search for books and compare prices
Tables of Contents for Private Security and the Investigative Process
Chapter/Section Title
Page #
Page Count
Preface
xi
 
Acknowledgments
xiii
 
Introduction to the Private Security Industry and the Investigative Process
1
18
The Trend toward Privatization
1
5
The Investigative Process: Private Security's Role
6
13
Types of Investigative Activities
9
1
General Investigative Methods
9
10
General Characteristics of a Competent Investigator
19
20
Introduction
19
1
Objectivity
20
1
Logic
20
4
Perseverance and Diligence
24
2
Human Relations Skills
26
2
Ethical Practices
28
11
Initial Interview and Case Evaluation
39
28
Introduction
39
1
Initial Interview
40
24
Miscellaneous Matters at Initial Interview
42
21
Recording Interview Impressions
63
1
Case Evaluation
64
3
Witnesses
67
14
Introduction
67
1
Types of Witnesses
68
1
Processing Witnesses
68
13
Missing of Unknown Witnesses
70
2
Lay Witnesses
72
4
Expert Witnesses
76
3
Character Witnesses
79
2
Collection of Information
81
24
The Nature of Information and the Rules of Collection
81
5
Leads and Contacts for the Private Investigator
86
3
Public Sources of Information
89
4
Federal Agencies
89
1
State and Local Agencies
90
3
Private Sources of Information
93
5
Directories, Databases, and Atlases
93
2
Libraries
95
1
Newspapers
95
1
The Internet
96
1
Professional Associations and Groups
96
1
Auto Records
97
1
The Background Investigation
98
2
Real Property Title Search
100
5
Collection of Evidence and Preservation of the Scene
105
50
Introduction
105
1
Preliminary Strategies and Responses
106
5
Scene Sketches and Other Graphic Portrayals
111
3
Rules for Sketching
112
1
Rules for Measuring
113
1
Photographic Evidence
114
11
Location of Crime Scene
118
2
Photography and Special Applications
120
5
Drug and Alcohol Abuse Evidence
125
1
Documentary Evidence
125
18
Police Records
127
2
Medical Records
129
13
Records Involving Economic Damages
142
1
Preservation of Evidence
143
12
Surveillance Techniques
155
36
Purposes and Functions
155
1
Preliminary Questions and Issues
156
6
What Are the Steps of Surveillance?
156
3
What Is the Exact Objective of Surveillance?
159
1
Where Is the Location of Surveillance?
159
1
When Will Surveillance Occur?
160
1
Who or What Will Be Surveilled?
160
2
Preparation and Equipment
162
6
Personal Behavior and Attire
162
1
Surveillance Equipment
163
5
Types of Surveillance
168
15
Stationary Surveillance
169
1
Moving Surveillance
169
9
Hybrid and Other Special Surveillance Techniques
178
5
Surveillance Forms and Reports
183
8
Report Writing
191
38
Introduction
191
2
Efficiency
191
1
The Failure of Memory
192
1
Organizational Influence
192
1
A Public Relations Tool
193
1
Characteristics of Solid Report Writing
193
5
The Role of Note Taking
193
2
Choosing a Report Design or Format
195
1
The Final Report
196
2
Standard Reports for the Private Investigator
198
31
Activity Reports
198
14
Major Criminal Documentation
212
17
Investigative Method and Technique: Theft/Property Offenses
229
32
Introduction
229
2
Shoplifting
231
6
Rationalization and Justification
231
1
Shoplifting Methods
232
5
Internal Theft by Employees
237
5
Reasons for Theft
238
1
Theft Strategies
239
1
Investigating Theft
240
1
Obtaining Confessions or Statements
241
1
Burglary
242
4
Defensive Techniques to Minimize and Identify Burglary and Property Losses
246
8
Site Security Surveys and Application
248
1
Determining Organizational Characteristics
248
2
Theft Tests
250
4
Missing or Stolen Property
254
7
Investigative Method and Technique: Insurance Cases
261
40
Introduction
261
1
Application and Method
262
29
Property Claims for Cases of Arson
262
1
Workers' Compensation
263
12
Disability Claims
275
1
Auto Liability Claims
276
15
Auto Theft, Fraud, and Parts Pilferage
291
10
Vehicle Identification Systems
297
1
Parts Identification Systems
298
3
Investigative Method and Technique: Background Investigations
301
34
Introduction
301
1
Establishing Identity and Preliminary Background Issues
302
17
Employment History
305
4
Credit History
309
10
Alternative Methods of Background Review
319
8
References
319
4
Consultative Services
323
4
The Polygraph Test
327
1
Comprehensive Background Report
327
8
The Security Office: Administrative Issues
335
1
Some General Principles
335
2
Time-Keeping Methods
337
1
The Value of Administrative Documents
337
4
Filing Systems
341
1
Setup and Maintenance
341
3
Tickler Files
344
1
Software Considerations
345
2
Billing
347
10
Conclusion
357