Just when you thought there was nothing new to learn, the author has created the most concise investigative guide to business intelligence and the social media. This powerful resource contains useful insights and proven successful techniques the reader can apply immediately. Step-by-step examples coupled with proven strategies and a detailed practical approach all lead to achieving better results. Hetherington's methods appeal to and educate readers at all levels of expertise.
It is easier to paint a pretty picture than to hide a checkered past. In business, a company's future can depend upon what it knows about a competitor, vendor, customer or potential partner. The difference between entering a profitable relationship or costly litigation can hinge on an effective business background investigation. A smart businessperson checks to see if there are hidden past financial problems, principals with criminal records, or a history of lawsuits. Business Background Investigations provides the tools and techniques needed to investigate any business entity and uncover the details essential for success in a highly competitive environment.
Financial crimes and scandals constantly victimize sophisticated companies, investors, executives, and business deal-makers. Whether you’re planning a major investment, a corporate acquisition, or merger, you can’t afford to have it happen to you. In Digging for Disclosure , the leaders of a world-class corporate investigations firm show you exactly how to protect yourself from financial fraud. Kenneth Springer and Joelle Scott draw on decades of experience as investigators working for top clients. They present dozens of stunning stories of real-world financial malfeasance, as well as powerful lessons and techniques for recognizing the signals of fraud, and successfully exposing it. You’ll discover little-known databases for uncovering what corporate criminals don’t want you to know—and how to go beyond the Internet to find crucial information that only exists offline. Springer and Scott show how to “think like a swindler”… track down fraud both before and after a transaction… gather crucial competitive intelligence… find hidden assets such as co-op real estate… uncover foreign criminal convictions… understand a potential borrower’s true financial situation… perform background checks on corporations… even investigate the potential involvement of organized crime. You can’t afford not to know who you’re dealing with. Digging for Disclosure will help you make sure you do—always.
"In this book, you will discover hard-to-find public information through the advanced use of search engines and social networks; learn insider secrets for finding detailed information on people and businesses; access detailed state-by-state profiles to know which types of records can be found online and what they will reveal. 11,000+ sites examined; locate the best online vendors for your specific needs; also includes a chapter dedicated to the fundamentals of searching public records online; and replaces the 6th edition of Public Records Online."--BOOK JACKET.
Both authors have bought and sold several businesses, and here they explain the process in simple, easy-to-follow steps that cover all the basics such as market, products, insurance facilities, assets and short and long term liabilities.
Security Operations Management, 3rd edition, is the latest edition the seminal reference on corporate security management operations for today's security management professionals and students. The book explores the characteristics of today's globalized workplaces, why security has a key role within them, and what the greatest concern are to security practitioners and senior managers. Incorporating the latest security research and best practices, updates to Security Operations Management 3rd edition include explorations of the key skills needed by security managers to demonstrate the value of their security program, greater emphasis on identifying and managing risk, and coverage of the latest technological advances in security control, command, communications, and computing. The third edition also delves more deeply than previous editions into online security training practices, as well as investigates the changing roles of women and minorities in security operations. - Includes all-new cases and examples—including from outside the U.S.—providing coverage of both the business and technical aspects of security - Offers increased coverage of cybercrime and workplace violence - Explores the latest technological advances in security control, command, communications, and computing, and current techniques for how prospective security personnel are vetted, including how to use social media - Prepares security professionals for professional certification exams
Finally there is a reference source that brings together all the available anti-money laundering and Bank Secrecy Act guidance and best practices for conducting suspicious activity report (SAR) investigations. This book offers a treasure trove of information that will make your SAR process more efficient while simultaneously reducing compliance risk. The authors detail how to conduct suspicious activity investigations in a step-by-step manner and provide all the information you'll need to understand and identify a full range of financial crimes and schemes.
Since the publication of the first edition of this volume, many new certification programs have begun in private and community colleges, including a course designed by the author for Boston University and a specialty certification by the U.S. Association for Professional Investigators. Reflecting the surge in interest into the investigative fi
"Due Diligence Handbook provides business directors with a practical and authoritative guidance to minimising financial and legal risks, as well as risks to reputation. The book brings together practical information on relevant legislation, regulations, codes and best practice guidance in one volume." "The book provides clear guidance and case studies to help understand the complexity of due diligence issues, and to demonstrate the detailed work that is necessary to ensure that the benefits of an acquisition can be realised and that there are no unexpected problems."--BOOK JACKET.
The manner in which criminal investigators are trained is neither uniform nor consistent, ranging from sophisticated training protocols in some departments to on-the-job experience alongside senior investigators in others. Ideal for students taking a first course in the subject as well as professionals in need of a refresher, Introduction to Criminal Investigation uses an accessible format to convey concepts in practical, concrete terms. Topics discussed include: The history of criminal investigation in Western society Qualifications for becoming an investigator, the selection process, and ideal training requirements Crime scene search techniques, including planning and post-search debriefing Preparing effective field notes and investigative reports Interviewing and interrogating Types of evidence found at the crime scene and how to collect, package, and preserve it The contributions of forensic science to criminal investigations and the equipment used in crime labs Investigative protocol for a range of crimes, including property crimes, auto theft, arson, financial crimes, homicide, assault, sex crimes, and robbery Specialized investigations, including drug trafficking, cybercrime, and gang-related crime Legal issues involved in criminal investigations and preparing a case for trial Bringing together contributions from law enforcement personnel, academics, and attorneys, the book combines practical and theoretical elements to provide a comprehensive examination of today‘s criminal investigative process. The accessible manner in which the information is conveyed makes this an ideal text for a wide-ranging audience.