Please ensure you are using the correct version of the Manual and Q&A for the exam you will be sitting. Find out more.
Dismiss
Show Summary Details
Covert Investigation

Covert Investigation

Clive Harfield and Karen Harfield
Page of

date: 13 December 2024

p. 534 Understanding the Operating Environmentlocked

p. 534 Understanding the Operating Environmentlocked

  • Clive Harfield
  • , and Karen Harfield

Abstract

This chapter discusses the operating environment, which requires a holistic recognition of the vulnerability and harm landscape to appropriately manage systemic and individual interventions that may be needed along the continuum of corruption. It highlights how the acquisition, security, use, and dissemination of information are obtained by covert investigation methods. It also details the creation of an arena vulnerable to compromise and a market for corruption in which the lack of sufficient competence can have significant adverse consequences. The chapter looks at corruption vulnerability awareness, which is the foundation of resistance and resilience against corruption. It covers information about investigation targets, tactics, and techniques that is of high value to those being investigated.

You do not currently have access to this chapter

Sign in

Please sign in to access the full content.

Subscribe

Access to the full content requires a subscription