors used innovative techniques to help him heal and walk again. The book also ends with Robert as a senior citizen who lives a normal life leading a dance group at his retirement center.
This book discusses a variety of topics such as cell phone seizure and examination, electrical fire investigation, potential vulnerabilities when using historic electrical devices, interpersonal conduct in the Middle East, Russia, and the USA, intellectual property theft, spy cases, and various motivations for crime in a manner that everyone can understand. We also discuss various test equipment and software used for collecting evidence from both physical evidence and invisible radio frequency artifacts. We also discuss electronic equipment that is used to destroy various documents as well as both human and automated processes used to reconstruct small shreds of paper. We discuss real cases regarding document reconstruction such as the American Embassy in Iran and the recently discovered East German (secret police) Stasi shredded records. We also discuss the Hanssen spying case using a PDA and low tech techniques such as the dead drop. Lastly, Jeff Marsh, a brilliant man who became disabled due to an unfortunate accident, demonstrates with the help of Dr. Doherty, various devices such as clocks and mustard jars with concealed purposes that may be used by undercover surveillance professionals or private investigators in a variety of settings, once proper approval is given. Jeff also discusses recreation and conversation as a means of exercising our intellect and informally learning from other people.
This book is centered around the memoir Looking Back, written in 1928 by 20 year old Isadore Weiss, only six years after coming to the United States. Isadore provides a fascinating insight into Jewish life in the Ukrainian village of Minkovitz before, during and after World War One. As the war reaches Minkovitz, the reader experiences the rare insight of the community s reaction to the fighting, the first cars, first motorcycles and first airplanes ever seen by people in that region. Contrary to popular current thought, we also see the excellent relationship between the Jewish community of Minkovitz and the German occupying troops, who made toys and gathered firewood for the homes of the people where they were housed during the winter. Isadore also recounts the artillery and the hand-to-hand combat between the forces of Simon Petlura, leader of the pogroms, and the Bolsheviks. We get to see how the new Communist regime establishes itself in Ukraine. Isadore s wife, Sylvia, rounds out the story of how they built a life together in the United States. The story continues of how Isadore graduated with honors from the University of Pittsburgh, and then worked as a Federal investigator as he overcame the barriers of a new language and anti-Semitism. Contributing authors provide background on the contemporary social, demographic and political environment in Ukraine to help the reader put Looking Back into context.
The book discusses some basics about computer security and some of the strategies that personal computer users take to try to keep their machine safe. It also discusses the dangers that many people and governments face from people misusing computer resources and some of the strategies that the United States Federal Government is taking to help keep its citizens safe. The book also robotics used from a distance to help disabled people recreate and work across countries.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.