The instruments for investigation

1 February 2020 Security Services & Risk Management

Regardless of the reason for investigation, the investigation is only as good as the investigators. In the world of security, criminology and risk management, it is the person and not the weapon that creates havoc.

The concept of success for criminology, security, and risk investigation management will depend on the level of situational awareness of the decision-makers on the ground and their reaction speed. This applies to any form or field in management, research and application, besides vetting and compliance, because crime lives in all fields – business, human resources, construction, farming, education, security or, for that matter, where any human is involved.

When the investigation is related to crime, the outcomes could lead to life-impacting or life and death situations. Therefore, the importance of knowing all the accurate and correct information is paramount. When any research is based on insufficient or unreliable information, the narrative of a puzzle-built picture will point the investigator in the wrong direction, wasting time, effort and money.

To heighten situational awareness and gather information to conceptualise the narrative, one would rely on the people on the ground, besides instruments for investigation, such as incident and crime mapping software, CCTV, access control, perimeter security, drones, covert or overt surveillance equipment, social media tracking, mobile phone tracking, to mention but a few.

There are words related to investigation, such as identifying the modus operandi (pattern), which is one of the fundamental foundations for investigation. The pattern dictates the design and structure of any form, and it is obvious that once the pattern changes, so too does the formation of the structure. The word ’clue’ could describe the X factor. Identifying or uncovering an element could point to identifying a pattern.

Concept

To read the situation is to fully understand the nature of the beast (narrative). This is done by following a pattern of thought that could be described as building a puzzle. The correct placing of all pieces of the puzzle using their distinctive patterns and shapes form the full picture. Subsequently, one must have conceptional thought and must be fully situational aware to ensure that all the pieces of the puzzle are considered and fit for construction. Thereafter, one must distinguish and identify the pattern to comprehend the structural formation, which could change at a moment’s notice.

The pieces of the puzzle must be truthful. As we know, people lie, hide or volunteer information for their own agenda. Therefore, the tool must contain the knowledge and methods to critically out-think and outsmart the criminal. Furthermore, they also follow the tangible chain of evidence to comprehend the big picture.

Keep in mind that one can locate tangible items that a syndicate or person may use to commit an act of crime or terror. Therefore, connecting people with things must be an approach to follow.

Taking all the above into consideration for defining the hypothesis and selecting the tools to critically out-think or outsmart the criminal, certain issues have to be taken into consideration. Furthermore, it would be a human that must do the investigation for research, analytics and operations.

The technology is only as good as the users

To find the clues and the pattern, one must identify and comprehend the crime on/in a location or field of interest. The researcher/investigator must know the culture of crime and methods of crime to select the instruments best suited. The practitioners need to read the situation and the people involved.

As stated earlier, the instrument is only as good as the user that is knowledgeable in distinct crime or domains (e.g. security consultants). Besides having the soft skills, they must also have the character traits such as mental and emotional intelligence. This dictates a question: “who is best to select the instruments?’’

The unbiased analyst/investigator must identify the pattern and formation of a structure by observing, interviewing and drawing up the questions for analysis. An example could be based on transnational or local organised crime, street gangs or the lone-wolf predator where the practitioner must read the situation to find the first piece of the puzzle, by identifying a person of interest that may be working on their own or with others.

A founding researcher (Flavell 1976,1979) suggests for critical thinking (thinking out of the box), that the person must be self-aware and regulate themselves in social settings. This should be supplemented by adding situational awareness to see the complete narrative and by taking into consideration that unknown and known issues could impact the complete picture (Ensley, 1995). Furthermore, the critical thinking soft skills must include lie, deception detection and critical situational interviewing regardless of culture, to identify a person of interest (Kirsten, 2018,2019).

Regardless of the investigative method, the completed narrative (picture) must be reviewed to consider missing issues and be totally comprehended (got the picture). Thereafter, the narrative must again be dissected to identify how, what and where the hard evidence could be found relating to each piece of the puzzle, e.g. CCTV footage, mobile phone records, DNA, fingerprints, etc.

The outcomes of using the instruments and critical thinking methodology included in the soft skills will uncover new crime and discover copycat crime. The research base for all, and guidance articles on where, how and to use such, can be found in the cited works.

Resources

• ISIO, www.intsi.org.

• Human Investigation Management [HIM], www.human-investigation-management.com.

• Kirsten, J. (2018), Critical Thinking, the X Factor in Criminology, Security and Risk (Vol 3), ISBN 978-0-620-81265-8.

• Kirsten, J. (2019), Security and Criminology Investigation Management (Vol 4), ISBN 978-0-6399974-0-7.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
AI rewrites financial crime
Security Services & Risk Management Financial (Industry)
Criminals are exploiting South Africa’s high connectivity and still-maturing regulation to scale attacks faster than we can defend them. The speed and sophistication of these scams are outpacing the systems designed to stop them.

Read more...
Strengthening organisational integrity in 2026 and beyond
iFacts Security Services & Risk Management
In 2026, the risks facing organisations, whether in the corporate sector or government, will be more complex and far-reaching. Employee screening will have to be more complex and comprehensive.

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
The impact of AI on security
Technews Publishing Information Security AI & Data Analytics
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.