Private Security and the Investigative Process 4th Edition by Charles P Nemeth – Ebook PDF Instant Download/Delivery: 1351037269 ,9781138489646
Full download Private Security and the Investigative Process 4th Edition after payment
Product details:
ISBN 10: 1351037269
ISBN 13: 9781138489646
Author: Charles P Nemeth
Private Security and the Investigative Process 4th Edition Table of contents:
Chapter 1 Introduction to the Private Security Industry and the Investigative Process
1.1 The Private Security Industry: Overview and Context
1.1.1 The Contemporary State of Private Security
1.1.2 Classifications and Functions of the Private Security Industry
1.2 The Private Security Industry and Privatization
1.3 The Role of Private Security and the Investigative Process
1.3.1 Investigative Activities Commonly Encountered by Private Security
1.4 Conclusion and Final Thoughts
Notes
Chapter 2 General Characteristics of a Competent Investigator
2.1 Introduction
2.2 A Private versus Public Mentality
2.2.1 Objectivity and Investigative Practice
2.2.2 Logic and Investigative Practice
2.2.3 Perseverance, Diligence, and Investigative Practice
2.3 Human Relations Skills and Investigative Practice
2.4 Ethics and the Investigative Process
Notes
Chapter 3 Interview and Case Evaluation
3.1 Introduction: The Interview and the Investigator
3.2 Initial Interview
3.2.1 Initial Interview: Administrative Requirements
3.2.1.1 Authorization and Release
3.2.1.2 Interview Information or Fact Sheets
3.2.1.3 Follow-Up Letter
3.2.2 Recording Interview Impressions
3.3 Case Evaluation and Subsequent Interviews
Notes
Chapter 4 Witness Testimony and Evidence in the Private Security Industry
4.1 The Purpose of Witnesses
4.2 Types of Witnesses
4.2.1 Missing or Unknown Witnesses
4.2.2 Lay Witnesses
4.2.3 Expert Witnesses
4.2.3.1 Qualifications of the Expert
4.2.3.2 Sources of Expert Witnesses
4.2.3.3 Expert Service Contracts
4.2.4 Character Witnesses
4.3 Processing Witnesses
4.4 Conclusion
Notes
Chapter 5 Collection of Information
5.1 The Nature of Information and the Rules of Collection
5.2 Leads and Contacts for the Private Investigator
5.3 Public Sources of Information
5.3.1 Federal Agencies
5.3.2 State and Local Agencies
5.4 Private Sources of Information
5.4.1 Directories, Databases, and Atlases
5.4.1.1 Business Databases
5.4.1.2 Miscellaneous Databases
5.4.2 Libraries
5.4.3 Newspapers
5.4.4 The Internet and Web-Based Searches
5.4.4.1 Social Media Searches
5.4.5 Professional Associations and Groups
5.4.6 Auto Records
5.5 The Background Investigation
5.6 Real Property Title Search
5.7 Conclusion
Notes
Chapter 6 Collection of Evidence and Preservation of the Scene
6.1 Investigative Technique: Initial Scene Visitation
6.2 Investigative Technique: Preliminary Evidence Collection Strategies
6.3 Investigative Technique: Scene Sketches and Other Graphic Portrayals
6.3.1 Rules for Sketching
6.3.2 Rules for Measuring
6.4 Investigative Technique: Photographic Evidence
6.4.1 Location of Crime Scene
6.4.2 Photography and Special Applications
6.4.2.1 Vehicular Accidents and Related Auto Claims
6.4.2.2 Bodily Injuries and Photographic Method
6.4.2.3 Arson/Insurance Fraud and Photographic Evidence
6.4.2.4 Burglary/Criminal Trespass/Forcible Theft and Photographic Evidence
6.4.2.5 Drug and Alcohol Abuse and Photographic Evidence
6.5 Investigative Technique: Documentary Evidence
6.5.1 Police Records
6.5.1.1 Alcohol or Chemical Reports
6.5.1.2 Accident Reports
6.5.1.3 Domestic Relations Documentation
6.5.1.4 Radio Logs
6.5.1.5 Arrest Reports—Narcotics
6.5.1.6 Violence in the Workplace
6.5.1.7 Missing Person Reports
6.5.1.8 Disposition Sheets
6.5.1.9 Suspect Descriptions
6.6 Investigative Technique: Medical Records
6.7 Investigative Technique: Records Involving Economic Damages
6.8 Investigative Technique: Preservation of Evidence
6.9 Conclusion
Notes
Chapter 7 Surveillance Techniques
7.1 Purposes and Functions
7.2 Tactics and Strategy in Surveillance
7.2.1 What Are the Steps of Surveillance?
7.2.2 The Precise Objective of Surveillance
7.2.3 The Location of Surveillance
7.2.4 Time of Surveillance
7.2.5 The Subject or Target of Surveillance
7.3 Surveillance: Preparatory Steps
7.3.1 Personal Behavior and Attire
7.3.2 Surveillance Equipment
7.3.2.1 CCTV Equipment
7.3.2.2 Photographic/Video Equipment
7.4 Types of Surveillance
7.4.1 Stationary Surveillance
7.4.2 Moving Surveillance
7.4.2.1 Foot Surveillance
7.4.2.2 Auto Surveillance
7.4.3 Hybrid and Other Special Surveillance Techniques
7.4.3.1 Foot and Auto Surveillance
7.4.3.2 Surveillance at Bus Stops
7.4.3.3 Use of Pretext
7.5 Surveillance Forms and Reports
7.6 Conclusion
Notes
Chapter 8 Report Writing
8.1 Introduction
8.1.1 Report Writing Promotes Efficiency in the Investigative Process
8.1.2 Reports and Memory
8.1.3 Investigative Reports and Organizational Method
8.1.4 Investigative Reports as Proof of Services Rendered
8.2 Investigative Report Writing: Standards for Authorship
8.2.1 Investigative Field Notes: A Preliminary Step
8.2.2 The Essential Qualities of an Investigative Report: Accurate, Brief, and Complete
8.2.3 Investigative Report Design
8.3 Standard Reports for the Private Investigator
8.3.1 Investigative Activity Reports
8.3.1.1 Daily Reports
8.3.1.2 Review Reports
8.3.1.3 Patrol and Observation Reports
8.3.1.4 Surveillance Reports
8.3.1.5 Missing Person Reports
8.3.1.6 Undercover Investigation Reports
8.3.1.7 Bomb Search Reports
8.3.1.8 Inspection Reports
8.3.1.9 Security Incident Reports
8.3.1.10 Investigative Reports
8.3.1.11 Traffic Reports
8.3.1.12 Property Reports
8.3.1.13 Basic Security Survey
8.3.2 Major Criminal Documentation
8.3.2.1 The Offense Report
8.3.2.2 Arrest Report
8.3.2.3 Defendant’s Statement
8.4 Conclusion
Notes
Chapter 9 Investigative Method and Technique: Theft/Property Offenses
9.1 Introduction
9.2 Shoplifting and Retail Theft
9.2.1 Rationalizations and Justifications for Shoplifting and Retail Theft
9.2.2 Shoplifting Methods
9.2.3 Shoplifting Identification
9.2.4 Shoplifting Investigation
9.3 Internal Theft by Employees
9.3.1 Reasons and Rationales for Internal Theft
9.3.2 Theft Strategies
9.3.3 Investigating Theft
9.3.4 Obtaining Confessions or Statements
9.4 Burglary and the Private Investigator
9.5 Defensive Techniques to Minimize Property Losses from Theft and Burglary
9.5.1 Tactics and Strategies
9.5.1.1 Site Security Surveys and Their Application
9.5.1.2 Determining Organizational Characteristics
9.5.1.3 Theft Tests
9.6 Missing or Stolen Property
9.7 Conclusion
Notes
Chapter 10 Investigative Method and Technique: Insurance Cases
10.1 Introduction
10.2 Investigative Application and Method in Specific Cases
10.2.1 Insurance Property Claims in Fire and Arson
10.2.2 Workers’ Compensation
10.2.3 Disability Claims
10.2.4 Auto Liability Claims
10.2.4.1 Policy Declaration
10.2.4.2 Processing the Auto Liability Case
10.3 Special Problems: Auto Theft, Fraud, and Parts Pilferage
10.3.1 Auto Identification Systems
10.3.1.1 VIN Systems
10.3.1.2 Parts
10.4 Conclusion
Notes
Chapter 11 Investigative Method and Technique: Background Investigations
11.1 Introduction
11.2 Background Investigation Basics
11.3 Background Issues
11.3.1 Establishing Identity
11.3.2 Employment History
11.3.3 Credit History
11.4 Alternative Methods of Background Review
11.4.1 References
11.4.2 Consultative Services
11.4.3 The Polygraph Test
11.5 Comprehensive Background Report
11.6 Conclusion
Notes
Chapter 12 The Security Office: Administrative Issues
12.1 Some General Principles of Office Administration
12.2 Timekeeping Methods
12.3 The Value of Administrative Documents
12.3.1 Software Considerations
12.4 Filing Systems
12.4.1 Setup and Maintenance
12.4.2 Tickler Files
12.4.3 Software Considerations
12.5 Billing
12.5.1 Software Considerations
12.6 Conclusion
People also search for Private Security and the Investigative Process 4th Edition:
private security and investigative services
private investigator article
r.a. private investigation & security inc
private security and investigative services renewal
private q evidence
Tags: Charles P Nemeth, Private Security, Investigative Process