***** The Process of Investigation: Concepts and Strategies for Investigators in the Private Sector, Third Edition. By Charles A. Sennewald, CPP, CSC, and John K. Tsukayama, CPP, CFE, PCI; published by Butterworth-Heinemann, available from ASIS, item #1693, 703/519-6200 (phone), www.asisonline.org (Web); 344 pages; $60 (ASIS members), $66 (nonmembers).
The third edition of The Process of Investigation: Concepts and Strategies for Investigators in the Private Sector is one of the most complete references on investigation I have read, in large part because the authors stay true to the topic. The book begins with clear definitions of public and private sector investigations, differentiating between the two economically. Private sector investigators must remain cognizant of the unique legal landscape in which they operate.
The authors explain the relevance of the investigative process and its application. It is not just for solving crimes—it can help prevent them through processes such as background checks on prospective employees.
The book’s organization is particularly helpful. Each section focuses on a different aspect of an investigation, walking the reader through the process step-by-step. The authors explain not only how to collect information, but also how to act on it to achieve a desired solution.
The authors further provide an outstanding overview of resources available to investigators and give instruction on how to take advantage of them. They cover trends in cameras, computers, and other technology, giving highlights of their strengths, weaknesses, and applications. Other sections, addressing ancillary issues such as educational requirements, are thorough as well.
The book is quite dry and technical, however. It is, therefore, best suited as an academic source for the graduate student or as a desk reference for the security professional. That limitation aside, I highly recommend it.
Reviewer: William F. Eardley IV is a veteran law enforcement and security professional, holding a master’s degree in liberal studies and a graduate certificate in information security from Eastern Michigan University. He is a member of ASIS International.