Surveillance & PI Tradecraft

Practical guides to surveillance methodology, private investigation techniques, and field operations — including foundational Australian and UK industry texts.

Surveillance Tradecraft: The Professional's Guide to Surveillance Training

Peter Jenkins

Intel Publishing, 2010 (3rd Edition)

Comprehensive 461-page professional training manual. Author: 12 years Royal Marines specialising in reconnaissance, intelligence, and counter-terrorism. 500+ colour photographs.

UK Industry Standard Surveillance

Advanced Surveillance: The Complete Manual of Surveillance Training

Peter Jenkins

Intel Publishing, 2003

Advanced techniques building on foundational surveillance methodology. Covert operations, counter-surveillance, and specialist tradecraft.

UK Advanced

Covert Surveillance

Peter Jenkins

Intel Publishing, 1999

Foundation text in the Jenkins surveillance series. Core principles of covert observation and evidence gathering.

UK Foundation

The Private Investigators Handbook / The Investigators Guide

Ashley Keith — Bay Island Group, Queensland

Out of Print

Accepted as "the bible" for training investigators throughout Australia. The expanded edition (460 pages) incorporates the original contents and adds substantially. Now out of print and rare.

Australian Industry Standard Out of Print
Behind the Private Eye

Behind the Private Eye: Surveillance Tales & Techniques

Chris Cooper

2005, 543 pages

Real-world surveillance operations from an experienced Australian PI. Covers mobile, static, and rural surveillance techniques. Used in TAFE investigator training programs.

Australian Surveillance

Basic Private Investigation Manual

Marshall

2005

Foundation text covering core private investigation methodology, evidence handling, and operational procedures.

Investigation Foundation

The Everything Private Investigation Book

Stephens

2008

Comprehensive overview of private investigation services, techniques, and business operations.

Investigation Security

Private Investigator's Instant Success Secrets

Day

c. 2008

Practical guidance on investigation business operations, client management, and professional development.

Investigation Business

Interview & Interrogation

Industry-standard texts on interview methodology, statement analysis, and investigative questioning techniques.

Criminal Interrogation and Confessions - Reid Technique

Essentials of the Reid Technique: Criminal Interrogation and Confessions

John E. Reid & Associates

The Reid Technique — foundational methodology for investigative interviewing, behavioural analysis, and structured interrogation procedures used by law enforcement and private investigators worldwide.

Reid Technique Industry Standard

Interviewing and Interrogation

Rabon

1992

Comprehensive guide to interview techniques, statement analysis, and detecting deception in investigative settings.

Investigation Fraud

Fraud Investigation & Forensic Accounting

Reference materials supporting fraud detection, financial analysis, and investigative accounting methodologies.

Forensic Accounting and Fraud Investigation for Non-Experts

Forensic Accounting and Fraud Investigation for Non-Experts

Silverstone, Sheetz, Pedneault & Rudewicz

2007 (2nd Edition)

Practical guide to forensic accounting techniques, fraud schemes recognition, financial statement analysis, and investigation methodology for non-accountants.

Forensic Accounting Fraud Detection

Fraud Auditing and Forensic Accounting

Bologna & Lindquist

1995

Foundation text on fraud auditing methodology, investigative accounting, and financial crime detection techniques.

Fraud Governance

Essential Guide to Workplace Investigations

Guerin

Comprehensive guide to conducting workplace investigations including harassment, fraud, misconduct, and policy violations.

Workplace WHS Fraud

Security & Risk Management

Professional texts on security operations, risk assessment, close protection, and information security management.

Risk Management for Security Professionals

Roper

1999

Comprehensive framework for security risk assessment, threat analysis, and protective measures implementation.

Risk Management Security

Information Security Based on ISO 27001/ISO 27002

Calder & Van Bon

2009

Implementation guide for ISO 27001 information security management systems and ISO 27002 security controls.

ISO 27001 InfoSec Governance

Industrial Espionage: Developing a Counterespionage Program

Benny

2013

Comprehensive guide to protecting corporate assets from industrial espionage, including TSCM, information security, and counterintelligence measures.

Counterespionage TSCM Corporate Security

The Modern Bodyguard

Peter Consterdine

1997/2006

Definitive text on close protection operations, threat assessment, advance work, and principal protection methodology.

Close Protection Risk Management

Streetwise

Peter Consterdine

1998

Personal security awareness, threat recognition, and practical self-protection strategies for security professionals.

Security WHS

Fit to Fight

Peter Consterdine

1997

Physical preparedness and defensive tactics for security operatives and close protection professionals.

Security WHS

100 Deadly Skills

Clint Emerson

2015

Survival and operational skills from a former Navy SEAL. Practical techniques for security professionals and field operatives.

Security Field Skills

Digital Forensics

Technical references supporting computer forensics, mobile device analysis, and electronic evidence handling.

Computer Evidence: Collection and Preservation

Computer Evidence: Collection and Preservation

Christopher L.T. Brown

Technical guide to digital evidence collection, chain of custody procedures, forensic imaging, and data preservation methodologies.

Digital Forensics Evidence
Digital Forensics for Handheld Devices

Digital Forensics for Handheld Devices

Eamon P. Doherty

Mobile device forensics including smartphones, tablets, and portable electronics. Data extraction, recovery techniques, and analysis methodologies.

Mobile Forensics Data Recovery

Professional Development

The reference library represented ongoing commitment to professional development and evidence-based practice. These texts complemented formal qualifications including the Post Graduate Certificate in Fraud Investigation (Charles Sturt University), Advanced Diploma in Cell Phone Forensics (IFS), and certifications in information security (CISSP, CISM, CISA).

Selected titles were also available through the PJL Online Store (2003-2015), providing resources to fellow investigators and security professionals.