ABSTRACT

Aer reading this chapter, you should be able to: 1. Explain the purposes of investigations and the foundation of suc-

cessful investigations 2. Describe fraud, internal the, shopliing, and robbery investiga-

tions and the guidelines for each 3. Explain ten guidelines for interviewing suspects 4. Detail the priorities at a crime scene 5. List ten major sources of information for investigators 6. Discuss the varied purposes and types of surveillance, applicable

equipment, and guidelines 7. Describe private-sector undercover investigations 8. Explain the characteristics of superior investigative reports 9. Detail guidelines for testifying 10. Describe how technology and forensic science are helpful to

investigations

investigation proprietary investigation

contract investigation workplace investigation undercover investigation litigation investigation due-diligence investigation fraud board of directors Foreign Corrupt Practices Act of 1977 general counsel mens rea actus reus detention chain of custody of evidence civil recovery interviewing oensive interviewing closed-ended question open-ended question rapport rationalization subpoena duces tecum interrogation Miranda warnings NLRB v. J. Weingarten Inc., No. 251 (1975) information brokers pretexting Gramm-Leach-Bliley Act of 1999 Telephone Records and Privacy Protection Act of 2006 traditional surveillance stationary surveillance mobile surveillance prop perjury link analysis neural net technology Employee Polygraph Protection Act of 1988 lie detector polygraph forensic science Alphonse Bertillon Sir Francis Galton Alec Jereys CSI eect

Introduction is chapter contains three major sections: (1) types of and guidelines for investigations, (2) techniques of investigation, and (3) technology and forensic science. Four major types of investigations (i.e., fraud, internal the, shopliing, and robbery) are described so that the reader can understand how these investigations are conducted while comparing and contrasting each. General techniques of investigation, such as interviewing and surveillance, are explained to provide a foundation for many types of investigations. e chapter ends with a discussion of technology and forensic science and the relevance to private security investigations. Contrary to what is depicted in television programs and movies, investigative work entails painstaking perseverance that can last for years for certain cases, adherence to legal and constitutional requirements, the likelihood that a case can be solved without the services of a crime laboratory (and if such services are needed, tests oen require more than ten minutes), signicant “paperwork,” and the possibility that the defendant will go free.