LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code needed.
The Process of Investigation, Third Edition, is a book written to address the needs of the private investigator in the security field. Continuing in the tradition of its previous… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code needed.
The Process of Investigation, Third Edition, is a book written to address the needs of the private investigator in the security field. Continuing in the tradition of its previous editions, this book covers essential topics which are often overlooked in works that concentrate on the public aspects of investigation. Investigative skills such as surveillance techniques, interviewing and interrogation, evidence, and confessions and written statements are all discussed, and supplemented with updated case studies and examples from the authors’ own experiences.
Major revisions to The Process of Investigation include mention and coverage of the effects of 9/11 on the security industry, the need to incorporate awareness of terrorism and terrorist activities when investigating any suspicious behavior, and two completely new chapters. Chapter 10 discusses interviewing and interrogations, and is written by Doug Wicklander and Dave Zulawski, premier experts in the field. Chapter 23 addresses the issues of workplace violence, and includes coverage of stalking, domestic violence spillover into workplaces, red flags, and the Theory of Threat Assessment and Management (TAM), among other topics. Additionally, other more minor modifications in legislation that have been passed and implemented since the last edition are addressed throughout the book.
I. FUNDAMENTALS OF SECURITY INVESTIGATION1. The Investigative Process2. A Comparison of Public and Private Sectors3. Qualities of the Investigator4. Managing the Investigative Function
II. METHODS OF SECURITY INVESTIGATION5. Undercover Investigations6. Surveillance7. Background Investigations8. Discovering Covert Crimes
III. BUILDING A CASE9. Interviews and Interrogations10. An Overview of the Interview and Interrogation Process11. Evidence12. Written Statements, Admissions, and Confessions13. The Use of Informants14. Report Writing and Note Taking
IV. APPLYING INVESTIGATIVE STRATEGIES15. Problems Arise: The What of Investigation16. Crime and Solution: The How of Investigation17. Identifying Suspects: The Who of Investigation18. Finding Information: The Where of Investigation19. The Time Factor: The When of Investigation20. Establishing Motive: The Why of Investigation
V. INVESTIGATIVE TECHNOLOGY21. Imagery22. Computers in Private Sector Investigations23. Targeted Violence Investigations
CS
JT
Currently John teaches International Relations, Political Philosophy, and Terrorism Studies classes. He is also doing authoring and research in Political Violence, and is preparing to conduct research on American counter-intelligence during the Cold War.