LATEST UPDATE (ALREADY GRADED A+.)
Identify the major goals of a criminal investigation and the steps required to achieve those goals
o Main goal is to solve crime by proving or disproving allegations. Must conduct investigations safely.
o Steps are:
1. Case initiation
2. Assessment of allegation/Information
3. Development of allegation/information
4. Conduct investigation safely (Motive Opportunity Means (MOM))
5. Prepare investigative summary/reports
6. Formal referral to AUSA
7. Process suspects through judicial process
8. Process criminal/civil asset forfeitures
9. Close the investigation
Identify interpersonal and communication skills required to generate rapport and obtain reliable
information.
Interpersonal communication skills include exchanging information and feelings, having a good self-
concept is helpful.
-Rapport is built by fostering trust and respect, often through reciprocity.
-Active listening guidelines include remaining neutral, not interrupting, and paraphrasing
Identify interview planning considerations.
o Officer Safety is #1
o Determine objectives
o 3rd party considerations
o Background of interviewee
o Physical environment
o Interview victims, witnesses, and then suspects when possible
Demonstrate and/or identify the principal components of "Psychological First Aid" techniques and the
communication skills necessary for building effective relationships with victims and witnesses.
You/we/I approach: "You" stage seeks to build rapport and address basic needs, "we" stage stresses that
the interviewer and interviewer both need something from each other (we need to work together), and
the I stage moves to the interviewer's more direct questions/needs
Differentiate how victims' rights and services are mandated by law.
o Victims' Rights and Restitution Act of 1990- services mandated to crime victims
o Crime Victims' Rights Act of 2004: victims' rights once Federal charges begin
Identify the law enforcement interview process.
, o Introduction, Rapport, questions, summary, and close
Demonstrate and/or identify the procedures when conducting interviews with one or two law
enforcement officers to include note taking.
o Primary interviewer established control at the beginning and briefs secondary beforehand. The
secondary interviewer takes notes, may ask follow-up questions, and summarizes interview at the end.
Notes should be taken and/or recorded as soon as possible following the interview.
Demonstrate and/or identify recommended questioning techniques.
o Open ended questions are better than closed-ended.
- Encouraging the interviewee to recall or recreate incidents.
- T.E.D. = "tell, explain, describe."
- Avoid closed ended questions, leading questions, compound questions, complex questions, and "polite
speak"
Demonstrate and/or identify principles of nonverbal communication.
o Proxemics - use of personal space, Haptics - psychology of touch, Environment
Demonstrate and/or identify verbal indicators of truth and deception
o Quantity of details, reproduction of conversation, latency, unprompted self-correction, chronological
order, unusual detail, and number of self-references are indicators.
o Investigators need be mindful of confirmation bias, belief preservation, and "investigator bias"
Demonstrate and/or identify planning considerations for a suspect interview.
o Custodial vs. non-custodial based on situation. Electronic recording is encouraged when permitted,
practical, and in accordance with DHS guidelines. Research case, evidence, and subject info before
interview.
Demonstrate and/or identify the suspect interview method.
o Transition to Strategic Use of evidence (SUE) after building rapport. Summarize the interview and
close.
Recognize the various documents that are acceptable for U.S. Citizens and Foreign Nationals to
present to officials as proof of identity.
o I-551 Permanent Resident Alien Card - good for 10 years
o I-766 Employment authorization/Visa for non-immigrants
Identify the security features found in most common types of identity documents and the techniques
used to detect alteration and counterfeiting of security devices.
o Holograms that appear with backlighting or oblique lighting are used to protect photo.
o Optically variable ink (OVI) looks different under certain angles
Recognize common methods for altering and counterfeiting identity documents.