Private security and the investigative process
Private Security and the Investigative Process, Fourth Edition is fully updated and continues to provide complete coverage of the investigative process for private investigations by both individuals and in corporate security environments. This edition covers emerging technology, revised legal and pr...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Boca Raton, FL :
CRC Press
[2020]
|
Edición: | Fourth edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009757929406719 |
Tabla de Contenidos:
- Cover
- Half Title
- Title Page
- Copyright Page
- Dedication
- Contents
- Preface
- Acknowledgments
- Author Bio
- 1: Introduction to the Private Security Industry and the Investigative Process
- 1.1 The Private Security Industry: Overview and Context
- 1.1.1 The Contemporary State of Private Security
- 1.1.2 Classifications and Functions of the Private Security Industry
- 1.2 The Private Security Industry and Privatization
- 1.3 The Role of Private Security and the Investigative Process
- 1.3.1 Investigative Activities Commonly Encountered by Private Security
- 1.4 Conclusion and Final Thoughts
- Notes
- 2: General Characteristics of a Competent Investigator
- 2.1 Introduction
- 2.2 A Private versus Public Mentality
- 2.2.1 Objectivity and Investigative Practice
- 2.2.2 Logic and Investigative Practice
- 2.2.3 Perseverance, Diligence, and Investigative Practice
- 2.3 Human Relations Skills and Investigative Practice
- 2.4 Ethics and the Investigative Process
- Notes
- 3: Interview and Case Evaluation
- 3.1 Introduction: The Interview and the Investigator
- 3.2 Initial Interview
- 3.2.1 Initial Interview: Administrative Requirements
- 3.2.1.1 Authorization and Release
- 3.2.1.2 Interview Information or Fact Sheets
- 3.2.1.3 Follow-Up Letter
- 3.2.2 Recording Interview Impressions
- 3.3 Case Evaluation and Subsequent Interviews
- Notes
- 4: Witness Testimony and Evidence in the Private Security Industry
- 4.1 The Purpose of Witnesses
- 4.2 Types of Witnesses
- 4.2.1 Missing or Unknown Witnesses
- 4.2.2 Lay Witnesses
- 4.2.3 Expert Witnesses
- 4.2.3.1 Qualifications of the Expert
- 4.2.3.2 Sources of Expert Witnesses
- 4.2.3.3 Expert Service Contracts
- 4.2.4 Character Witnesses
- 4.3 Processing Witnesses
- 4.4 Conclusion
- Notes
- 5: Collection of Information.
- 5.1 The Nature of Information and the Rules of Collection
- 5.2 Leads and Contacts for the Private Investigator
- 5.3 Public Sources of Information
- 5.3.1 Federal Agencies
- 5.3.2 State and Local Agencies
- 5.4 Private Sources of Information
- 5.4.1 Directories, Databases, and Atlases
- 5.4.1.1 Business Databases
- 5.4.1.2 Miscellaneous Databases
- 5.4.2 Libraries
- 5.4.3 Newspapers
- 5.4.4 The Internet and Web-Based Searches
- 5.4.4.1 Social Media Searches
- 5.4.5 Professional Associations and Groups
- 5.4.6 Auto Records
- 5.5 The Background Investigation
- 5.6 Real Property Title Search
- 5.7 Conclusion
- Notes
- 6: Collection of Evidence and Preservation of the Scene
- 6.1 Investigative Technique: Initial Scene Visitation
- 6.2 Investigative Technique: Preliminary Evidence Collection Strategies
- 6.3 Investigative Technique: Scene Sketches and Other Graphic Portrayals
- 6.3.1 Rules for Sketching
- 6.3.2 Rules for Measuring
- 6.4 Investigative Technique: Photographic Evidence
- 6.4.1 Location of Crime Scene
- 6.4.2 Photography and Special Applications
- 6.4.2.1 Vehicular Accidents and Related Auto Claims
- 6.4.2.2 Bodily Injuries and Photographic Method
- 6.4.2.3 Arson/Insurance Fraud and Photographic Evidence
- 6.4.2.4 Burglary/Criminal Trespass/Forcible Theft and Photographic Evidence
- 6.4.2.5 Drug and Alcohol Abuse and Photographic Evidence
- 6.5 Investigative Technique: Documentary Evidence
- 6.5.1 Police Records
- 6.5.1.1 Alcohol or Chemical Reports
- 6.5.1.2 Accident Reports
- 6.5.1.3 Domestic Relations Documentation
- 6.5.1.4 Radio Logs
- 6.5.1.5 Arrest Reports-Narcotics
- 6.5.1.6 Violence in the Workplace
- 6.5.1.7 Missing Person Reports
- 6.5.1.8 Disposition Sheets
- 6.5.1.9 Suspect Descriptions
- 6.6 Investigative Technique: Medical Records.
- 6.7 Investigative Technique: Records Involving Economic Damages
- 6.8 Investigative Technique: Preservation of Evidence
- 6.9 Conclusion
- Notes
- 7: Surveillance Techniques
- 7.1 Purposes and Functions
- 7.2 Tactics and Strategy in Surveillance
- 7.2.1 What Are the Steps of Surveillance?
- 7.2.2 The Precise Objective of Surveillance
- 7.2.3 The Location of Surveillance
- 7.2.4 Time of Surveillance
- 7.2.5 The Subject or Target of Surveillance
- 7.3 Surveillance: Preparatory Steps
- 7.3.1 Personal Behavior and Attire
- 7.3.2 Surveillance Equipment
- 7.3.2.1 CCTV Equipment
- 7.3.2.2 Photographic/Video Equipment
- 7.4 Types of Surveillance
- 7.4.1 Stationary Surveillance
- 7.4.2 Moving Surveillance
- 7.4.2.1 Foot Surveillance
- 7.4.2.2 Auto Surveillance
- 7.4.3 Hybrid and Other Special Surveillance Techniques
- 7.4.3.1 Foot and Auto Surveillance
- 7.4.3.2 Surveillance at Bus Stops
- 7.4.3.3 Use of Pretext
- 7.5 Surveillance Forms and Reports
- 7.6 Conclusion
- Notes
- 8: Report Writing
- 8.1 Introduction
- 8.1.1 Report Writing Promotes Efficiency in the Investigative Process
- 8.1.2 Reports and Memory
- 8.1.3 Investigative Reports and Organizational Method
- 8.1.4 Investigative Reports as Proof of Services Rendered
- 8.2 Investigative Report Writing: Standards for Authorship
- 8.2.1 Investigative Field Notes: A Preliminary Step
- 8.2.2 The Essential Qualities of an Investigative Report: Accurate, Brief, and Complete
- 8.2.3 Investigative Report Design
- 8.3 Standard Reports for the Private Investigator
- 8.3.1 Investigative Activity Reports
- 8.3.1.1 Daily Reports
- 8.3.1.2 Review Reports
- 8.3.1.3 Patrol and Observation Reports
- 8.3.1.4 Surveillance Reports
- 8.3.1.5 Missing Person Reports
- 8.3.1.6 Undercover Investigation Reports
- 8.3.1.7 Bomb Search Reports
- 8.3.1.8 Inspection Reports.
- 8.3.1.9 Security Incident Reports
- 8.3.1.10 Investigative Reports
- 8.3.1.11 Traffic Reports
- 8.3.1.12 Property Reports
- 8.3.1.13 Basic Security Survey
- 8.3.2 Major Criminal Documentation
- 8.3.2.1 The Offense Report
- 8.3.2.2 Arrest Report
- 8.3.2.3 Defendant's Statement
- 8.4 Conclusion
- Notes
- 9: Investigative Method and Technique: Theft/Property Offenses
- 9.1 Introduction
- 9.2 Shoplifting and Retail Theft
- 9.2.1 Rationalizations and Justifications for Shoplifting and Retail Theft
- 9.2.2 Shoplifting Methods
- 9.2.3 Shoplifting Identification
- 9.2.4 Shoplifting Investigation
- 9.3 Internal Theft by Employees
- 9.3.1 Reasons and Rationales for Internal Theft
- 9.3.2 Theft Strategies
- 9.3.3 Investigating Theft
- 9.3.4 Obtaining Confessions or Statements
- 9.4 Burglary and the Private Investigator
- 9.5 Defensive Techniques to Minimize Property Losses from Theft and Burglary
- 9.5.1 Tactics and Strategies
- 9.5.1.1 Site Security Surveys and Their Application
- 9.5.1.2 Determining Organizational Characteristics
- 9.5.1.3 Theft Tests
- 9.6 Missing or Stolen Property
- 9.7 Conclusion
- Notes
- 10: Investigative Method and Technique: Insurance Cases
- 10.1 Introduction
- 10.2 Investigative Application and Method in Specific Cases
- 10.2.1 Insurance Property Claims in Fire and Arson
- 10.2.2 Workers' Compensation
- 10.2.3 Disability Claims
- 10.2.4 Auto Liability Claims
- 10.2.4.1 Policy Declaration
- 10.2.4.2 Processing the Auto Liability Case
- 10.3 Special Problems: Auto Theft, Fraud, and Parts Pilferage
- 10.3.1 Auto Identification Systems
- 10.3.1.1 VIN Systems
- 10.3.1.2 Parts
- 10.4 Conclusion
- Notes
- 11: Investigative Method and Technique: Background Investigations
- 11.1 Introduction
- 11.2 Background Investigation Basics
- 11.3 Background Issues
- 11.3.1 Establishing Identity.
- 11.3.2 Employment History
- 11.3.3 Credit History
- 11.4 Alternative Methods of Background Review
- 11.4.1 References
- 11.4.2 Consultative Services
- 11.4.3 The Polygraph Test
- 11.5 Comprehensive Background Report
- 11.6 Conclusion
- Notes
- 12: The Security Office: Administrative Issues
- 12.1 Some General Principles of Office Administration
- 12.2 Timekeeping Methods
- 12.3 The Value of Administrative Documents
- 12.3.1 Software Considerations
- 12.4 Filing Systems
- 12.4.1 Setup and Maintenance
- 12.4.2 Tickler Files
- 12.4.3 Software Considerations
- 12.5 Billing
- 12.5.1 Software Considerations
- 12.6 Conclusion
- Notes
- Index.