NCJ Number
              30148
          Journal
  Assets Protection Volume: 1 Issue: 2 Dated: (SUMMER 1975) Pages: 5-16
Date Published
  1975
Length
              12 pages
          Annotation
              VOICEPRINT IDENTIFICATION, VOICE SCAN SPECTROGRAPHS, PSYCHOLINGUISTIC ANALYSIS, AND PSYCHOLOGICAL STRESS EVALUATORS ARE DISCUSSED AS AIDS FOR THE INVESTIGATION OF EXTORTION THREATS.
          Abstract
              THE PROPER METHOD OF RECORDING TELEPHONE CONVERSATIONS FOR EVIDENTIARY PURPOSES IS LAID OUT. THIS ARTICLE OFFERS AN INTRODUCTION TO THE OVERALL PHENOMENA OF EXTORTION, GIVING THE BROAD LEGAL DEFINITION OF EXTORTION, SHOWING THE VARIETIES OF EXTORTIONATE THREATS, AND INTRODUCING SEVERAL THREAT ANALYSIS RESOURCES AND TECHNIQUES THAT CAN ASSIST IN DETERMINING THE VERACITY OF THE EXTORTIONIST AND THE EXTORTION DEMAND. THESE TECHNIQUES MAY ALSO ASSIST IN REVEALING THE CHARACTER OF THE EXTORTIONIST, OR HIS ACTUAL IDENTITY. IN ADDITION, SOME OF THESE TECHNIQUES AND RESOURCES MAY AID IN LOCATING THE EXTORTIONIST. (AUTHOR ABSTRACT MODIFIED)
          