SlideShare a Scribd company logo
1 of 14
Private
Investigations
Aim of Session
• To provide an overview of :
• Investigations in general.
• Private investigations.
• Private investigations vs. public law.
enforcement investigations.
Introduction
Definition of investigations
• To try to find out the facts about something, (such as a crime or
an accident) in order to learn how it happened, who did it, etc.
www.merriam-webster.com
• The act or process of examining a crime, problem, statement,
etc. carefully, especially to discover the truth.
http://dictionary.cambridge.org
Why investigate?
• Commitment to Customer.
• Find theTrue Cause.
• Eliminate that Cause.
• Analyze the entire safety and security system.
• Prevent future incident.
Types of investigations
• Pre-employment screening
• Incident.
• Accident.
• Internal theft.
• Fraud.
• Product liability.
• Industrial espionage.
Elements of investigations
• Organisation and preparation.
• Investigation meetings and interviews.
• Evidence gatherings.
• Writing investigation reports.
Private Investigations
Role of private investigator
• Pre-employment screening.
• Incident response.
• Conducting civil investigations .
• Expose frauds and wrongdoers.
• Testify in courts.
Area of operations
• Private organizations.
• Personal.
• Intelligence and background screening.
Private investigations
vs.
public law enforcement
investigations
Public law enforcement investigations
• Conducted by sworn state or federal police officers.
• Ability to make an arrest.
• Privileged access to information.
• Equipment and resources at will.
• All expenses are covered.
Private investigations
• Conducted by civil citizens.
• No lawful power to arrest .
• Restricted access to government information.
• Resources and equipment at own expense.
Thank you
Abdelhadi Loukili

More Related Content

What's hot (20)

Crime detection
Crime detectionCrime detection
Crime detection
 
Dying declaration ppt siddharth singh
Dying declaration ppt   siddharth singhDying declaration ppt   siddharth singh
Dying declaration ppt siddharth singh
 
Chapter 9 Developmental Theories: Latent Trait and Life CourseChapter 9 De...
Chapter  9Developmental Theories: Latent Trait and Life CourseChapter  9 De...Chapter  9Developmental Theories: Latent Trait and Life CourseChapter  9 De...
Chapter 9 Developmental Theories: Latent Trait and Life CourseChapter 9 De...
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Criminal law
Criminal lawCriminal law
Criminal law
 
Types of Crime
 Types of Crime  Types of Crime
Types of Crime
 
The Elements of a Crime
The Elements of a CrimeThe Elements of a Crime
The Elements of a Crime
 
Victim's Rights
Victim's RightsVictim's Rights
Victim's Rights
 
Qde reviewer
Qde reviewerQde reviewer
Qde reviewer
 
Interview & Interrogation
Interview & Interrogation Interview & Interrogation
Interview & Interrogation
 
Nature of Crime
Nature of CrimeNature of Crime
Nature of Crime
 
Narco analysis Technique
Narco analysis TechniqueNarco analysis Technique
Narco analysis Technique
 
Modus operandi
Modus operandiModus operandi
Modus operandi
 
CRIME SCENE MANAGEMENT COMPILED
CRIME SCENE MANAGEMENT COMPILEDCRIME SCENE MANAGEMENT COMPILED
CRIME SCENE MANAGEMENT COMPILED
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Evidence
EvidenceEvidence
Evidence
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Forensic Psychology - Rights of Victim
Forensic Psychology - Rights of VictimForensic Psychology - Rights of Victim
Forensic Psychology - Rights of Victim
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
First Responder Officer in Cyber Crime
First Responder Officer in Cyber CrimeFirst Responder Officer in Cyber Crime
First Responder Officer in Cyber Crime
 

Viewers also liked

владислав володин семинар Prom.ua - хмельницкий 2017 февраль
владислав володин   семинар Prom.ua - хмельницкий 2017 февральвладислав володин   семинар Prom.ua - хмельницкий 2017 февраль
владислав володин семинар Prom.ua - хмельницкий 2017 февральVlad Volodin
 
Walter russell’s cosmology byJohn EchEl
Walter russell’s cosmology byJohn EchElWalter russell’s cosmology byJohn EchEl
Walter russell’s cosmology byJohn EchElNano Nate
 
Data Warehouse Design Project
Data Warehouse Design ProjectData Warehouse Design Project
Data Warehouse Design ProjectPradeep Yamala
 
阿里研究院- 新零售研究报告
阿里研究院- 新零售研究报告阿里研究院- 新零售研究报告
阿里研究院- 新零售研究报告Tony Ho
 
Научно образовательный центр «Интеллектика»
Научно образовательный центр «Интеллектика»Научно образовательный центр «Интеллектика»
Научно образовательный центр «Интеллектика»vogu35
 
Праздник, посвящённый Дню Защитника Отечества
Праздник, посвящённый Дню Защитника ОтечестваПраздник, посвящённый Дню Защитника Отечества
Праздник, посвящённый Дню Защитника ОтечестваIrina Kutuzova
 
Hosam maxillofascial ppt
Hosam maxillofascial pptHosam maxillofascial ppt
Hosam maxillofascial pptHossam atef
 
3Com 03-0287-001 E-2
3Com 03-0287-001 E-23Com 03-0287-001 E-2
3Com 03-0287-001 E-2savomir
 

Viewers also liked (15)

Ikhtiologi riska
Ikhtiologi riskaIkhtiologi riska
Ikhtiologi riska
 
Documento di Buona Causa
Documento di Buona CausaDocumento di Buona Causa
Documento di Buona Causa
 
владислав володин семинар Prom.ua - хмельницкий 2017 февраль
владислав володин   семинар Prom.ua - хмельницкий 2017 февральвладислав володин   семинар Prom.ua - хмельницкий 2017 февраль
владислав володин семинар Prom.ua - хмельницкий 2017 февраль
 
Así es hoy el cv perfecto
Así es hoy el cv perfectoAsí es hoy el cv perfecto
Así es hoy el cv perfecto
 
Walter russell’s cosmology byJohn EchEl
Walter russell’s cosmology byJohn EchElWalter russell’s cosmology byJohn EchEl
Walter russell’s cosmology byJohn EchEl
 
Data Warehouse Design Project
Data Warehouse Design ProjectData Warehouse Design Project
Data Warehouse Design Project
 
阿里研究院- 新零售研究报告
阿里研究院- 新零售研究报告阿里研究院- 新零售研究报告
阿里研究院- 新零售研究报告
 
Научно образовательный центр «Интеллектика»
Научно образовательный центр «Интеллектика»Научно образовательный центр «Интеллектика»
Научно образовательный центр «Интеллектика»
 
Праздник, посвящённый Дню Защитника Отечества
Праздник, посвящённый Дню Защитника ОтечестваПраздник, посвящённый Дню Защитника Отечества
Праздник, посвящённый Дню Защитника Отечества
 
Puisi untuk tuhan
Puisi untuk tuhanPuisi untuk tuhan
Puisi untuk tuhan
 
Asas maths campur
Asas maths campurAsas maths campur
Asas maths campur
 
Contact sheet
Contact sheetContact sheet
Contact sheet
 
Hosam maxillofascial ppt
Hosam maxillofascial pptHosam maxillofascial ppt
Hosam maxillofascial ppt
 
3Com 03-0287-001 E-2
3Com 03-0287-001 E-23Com 03-0287-001 E-2
3Com 03-0287-001 E-2
 
Les energies renovables.
Les energies renovables.Les energies renovables.
Les energies renovables.
 

Similar to Introduction to investigation

Building an enterprise forensics response service
Building an enterprise forensics response serviceBuilding an enterprise forensics response service
Building an enterprise forensics response serviceSeccuris Inc.
 
Internal Auditors Association
Internal Auditors AssociationInternal Auditors Association
Internal Auditors Associationmurnan
 
Cyber security series vulnerability assessments
Cyber security series   vulnerability assessmentsCyber security series   vulnerability assessments
Cyber security series vulnerability assessmentsJim Kaplan CIA CFE
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcementMeg Weber
 
Ethical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationEthical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationJay Nagar
 
Private Investigation
Private InvestigationPrivate Investigation
Private InvestigationFreddyClaus
 
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime NetworksTHOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime NetworksJohn Bambenek
 
fy14_sh-27638-sh4_Incident-Investigation.pptx
fy14_sh-27638-sh4_Incident-Investigation.pptxfy14_sh-27638-sh4_Incident-Investigation.pptx
fy14_sh-27638-sh4_Incident-Investigation.pptxRezi Purnama
 
Fraud investigations session 2 slides
Fraud investigations session 2 slidesFraud investigations session 2 slides
Fraud investigations session 2 slidesZeeshan Shahid
 
Claims club 2015-16, London and Birmingham
Claims club 2015-16, London and BirminghamClaims club 2015-16, London and Birmingham
Claims club 2015-16, London and BirminghamBrowne Jacobson LLP
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesMeg Weber
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsSam Bowne
 
Investigating Misconduct: Reaching a Decision and Determining Root Causes
Investigating Misconduct: Reaching a Decision and Determining Root CausesInvestigating Misconduct: Reaching a Decision and Determining Root Causes
Investigating Misconduct: Reaching a Decision and Determining Root CausesCase IQ
 
Forensic Accounting Scope
Forensic Accounting ScopeForensic Accounting Scope
Forensic Accounting Scopeinfantemiliya
 
164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.pptharshbj1801
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)Sam Bowne
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 

Similar to Introduction to investigation (20)

Building an enterprise forensics response service
Building an enterprise forensics response serviceBuilding an enterprise forensics response service
Building an enterprise forensics response service
 
Internal Auditors Association
Internal Auditors AssociationInternal Auditors Association
Internal Auditors Association
 
Cyber security series vulnerability assessments
Cyber security series   vulnerability assessmentsCyber security series   vulnerability assessments
Cyber security series vulnerability assessments
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcement
 
Ethical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationEthical Hacking and Defense Penetration
Ethical Hacking and Defense Penetration
 
Private Investigation
Private InvestigationPrivate Investigation
Private Investigation
 
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime NetworksTHOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
 
fy14_sh-27638-sh4_Incident-Investigation.pptx
fy14_sh-27638-sh4_Incident-Investigation.pptxfy14_sh-27638-sh4_Incident-Investigation.pptx
fy14_sh-27638-sh4_Incident-Investigation.pptx
 
Fraud investigations session 2 slides
Fraud investigations session 2 slidesFraud investigations session 2 slides
Fraud investigations session 2 slides
 
Claims club 2015-16, London and Birmingham
Claims club 2015-16, London and BirminghamClaims club 2015-16, London and Birmingham
Claims club 2015-16, London and Birmingham
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM Operations
 
The golden hour
The golden hour  The golden hour
The golden hour
 
Difference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptxDifference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptx
 
Investigating Misconduct: Reaching a Decision and Determining Root Causes
Investigating Misconduct: Reaching a Decision and Determining Root CausesInvestigating Misconduct: Reaching a Decision and Determining Root Causes
Investigating Misconduct: Reaching a Decision and Determining Root Causes
 
Forensic Accounting Scope
Forensic Accounting ScopeForensic Accounting Scope
Forensic Accounting Scope
 
What to do when get hacked or suffer a cyber breach
What to do when get hacked or suffer a cyber breachWhat to do when get hacked or suffer a cyber breach
What to do when get hacked or suffer a cyber breach
 
164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 

Recently uploaded

一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理e9733fc35af6
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...ZurliaSoop
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理Airst S
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Abdul-Hakim Shabazz
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Nilendra Kumar
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理Airst S
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理bd2c5966a56d
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理ss
 
Article 12 of the Indian Constitution law
Article 12 of the Indian Constitution lawArticle 12 of the Indian Constitution law
Article 12 of the Indian Constitution lawyogita9398
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理Airst S
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in LawNilendra Kumar
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样mefyqyn
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理e9733fc35af6
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersJillianAsdala
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 

Recently uploaded (20)

一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy NovicesIt’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
Article 12 of the Indian Constitution law
Article 12 of the Indian Constitution lawArticle 12 of the Indian Constitution law
Article 12 of the Indian Constitution law
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 

Introduction to investigation

  • 2. Aim of Session • To provide an overview of : • Investigations in general. • Private investigations. • Private investigations vs. public law. enforcement investigations.
  • 4. Definition of investigations • To try to find out the facts about something, (such as a crime or an accident) in order to learn how it happened, who did it, etc. www.merriam-webster.com • The act or process of examining a crime, problem, statement, etc. carefully, especially to discover the truth. http://dictionary.cambridge.org
  • 5. Why investigate? • Commitment to Customer. • Find theTrue Cause. • Eliminate that Cause. • Analyze the entire safety and security system. • Prevent future incident.
  • 6. Types of investigations • Pre-employment screening • Incident. • Accident. • Internal theft. • Fraud. • Product liability. • Industrial espionage.
  • 7. Elements of investigations • Organisation and preparation. • Investigation meetings and interviews. • Evidence gatherings. • Writing investigation reports.
  • 9. Role of private investigator • Pre-employment screening. • Incident response. • Conducting civil investigations . • Expose frauds and wrongdoers. • Testify in courts.
  • 10. Area of operations • Private organizations. • Personal. • Intelligence and background screening.
  • 11. Private investigations vs. public law enforcement investigations
  • 12. Public law enforcement investigations • Conducted by sworn state or federal police officers. • Ability to make an arrest. • Privileged access to information. • Equipment and resources at will. • All expenses are covered.
  • 13. Private investigations • Conducted by civil citizens. • No lawful power to arrest . • Restricted access to government information. • Resources and equipment at own expense.