Cover image for Process of Investigation : Concepts and Strategies for Investigators in the Private Sector.
Process of Investigation : Concepts and Strategies for Investigators in the Private Sector.
Title:
Process of Investigation : Concepts and Strategies for Investigators in the Private Sector.
Author:
Sennewald, Charles A.
ISBN:
9780080480404
Personal Author:
Edition:
3rd ed.
Physical Description:
1 online resource (345 pages)
Contents:
Front Cover -- The Process of Investigation: Concepts and Strategies for Investigators in the Private Sector -- Copyright Page -- Table of Contents -- PREFACE -- ACKNOWLEDGMENTS -- PART I: FUNDAMENTALS OF SECURITY INVESTIGATION -- Chapter 1. The Investigative Process -- TWO CATEGORIES OF INVESTIGATION -- THE INVESTIGATIVE PROCESS -- THE CREATIVE PROCESS IN INVESTIGATION -- Chapter 2. A Comparison of Public and Private Sectors -- SOURCE OF AUTHORITY AND FUNDING -- SOURCES OF INFORMATION -- JOB SECURITY -- SCOPE OF WORK -- IMAGE -- CIVIL LIABILITY -- TRAINING AND EDUCATION -- TECHNICAL RESOURCES -- PROFESSIONALISM -- CAREER PATHS -- ASSISTANCE -- PERSONAL ACHIEVEMENT -- OVERLAPPING MISSIONS -- CONCLUSION -- Chapter 3. Qualities of the Investigator -- POWERS OF OBSERVATION -- RESOURCEFULNESS -- PATIENCE -- INTERACTION WITH PEOPLE -- UNDERSTANDING HUMAN BEHAVIOR -- UNDERSTANDING THE LEGAL IMPLICATIONS -- EFFECTIVE COMMUNICATION SKILLS -- RECEPTIVITY -- SENSE OF WELL-BEING -- DEDICATION TO THE WORK -- SELF-INITIATIVE -- HEALTHY SKEPTICISM -- INTUITION -- ENERGY AND STAMINA -- ACTING SKILLS -- GOOD JUDGMENT -- THE EXERCISE OF LOGIC -- INTELLIGENCE -- CREATIVE IMAGINATION -- GOOD CHARACTER -- SENSE OF PROFESSIONALISM -- A SELF-QUIZ -- TRUE SUCCESS -- Chapter 4. Managing the Investigative Function -- THE MANAGER AS INVESTIGATIVE COUNSELOR -- THE MANAGER AS TRAINER -- THE MANAGER AS CONTROLLER -- THE MANAGER AS MOTIVATOR -- THE MANAGER AS EVALUATOR -- PART II: METHODS OF SECURITY INVESTIGATION -- Chapter 5. Undercover Investigations -- TECHNIQUES AND METHODS -- PROBLEM AREAS -- THE ABSENCE OF PROFESSIONALISM -- CONCLUSION -- Chapter 6. Surveillance -- COVERT VERSUS OVERT SURVEILLANCE -- THE STATIONARY SURVEILLANCE -- THE MOVING SURVEILLANCE -- MOVING AND STATIONARY SURVEILLANCE -- CONCLUSION -- Chapter 7. Background Investigations -- WORKPLACE VIOLENCE.

THE APPLICATION PACKAGE -- POST-HIRE SCREENING -- Chapter 8. Discovering Covert Crimes -- DEPLOYMENT OF UNDERCOVER AGENTS -- SHOPLIFTING SURVEILLANCE -- PART III: BUILDING A CASE -- Chapter 9. Interviews and Interrogations -- INTERVIEWING -- INTERROGATION -- PREPARING FOR THE INTERROGATION -- CONCLUSION -- Chapter 10. An Overview of the Interview and Interrogation Process -- DEMEANOR -- RAPPORT -- INTERVIEW AND INTERROGATION -- CONDUCTING THE INTERVIEW -- SELLING THE INTERVIEW -- STATEMENT ANALYSIS - THE UNTAINTED STORY -- FACT GATHERING -- LIFESTYLE INTERVIEWS -- COGNITIVE INTERVIEWING -- COMMON INTERVIEWER ERRORS -- BEHAVIORAL INTERVIEWING -- DIAGRAMS -- INTERROGATION -- DECISION TO CONFESS -- RATIONALIZATION -- DENIALS -- METHODS OF INTERROGATION -- DOCUMENTING THE CONFESSION OR THE INTERVIEW -- CONCLUSION -- SUGGESTED READING -- Chapter 11. Evidence -- DOCUMENTARY EVIDENCE -- SOME RULES AND DEFINITIONS OF EVIDENCE -- A FINAL WORD ABOUT EVIDENCE -- Chapter 12. Written Statements,Admissions, and Confessions -- WRITTEN STATEMENTS -- ALLOWABLE USES OF STATEMENTS -- HISTORICAL BACKGROUND -- TYPES OF CONSTRAINTS -- CONFESSIONS AND ADMISSIONS -- THE WRITTEN ADMISSION -- VIDEOTAPED CONFESSIONS -- VALUE OF THE CONFESSION -- Chapter 13. The Use of Informants -- PROFESSIONAL CONTACTS -- INFORMANTS -- INFORMANT CONTROL STAGES -- MAXIMIZING POTENTIAL FOR CONTROLLED INFORMANT RECRUITMENT -- UNEXPECTED DIVIDENDS -- TREATMENT OF INFORMANTS -- THE NEED FOR CORROBORATION -- Chapter 14. Report Writing and Note Taking -- DEFINING THE INVESTIGATIVE REPORT -- NARRATIVE REPORTS -- STRUCTURED OR FORMALIZED REPORTS -- NOTE TAKING -- LARGE CASE REPORT FORMAT -- SUMMARY -- Part IV: APPLYING INVESTIGATIVE STRATEGIES -- Chapter 15. Problems Arise: The What of Investigation -- Chapter 16. Crime and Solution: The How of Investigation -- SCIENTIFIC DETECTION METHODS.

HOW WAS IT ACCOMPLISHED? (COMMISSION STRATEGY) -- HOW CAN THE CRIME BE SOLVED? (SOLUTION STRATEGY) -- THE MODUS OPERANDI -- SELECTING THE SOLUTION STRATEGY -- Chapter 17. Identifying Suspects: The Who of Investigation -- THE PROCESS OF ELIMINATION -- READING THE PHYSICAL EVIDENCE -- THE INVESTIGATIVE INTERVIEW -- COMBINING TECHNIQUES -- SUMMARY -- Chapter 18. Finding Information: The Where of Investigation -- SOURCES OF INFORMATION IN THE PRIVATE SECTOR -- DIRECTORIES AND PERIODICALS -- INFORMATION SOURCES IN LOCAL GOVERNMENT -- INFORMATION SOURCES IN STATE GOVERNMENT -- OTHER SOURCES -- PUBLISHING/JOURNALISM RESOURCES -- Chapter 19. The Time Factor: The When of Investigation -- METHODS OF ESTABLISHING TIME -- HOW TO PREESTABLISH TIME -- Chapter 20. Establishing Motive: The Why of Investigation -- MOTIVATION AND DETECTION STRATEGY -- MOTIVES FOR THEFT -- MOTIVE AND RESPONSE -- SUMMARY -- Part V: TECHNOLOGICAL AND SPECIALIZED INVESTIGATIVE TECHNIQUES -- Chapter 21. Imagery -- SCENE DOCUMENTATION -- THE FUTURE OF INVESTIGATIVE PHOTOGRAPHY -- Chapter 22. Computers in Private Sector Investigations -- A CHANGING INVESTIGATOR'S WORLD -- COMPUTERS AS INVESTIGATIVE TOOLS -- COMPUTERS AS OBJECTS OF EVIDENCE -- COMPUTERS AS TOOLS -- COMPUTERS AS OBJECTS OF EVIDENCE -- A FINAL NOTE -- Chapter 23. Targeted Violence Investigations -- TYPES OF WORKPLACE VIOLENCE -- SIGNIFICANCE OF WORKPLACE VIOLENCE -- A COMMON MISTAKE -- THREATS -- A THREAT IN THE WAREHOUSE -- THE LONG VIEW -- SOURCES -- INDEX.
Abstract:
The Process of Investigation, Third Edition, is a book written to address the needs of the private investigator in the security field. Continuing in the tradition of its previous editions, this book covers essential topics which are often overlooked in works that concentrate on the public aspects of investigation. Investigative skills such as surveillance techniques, interviewing and interrogation, evidence, and confessions and written statements are all discussed, and supplemented with updated case studies and examples from the authors' own experiences. Major revisions to The Process of Investigation include mention and coverage of the effects of 9/11 on the security industry, the need to incorporate awareness of terrorism and terrorist activities when investigating any suspicious behavior, and two completely new chapters. Chapter 10 discusses interviewing and interrogations, and is written by Doug Wicklander and Dave Zulawski, premier experts in the field. Chapter 23 addresses the issues of workplace violence, and includes coverage of stalking, domestic violence spillover into workplaces, red flags, and the Theory of Threat Assessment and Management (TAM), among other topics. Additionally, other more minor modifications in legislation that have been passed and implemented since the last edition are addressed throughout the book. - Serves as a valuable reference tool for both the student and the professional - Contains practical information that can be utilized in real-life investigative situations - Includes two brand new chapters about interviewing, interrogations, and the Theory of Threat Assessment and Management.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: