Investigative Interviews

Learn to identify fraud deception & insider threats

This two day investigative interviewing course lays the foundation and process for preparing, executing and evaluating an investigation within your organization. It introduces the audience to tools and techniques that can be used by the interviewer to extrapolate information, determine intent and achieve cooperation.

Billions of dollars are spent annually by corporations to investigate fraud, theft and espionage.

Investigative Interviewing Course By Chameleon Associates

Across the globe, increasing resources and time are devoted to this endeavor. This exponential growth has focused the need for effective screening of personnel, periodic evaluation and results-oriented, proactive investigation.

The objectives of the Chameleon course in Investigative Interviewing include:

  • Train corporate security personnel on techniques and skills for conducting investigative interviewing.
  • Understanding the adversarial Methods of Operation that relate to an interviewee who is resisting and/or attempting to manipulate the investigative process.
  • Learn to conduct result-oriented investigations and interviews in a corporate and/or governmental setting.
  • Efficiently screen and interview human resources entering an organization.
  • In this highly interactive course, trainees will simulate investigative interviewing scenarios to include exercises in the preparation for the investigative interview, analysis of documents and background information.

Chameleon’s investigative interviewing is proactive, results-oriented and highly effect. It aims to make the most of the time and resources an organization devotes to its mitigation efforts against both criminal and terrorist threat. Interviews are one of the best and most effective tools available.

Interested In Providing This Course To Your HR Or Security Department?

Drop us a line today and we will send you a detailed proposal!

An interviewer needs to carefully prepare for an interview, gather intelligence and make the best of various tools and technologies. In the course of the exchange, he has to be able to evaluate the information, behavior, body language of an interviewee and make a determination as to the potential threat posed. A valuable by-product of interviews is the collection of information that if used and disseminated correctly, can be part of an overall security effort.

The nature of the threat is such that an organization needs to act quickly and take initiative to apprehend, mitigate or defuse indications of potential, hostile activities. This is one more reason why solid training is imperative.