Fraud Interview Guide
Fraud Victim Interview Guide
Officer Name | ____________________________ |
Date | ________________ |
Case Number | ____________________________ |
Notes |
Preparation
- Review Case Details: Examine prior reports, victim background, and fraud type.Prepares officer for trauma-informed, culturally sensitive interview and evidence collection.
- Cultural/Language Considerations: Identify language barriers and arrange interpreters.Ensures accessibility and cultural awareness.
- Recording: Use video/audio (with consent).Captures admissible and accurate record.
- Environment: Choose a quiet, private setting.Promotes comfort and openness.
Section 1: Introduction & Rapport Building
- Can you tell me your full name, date of birth, and contact information?Confirms identity for records.
- Can you share a bit about yourself and your background?Builds rapport and establishes baseline.
- Is there anything about your background or preferences that would make this easier for you?Ensures cultural sensitivity and accessibility.
- Are you comfortable proceeding with this interview? Would you like anyone else present?Trauma-informed consent and comfort.
- Have you previously reported this incident?Avoids duplication and checks reporting history.
Section 2: Overview of the Incident
- Start from the beginning and tell me everything you remember.Encourages free recall.
- When did you first realize something was wrong?Establishes timeline of awareness.
- What made you believe this was fraud?Identifies red flags and suspect behavior.
- What worries you most about this situation?Uncovers ongoing risks.
Section 3: Fraud Details
- What type of fraud do you believe this was?Helps categorize investigation.
- How were you first contacted?Identifies vector of contact.
- Do you have any of the original communications?Sources digital evidence.
- Did you provide any personal or financial information?Assesses scope of compromise.
- Did you send any money or assets?Establishes loss and financial trail.
- Were you promised anything in return?Identifies manipulation strategy.
- Did you ever meet the suspect in person?Identifies leads for surveillance.
- If you could imagine how someone might scam others like this, what would be the easiest way?Uncovers broader fraud patterns.
Section 4: Timeline and Communication Channels
- Can you outline a timeline of key events?Aligns events with evidence.
- What platforms were used to communicate?Identifies data sources.
Section 5: Impact Assessment
- What is your total estimated financial loss?Determines charge severity.
- How has this impacted your daily life or well-being?Identifies victim support needs.
- Has the suspect tried to contact you again or made threats?Assesses ongoing risk.
Section 6: Victim's Actions and Mitigation
- Have you contacted your bank or credit card provider?Assesses protective steps.
- Have you contacted credit bureaus or changed passwords?Evaluates risk management.
- Have you filed other reports?Facilitates inter-agency collaboration.
- What support do you feel you need?Aligns with holistic victim care.
Section 7: Suspect Information (if known)
- Do you have any names, usernames, phone numbers, or email addresses?Provides investigative leads.
- Do you have any voice recordings, screenshots, or documents?Preserves digital evidence.
Section 8: Closing
- Is there anything else you feel we should know?Opens door for unprompted details.
- Are you willing to provide a written statement or evidence?Formalizes testimonial.
- Would you like to be referred to victim services?Ensures holistic care.
Summary of demeanor | ____________________________ |
Any unsolicited comments | ____________________________ |
Devices observed or seized | ____________________________ |
Next steps | ____________________________ |
Post-interview evaluation | ____________________________ |
Fraud Suspect Interview Guide
Officer Name | ____________________________ |
Date | ________________ |
Case Number | ____________________________ |
Location | ____________________________ |
Notes |
Preparation
- Review all available evidence, including victim statements and communications.Prepares for focused, strategic questioning.
- Plan questioning strategy: Open-ended first, closed questions later.Encourages narrative and limits defensiveness.
- Ensure legal compliance and Miranda rights read.Protects admissibility and suspects’ rights.
Section 1: Identification & Background
- Can you state your full name, date of birth, and current address?Confirms identity.
- Do you have any prior involvement with financial fraud or cybercrime?Establishes background risk.
- Employment history?Identifies opportunities or patterns.
- Relationship to victim (if known)?Clarifies connection.
Section 2: Fraud Details
- Do you know the victim in this case?Direct link inquiry.
- Have you received money or sensitive information from anyone recently?Assesses involvement.
- Do you use online platforms to conduct financial transactions?Identifies modus operandi.
- Have you ever created fake accounts or personas online?Confession opportunity or detection.
Section 3: Timeline & Alibi
- Can you describe your activities during [date/time] of the alleged fraud?Validates timeline or identifies discrepancies.
- Do you have anyone who can confirm your whereabouts?Alibi verification.
Section 4: Closing
- Is there anything you want to clarify or add regarding the allegations?Final opportunity for narrative.
- Are you willing to provide documents or access to devices for investigation?Evidence preservation.
Demeanor during interview | ____________________________ |
Inconsistencies observed | ____________________________ |
Documents seized | ____________________________ |
Follow-up actions | ____________________________ |
Case status/recommendations | ____________________________ |