Process of Investigation
Concepts and Strategies for Investigators in the Private Sector
- Charles Sennewald, CPP, Independent security management consultant, expert witness, and author, internationally based
- John Tsukayama, CPP, CFE, PCI, Instructor, Brigham Young University, Hawaii; former executive vice president, Safeguard Services, Inc., Honolulu, Hawaii.
The Process of Investigation, Third Edition, is a book written to address the needs of the private investigator in the security field. Continuing in the tradition of its previous editions, this book covers essential topics which are often overlooked in works that concentrate on the public aspects of investigation. Investigative skills such as surveillance techniques, interviewing and interrogation, evidence, and confessions and written statements are all discussed, and supplemented with updated case studies and examples from the authors’ own experiences.Major revisions to The Process of Investigation include mention and coverage of the effects of 9/11 on the security industry, the need to incorporate awareness of terrorism and terrorist activities when investigating any suspicious behavior, and two completely new chapters. Chapter 10 discusses interviewing and interrogations, and is written by Doug Wicklander and Dave Zulawski, premier experts in the field. Chapter 23 addresses the issues of workplace violence, and includes coverage of stalking, domestic violence spillover into workplaces, red flags, and the Theory of Threat Assessment and Management (TAM), among other topics. Additionally, other more minor modifications in legislation that have been passed and implemented since the last edition are addressed throughout the book.View full description
PRIMARY MARKET:Corporate and Private Investigative (P.I.) professionals working in the private sector, new professionals entering the security field (from the military and/or law enforcement).SECONDARY MARKET: Security managers, security consultants, Undergraduate students in 2- and 4-year colleges in Introduction to Security courses for Security and Law Enforcement majors.
- Published: May 2006
- Imprint: BUTTERWORTH HEINEMANN
- ISBN: 978-0-7506-7950-3
“You get what you pay for in this book — the best available information … this is an effective and valuable investigative manual.” — Canadian Security
Table of ContentsI. FUNDAMENTALS OF SECURITY INVESTIGATIONChapter 1 - The Investigative ProcessChapter 2 - A Comparison of Public and Private SectorsChapter 3 - Qualities of the InvestigatorChapter 4 - Managing the Investigative FunctionII. METHODS OF SECURITY INVESTIGATIONChapter 5 - Undercover InvestigationsChapter 6 - SurveillanceChapter 7 - Background InvestigationsChapter 8 - Discovering Covert CrimesIII. BUILDING A CASEChapter 9 - Interviews and InterrogationsChapter 10 - An Overview of the Interview and Interrogation ProcessBy: David E. Zulawski, CFI, CFE and Douglas E. Wicklander, CFI, CFEChapter 11 - EvidenceChapter 12 - Written Statements, Admissions, and ConfessionsChapter 13 - The Use of InformantsChapter 14 - Report Writing and Note TakingIV. APPLYING INVESTIGATIVE STRATEGIESChapter 15 - Problems Arise: The What of InvestigationChapter 16 - Crime and Solution: The How of InvestigationChapter 17 - Identifying Suspects: The Who of InvestigationChapter 18 - Finding Information: The Where of InvestigationChapter 19 - The Time Factor: The When of InvestigationChapter 20 - Establishing Motive: The Why of Investigation V. INVESTIGATIVE TECHNOLOGYChapter 21 - ImageryChapter 22 - Computers in Private Sector InvestigationsChapter 23 - Targeted Violence InvestigationsSOURCESINDEX