Printer Friendly

Secrets of Top Pls: How to Conduct an Investigation.

Secrets of Top Pls: How to Conduct an Investigation. By Joseph Hoover and Anni Adkins; published by AHHA Publishing, 541/862-8022 (phone and fax); 345-page book and two 2-hour videotapes; $149.95.

The best investigators are like the best practitioners in any other profession. They not only have mastered the fundamentals of their craft, but they also have developed their unique strengths and talents, which enable them to improve on these fundamentals. Basic training manuals are, in other words, only the first step for those who want to excel, but they can be an important first step.

This manual and tape set helps investigators move toward their goal. Beyond setting out the nuts and bolts of private investigation, it is loaded with insider tips, strategies, and resources. Four hours of videotape provide up-close, unrehearsed interviews with some of the top investigators in the United States. Filmed on location in their own work environments, the experts explain the many strategies and techniques that they and other top investigators use.

The manual is divided into six well-organized, easy-to-read sections, covering everything from finding sources of information to learning to succeed as a private investigator. Also included are numerous samples of investigative forms, mail and Web addresses, and phone numbers of some of the best resources available. Licensing requirements and public records information are presented for all fifty states.

An unparalleled reference, this set is highly recommended for in-house investigators and for private firms responsible for training new investigators. It is also valuable for professors teaching courses on investigations or careers in criminal justice.

Reviewer: Johnny R May, CPP, CPO (certified protection officer), coordinates the Security & Private Investigation degree program at Henry Ford Community College in Dearborn, Michigan. He is a member of the ASIS Standing Committee on Academic Programs.
COPYRIGHT 2000 American Society for Industrial Security
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2000 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:Review
Author:May, Johnny R.
Publication:Security Management
Article Type:Book Review
Date:Apr 1, 2000
Previous Article:e-Policy: How to Develop Computer, E-Mail, and Internet Guidelines to Protect Your Company and Its Assets.
Next Article:The Limits of Privacy.

Related Articles
The interim security clearance.
Reinvestigations - are they really necessary?
Background checks.
Troubled security clearance program needs fixing.
Spiraling spy game.
Security clearance moratorium is lifted.

Terms of use | Privacy policy | Copyright © 2019 Farlex, Inc. | Feedback | For webmasters