Preface | p. ix |
Acknowledgments | p. xi |
Fundamentals of Security Investigations | p. 1 |
The Investigative Process | p. 3 |
A Comparison of Public and Private Sectors | p. 11 |
Qualities of the Investigator | p. 21 |
Managing the Investigative Function | p. 35 |
Methods of Security Investigation | p. 47 |
Undercover Investigations | p. 49 |
Surveillance | p. 63 |
Background Investigation | p. 79 |
Discovering Covert Crimes | p. 95 |
Building a Case | p. 113 |
Interviews and Interrogation | p. 115 |
Evidence | p. 139 |
Written Statements, Admissions, and Confessions | p. 155 |
The Use of Informants | p. 173 |
Report Writing and Note Taking | p. 191 |
Applying Investigative Strategies | p. 207 |
Problems Arise: The What of Investigation | p. 209 |
Crime and Solution: The How of Investigation | p. 213 |
Identifying Suspects: The Who of Investigation | p. 227 |
Finding Information: The Where of Investigation | p. 243 |
The Time Factor: The When of Investigation | p. 263 |
Establishing Motive: The Why of Investigation | p. 277 |
Investigative Technology | p. 291 |
Imagery | p. 293 |
Computers in Private Sector Investigations | p. 309 |
Sources | p. 331 |
Index | p. 335 |
Table of Contents provided by Syndetics. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.