Charles 'Chuck” Sennewald, CSC, CPP, is an independent security management consultant and expert witness and the author of numerous Butterworth-Heinemann titles, including 'Effective Security Management'; 'Security Consulting'; 'Retail Crime, Security and Loss Prevention: An Encyclopedic Reference;' 'From the Files of a Security Expert Witness'; and earlier editions of this book 'The Process of Investigation.' Chuck is a graduate of California State University - Los Angeles with a BS degree in Police Science and Administration. Chuck is also the founder and first president of the International Association of Professional Security Consultants (IAPSC), and is a long-time member of ASIS International. He has lectured and is read in countries around the globe.
The Process of Investigation, Fourth Edition addresses the needs of today's private sector investigative professional by providing a full-spectrum treatment of the investigative process, from case inception and investigative strategy selection to executing complex investigative techniques, to creating reports useful for corporate, legal, and prosecutorial purposes.Continuing in the tradition of its previous editions, The Process of Investigation, Fourth Edition covers essential topics overlooked in books on the public aspects of investigation. Investigative skills such as surveillance techniques, interviewing and interrogation, collecting and documenting evidence, and taking confessions and written statements are all discussed, and supplemented with updated case studies and examples from the authors' own professional experiences. - Teaches the fundamentals of the investigative process and serves as a valuable reference tool for both the student and the professional- Experienced professionals can brush up on seldom-used specialty skills, and reconsider existing methods and approaches- Includes a new chapter on discrimination investigations
Front Cover 1
The Process of Investigation 4
Copyright 5
Dedication 6
Contents 8
Preface 20
Acknowledgments 22
About the Authors 24
Part 1 Fundamentals of Security Investigation 26
CHAPTER 1 - THE INVESTIGATIVE PROCESS 28
TWO CATEGORIES OF INVESTIGATION 28
THE INVESTIGATIVE PROCESS 29
THE CREATIVE PROCESS IN INVESTIGATION 33
REFERENCES 33
CHAPTER 2 - A COMPARISON OF PUBLIC AND PRIVATE SECTORS 34
SOURCE OF AUTHORITY AND FUNDING 35
SOURCES OF INFORMATION 35
JOB SECURITY 35
SCOPE OF WORK 35
IMAGE 35
CIVIL LIABILITY 36
TRAINING AND EDUCATION 36
TECHNICAL RESOURCES 37
PROFESSIONALISM 37
CAREER PATHS 38
ASSISTANCE 39
PERSONAL ACHIEVEMENT 39
OVERLAPPING MISSIONS 40
CONCLUSION 41
CHAPTER 3 - QUALITIES OF THE INVESTIGATOR 42
POWERS OF OBSERVATION 43
RESOURCEFULNESS 43
PATIENCE 44
INTERACTING WITH PEOPLE 44
UNDERSTANDING OF HUMAN BEHAVIOR 45
UNDERSTANDING LEGAL IMPLICATIONS 45
EFFECTIVE COMMUNICATION SKILLS 45
RECEPTIVITY 46
SENSE OF WELL-BEING 46
DEDICATION TO THE WORK 46
SELF-INITIATIVE 47
HEALTHY SKEPTICISM 47
INTUITION 47
ENERGY AND STAMINA 48
ACTING SKILLS 48
GOOD JUDGMENT 49
LOGIC 49
INTELLIGENCE 50
CREATIVE IMAGINATION 50
GOOD CHARACTER 51
SENSE OF PROFESSIONALISM 51
A SELF-QUIZ 51
TRUE SUCCESS 51
REFERENCES 53
CHAPTER 4 - MANAGING THE INVESTIGATIVE FUNCTION 54
THE MANAGER AS INVESTIGATIVE COUNSELOR 54
THE MANAGER AS TRAINER 55
THE MANAGER AS CONTROLLER 57
THE MANAGER AS MOTIVATOR 62
THE MANAGER AS EVALUATOR 63
REFERENCES 63
Part II METHODS OF SECURITY INVESTIGATION 64
CHAPTER 5 - UNDERCOVER INVESTIGATIONS 66
TECHNIQUES AND METHODS 67
PROBLEM AREAS 73
THE ABSENCE OF PROFESSIONALISM 75
CONCLUSION 76
CHAPTER 6 - SURVEILLANCE 78
COVERT VERSUS OVERT SURVEILLANCE 78
THE STATIONARY SURVEILLANCE 80
THE MOVING SURVEILLANCE 84
MOVING AND STATIONARY SURVEILLANCE 85
CONCLUSION 91
CHAPTER 7 - BACKGROUND INVESTIGATIONS 92
WORKPLACE VIOLENCE 93
THE APPLICATION PACKAGE 93
POST-HIRE SCREENING 99
REFERENCES 103
CHAPTER 8 - DISCOVERING COVERT CRIMES 104
DEPLOYMENT OF UNDERCOVER AGENTS 105
SHOPLIFTING SURVEILLANCE 114
REFERENCES 116
Part III BUILDING A CASE 118
CHAPTER 9 - INTERVIEWS AND INTERROGATIONS 120
INTERVIEWING 121
INTERROGATION 127
PREPARING FOR THE INTERROGATION 129
CONCLUSION 135
REFERENCE 136
CHAPTER 10 - AN OVERVIEW OF THE INTERVIEW AND INTERROGATION PROCESS 138
DEMEANOR 139
RAPPORT 139
INTERVIEW AND INTERROGATION 140
CONDUCTING THE INTERVIEW 146
SELLING THE INTERVIEW 149
STATEMENT ANALYSIS—THE UNTAINTED STORY 149
FACT GATHERING 150
LIFESTYLE INTERVIEWS 151
COGNITIVE INTERVIEWING 151
COMMON INTERVIEWER ERRORS 153
BEHAVIORAL INTERVIEWING 153
DIAGRAMS 154
INTERROGATION 154
DECISION TO CONFESS 155
RATIONALIZATION 156
DENIALS 156
METHODS OF INTERROGATION 158
DOCUMENTING THE CONFESSION OR THE INTERVIEW 161
CONCLUSION 161
SUGGESTED READING 162
CHAPTER 11 - EVIDENCE 164
DEMONSTRATIVE EVIDENCE 164
DOCUMENTARY EVIDENCE 171
SOME RULES AND DEFINITIONS OF EVIDENCE 174
A FINAL WORD ABOUT EVIDENCE 175
REFERENCE 176
CHAPTER 12 - WRITTEN STATEMENTS, ADMISSIONS, AND CONFESSIONS 178
WRITTEN STATEMENTS 178
ALLOWABLE USES OF STATEMENTS 181
HISTORICAL BACKGROUND 182
TYPES OF CONSTRAINTS 185
CONFESSIONS AND ADMISSIONS 187
THE WRITTEN ADMISSION 188
VIDEOTAPED CONFESSIONS 189
VALUE OF THE CONFESSION 190
REFERENCE 190
CHAPTER 13 - THE USE OF INFORMANTS 192
PROFESSIONAL CONTACTS 192
INFORMANTS 193
THE ANONYMOUS INFORMANT 196
INFORMANT CONTROL STAGES 199
MAXIMIZING POTENTIAL FOR CONTROLLED INFORMANT RECRUITMENT 203
UNEXPECTED DIVIDENDS 203
TREATMENT OF INFORMANTS 203
THE NEED FOR CORROBORATION 204
REFERENCES 204
CHAPTER 14 - REPORT WRITING AND NOTE TAKING 206
DEFINING THE INVESTIGATIVE REPORT 206
NARRATIVE REPORTS 206
STRUCTURED OR FORMALIZED REPORTS 212
NOTE TAKING 213
LARGE CASE REPORT FORMAT 213
SUMMARY 218
REFERENCE 218
Part IV APPLYING INVESTIGATIVE STRATEGIES 220
CHAPTER 15 - PROBLEMS ARISE: THE WHAT OF INVESTIGATION 222
CHAPTER 16 - CRIME AND SOLUTION: THE HOW OF INVESTIGATION 226
SCIENTIFIC DETECTION METHODS 227
HOW WAS IT ACCOMPLISHED? (COMMISSION STRATEGY) 228
HOW CAN THE CRIME BE SOLVED? (SOLUTION STRATEGY) 230
THE MODUS OPERANDI 233
SELECTING THE SOLUTION STRATEGY 233
REFERENCE 236
CHAPTER 17 - IDENTIFYING SUSPECTS: THE WHO OF INVESTIGATION 238
THE PROCESS OF ELIMINATION 238
READING THE PHYSICAL EVIDENCE 240
THE INVESTIGATIVE INTERVIEW 242
COMBINING TECHNIQUES 245
SUMMARY 247
CHAPTER 18 - FINDING INFORMATION: THE WHERE OF INVESTIGATION 250
SOURCES OF INFORMATION IN THE PRIVATE SECTOR 253
DIRECTORIES AND PERIODICALS 256
INFORMATION SOURCES IN LOCAL GOVERNMENT 258
INFORMATION SOURCES IN STATE GOVERNMENT 259
OTHER SOURCES 261
REFERENCES 263
CHAPTER 19 - THE TIME FACTOR: THE WHEN OF INVESTIGATION 264
METHODS OF ESTABLISHING TIME 265
HOW TO PRE-ESTABLISH TIME 270
CHAPTER 20 - ESTABLISHING MOTIVE: THE WHY OF INVESTIGATION 274
MOTIVATION AND DETECTION STRATEGY 275
MOTIVES FOR THEFT 276
MOTIVE AND RESPONSE 278
SUMMARY 279
REFERENCES 285
Part V TECHNOLOGICAL AND SPECIALIZED INVESTIGATIVE TECHNIQUES 286
CHAPTER 21 - IMAGERY 288
PHOTOGRAPHY AND EQUIPMENT 288
SCENE DOCUMENTATION 297
THE FUTURE OF INVESTIGATIVE PHOTOGRAPHY 298
REFERENCES 300
CHAPTER 22 - COMPUTERS IN PRIVATE SECTOR INVESTIGATIONS 302
A CHANGING INVESTIGATOR’S WORLD 302
COMPUTERS AS INVESTIGATIVE TOOLS 302
COMPUTERS AS OBJECTS OF EVIDENCE 302
COMPUTERS AS TOOLS 304
COMPUTERS AS OBJECTS OF EVIDENCE 312
A FINAL NOTE ON CYBERCRIME 319
REFERENCES 319
CHAPTER 23 - TARGETED VIOLENCE INVESTIGATIONS 322
TYPES OF WORKPLACE VIOLENCE 323
SIGNIFICANCE OF WORKPLACE VIOLENCE 323
A COMMON MISTAKE 324
THREATS 324
A THREAT IN THE WAREHOUSE 335
THE LONG VIEW 337
REFERENCES 338
CHAPTER 24 - DISCRIMINATION INVESTIGATIONS 340
DISCRIMINATION AND HARASSMENT 342
REFERENCES 358
Index 360
The Investigative Process
Abstract
This chapter includes information on the division of the investigative process into two categories: constructive and reconstructive, as well as how the investigative process applies to the security industry, and what the basic questions are to be answered regarding an incident or action. The chapter also explains the importance of information collection through communication from informants and interviews, as well as the importance of one’s own powers of observation, using detailed examples drawn from created scenarios as well as historical accounts of early investigative processes. Finally, the chapter compares modern investigative techniques to historical ones and highlights the creative and imaginative nature of investigations.
Keywords
Investigative process; constructive; reconstructive; information collection; communication; observation
Two Categories of Investigation
The Investigative Process
Communication
Observation
Erscheint lt. Verlag | 30.12.2014 |
---|---|
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Recht / Steuern ► EU / Internationales Recht | |
Recht / Steuern ► Strafrecht ► Kriminologie | |
Recht / Steuern ► Strafrecht ► Strafverfahrensrecht | |
Sozialwissenschaften ► Politik / Verwaltung | |
ISBN-10 | 0-12-800643-9 / 0128006439 |
ISBN-13 | 978-0-12-800643-6 / 9780128006436 |
Haben Sie eine Frage zum Produkt? |
Größe: 9,3 MB
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
Größe: 5,4 MB
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belletristik und Sachbüchern. Der Fließtext wird dynamisch an die Display- und Schriftgröße angepasst. Auch für mobile Lesegeräte ist EPUB daher gut geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich