Professional Documents
Culture Documents
CRIMINAL INVESTIGATION
A criminal investigation is an undertaking that seeks, collects, and gathers evidence of a crime for a case or
specific purpose.
A criminal investigator looks for clues and evidence to determine whether a crime has taken place. If a crime
has been committed, investigators may look into the background of the accused and try to uncover who
committed the crime. Police agencies and law enforcement are committed to criminal investigations of every
kind, but a growing number of individuals are choosing to launch their own criminal investigations with the
help of professional investigators.
Court Proceedings: All the evidence gathered during the investigation is presented to the court and a decision
is made in regards to punishment.
Types of investigation
1. Criminal Forensics
2. Intelligence gathering
3. Electronic discovery
4. Intrusion Investigation
There are four main types of investigation performed by digital forensics specialists. The first three are broadly
similar in the activities the involve, but differ in terms of the legal restrictions and guidelines imposed as well
as the type of digital evidence and form of report.
1. Criminal forensics
The largest form of digital forensics and falling under the remit of law enforcement (or private contractors
working for them). Criminal forensics is usually part of a wider investigation conducted by law enforcement
and other specialists with reports being intended to facilitate that investigation and, ultimately, to be entered
as expert evidence before the court. Focus is on forensically sound data extraction and producing
report/evidence in simple terms that a lay man will understand.
2.Intelligence gathering
This type of investigation is often associated with crime, but in relation to providing intelligence to help track,
stop or identify criminal activity. Unless the evidence is later to be used in court forensic soundness is less of
a concern in this form of investigation, instead speed can be a common requirement.
4. Intrusion investigation
The final form of investigation is different from the previous three. Intrusion investigation is instigated as a
response to a network intrusion, for example a hacker trying to steal corporate secrets. The investigation
focuses on identifying the entry point for such attacks, the scope of access and mitigating the hackers
activities. Intrusion investigation often occurs "live" (i.e. in real time) and leans heavily on the discipline of
network forensics.
Introduction
Gauging the Value of Evidence
1. It is unique
2. It has a low probability of occurring by chance –
3. It is inconsistent –
4. It is a physical match -
Introduction
The key principle underlying crime scene investigation is a concept that has become known as Locard’s
Exchange Principle. It states that whenever someone enters or exits an environment, something physical
is added to and removed from the scene. This principle is generally summed up by stating: “Every contact
leaves a trace.”
The logic behind this principle allows investigators to link suspects to victims, to physical objects, and to
scenes. Any evidence that can link a person to the scene is referred to as associative evidence. This may
include items such as fingerprints, blood and bodily fluids, weapons, hair, fibers and the like. This type of
evidence answers the question “Who did this?”
While associative evidence links people to the place of the crime, reconstructive evidence allows
investigators to gain an understanding of the actions that took place at the scene. A broken window, a
blood spatter pattern, bullet paths and shoe prints can all reveal what actually happened. This type of
evidence answers the question, “How did it happen?”
To help establish the linkage of people and things to a scene, the investigator may also collect known
substances, called control samples. These can be items such as fibers from carpeting at the scene, glass
fragments, soil, vegetation and other trace evidence. Learn more about trace evidence▸ If these are
found on the suspect’s clothing, in their vehicle or at their residence, it could provide circumstantial
evidence linking the person to the scene.
For example, police are called to a residential neighborhood where a home invasion and burglary has just
occurred. Investigators collect glass fragments from a shattered cabinet door with a distinct pattern etched
into the glass. A tip leads investigators to a local man with a known history of burglary. Examination of the
suspect’s clothing yields glass fragments with the same distinct pattern as the smashed cabinet doors.
Eliminating people who could not be the perpetrator is also important. Control samples of fingerprints and
DNA are often collected from any person(s) who have access to the scene who are not considered
suspects.
5. It is unique - If an item is found that helps narrow the possibilities of who might be considered a
suspect, or the manner in which a crime was committed, this evidence would be of use. Is an
impression from a vehicle tire found in the dirt at the scene? The tread impression can be compared
to others to determine the type of tire that was on the car. Is a shoe print left in the soil? The tread
may help to identify the size and type of shoes it came from and the wear pattern could be used to
match it to a specific pair. Learn more about footwear impressions and tire tracks ▸
6. It has a low probability of occurring by chance - Considering the mathematical probabilities
will help to determine the odds that a piece of physical evidence found at the scene could appear
merely by coincidence. If DNA evidence found at the scene matches a suspect, the chances are
exceedingly low that another person could have left this sample. But even evidence that has a much
higher probability—for instance, a common type of shoeprint that is left in the soil—is still valuable.
When combined with other high probability evidence, these can help narrow the list of possible
parties and build a compelling case.
7. It is inconsistent - If an item is found that is out of place or inconsistent with the setting, or is out
of character for the victim—for instance if the victim was a non-smoker but a cigarette butt is found
at the scene—this could be an important bit of evidence.
8. It is a physical match - If trace evidence is found on the suspect or in his possession that
matches something at the scene, this makes this item valuable as evidence. For instance, broken
plastic parts or a broken fingernail that can be matched by fracture marks can demonstrate that two
pieces were once a part of the same item.
Introduction
1. Establish the scene dimensions and identify potential safety and health hazards –
2. Establish security -
3. Plan, communicate and coordinate –
4. Conduct a primary survey/walkthrough –
5. Document and process the scene -
6. Conduct a secondary survey/review –
7. Record and preserve evidence -
How and Where Tests on the Evidence are Conducted
Introduction
The circumstances that investigators encounter at the scene will largely dictate the approach used to
process the scene. A homicide will likely require different treatment and processing than a burglary.
However, to ensure a thorough process, the seven steps outlined below are often followed. These steps
can be conducted in a different order, combined or even skipped altogether to meet the needs of the
situation.
1. Establish the scene dimensions and identify potential safety and health hazards -
Investigators initially locate the “focal point” of the scene, the main area of disturbance. This could be a
ransacked bedroom, the area where an attack occurred, or the room in which a victim was found. Radiating
out from that point, investigators establish an area that is sizeable enough to likely contain all relevant
physical evidence that may be present. It is easier for investigators to condense the size of a scene at a
later point than to discover that sensitive evidence outside the scene has been damaged or destroyed by
other responders, media or onlookers. In addition, potential paths of perpetrator entry/exit are identified.
Safety is of paramount importance during the initial approach to the scene. Weapons, biohazards, chemical
hazards and even intentional traps could be waiting for responders. If medical, fire or coroners will be on
scene, they will need to be advised regarding evidentiary issues as well.
2. Establish security - According to Locard’s Exchange Principle, every person who enters or exits the
scene will add or subtract material from the crime scene, so it’s crucial to quickly secure the area. To
control access, the scene may be cordoned off with yellow crime scene tape, cones or by other means. In
addition, a common entryway is often established that all crime scene personnel will use to enter and exit
the scene and all people entering or leaving the scene are documented once the boundaries have been
established. Additional areas for consultation and evidence storage may also be established if necessary.
3. Plan, communicate and coordinate - Before collecting evidence, investigators must first develop a
theory regarding the type of offense that occurred. Knowing the type of crime will help investigators
anticipate the evidence that could be present. This may require gathering information from witnesses or
persons of interest. Based on this information, the crime scene team will develop an evidence-collection
strategy taking into consideration weather conditions, time of day and other factors. Additional forensic
resources may also be requested to handle special situations.
4. Conduct a primary survey/walkthrough - An initial survey of the scene is then conducted to
prioritize evidence collection. During this walkthrough, the lead investigator will identify potentially valuable
evidence, take notes and capture initial photographs of the scene and the evidence. The crime scene is
documented to record conditions such as whether lights were on or off, the position of shades and doors,
position of movable furniture, any smells present, the temperature of the scene, etc. To facilitate this
process, crime scene specialists may create an evidence-free pathway leading to the primary area of
interest by conducting a thorough sweep for evidence in that area.
5. Document and process the scene - With a plan in place, the crime scene team conducts a
thorough, coordinated investigation of the scene, collecting all probative evidence. This entails detailed
documentation with digital and video cameras or, if available, a 3-D scanner. For some situations, sketches
and diagrams are also created. During the evidence-collection process, it is crucial that the crime scene
investigator follow proper procedures for collecting, packaging and preserving the evidence, especially if it
is of a biological nature. Biological evidence can be destroyed or damaged by weather conditions,
individuals can inadvertently contaminate it, or it can be overlooked entirely if alternate light sources are not
used to inspect the scene.
6. Conduct a secondary survey/review - To ensure that the scene has been thoroughly searched, a
second survey of the area is conducted as a quality control step.
7. Record and preserve evidence - To make certain that all evidence is accounted for, an inventory log
is created. The descriptions recorded into the log must match the photo of the evidence taken at the scene
and the description included in the crime scene report. For instance, if a gun is collected, the serial number
of the firearm in the evidence log must match the serial number shown in the photo that was taken at the
scene. This paper trail establishes the chain of custody that will follow the evidence throughout the lifecycle
of the case.
How and Where Tests on the Evidence are Conducted
The most probative evidence will be sent to either a forensic laboratory or, if the laboratory does not have
an expert in that forensic discipline, to an outside analyst for examination. To help identify the evidence that
is most valuable, the crime scene personnel may conduct initial screening tests, called presumptive tests,
at the scene. These tests can be useful in determining the type of substance present—whether it’s a toxin
or a drug, a stain that contains body fluids, or even whether a dried red substance found in the kitchen is
blood or ketchup.
Presumptive tests allow investigators to narrow the field of possibilities to a certain class of substance, but
they are not specific enough to confirm the presence of specific compounds. In addition to helping provide
clues to indicate how the crime occurred and who may have been involved, presumptive tests can also help
reduce the quantity of evidence that is submitted to the lab to include only the most important items. This
helps to expedite processing at the laboratory.
What is Intelligence?
What are the 5 steps of the Intelligence cycle?
What is Intelligence?
Intelligence is the product that results from a set of actions that are performed to information. Traditionally,
used across governmental organizations for the purpose of national security. The actions are collect,
analyze, integrate, interpret and disseminate. The final product of intelligence gives value-added, tailed
information that provides an organization or its adversary, the ability to make conclusions. For the enterprise
the information product might be to seek information about the threat actors means, motive and capabilities.
On the other hand the adversary might want to seek information about intellectual property (patents,
copyrights, trademarks, trade secrets, etc) from your company in order to gain economical advantage or to
subvert its interests. In any of the cases the information produced gives an edge, a competitive advantage to
you or to your adversary.
The information produced contains facts, findings and forecasts that supports yours or the adversary
goals. There are two categories of Intelligence. One is strategic and the other is operational. Strategic
intelligence means information produced to support well informed decisions of long-lasting importance.
Strategic intelligence is broader and often requires information concerning different fields. Operational
intelligence is of limited life span and it to be used rapidly and is concerned with current events and capability.
6. Planning and direction – This is the first step. It’s here were the requirements and priorities are
set. The capabilities to produce Intel are limited as any other resource which means we want to
maximize its production with a constant number of resources. Among others, a methodology to define
the requirements might be using the “Five W’s”. It’s also in this step where we define which areas the
intelligence produced will have the most impact and make to most contribution. During the planning
is fundamental to specify which categories of Intelligence will be gathered i.e. OSINT (Open Source
Intelligence). In addition, the processes, people and technology to support the different steps in the
cycle need to be established with clear roles and responsibilities.
7. Collection – The second step includes all the different activities, mainly research, that involves the
collection of data to satisfy the requirements that were defined. The collection can be done either via
technical or human means and involves gathering data from a variety of sources. In the military and
intelligence community the sources normally used are people, objects, emanations, records. These
sources span the different collection disciplines named as HUMINT, IMINT, MASINT, SIGNT, OSINT
and others. Once collected, information is correlated and forwarded for processing and production.
8. Processing and exploitation – Third step, the collected raw data starts to be interpreted,
translated and converted into a form suitable for the consumers of the intelligence. The raw data
becomes information.
9. Analysis and production – The refinement of the information that was produced in the previous
step. The fusion of the different information that was processed from the different intelligence
disciplines. These are key tasks performed during this step. The analysis consists of facts, findings
and forecasts that describe the element of study and allow the estimation and anticipation of events
and outcomes. The analysis should be objective, timely, and most importantly accurate. To produce
intelligence objectively, the analysts apply four basic types of reasoning. Induction, deduction,
abduction and the scientific method. Furthermore, because bias and misperceptions can influence
the analysis the analyst should be aware of the different analytical pitfalls. The outcome is value-
added actionable information tailored to a specific need. For example, in the United States, creating
finished intelligence for national and military purposes is the role of the CIA.
10. Dissemination and Integration – Essentially, this step consists in delivering the finished product
to the consumers who requested the information. This can be done using a wide range of formats and
in a manual or automated manner.
Link for Pakistan Intelligence Agencies: The Inside story
(https://herald.dawn.com/news/1153827)
Types of Investigations
1. Forensic Investigation
2. Electronic Investigation
3. Database Investigation
FORENSIC INVESTIGATION
Outline:
4. Forensic Archaeology
Forensic archaeology focuses on human remains that are severely decomposed. They mainly focus on
clues they can glean from the bones, including carbon dating to determine their age. From these clues,
they can sometimes establish cause-of-death. If a mass grave is discovered or in the event of large
casualties, forensic archaeologists can identify the victims using facial reconstruction software.
5. Forensic Dentistry
Forensic dentists are vital when a victim can’t be identified by any other means or when a culprit bites a
victim. Since teeth have distinct patterns, the marks left behind can identify a suspect or victim. The shape
of the jaw can also indicate age, gender, and DNA can be extrapolated from teeth like with bone marrow
and hair. Even if the victim wasn’t bitten, physical evidence found at a crime scene may still be useful for
forensic dentists. For example, a pencil with bite marks or a half eaten apple might have deep enough
impressions to reveal someone’s identity.
6. Forensic Entomology
Forensic entomology is the study of any insects found at a crime scene. Alive or dead, these bugs can
reveal where a crime took place, whether the victim had been given drugs, and the time of death. Some
insects are only found in specific areas so finding them on a body can suggest whether a body was moved.
The presence of larvae in a body can also suggest how long a victim has been dead. If the crime isn’t a
murder, insects will still occupy untreated wounds in abuse cases or identify the origin of illegally imported
goods, like cannabis.
7. Forensic Graphology
Forensic graphologists study the handwriting on ransom notes, poison pen letters, suicide notes, and
blackmail demands. Though age and gender cannot be determined by handwriting alone, it can indicate the
writer’s state of mind at the time the note was penned. Handwriting can give insights about:
• Mood
• Motivation
• Integrity
• Intelligence
• Emotional stability
Slant, size of writing, and the weight of the hand all reflect information about the writer. The phrases and
slang the writer uses can also say a lot about location and motive. Forensic graphologists are also used to
verify the validity of documents such as insurance claims or police statements.
8. Forensic Pathology
Ultimately, it is the forensic pathologist’s job to find out cause-of-death, especially when it is suspected that
the death was not due to natural causes. They perform an autopsy, which involves observing both the
outside and inside of the victim. On the outside there may be signs of blows, bruises, bullet entry points, or
asphyxia. On the inside, the pathologist will look at things like the organs and stomach contents. By
observing these things, a pathologist can determine whether the death was a suicide, murder, or due to
natural causes.
9. Forensic Psychology
Forensic psychology studies the thoughts behind an attacker’s actions. Before thinking about how to catch
a suspect, forensic psychologists consider why the act was committed. They look at sources of extreme
stress in the perpetrator’s life that might push them to act violently. They also observe the scene of the
crime, which can tell them whether the act was done out of a burst of emotion or was predetermined. Once
a suspect is caught, a forensic psychologist can determine whether they are of sound mind. Even in cases
of suspected suicide, investigators can examine the life of the victim and conclude whether the act was
purposeful or an accident.
Introduction
Investigative Tools and Equipment
Tools and Materials for Collecting Digital Evidence
Stages of Investigations
1. Policy and Procedure Development
2. Evidence Assessment
3. Evidence Acquisition
4. Evidence Examination
5. Documenting and Reporting
Introduction
The field of computer forensics investigation is growing, especially as law enforcement and legal entities
realize just how valuable information technology (IT) professionals are when it comes to investigative
procedures. With the advent of cybercrime, tracking malicious online activity has become crucial for
protecting private citizens, as well as preserving online operations in public safety, national security,
government and law enforcement. Tracking digital activity allows investigators to connect cyber
communications and digitally-stored information to physical evidence of criminal activity; computer forensics
also allows investigators to uncover premeditated criminal intent and may aid in the prevention of future
cyber-crimes. For those working in the field, there are five critical steps in computer forensics, all of which
contribute to a thorough and revealing investigation.
Stages of Investigations
1. Policy and Procedure Development
Whether related to malicious cyber activity, criminal conspiracy or the intent to commit a crime, digital
evidence can be delicate and highly sensitive. Cyber security professionals understand the value of this
information and respect the fact that it can be easily compromised if not properly handled and protected. For
this reason, it is critical to establish and follow strict guidelines and procedures for activities related to
computer forensic investigations. Such procedures can include detailed instructions about when computer
forensics investigators are authorized to recover potential digital evidence, how to properly prepare systems
for evidence retrieval, where to store any retrieved evidence, and how to document these activities to help
ensure the authenticity of the data.
Law enforcement agencies are becoming increasingly reliant on designated IT departments, which are
staffed by seasoned cyber security experts who determine proper investigative protocols and develop
rigorous training programs to ensure best practices are followed in a responsible manner. In addition to
establishing strict procedures for forensic processes, cyber security divisions must also set forth rules of
governance for all other digital activity within an organization. This is essential to protecting the data
infrastructure of law enforcement agencies as well as other organizations.
An integral part of the investigative policies and procedures for law enforcement organizations that utilize
computer forensic departments is the codification of a set of explicitly-stated actions regarding what
constitutes evidence, where to look for said evidence and how to handle it once it has been retrieved. Prior
to any digital investigation, proper steps must be taken to determine the details of the case at hand, as well
as to understand all permissible investigative actions in relation to the case; this involves reading case briefs,
understanding warrants and authorizations and obtaining any permissions needed prior to pursuing the case.
2. Evidence Assessment
A key component of the investigative process involves the assessment of potential evidence in cyber-crime.
Central to the effective processing of evidence is a clear understanding of the details of the case at hand and
thus, the classification of cyber-crime in question. For instance, if an agency seeks to prove that an individual
has committed crimes related to identity theft, computer forensics investigators use sophisticated methods
to sift through hard drives, email accounts, social networking sites and other digital archives to retrieve and
assess any information that can serve as viable evidence of the crime. This is, of course, true for other crimes,
such as engaging in online criminal behavior like posting fake products on eBay or Craigslist intended to lure
victims into sharing credit card information. Prior to conducting an investigation, the investigator must define
the types of evidence sought (including specific platforms and data formats) and have a clear understanding
of how to preserve pertinent data. The investigator must then determine the source and integrity of such data
before entering it into evidence.
3. Evidence Acquisition
Perhaps the most critical facet of successful computer forensic investigation is a rigorous, detailed plan for
acquiring evidence. Extensive documentation is needed prior to, during, and after the acquisition process;
detailed information must be recorded and preserved, including all hardware and software specifications, any
systems used in the investigation process, and the systems being investigated. This step is where policies
related to preserving the integrity of potential evidence are most applicable. General guidelines for preserving
evidence include: the physical removal of storage devices, using controlled boot discs to retrieve sensitive
data and ensure functionality, and taking appropriate steps to copy and transfer evidence to the investigator’s
system.
Acquiring evidence must be accomplished in a manner both deliberate and legal. Being able to document
and authenticate the chain of evidence is crucial when pursuing a court case, and this is especially true for
computer forensics given the complexity of most cybersecurity cases.
4. Evidence Examination
In order to effectively investigate potential evidence, procedures must be in place for retrieving, copying, and
storing evidence within appropriate databases. Investigators typically examine data from designated
archives, using a variety of methods and approaches to analyze information; these could include utilizing
analysis software to search massive archives of data for specific keywords or file types, as well as procedures
for retrieving files that have been recently deleted. Data tagged with times and dates is particularly useful to
investigators, as are suspicious files or programs that have been encrypted or intentionally hidden.
Analyzing file names is also useful, as it can help determine when and where specific data was created,
downloaded, or uploaded and can help investigators connect files on storage devices to online data transfers
(such as cloud-based storage, email, or other Internet communications). This can also work in reverse order,
as file names usually indicate the directory that houses them. Files located online or on other systems often
point to the specific server and computer from which they were uploaded, providing investigators with clues
as to where the system is located; matching online filenames to a directory on a suspect’s hard drive is one
way of verifying digital evidence. At this stage, computer forensic investigators work in close collaboration
with criminal investigators, lawyers, and other qualified personnel to ensure a thorough understanding of the
nuances of the case, permissible investigative actions, and what types of information can serve as evidence.
• Email messages
• Software programs
• Plain text/images
• Web pages
• Word processing files
• Spreadsheets
• Meta data
• Databases
• Backup tapes
• Cache memory
• Hard drives
• CD-ROMs
• Thumb drives
• PDAs
• Firewall/IDS logs
• Phone call logs
• IM transmissions
Depending on the type of investigation, investigators may strive to recover lost files or information, trace
changes to electronic files, or determine whether any electronic files were involved in cyber
Signs that there may be something wrong with your electronic data:
INVESTIGATIVE INTERVIEWING
Outline:
Multiple interviewers
• open-ended
• specific-closed
• forced-choice
• multiple
• leading.
Closure
Evaluation
PEACE framework
PEACE model
There are five phases to the PEACE framework.
Planning and preparation
This is one of the most important phases in effective interviewing. The success of the interview and,
consequently, the investigation could depend on it.
A planning session that takes account of all the available information and identifies the key issues and
objectives is required, even where it is essential that an early interview takes place.
Interviewers should consider the following:
Interview plan
Planning and preparation gives the interviewer the opportunity to:
Interviewee
Individual characteristics should be taken into account when planning and preparing for an interview.
Although not an exhaustive list, these may include:
• age – knowing the interviewee’s age helps to determine the best time to undertake the interview
and whether an appropriate adult/interview supporter is required
• cultural background – this can affect the way a person prefers to be addressed, and may also
indicate the need for an interpreter
• religion or belief – eg, interviewers may need to take prayer requirements into account
• domestic circumstances – this can help to identify other people who may be useful to the
investigation, eg, family, associates or neighbours
• physical and mental health – knowledge of an existing medical condition and ensuring that
appropriate facilities are used
• disability
• previous contact with the police – this helps to determine factors such as the interviewee’s reaction,
and the interviewer’s safety
• gender – in certain types of crime, eg, sexual offences or domestic violence, it is important to
consider the gender of the interviewee. Potentially sensitive issues such as an interviewee’s sexual
orientation or gender assignment should be approached tactfully, if these matters become relevant
to the interview.
Practical arrangements
The interviewer may need to consider a number of activities and practical considerations which may help
them to understand the circumstances of the offence, and to achieve the best interview from the
interviewee.
These include:
• the time a suspect has been in custody (investigators should be aware of the detention clock and its
impact on the interview)
• the range of topics to be covered around identified time parameters (this may vary depending
on whether it is a witness or suspect interview)
• the points necessary to prove the potential offence(s) under investigation
• any points which may be a defence for committing the offence(s) under investigation
• introduction of exhibits
• material which suggests the suspect may have committed the offence
• identified information which may assist the investigation
• any other relevant points, eg, actus reus (guilty act), mens rea (guilty mind), intention, no valid
defence
• planning for a prepared statement, special warnings, adverse inference, significant comments or
silences.
Multiple interviewers
The plan should record who will be the lead interviewer, and who is responsible for note-taking. It is
important that interviewers understand their respective roles and maintain the role agreed. Two
interviewers asking multiple questions in an unstructured manner is unlikely to achieve the interview’s
objective.
• identify topics during the interview and, therefore, manage the conversation
• communicate interest to the interviewee in their account
• identify important evidential information.
Factors such as the interviewee’s background and personal characteristics should be taken into account.
Beginning the interview
This is important and should be considered in the planning stage. The reason for the interview should also
be clearly explained, eg, the interviewer may say:
• ‘You are here because you have been arrested for (offence)’ or
• ‘You are here because you witnessed (offence/incident).’
The interviewer should then check the interviewee has understood the explanation.
Objectives of the interview
Before starting an interview, the objectives of the interview should be explained to the interviewee, and they
should be provided with an outline or route map of it.
For example, interviewers may say:
Then go on to explain:
• ‘I will also ask you about anything else which may become relevant during the interview in order to
properly establish the facts and issues.’
encouraging the interviewee to continue reporting their account until it is complete by using simple utterances such
as ‘mm mm’ and prompts, eg, ‘What happened next?’ or questions that reflect what the interviewee has said, such
as, ‘He hit you?’.
Questions
These should be as short and simple as possible. They should not contain jargon or other language which
the interviewee may not understand.
Some types of questions are useful, helping the interviewer to extract information from the interviewee, eg,
open-ended. Others are not and may actually confuse the interviewee or prevent them from giving a full
and accurate account, eg, multiple questions.
Five key question types
• open-ended
• specific-closed
• forced-choice
• multiple
• leading.
Open-ended
For example, ‘Tell me’, ‘Describe’, ‘Explain’.
• are useful at the beginning of an interview as they allow for a full, unrestricted account
• produce answers which are less likely to have been influenced by the interviewer.
The interviewer should avoid interrupting the interviewee when asking open questions.
Specific-closed
For example, ‘Who did that?’ ‘What did he say?’ ‘Where does he live?’ ’When did this happen?’ This type of
question:
Forced-choice
For example, ‘Was the car an estate or a saloon?’ In this situation:
• interviewees might guess the answer by selecting one of the options given
• interviewees might simply say ‘yes’ in response to the question, leaving the interviewer to
guess which part of the question the response applies to, or needing to ask a follow-up question to
clarify it
• the choice of answer given to the interviewee might not contain the correct information, eg, ‘was it
dark blue or light blue’, when it could have been medium blue.
Multiple
For example, ‘Where did he come from, what did he look like and where did he go to?’ These questions
may also refer to multiple concepts, eg,’What did they look like’ and confusion might arise as a result of the:
Leading
For example, ‘You saw the gun, didn’t you?’ implies the answer or assumes facts that are likely to be
disputed. They can also:
• be used to introduce information not already mentioned, eg, ‘What did he look like?’
• have an adverse influence on interviewee’s response
• distort the interviewee’s memory
The information obtained as a result of leading questions may be less credible and in extreme cases could
be ruled inadmissible. They should, therefore, be used only as a last resort.
Closure
This should be planned and structured so that the interview does not end abruptly.
Where there are two interviewers, the lead interviewer should check that the second interviewer has no
further questions before closing the interview.
The interviewer should accurately summarise what the interviewee has said, taking account of any
clarification that the interviewee wishes to make.
Any questions the interviewee asks should be dealt with.
The interviewer should then bring the interview to a conclusion by preparing a witness statement if
appropriate or, where the interviewee is a suspect, by announcing the date and time before turning the
recording equipment off.
They should then explain to the interviewee what will happen next.
Evaluation
Following an interview, the interviewer needs to evaluate what has been said with a view to:
INTERROGATION
Outline:
Introduction
Prerequisites of an interrogation:
1. Suspect:
2. Victim:
3. Scene of crime:
4. Place of Interrogation:
5. Time of Interrogation:
Method of Interrogation
Interrogation of emotional offender:
Interrogation of non-emotional offender:
1. Question and Answer Method:
2. Narrative Method: Alibi:
3. Factual method:
4. Sweet and sour method:
5. Overheard conversation method:
6. Hypothetical situation:
7. Telling the story backward:
8. Bluff Method:
Prerequisites of an interrogation:
Before conducting interrogation an interrogator should have the information about:
Suspect:
(i) Name, age, profession, occupation
(ii) Social and financial situation
Victim:
(i) Name, age, profession, occupation
Scene of crime:
(i) Time and place of occurrence
Place of Interrogation:
(i) At the spot when a suspect is apprehended at the scene of crime
(ii) In an interrogation room where the interrogator has more psychological advantage.
Time of Interrogation:
(i) As soon as the suspect is apprehended and information collected
You should always remember that a suspect is innocent and not a criminal unless his guilt is proved in court.
Be a good listener.
Control your anger because in anger you loose reasoning and the judgment made without reasoning is mostly
incorrect.
Method of Interrogation
We can classify criminals into two major categories:
1) emotional offender
2) non-emotional offender
The purpose of classification is to vary your approach and methods during the interrogation of a suspect.
1) An emotional offender is usually a first time offender and can be broken down easily when played with his
emotion, ie, love, hatred, anger, frustration etc.
ii) By telling him that anybody could do what he has done in the similar situation.
iii) Blaming the society for his action.
iv) Being friendly with him and offering him coke or cigarettes, which an offender never expects from a police
officer.
v) Observe his physical reaction to the crime related and non-related questions. When someone is lying he
will be under tension. The anti-diuretic bio-chemical substance released by his body leads to the dryness of
his mouth and lips. Again in tension he may be tapping his foot, playing with his fingers, looking blankly
somewhere else.
Question and Answer Method: This is a common form of interrogation where an interrogator ask several
questions to get the facts of a case. He develops his questions based on the fact of the case and the answers
given to him by the suspect.
Narrative Method: Let the suspect tell his side of story without interruption. Ask him to repeat it three or
four times. He will have to tell more and more lies just to cover up one lie. The more he lies, the more you
have a chance to detect untruthfulness of his story. Verify his story and re-interrogate him.
Alibi: Ask where he was and what he was doing at the time of occurrence of the crime. Verify his alibi and
re-interrogate him.
Factual method: The best way to interrogate a hardned and professional criminal is to confront him with
the physical and circumstantial evidence, which will eventually lead to his confession.
Sweet and sour method: Interrogation conducted by two different interrogators, one being soft spoken
and other being harsh towards the suspect could be fruitful in some case.
Overheard conversation method: Whenever there is more than one offender this method works well.
One suspect while being interrogated should be viewed but not heard by another suspect from outside of the
interrogation room. When his turn of interrogation starts, tell the offender that his associate has already
confessed about the crime and now it is his turn to confess.
Hypothetical situation: Ask a suspect that even he has not done it, how would he have done it in the
similar situation. May be some important clue could come out of this.
Telling the story backward: Sometimes you could ask a suspect his side of story backward. If he has
told you what he has done from yesterday 6AM to today 10PM, then let him start from today 10PM to
yesterday 6AM
Bluff Method: Interrogators have used this method for extracting truth from suspects.In this method an
interrogator tells a suspect that he has been seen by witness while committing crime or that his fingerprint,
footprint or physical evidence have been found at the scene of crime, so there is no choice but to tell the
truth. You may be successful extracting the fact in exceptional case but this is not the right method because
if the suspect is innocent, the situation is ridiculous.
There is no hard and fast rule as to what method you apply to extract the fact or the confession. It is upto you
and, your experience will guide you to interrogate various kind of suspects. But one should always keep in
mind that a confession even in writing is nothing more than a piece of paper unless it is supported or
corroborated by other independent physical or circumstantial evidence.
• What comes out of interrogation is confession while what comes out of an interview is true information
• There is often discussion in an interview but, in interrogation, there is always an attempt to get the
information
Benefits
The following benefits have been defined by the professional structure for investigative interviewing:
Public confidence – Professional interviews will provide high-quality material that enables the guilty to be
brought to justice and the innocent to be exonerated. This increases public confidence in the police service,
particularly with victims and witnesses of crime.
Consistent performance – Criminal investigation largely takes place away from the police station.
Interviews with victims and witnesses are conducted at scenes of crime, at witnesses’ homes, at their place
of work, in cars and in the street. The techniques of investigative interviewing will help investigators to achieve
results in even the most unpromising circumstances.
Support for victims and witnesses – Victims and witnesses may be upset, scared, embarrassed or
suspicious. Good investigative interview techniques will help to calm or reassure them so that they can
provide an accurate account.
Dealing with suspects – Interviews generally take place in a police station, but can be elsewhere, eg, a
prison. Do not assume that all suspects are going to lie, say nothing or provide a self-serving version of
events. Some may, but where suspects do admit guilt this will be due, in part, to the strength of material
gathered during the investigation.
Principle 1
The aim of investigative interviewing is to obtain accurate and reliable accounts from victims, witnesses or
suspects about matters under police investigation.
To be accurate, information should be as complete as possible without any omissions or distortion.
To be reliable, the information must have been given truthfully and be able to withstand further scrutiny, eg,
in court.
Accurate and reliable accounts ensure that the investigation can be taken further by opening up other lines
of enquiry and acting as a basis for questioning others.
Principle 2
Investigators must act fairly when questioning victims, witnesses or suspects. They must ensure that they
comply with all the provisions and duties under the Equality Act 2010 and the Human Rights Act 1998.
Acting fairly means that the investigator must not approach any interview with prejudice. The interviewer
should be prepared to believe the account that they are being given, but use common sense and judgement
rather than personal beliefs to assess the accuracy of what is being said.
People with clear or perceived vulnerabilities should be treated with particular care, and extra safeguards
should be put in place.
Principle 3
Investigative interviewing should be approached with an investigative mindset.
Accounts obtained from the person who is being interviewed should always be tested against what the
interviewer already knows or what can be reasonably established.
The main purpose of obtaining information in an interview is to further the enquiry by establishing facts. This
point highlights the importance of effective planning in line with the whole investigation.
Interviewers should think about what they want to achieve by interviewing the victim, witness or suspect, and
set objectives which will help to corroborate or disprove information already known.
Investigators should try to fill the gaps in the investigation by testing and corroborating the information by
other means where possible.
Principle 4
Investigators are free to ask a wide range of questions in an interview in order to obtain material which may
assist an investigation and provide sufficient evidence or information.
Conducting an investigative interview is not the same as proving an argument in court. This means that
interviewers are not bound by the same rules of evidence that lawyers must abide by.
Although the interviewer may ask a wide range of questions, the interviewing style must not be unfair or
oppressive. The interviewer should act in accordance with the Police and Criminal Evidence Act
1984(PACE) and the PACE codes of practice. See principle 2 for further information regarding equality and
human rights considerations.
In R v Fulling [1987] 2 ALLER 65, Lord Chief Justice Taylor stated that oppression is defined as:
the exercise of authority or power in a burdensome, harsh, or wrongful manner, or unjust or cruel treatment
of subjects or inferiors, or the imposition of unreasonable or unjust burdens in circumstances which would
almost always entail some impropriety on the part of the [interviewer].
Principle 5
Investigators should recognize the positive impact of an early admission in the context of the criminal justice
system.
Benefits of an early admission relate to the following areas:
Victim – has an opportunity to claim compensation in respect of an offence that has been admitted by the
defendant, detected, and acknowledged by the criminal justice system.
Court – has a fuller and more accurate picture of the offending and is able to sentence more appropriately.
There is the potential for savings too as offences can be dealt with promptly without additional court hearings.
Defendant – may receive credit for early admission of guilt. They may be eligible for a lesser sentence –
possibly allowing for tailored sentencing and access to rehabilitative programmes, and being able to ‘clear
the slate’ to avoid the risk of subsequent prosecution for other offences. See CPS guidance and Sentencing
Council Guidelines (2007) Reduction in Sentence for a Guilty Plea.
Police – gain valuable intelligence, increase detected offences rates, record a fuller picture of offending for
possible use in future cases or to support applications for anti-social behaviour orders, or other restrictive
orders.
Prosecution – has a fuller and more accurate picture of, for example, the offender’s criminal history when
considering the public interest test, bail decisions, bad character, level of danger, and what information to
give the court.
Resources – are used efficiently, and the public’s confidence in the criminal justice system is improved.
Principle 6
Investigators are not bound to accept the first answer given. Questioning is not unfair merely because it is
persistent.
An investigating officer has the duty to obtain accurate and reliable information. A complete and reliable
account from witnesses, victims and suspects may not always be easy to obtain.
There may be different reasons why an investigator needs to be persistent:
• they may have reasonable belief that the interviewee is not telling the truth
• they may believe further information could be provided.
Principle 7
This principle extends the right of an investigator to put questions to those they believe can help them to
establish the truth of a matter under investigation.
Suspects have the right to remain silent, but they are warned during the police caution or during special
cautions of possible adverse inferences being drawn should they choose to exercise that right.
What is a Stop?
What constitutes a stop and frisk? Can one be stopped and not frisked? Or does one action always follow
another? A stop is a seizure of a person. There are two types of stops: (1.) a show of force and (2.) a show
of authority. With a show of force, an officer must physically lay hands on the person with the intent of
detaining them. In a show of authority, the officer's look, demeanor, and display of authority persuades a
person to submit to authority. The key element in this type of stop is that the individual must submit to the
show of authority, believe they have been seized, and feel compelled to cooperate.
A Justified Stop
A stop is justified if the suspect is exhibiting any combination of the following behaviors:
The purpose of a frisk is to dispel suspicions of danger to the officer and other persons. The frisk should only
be used to detect concealed weapons or contraband. If other evidence, such as a suspected drug container,
can be felt under the suspect's clothing, it can be seized by the officer. This is called the "plain feel" doctrine.
To pass the plain feel test, the item must have an immediately apparent character or quality of being
contraband or evidence.
Suspicion the suspect is about to commit a crime where a weapon is commonly used.
Time of day and/or geographical surroundings (not sufficient by themselves to justify frisk).
Even some patrol officers complain about an unwritten quota system that rewards officers with promotions
based on the number of stop and frisks they perform that uncover drugs or guns. While officers believe the
stop and frisk law is a useful crime fighting tool, they also feel the law can be overused in an effort to boost
statistics. Moreover, stop and frisk may reduce crime by scaring criminals into thinking they might be stopped
at any time, but it also scares law-abiding citizens. This further alienates good citizens and strains the
relationship between the police and the community.
When used correctly, the stop and frisk tool benefits the police and average citizens. Curbing crime and
ensuring the safety of our on-the-beat public servants, stop and frisk can help us all sleep a little more soundly
- a good step in the all-American pursuit of happiness.
An arrest is the act of depriving people of their liberty, usually in relation to an investigation or prevention of
a crime, and thus detaining the arrested person in a procedure as part of the criminal justice system.
When the police arrest someone, they take away that person's fundamental right to freedom. Consequently,
there are several procedures the police must follow before they can make a legal arrest so that our rights
remain protected. This article has some information about the general requirements police must meet before
making an arrest.
It should be noted that many states and police departments add extra procedures; sometimes, these
procedures are designed to protect police officers' physical safety, sometimes they are designed to help the
police officer document the arrest, and sometimes they are designed to help the officer avoid making a legal
mistake which could ruin the prosecution's case in a criminal trial. These extra procedures differ from one
police department to the next, so if you have questions about these, it's best to contact your local police.
The officer has probable cause to believe that person arrested committed a crime;
An officer cannot arrest someone just because she feels like it or has a vague hunch that someone might be
a criminal. Police officers have to be able to justify their arrest usually by showing some tangible evidence
that led them to probable cause.
However, the police must read a suspect his Miranda Rights before an interrogation, so many police
departments recommend that Miranda Rights be read at the time of arrest. This way, they can start
questioning right away, and also, any information volunteered by a suspect can be used against them. Finally,
although police will almost always tell an arrestee why they are under arrest, they may not necessarily have
any legal obligation to do so. This depends on both the jurisdiction and the circumstances of the arrest.
One universal rule police officers must follow is that they are not allowed to use excessive force or treat the
arrestee cruelly. Generally, police officers are only allowed to use the minimum amount of force necessary
to protect themselves and bring the suspect into police custody. This is why people are advised to never
resist an arrest or argue with police. The more a suspect struggles, the more force is required for the police
to do their job. If the arrestee thinks the arrest is unjustified or incorrect, she can always challenge it later with
the help of an attorney, and if warranted, bring a civil rights case.
First of all we have to define what is arrest? Arrest is not defined in Cr.P.C but we can define it as, “A persona
can be said to be arrested when he is actually touched or confined by police officer or other person in
accordance with law provided”.
But he cannot cause death of such persona during arrest (except in case when person accused of an offence
punishable with death or imprisonment of life).
When there are chances that accused will escape, police officer can break open any door or window of house
Search and Seizure is a procedure used in many civil law and common law legal systems by which police
or other authorities and their agents, who suspect that a crime has been committed, do a search of a person's
property and confiscate any relevant evidence to the crime.
Some countries have provisions in their constitutions that provide the public with the right to be free from
"unreasonable" search and seizure. This right is generally based on the premise that everyone is entitled to
a reasonable right to privacy.
Lawmakers and the courts have put in place legal safeguards to ensure that law enforcement officers interfere
with individuals' Fourth Amendment rights only under limited circumstances, and through specific methods.
A law enforcement officer's physical apprehension or "seizure" of a person, by way of a stop or arrest; and
Police searches of places and items in which an individual has a legitimate expectation of privacy -- his or
her person, clothing, purse, luggage, vehicle, house, apartment, hotel room, and place of business, to name
a few examples.
The Fourth Amendment provides safeguards to individuals during searches and detentions, and prevents
unlawfully seized items from being used as evidence in criminal cases. The degree of protection available in
a particular case depends on the nature of the detention or arrest, the characteristics of the place searched,
and the circumstances under which the search takes place.
An individual is stopped for police questioning while walking down the street.
An individual is pulled over for a minor traffic infraction, and the police officer searches the vehicle's trunk.
An individual is arrested.
Police officers enter an individual's house to place him or her under arrest.
Police officers enter a corporation's place of business to search for evidence of crime.
Police officers confiscate an individual's vehicle or personal property and place it under police control.
Potential scenarios implicating the Fourth Amendment, and law enforcement's legal obligation to protect
Fourth Amendment rights in those scenarios, are too numerous to cover here. However, in most instances a
police officer may not search or seize an individual or his or her property unless the officer has:
A belief rising to the level of "probable cause" that an individual has committed a crime.
An arrest is found to violate the Fourth Amendment because it was not supported by probable cause or a
valid warrant. Any evidence obtained through that unlawful arrest, such as a confession, will be kept out of
the case.
A police search of a home is conducted in violation of the homeowner's Fourth Amendment rights, because
no search warrant was issued and no special circumstances justified the search. Any evidence obtained as
a result of that search cannot be used against the homeowner in a criminal case.
A valid search warrant must meet four requirements: (1) the warrant must be filed in good faith by a law
enforcement officer;
(2) the warrant must be based on reliable information showing probable cause to search;
Where can police search and what can they seize under a warrant?
Police may only search the particular area and seize the specific items called for in the search warrant. Police
may search outside the scope of the warrant only if they are protecting their safety or the safety of others, or
if they are acting to prevent the destruction of evidence. Police may seize objects not specified in the warrant
only if they are in plain view during the course of the search.
Yes. Under some circumstances, police are authorized to conduct a search without first obtaining a search
warrant. Common exceptions to the warrant requirement include:
Consent. Police may conduct a search without a search warrant if they obtain consent. Consent must be
freely and voluntarily given by a person with a reasonable expectation of privacy in the area or property to be
searched.
Plain View. An officer may seize evidence without a warrant if an officer is on the premises lawfully and the
evidence is found in plain view.
Search incident to arrest. While conducting a lawful arrest, an officer may search an individual's person and
their immediate surroundings for weapons or other items that may harm the officer. If a person is arrested in
or near a vehicle, the officer has the right to search the passenger compartment of that vehicle.
Exigent Circumstances. Police are not required to obtain a search warrant if they reasonably believe that
evidence may be destroyed or others may be placed in danger in the time it would take to secure the warrant.
Automobile Exception. An officer may search a vehicle if they have a reasonable belief that contraband is
contained inside the vehicle.
Hot Pursuit. Police may enter a private dwelling if they are in "hot pursuit" of a fleeing criminal. Once inside
a dwelling, police may search the entire area without first obtaining a search warrant.
A police officer may stop an individual to conduct a field interview if the officer has reasonable suspicion that
criminal activity has been, is being or is about to be committed. During the field interview, the officer may
conduct a pat-down search of the outer garments for weapons if the officer has a reasonable fear for his or
her own safety as well as that of others.
If evidence is obtained without a valid search warrant, and no exception to the warrant requirement applies,
the evidence may be subject to the exclusionary rule. The exclusionary rule prevents illegally obtained
evidence from being admitted in a court of law. Evidence gathered on the basis of illegally obtained evidence
(known as "fruit of the poisonous tree") will also be excluded.
Outline:
Introduction
The Process
1. Profiling inputs
2. Decision processing
3. Crime assessment
4. The offender profile
5. Investigative use
6. Flaws
Introduction
Criminal profiling is an important part of a criminal psychology. This part of an article will partially answer
questions about what criminal profiling is, what it is used for, what is aim of it, in which cases it is mostly used,
what are it’s types and what kind of approaches it has.
In short, Criminal profiling (also known as offender profiling and specific profile analysis) is to create a
psychological and not only psychological portrait, determine location of the offenders by gathering their
personal attributes from crime scene behavior in order to assist in detection of them.
Criminal profiling is typically used when offender’s identity is unknown and with serious criminal offences
such as murder, sexual assault. Profilers also work on crime series, where is considered, that the crime is
committed by the same offender.
What creates an offender profile is not clearly agreed, but the process of profiling draws both, physical and
nonphysical information. This includes the layout of the crime scene in terms of disposition of the victim and
the presence or absence of significant items, evidence on what was done to the victim and the sequence of
events,and the perpetrator’s behavior before and after the crime. From these data, inferences are drawn
about the possible meaning and motivation of particular acts. For example, tying up a victim may mean a
necessity for control, while stabbing the victim before sexual intercourse may mean a need for arousal from
pain or blood. Characteristics of the victim, location of the crime, use of a vehicle, and relation to previous
crimes may also suggest social and demographic features of the offender, such as race, age or occupation.
The goal is to narrow the field of investigation, basic assumptions are, that an offender’s behavior at the crime
scene reflects consistencies in personality and method of committing crime (Holmes, 1989). In the majority
of cases Criminal profiling is used in serial crimes and sexual assaults and 90% of profiling attempts involve
murder or rape. Holmes suggests, that profiling is most useful when the crime scene reflects
psychopathology, such as sadistic assaults, rapes or satanic and cut killings. However, there have been
cases of it’s use in arson, obscene telephone calls and bank robbery.
There are two main directions of Criminal profiling: The profiling of an criminal’s personal
characteristics and geographical profiling. Most commonly, the first one is what people most commonly
associate with criminal profiling.
A geographical profiler could be asked to identify the location of an offender’s home, an offender profiler
might be asked to construct profile of an unknown offender based on his/hers behavior at the crime scene.
A profiler may also be asked to advise police about which particular suspect should be interviewed and how.
In addition to it, Ainsworth has identified four main approaches to criminal profiling, these are:
The geographical approach – this looks at patterns in the location and timing of offences to make
judgements about links between crimes and suggestions about where offenders live and work.
Investigative psychology – this grew out of geographical profiling and uses established psychological
theories and methods of analysis to predict offender characteristics from offending behavior.
The typological approach – this involves looking at the characteristics of crime scenes to assign
offenders to different categories, each category of offender having different typical characteristics.
The clinical approach – this approach uses insights from psychiatry and clinical psychology to aid
investigation where an offender is thought to be suffering from a mental illness of other psychological
abnormality.
The Process
The basic assumptions
When profiling characteristics of a person, a offender profiler assumes, that the offender’s behavior is directed
by the way he/she thinks and his/her characteristics. Although, “how they think how they behave” principle
is not flawless, because sometimes an offender’s behavior may be affected by involvement of another person,
such as victim or witness and in result a drawing of an his/her characteristics becomes more complicated. It
is the job of a criminal profiler to infiltrate a behavior that is indicative of a person rather than of the situation.
2. Decision processing
During this step, all the information gathered in the first stage is being organized in order classify the crime
by type and style. A correct classification will assist profiler in determining the direction of investigation.
For the purposes of this step the answer to relevant questions about the crime will help. These may be:
The more specific classification a criminal act falls in the better. For example, a murder can be divided into
many types of classification, such as: