Inge Sebyan Black
Page 24
questions and incriminating ones.
48. Only use Miranda when subject is not free to go.
49. Keep an open mind.
50. Don’t keep time.
51. Have a private location.
52. Select the location yourself.
53. Know when to shut up and be silent.
54. Prepare the seating arrangement prior to the interview.
55. Start with small talk.
56. Use deception sparingly.
57. Set the room so your comfortable level.
58. Establish common ground.
59. Know when to stop, pause, be silent, and be direct and indirect.
60. Take notes and bring a notebook.
61. Know when to get help or call an expert.
62. Dare to ask tough questions.
63. Choose questions wisely.
64. Avoid third-degree questioning.
65. Ask closed questions when necessary.
66. Ask open-ended questions when needed.
Investigative Interviewing: One Hundred Things You Should Know
161
67. Keep questions simple.
68. Hide your personal values.
69. Maintain a neutral stance.
70. Be patient and break the interviewee’s pat story.
71. Control personal anger.
72. Avoid using coercive behaviors.
73. Be nonjudgmental.
74. Use active listening skills.
75. Consider the human needs of the interviewee.
76. Be respectful.
77. Build trust.
78. Be flexible with your methods.
79. Be creative; think outside the box.
80. Let the interviewee talk.
81. Develop a rapport.
82. Watch for behavioral clues such as gestures, facial expressions, and
tone of voice.
83. Follow your instincts.
84. Wait till you have enough leverage before you hit that home run.
85. Know when to be aggressive.
86. Practice, practice, and practice.
87. Wear a suit and tie when it might be warranted.
88. Dress casually if it fits the interview setting and style.
89. Control personal anger.
90. Maintain a neutral stance.
91. Apply flexible methods.
92. Cover suspiciousness.
93. Manage your time.
94. Remember the 14th Amendment regarding due process and equal
protection.
95. Remember the importance of a well-written report.
96. Use benchmarking.
97. Remember your code of ethics.
98. Use professional conduct.
99. Validate information.
100. Don’t get sucked into the trap of familiarity.
CONCLUSION
The investigative interview is an art because each of us makes it such. Each of
you will bring your own style, technique, and personality to each of your
interviews.
It is my hope that something in this book will help you examine your
own values, beliefs, ethics, and behavior and will help you to be a successful
interviewer. Remember to treat everyone with respect and work on build-
ing relationships that allow for dialogue.
The most powerful advice that I can give to you is to practice, practice,
and practice and to embrace your art.
163
REFERENCES
Anastasi, J., 2003. The New Forensics: Investigating Corporate Fraud and the Theft of Intel-
lectual Property. Wiley, Hoboken, NJ.
Barefoot, J.K., 1990. Employee Theft Investigation, second ed. Butterworth, Boston.
Davia, H.R., 2000. Accountant’s Guide to Fraud Detection and Control, second ed. Wiley,
New York.
Doig, A., 2012. Fraud: The Counter Fraud practitioner’s Handbook. Ashgate Publishing,
Farnham.
Felson, M., Clarke, R.V., 1997. Business and Crime Prevention. Criminal Justice Press,
Monsey, NY.
Fischer, R., Halibozek, E., 2013. Introduction to Security, nineth ed. Elsevier, Amsterdam.
Fischer, R.J., Green, G., 2004. Introduction to Security, seventh ed. Butterworth-
Heinemann, Amsterdam.
Fischer, R.J., Halibozek, E.P., 2013. Introduction to Security, nineth ed. Butterworth-
Heinemann, Waltham, Mass.
Friedrichs, D.O., 2010. Trusted Criminals: White Collar Crime in Contemporary Society,
fourth ed. Wadsworth Cengage Learning, Belmont.
Gordon, N.J., Fleisher, W.L., 2011. Effective Interviewing and Interrogation Techniques,
third ed. Academic Press, Burlington, MA.
Harrendorf, S., Heiskanen, M., Malby, S., 2010. International Statistics on Crime and Justice.
European Institute for Crime Prevention and Control, affiliated with the United Nations
(HEUNI), Helsinki.
Herlihy, B., Corey, G., 2006. Ethics Surrounding Interviewing, sixth ed. American Counsel-
ing Association, Alexandria, VA.
Hewlett-Packard’s pretexting scandal: hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, 109th Congress, second session, September 28, 2006. 2006. US GPO, Washington.
August 1999, The review of metaphysics. J. Philos. 96 (8), (Bibliography), XCIV, 9,
September 1, 1997.
Killinger, B., 2007. Integrity: Doing the Right Thing for the Right Reason. McGill-Queen’s
University Press, Montreal.
Lord, V.B., Cowan, A.D., 2011. Interviewing in Criminal Justice: Victims, Witnesses, Cli-
ents, and Suspects. Jones and Bartlett, Sudbury, MA.
Lyman, M.D., 1999. Criminal Investigation: The Art and the Science, second ed. Prentice
Hall, Upper Saddle River, NJ.
Luftig, J.T., Ouettette, S., May 3, 2009. The Decline of Ethical Behavior in Business.
Matsumoto, D.H., 2011, June 1. Evaluating truthfulness and detecting deception. The FBI
Law Enforcement Bulletin. 1, 1.
Mendell, R.L., 1997. How to Conduct Business Investigations and Competitive Intelligence
Gathering. Thomas Investigative Publications, Austin, TX.
Mesis, J., 2005, February. The FTC pretexting. PI Magazine, 43, 0.
Milne, R., 2009. International Developments in Investigative Interviewing. Willan, Cul-
lompton, Devon.
Pretexting: Your personal information revealed, 2006. Federal Trade Commission, Bureau
of Consumer Protection, Washington, DC.
Proctor, M., 2003. How to Stop a Stalker. Prometheus Books, Amherst, NY.
Professional and Ethical Conduct, 2001. Introduction to Private Investigation. Reprint.
British Columbia: Private Investigators Association of BC, 2005, 10–12. Print.
165
166
References
Royal, R.F., Schutt, S.R., 1976. The Gentle art of Interviewing and Interrogation: A Pro-
fessional Manual and Guide. Prentice-Hall, Englewood Cliffs, NJ.
Tyska, L.A., Fennelly, L.J., 1999. Investigations: 150 Things you Should Know.
Butterworth-Heinemann, Boston.
Williamson, B.M., 2009. International Developments in Investigative Interviewing. Willan,
Cullompton Devon.
Yeschke, C.L., 2003. The art of Investigative Interviewing: A Human Approach to Testi-
monial Evidence, second ed. Butterworth-Heinemann, Amsterdam.
Zaenglein, N., 1998. Disk Detective: Secrets you Must Know to Recover Information from
a Computer. Paladin Press, Boulder, CO.
Zulawski, D.E., Wicklander, D.E., 2002. Practical Aspects of Interview and Interrogation,
second ed. CRC Press, Boca Raton, FL.
Laws
, n.d. Code of Ethics. California Association of Licensed Investigators. Retrieved February 18, 2013, from www.cali-pi.org/?Ethics.
Sebastian, E., Yahoo! March 22, 2011. Retrieved June 23, 2013, from http://yahoo.com.
Jeffery T. Luftig and Steven Ouettette, May 3, 2009, The Decline of Ethical Behavior in Business http://www.qualitydigest.com/magazine/2009/may/article/decline-ethical-
behavior-business.html#
INDEX
Note: Page numbers followed by f indicate figures.
A
levels of authority, 80
Active listening
neutrality, 81
acceptance, 70–71
security personnel, 80–81
attentiveness and concentration, 69–70
body language, 73–74
C
body posture and movement, 74
Canadian Centre for Justice Statistics
detachment, 71–72
(CCJS), 54
eye contact, 75
Criminal Code of Canada, 54
gestures, facial expression and tone of
Criminal Searches, 5
voice, 74–75
Curiosity, 25
patience, 72–73
positive silence, 76–77
D
touch, 75
Deception and interview
American Management Association,
body language and physical signs, 34
147–149
conscience, 31
Attitude
convincing liars, 31
antagonist behavior, 20–21
interviewee credibility, 31
authoritarianism, 20–21
interviewer’s goal
bias and prejudices, 19
interviewee’s physical and verbal
negative feelings, 20–21
behavior, 29
neighborliness, 19–20
interviewer’s needs, 30
perceptive interviewees, 20
PEACE model, 29–30
positive attitude
Reid model, 29
congruence, 20
truthful statements, 29
empathy, 20
Wicklander-Zulawski model, 29
unconditional positive regard, 20
nonverbal signs, 34
strengths and limitations, 21
pathological liars, 37
Australasian Council of Security
physiological signs, 36–37
Professionals, 12–13
projection, 39
Authority
psychological motives, 37
neutrality
psychopathic personality, 38
accusation, 86
rationalization, 38–39
floating-point strategy and open
refusal to cooperate, 36
mind, 84–85
truthfulness, 35–36
interviewee’s mood, 85
verbal signs, 32–33
subtle signals, 86
Driver’s Privacy Protection Act (DPPA), 4
power
liability concerns, 82–83
E
misuse of authority, 83
E-investigator, 5
positive application, 84
Ethics
security management and investigations
code of ethics
definition of, 79–80
behavioral standards, 13
167
168
Index
Ethics (Continued)
F
common elements, 12
Fair Credit Reporting Act, 152
decision making, 12
Federal Bureau of Investigation (FBI), 55
security professionals, 12–13
Federal Fair Credit Reporting Act
security professionals’ code of conduct,
(FCRA), 4
13–15
Federal Privacy Act of 1976, 152
conflict of interest, 16
Federal Trade Commission (FTC), 6
conversations, 11
Flexibility, 24–25
ethical and unethical interviewing,
Floating-point strategy (FPS), 92
15–16
ethical leadership, 11
G
ethical standards
Gramm-Leach-Bliley (GLB) Act, 4, 6
code of ethics, 9
definition, 10
I
ethical behavior, 9–10
Imagination, 25
ethics strategy, 9–10
Internal theft controls and personnel issues
human relationships, 9
dishonest employee
personality traits, 10
contagion of theft, 149
self-control, 9–10
danger signs, 145–146
situational ethics, 10–11
employee thief, 146
right people, 11
employment history and reference
written code of conduct, 12
checking, 150–154
Evidence
fraud triangle, 145
collection and preservation, 46–48
moral obligation, 149–150
documentary evidence, 41, 42
theft methods, 147–148
interrogation, 42
honesty, 142–144
legal tactics, 46
patience, 141
real/physical evidence, 41
state laws and company laws, 141
report writing
Internet Achieve, 4
clear expression, 48–49
Interview process
fundamental communication skills, 48
contact elements
good notes, 49
crime scene, 102
official documents, 48
introduction and greeting, 98–100
steps, 49
objectives, 100–101
suggestions, 50–51
seating arrangements, 100
trained ability, 48
setting the tone, 101–102
well-written report characteristics,
encouragement, 121
49–50
environmental setting, 115
search warrants/subpoenas, 42
first impressions, 97
testimonial evidence, 51
follow-up phase
voluntary confessions
inconsistencies, 112
equivalent rights, 43
investigation, circumstances of, 111
interrogation, 44
historical phase, 89
interview, 44
initial phase
Miranda warnings (see Miranda warnings)
contact, 95, 96f
psychological coercion, 43–44
evaluating potential interviewees, 94
written confession, 42–43
FPS, 92
Index
169
interview strategy, 94–95
“why it happened” question, 108
open mind, 95
“willingness” question, 107
positive expectations, 95
“you” question, 105
precontact, 92, 92f
review, 121
preliminary inquiry, 93
semistructured approach, 124–125
strategic planning, 93, 93f
structured approach, 124
intensity levels
terminal phase
energy and determination, 123
detection-of-deception examination,
general review and minimal
110
encouragement, 122
interviewee’s truthfulness, 110
inconsistencies, 122
Intuition
incriminatory statements, 123
arbitrary techniques, 23
verbal and nonverbal signs, 122
human behavior, 22
interviewee
’s evaluation process, 97–98
interviewees, 23–24
interview participants, 96–97
self-confidence, 23
intimate location, 118–120, 119f, 120f
spontaneous developments, 22
moderate location, 118, 118f
Investigative interviewer
nonstructured approach, 125
art, 1–2
participant location
guideline, 155–158
conversation location, 116–117, 117f
individual style, 1–2
personal space, 115–116
notary public
personal preparation phase
handwritten notarized statement, 3
biases and prejudices, 90
interviewee’s statement and signature,
communication, 89–90
2–3
human interaction, 91f
local and state laws, 3–4
never-ending learning process, 90
tape record, 3–4
polyphasic flowchart, 90f
pretexting, 5–6
primary phase
qualifications, 7
“approach” question, 106
research tools
bones, 103–109
internal investigations, 5
“consequences” questions, 107
Internet tools, 4–5
“expanding inquiry” question, 109
license agreements, 4
“instruction” question, 107
personal style and rapport, 5
investigator’s adaptability, 103
Social networking sites, 5
“kind to do it” question, 108
TLOxp, 4
narration question, 105
“suspicion” question, 106
M
“they say they saw you”
Microexpression, 34
question, 108
Miranda warnings
“They Say You Did It” Question,
investigative custodial questioning, 43
108
Miranda rights statements, 42–43
“thoughts” question, 106–107
requirement
“trust” question, 106
constitutional rights, 45
“verification” question, 106
interrogation, 45
“what would you say” question,
noncustodial interviewing, 45
108–109
police custody, 44
“who” question, 105–106
police officers, 45–46
170
Index
N
intuition, 127
National Crime Victimization Survey
open questions
(NCVS), 59–60
directive questions, 132
Notary public
diversion questions, 133
handwritten notarized statement, 3
goals, 131
interviewee’s statement and signature,
indirect questions, 132–133
2–3
leading questions, 133–134
local and state laws, 3–4