Inge Sebyan Black

Home > Other > Inge Sebyan Black > Page 24
Inge Sebyan Black Page 24

by 4<8=8AB@0B>@


  questions and incriminating ones.

  48. Only use Miranda when subject is not free to go.

  49. Keep an open mind.

  50. Don’t keep time.

  51. Have a private location.

  52. Select the location yourself.

  53. Know when to shut up and be silent.

  54. Prepare the seating arrangement prior to the interview.

  55. Start with small talk.

  56. Use deception sparingly.

  57. Set the room so your comfortable level.

  58. Establish common ground.

  59. Know when to stop, pause, be silent, and be direct and indirect.

  60. Take notes and bring a notebook.

  61. Know when to get help or call an expert.

  62. Dare to ask tough questions.

  63. Choose questions wisely.

  64. Avoid third-degree questioning.

  65. Ask closed questions when necessary.

  66. Ask open-ended questions when needed.

  Investigative Interviewing: One Hundred Things You Should Know

  161

  67. Keep questions simple.

  68. Hide your personal values.

  69. Maintain a neutral stance.

  70. Be patient and break the interviewee’s pat story.

  71. Control personal anger.

  72. Avoid using coercive behaviors.

  73. Be nonjudgmental.

  74. Use active listening skills.

  75. Consider the human needs of the interviewee.

  76. Be respectful.

  77. Build trust.

  78. Be flexible with your methods.

  79. Be creative; think outside the box.

  80. Let the interviewee talk.

  81. Develop a rapport.

  82. Watch for behavioral clues such as gestures, facial expressions, and

  tone of voice.

  83. Follow your instincts.

  84. Wait till you have enough leverage before you hit that home run.

  85. Know when to be aggressive.

  86. Practice, practice, and practice.

  87. Wear a suit and tie when it might be warranted.

  88. Dress casually if it fits the interview setting and style.

  89. Control personal anger.

  90. Maintain a neutral stance.

  91. Apply flexible methods.

  92. Cover suspiciousness.

  93. Manage your time.

  94. Remember the 14th Amendment regarding due process and equal

  protection.

  95. Remember the importance of a well-written report.

  96. Use benchmarking.

  97. Remember your code of ethics.

  98. Use professional conduct.

  99. Validate information.

  100. Don’t get sucked into the trap of familiarity.

  CONCLUSION

  The investigative interview is an art because each of us makes it such. Each of

  you will bring your own style, technique, and personality to each of your

  interviews.

  It is my hope that something in this book will help you examine your

  own values, beliefs, ethics, and behavior and will help you to be a successful

  interviewer. Remember to treat everyone with respect and work on build-

  ing relationships that allow for dialogue.

  The most powerful advice that I can give to you is to practice, practice,

  and practice and to embrace your art.

  163

  REFERENCES

  Anastasi, J., 2003. The New Forensics: Investigating Corporate Fraud and the Theft of Intel-

  lectual Property. Wiley, Hoboken, NJ.

  Barefoot, J.K., 1990. Employee Theft Investigation, second ed. Butterworth, Boston.

  Davia, H.R., 2000. Accountant’s Guide to Fraud Detection and Control, second ed. Wiley,

  New York.

  Doig, A., 2012. Fraud: The Counter Fraud practitioner’s Handbook. Ashgate Publishing,

  Farnham.

  Felson, M., Clarke, R.V., 1997. Business and Crime Prevention. Criminal Justice Press,

  Monsey, NY.

  Fischer, R., Halibozek, E., 2013. Introduction to Security, nineth ed. Elsevier, Amsterdam.

  Fischer, R.J., Green, G., 2004. Introduction to Security, seventh ed. Butterworth-

  Heinemann, Amsterdam.

  Fischer, R.J., Halibozek, E.P., 2013. Introduction to Security, nineth ed. Butterworth-

  Heinemann, Waltham, Mass.

  Friedrichs, D.O., 2010. Trusted Criminals: White Collar Crime in Contemporary Society,

  fourth ed. Wadsworth Cengage Learning, Belmont.

  Gordon, N.J., Fleisher, W.L., 2011. Effective Interviewing and Interrogation Techniques,

  third ed. Academic Press, Burlington, MA.

  Harrendorf, S., Heiskanen, M., Malby, S., 2010. International Statistics on Crime and Justice.

  European Institute for Crime Prevention and Control, affiliated with the United Nations

  (HEUNI), Helsinki.

  Herlihy, B., Corey, G., 2006. Ethics Surrounding Interviewing, sixth ed. American Counsel-

  ing Association, Alexandria, VA.

  Hewlett-Packard’s pretexting scandal: hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, 109th Congress, second session, September 28, 2006. 2006. US GPO, Washington.

  August 1999, The review of metaphysics. J. Philos. 96 (8), (Bibliography), XCIV, 9,

  September 1, 1997.

  Killinger, B., 2007. Integrity: Doing the Right Thing for the Right Reason. McGill-Queen’s

  University Press, Montreal.

  Lord, V.B., Cowan, A.D., 2011. Interviewing in Criminal Justice: Victims, Witnesses, Cli-

  ents, and Suspects. Jones and Bartlett, Sudbury, MA.

  Lyman, M.D., 1999. Criminal Investigation: The Art and the Science, second ed. Prentice

  Hall, Upper Saddle River, NJ.

  Luftig, J.T., Ouettette, S., May 3, 2009. The Decline of Ethical Behavior in Business.

  Matsumoto, D.H., 2011, June 1. Evaluating truthfulness and detecting deception. The FBI

  Law Enforcement Bulletin. 1, 1.

  Mendell, R.L., 1997. How to Conduct Business Investigations and Competitive Intelligence

  Gathering. Thomas Investigative Publications, Austin, TX.

  Mesis, J., 2005, February. The FTC pretexting. PI Magazine, 43, 0.

  Milne, R., 2009. International Developments in Investigative Interviewing. Willan, Cul-

  lompton, Devon.

  Pretexting: Your personal information revealed, 2006. Federal Trade Commission, Bureau

  of Consumer Protection, Washington, DC.

  Proctor, M., 2003. How to Stop a Stalker. Prometheus Books, Amherst, NY.

  Professional and Ethical Conduct, 2001. Introduction to Private Investigation. Reprint.

  British Columbia: Private Investigators Association of BC, 2005, 10–12. Print.

  165

  166

  References

  Royal, R.F., Schutt, S.R., 1976. The Gentle art of Interviewing and Interrogation: A Pro-

  fessional Manual and Guide. Prentice-Hall, Englewood Cliffs, NJ.

  Tyska, L.A., Fennelly, L.J., 1999. Investigations: 150 Things you Should Know.

  Butterworth-Heinemann, Boston.

  Williamson, B.M., 2009. International Developments in Investigative Interviewing. Willan,

  Cullompton Devon.

  Yeschke, C.L., 2003. The art of Investigative Interviewing: A Human Approach to Testi-

  monial Evidence, second ed. Butterworth-Heinemann, Amsterdam.

  Zaenglein, N., 1998. Disk Detective: Secrets you Must Know to Recover Information from

  a Computer. Paladin Press, Boulder, CO.

  Zulawski, D.E., Wicklander, D.E., 2002. Practical Aspects of Interview and Interrogation,

  second ed. CRC Press, Boca Raton, FL.

  Laws
, n.d. Code of Ethics. California Association of Licensed Investigators. Retrieved February 18, 2013, from www.cali-pi.org/?Ethics.

  Sebastian, E., Yahoo! March 22, 2011. Retrieved June 23, 2013, from http://yahoo.com.

  Jeffery T. Luftig and Steven Ouettette, May 3, 2009, The Decline of Ethical Behavior in Business http://www.qualitydigest.com/magazine/2009/may/article/decline-ethical-

  behavior-business.html#

  INDEX

  Note: Page numbers followed by f indicate figures.

  A

  levels of authority, 80

  Active listening

  neutrality, 81

  acceptance, 70–71

  security personnel, 80–81

  attentiveness and concentration, 69–70

  body language, 73–74

  C

  body posture and movement, 74

  Canadian Centre for Justice Statistics

  detachment, 71–72

  (CCJS), 54

  eye contact, 75

  Criminal Code of Canada, 54

  gestures, facial expression and tone of

  Criminal Searches, 5

  voice, 74–75

  Curiosity, 25

  patience, 72–73

  positive silence, 76–77

  D

  touch, 75

  Deception and interview

  American Management Association,

  body language and physical signs, 34

  147–149

  conscience, 31

  Attitude

  convincing liars, 31

  antagonist behavior, 20–21

  interviewee credibility, 31

  authoritarianism, 20–21

  interviewer’s goal

  bias and prejudices, 19

  interviewee’s physical and verbal

  negative feelings, 20–21

  behavior, 29

  neighborliness, 19–20

  interviewer’s needs, 30

  perceptive interviewees, 20

  PEACE model, 29–30

  positive attitude

  Reid model, 29

  congruence, 20

  truthful statements, 29

  empathy, 20

  Wicklander-Zulawski model, 29

  unconditional positive regard, 20

  nonverbal signs, 34

  strengths and limitations, 21

  pathological liars, 37

  Australasian Council of Security

  physiological signs, 36–37

  Professionals, 12–13

  projection, 39

  Authority

  psychological motives, 37

  neutrality

  psychopathic personality, 38

  accusation, 86

  rationalization, 38–39

  floating-point strategy and open

  refusal to cooperate, 36

  mind, 84–85

  truthfulness, 35–36

  interviewee’s mood, 85

  verbal signs, 32–33

  subtle signals, 86

  Driver’s Privacy Protection Act (DPPA), 4

  power

  liability concerns, 82–83

  E

  misuse of authority, 83

  E-investigator, 5

  positive application, 84

  Ethics

  security management and investigations

  code of ethics

  definition of, 79–80

  behavioral standards, 13

  167

  168

  Index

  Ethics (Continued)

  F

  common elements, 12

  Fair Credit Reporting Act, 152

  decision making, 12

  Federal Bureau of Investigation (FBI), 55

  security professionals, 12–13

  Federal Fair Credit Reporting Act

  security professionals’ code of conduct,

  (FCRA), 4

  13–15

  Federal Privacy Act of 1976, 152

  conflict of interest, 16

  Federal Trade Commission (FTC), 6

  conversations, 11

  Flexibility, 24–25

  ethical and unethical interviewing,

  Floating-point strategy (FPS), 92

  15–16

  ethical leadership, 11

  G

  ethical standards

  Gramm-Leach-Bliley (GLB) Act, 4, 6

  code of ethics, 9

  definition, 10

  I

  ethical behavior, 9–10

  Imagination, 25

  ethics strategy, 9–10

  Internal theft controls and personnel issues

  human relationships, 9

  dishonest employee

  personality traits, 10

  contagion of theft, 149

  self-control, 9–10

  danger signs, 145–146

  situational ethics, 10–11

  employee thief, 146

  right people, 11

  employment history and reference

  written code of conduct, 12

  checking, 150–154

  Evidence

  fraud triangle, 145

  collection and preservation, 46–48

  moral obligation, 149–150

  documentary evidence, 41, 42

  theft methods, 147–148

  interrogation, 42

  honesty, 142–144

  legal tactics, 46

  patience, 141

  real/physical evidence, 41

  state laws and company laws, 141

  report writing

  Internet Achieve, 4

  clear expression, 48–49

  Interview process

  fundamental communication skills, 48

  contact elements

  good notes, 49

  crime scene, 102

  official documents, 48

  introduction and greeting, 98–100

  steps, 49

  objectives, 100–101

  suggestions, 50–51

  seating arrangements, 100

  trained ability, 48

  setting the tone, 101–102

  well-written report characteristics,

  encouragement, 121

  49–50

  environmental setting, 115

  search warrants/subpoenas, 42

  first impressions, 97

  testimonial evidence, 51

  follow-up phase

  voluntary confessions

  inconsistencies, 112

  equivalent rights, 43

  investigation, circumstances of, 111

  interrogation, 44

  historical phase, 89

  interview, 44

  initial phase

  Miranda warnings (see Miranda warnings)

  contact, 95, 96f

  psychological coercion, 43–44

  evaluating potential interviewees, 94

  written confession, 42–43

  FPS, 92

  Index

  169

  interview strategy, 94–95

  “why it happened” question, 108

  open mind, 95

  “willingness” question, 107

  positive expectations, 95

  “you” question, 105

  precontact, 92, 92f

  review, 121

  preliminary inquiry, 93

  semistructured approach, 124–125

  strategic planning, 93, 93f

  structured approach, 124

  intensity levels

  terminal phase

  energy and determination, 123

  detection-of-deception examination,

  general review and minimal

  110

  encouragement, 122

  interviewee’s truthfulness, 110

  inconsistencies, 122

  Intuition

  incriminatory statements, 123

  arbitrary techniques, 23

  verbal and nonverbal signs, 122

  human behavior, 22

  interviewee
’s evaluation process, 97–98

  interviewees, 23–24

  interview participants, 96–97

  self-confidence, 23

  intimate location, 118–120, 119f, 120f

  spontaneous developments, 22

  moderate location, 118, 118f

  Investigative interviewer

  nonstructured approach, 125

  art, 1–2

  participant location

  guideline, 155–158

  conversation location, 116–117, 117f

  individual style, 1–2

  personal space, 115–116

  notary public

  personal preparation phase

  handwritten notarized statement, 3

  biases and prejudices, 90

  interviewee’s statement and signature,

  communication, 89–90

  2–3

  human interaction, 91f

  local and state laws, 3–4

  never-ending learning process, 90

  tape record, 3–4

  polyphasic flowchart, 90f

  pretexting, 5–6

  primary phase

  qualifications, 7

  “approach” question, 106

  research tools

  bones, 103–109

  internal investigations, 5

  “consequences” questions, 107

  Internet tools, 4–5

  “expanding inquiry” question, 109

  license agreements, 4

  “instruction” question, 107

  personal style and rapport, 5

  investigator’s adaptability, 103

  Social networking sites, 5

  “kind to do it” question, 108

  TLOxp, 4

  narration question, 105

  “suspicion” question, 106

  M

  “they say they saw you”

  Microexpression, 34

  question, 108

  Miranda warnings

  “They Say You Did It” Question,

  investigative custodial questioning, 43

  108

  Miranda rights statements, 42–43

  “thoughts” question, 106–107

  requirement

  “trust” question, 106

  constitutional rights, 45

  “verification” question, 106

  interrogation, 45

  “what would you say” question,

  noncustodial interviewing, 45

  108–109

  police custody, 44

  “who” question, 105–106

  police officers, 45–46

  170

  Index

  N

  intuition, 127

  National Crime Victimization Survey

  open questions

  (NCVS), 59–60

  directive questions, 132

  Notary public

  diversion questions, 133

  handwritten notarized statement, 3

  goals, 131

  interviewee’s statement and signature,

  indirect questions, 132–133

  2–3

  leading questions, 133–134

  local and state laws, 3–4

 

‹ Prev