Police Investigation Workflows - Professional Frameworks
UK College of Policing doctrine, PEACE model, PIP structure, HOLMES2 case management, and evidence collection standards for criminal investigations.
Police Investigation Workflows - Professional Frameworks
Executive Summary
Modern police investigations operate within rigorously structured professional frameworks that balance systematic methodology with investigative flexibility. This document synthesizes the core investigative doctrines, systems, and quality controls that define professional police investigation in the UK and internationally.
Key Principle: Investigation is fundamentally human. Systems must support investigative thinking, not replace it. Structure enables accountability while preserving the analytical judgment essential to effective investigation.
The UK's College of Policing Core Investigative Doctrine, built around the 5WH framework (What, Who, When, Where, Why, How), provides the conceptual foundation. This is operationalized through the Professionalising Investigation Programme (PIP), which stratifies investigative competence across four levels. Major incident investigations leverage HOLMES2 case management systems and multi-agency coordination protocols, while evidence collection adheres to internationally recognized chain of custody standards.
Critical to this framework is the legal architecture governing investigation: the Police and Criminal Evidence Act 1984 (PACE) governs arrests, detention, and interviews; the Criminal Procedure and Investigations Act 1996 (CPIA) mandates disclosure of all material evidence, including that which undermines the prosecution case. The Independent Office for Police Conduct (IOPC) provides external oversight and investigation standards for serious incidents.
Core Insight: Professional investigation requires both inculpatory and exculpatory evidence gathering. CPIA obligations demand pursuit of "reasonable lines of enquiry" both towards AND away from the suspect—a principle that distinguishes professional investigation from advocacy.
Related Research
This methodology shares concepts and techniques with other investigation frameworks:
Timeline Construction
- Legal eDiscovery - 8-step timeline with evidence linking (Bates numbers)
- Intelligence Analysis - Chronologies as diagnostic SAT
- Journalism - Temporal verification in ChronoFact framework
Evidence Chain of Custody
- Legal eDiscovery - SHA-256 hash certification and FRE 902(13)/(14) authentication
- Journalism - Documentary provenance and authentication standards
- Academic Research - Chain of evidence in qualitative research
Quality Control
- Quality Control Comparison - Comprehensive QC methodology comparison across all six domains
- Regulatory Investigations - Dual decision-maker model (professional + lay member)
- Intelligence Analysis - Minimum 3 independent reviewers, Red Cell programs
Interview Methodologies
- Regulatory Investigations - Formal investigation interview protocols
- Academic Research - Semi-structured interview techniques
- Journalism - Source interview and verification protocols
Bias Mitigation
- Intelligence Analysis - ACH 7-step process, 66 SATs
- Academic Research - Reflexivity journals and positionality statements
- Legal eDiscovery - Blind review protocols in TAR validation
Contradiction Detection
- Legal eDiscovery - Version tracking and temporal contradiction detection
- Intelligence Analysis - Multi-source fusion and contradictory evidence handling
- Journalism - Three-step verification and discrepancy resolution
1. Core Investigation Framework
1.1 The 5WH Framework (College of Policing Core Investigative Doctrine)
The 5WH model structures investigative thinking across six fundamental dimensions:
- What happened? (Event reconstruction, offence classification)
- Who was involved? (Victims, suspects, witnesses, accomplices)
- When did it occur? (Timeline establishment, sequence reconstruction)
- Where did it take place? (Crime scene, secondary locations, digital spaces)
- Why did it happen? (Motivation, context, contributory factors)
- How was it committed? (Methods, tools, techniques, modus operandi)
This framework drives hypothesis generation, evidence prioritization, and investigative planning. Every investigative action should advance understanding of one or more 5WH dimensions.
1.2 Professionalising Investigation Programme (PIP)
PIP establishes a four-tier competency structure for investigators:
PIP Level 1 - Volume Crime Investigators
- Initial responders and patrol officers
- Routine crime investigation (burglary, theft, criminal damage)
- Evidence preservation and scene management
- Witness identification and initial accounts
- Basic investigative decision-making
PIP Level 2 - Serious Crime Investigators
- Complex crime investigation (serious assault, rape, robbery)
- Advanced interview techniques
- Multi-source evidence coordination
- Investigation planning and management
- Supervision of PIP Level 1 investigations
PIP Level 3 - Senior Investigating Officers (SIO)
- Major incident investigation (homicide, terrorism, organized crime)
- HOLMES2 system management
- Multi-agency coordination
- Strategic investigative decision-making
- Major Incident Room (MIR) leadership
- Prosecution file preparation for complex cases
PIP Level 4 - Strategic Managers
- Oversight of multiple major investigations
- Resource allocation and strategic planning
- Policy development and quality assurance
- Interagency liaison at strategic level
- Review and learning from completed investigations
1.3 Investigative Principles
Primacy of Material All investigative conclusions must be supported by material evidence. Speculation and assumption are explicitly identified and tested.
Reasonable Lines of Enquiry CPIA requires investigators to pursue all reasonable lines of enquiry, whether they point towards or away from the suspect. This is not merely a legal obligation but a methodological imperative: robust conclusions require testing counter-hypotheses.
Objective Evidence Evaluation Confirmation bias is the primary threat to investigative integrity. Professional investigation demands systematic consideration of alternative explanations and evidence that contradicts working hypotheses.
Documentation and Audit Trail Every investigative action, decision, and rationale must be documented contemporaneously. This supports accountability, continuity (when investigators change), and legal scrutiny.
2. Interview Methodologies
2.1 PEACE Model (UK National Standard)
PEACE is the UK's evidence-based interview framework, internationally adopted and rooted in cognitive psychology rather than coercive tactics.
P - Planning and Preparation
- Review all available evidence
- Identify information gaps
- Develop interview strategy and topics
- Prepare questions (open-ended, not leading)
- Consider interviewee vulnerability and special measures
- Arrange appropriate environment and support
E - Engage and Explain
- Establish rapport (essential for cognitive function)
- Explain interview process and legal rights
- Address interviewee concerns
- Create psychologically safe environment
- Clarify expectations and outcomes
A - Account, Clarify, Challenge
- Obtain free narrative account (uninterrupted)
- Clarify ambiguities and timeline
- Probe for detail using open questions
- Challenge inconsistencies and contradictions
- Present evidence strategically
- Allow interviewee to explain discrepancies
C - Closure
- Summarize key points
- Allow interviewee to add or clarify
- Explain next steps
- Maintain rapport (future cooperation)
- Thank interviewee for participation
E - Evaluation
- Assess account against evidence
- Identify corroboration opportunities
- Determine further investigative actions
- Document interview outcomes and decisions
- Review interviewer performance and techniques
Evidence Base: PEACE interviews produce more reliable evidence than confrontational methods. The model reduces false confessions while increasing voluntary admissions.
2.2 Cognitive Interview Technique
Developed by Fisher and Geiselman (1992), the Cognitive Interview leverages memory science to enhance witness recall.
Performance: 46% increase in correct recall compared to standard interviews, with 90% accuracy maintained.
Four Core Techniques:
-
Context Reinstatement
- Mentally recreate physical environment
- Recall emotional state at time of event
- Recall thoughts and sensations
- Use environmental cues (sounds, smells, lighting)
- Rationale: Memory is context-dependent; reinstating context activates related neural pathways
-
Report Everything
- Encourage reporting all details, even if seemingly irrelevant
- No self-editing or filtering
- Include partial information and impressions
- Rationale: Seemingly trivial details can trigger associated memories or provide investigative leads
-
Recall from Different Perspectives
- Describe events from another person's viewpoint
- Consider what others present might have observed
- Caution: Clearly distinguish observed fact from inference
- Rationale: Different perspectives access different memory traces
-
Recall in Different Orders
- Reverse chronological order
- Start from most memorable point
- Vary sequence of recall
- Rationale: Disrupts script-based recall, accesses episodic memory
Application: Used primarily with cooperative witnesses (not suspects). Requires trained interviewers and extended time (typically 60-90 minutes).
2.3 Achieving Best Evidence (ABE)
ABE is the UK framework for interviewing vulnerable and intimidated witnesses, particularly children and adults with learning difficulties.
Key Principles:
- Pre-interview assessment of vulnerability and communication needs
- Specialist trained interviewers
- Video recording (admissible as evidence-in-chief)
- Phased approach with extensive rapport-building
- Communication aids (visual aids, intermediaries)
- Questions matched to developmental level
- Avoidance of repeated interviews (retraumatization)
Phases:
- Establishing rapport (extended phase, building trust)
- Free narrative (minimize interruptions)
- Questioning (open questions, visual aids)
- Closure (neutral topics, explain process)
Legal Framework: Video interviews can replace live testimony under Youth Justice and Criminal Evidence Act 1999, reducing trauma and improving evidence quality.
2.4 Reid Technique (US Context - Included for Contrast)
Important Caveat: The Reid Technique is controversial and has been linked to false confessions.
Structure:
- Nine-step confrontational interview
- Presumption of guilt
- Behavioral analysis (scientifically discredited)
- Minimization and maximization tactics
- Theme development (providing justifications)
Criticism:
- 25% of DNA exonerations involved false confessions
- Disproportionately affects vulnerable suspects (juveniles, intellectual disabilities)
- Creates compliance rather than truth-seeking
- Not evidence-based
Relevance: Understanding Reid is important for recognizing its limitations and appreciating why evidence-based models (PEACE, Cognitive Interview) are superior.
3. Major Incident Protocols
3.1 Senior Investigating Officer (SIO) Role
The SIO is the strategic and operational leader of major investigations (homicide, terrorism, serial offending, organized crime).
Requirements:
- PIP Level 3 accreditation
- Extensive investigative experience
- Strategic decision-making capability
- Multi-agency coordination skills
- HOLMES2 system proficiency
Responsibilities:
- Overall investigative strategy
- Resource allocation and tasking
- Risk assessment and management
- Media strategy and family liaison
- Prosecution file quality
- Post-incident learning and review
Decision-Making:
- Policy File documentation (rationale for all major decisions)
- Consultation with specialists (forensics, intelligence, legal advisors)
- Regular reviews with senior management
- Contingency planning for investigative failures
3.2 HOLMES2 Case Management System
HOLMES2 (Home Office Large Major Enquiry System 2) is the UK's cloud-based major incident management platform.
Core Functions:
- Action Management: Task allocation, tracking, and completion verification
- Document Management: Centralized repository for all case documents
- Statement Recording: Witness and suspect accounts with linking
- Intelligence Management: Integration of intelligence sources
- Timeline Construction: Automated chronology from multiple sources
- Nominal Management: Person tracking with relationship mapping
- Vehicle Management: Vehicle movements and ownership
- Property Management: Exhibits and evidence tracking
- Location Management: Geographic information system (GIS) integration
Dynamic Reasoning Engine:
- Pattern recognition across large datasets
- Anomaly detection (timeline gaps, contradictions)
- Link analysis (people, vehicles, locations, communications)
- Hypothesis testing against evidence base
- Identification of investigative gaps
Workflow:
- Initial Setup: Case creation, team roles, investigation parameters
- Data Input: Continuous feeding of actions, statements, intelligence, exhibits
- Analysis: Regular analytical products (timelines, relationship charts, intelligence assessments)
- Tasking: Action generation based on analysis
- Review: SIO reviews analytical products and adjusts strategy
- Disclosure: Automated disclosure schedule generation for prosecution
Benefits:
- Prevents information loss in large-scale investigations
- Enables continuity when personnel change
- Supports multiple concurrent lines of enquiry
- Provides audit trail for decision-making
- Facilitates multi-agency information sharing
3.3 Major Incident Room (MIR) Coordination
The MIR is the physical and organizational hub of major investigations.
Key Roles:
- Senior Investigating Officer (SIO): Strategic leadership
- Deputy SIO: Operational management, SIO contingency
- Office Manager: MIR administration and resource management
- Receiver: Initial action and intelligence assessment
- Statement Reader: Statement analysis and cross-referencing
- Indexer: HOLMES2 data input and quality control
- Analyst: Intelligence analysis and hypothesis testing
- Intelligence Officer: Intelligence source management
- Disclosure Officer: CPIA compliance and unused material management
- Family Liaison Officer (FLO): Victim family communication and intelligence gathering
Operational Rhythm:
- Daily briefings (morning and evening)
- Weekly strategic reviews
- Analytical products on demand
- 24/7 operational capability for fast-moving incidents
Quality Controls:
- Supervisor reviews of all actions
- Peer review of analytical products
- External review by senior officers
- IOPC oversight for sensitive cases
4. Evidence Collection and Chain of Custody
4.1 FBI 5-Step Chain of Custody Protocol
The FBI's five essential steps provide the international standard for evidence integrity:
1. Obtain Evidence Legally
- Search warrant or legal authority
- Consent (properly documented)
- Lawful seizure under arrest powers
- Documentation of legal basis
2. Describe in Detail
- Physical description (size, color, condition)
- Location where found
- Date and time of collection
- Environmental conditions
- Photographic documentation
- Sketches or diagrams where relevant
3. Identify Accurately
- Unique identifiers (serial numbers, markings)
- Exhibit numbering system
- Labeling with case number, date, collector initials
- Cross-reference to scene documentation
4. Package Properly
- Evidence-specific packaging (paper for biological, anti-static for digital)
- Tamper-evident sealing
- Contamination prevention
- Preservation of condition (refrigeration, secure storage)
- Documentation of packaging method
5. Establish Chain of Custody
- Chronological documentation of possession
- Transfer logs with signatures
- Storage location logs
- Access records
- Analysis documentation
- Court production records
Chain of Custody Documentation Must Include:
- Date and time of collection/transfer
- Collecting/transferring officer identity
- Receiving officer identity
- Purpose of transfer
- Location of storage
- Any examinations or analysis conducted
- Condition of evidence and packaging
Consequences of Broken Chain:
- Evidence inadmissibility
- Case collapse
- Disciplinary action
- Civil liability
4.2 Digital Evidence Standards
Specific Requirements:
- Forensic imaging (bit-by-bit copy, not file copy)
- Hash value certification (MD5, SHA-256)
- Write-blocking during acquisition
- Metadata preservation
- Analysis on copy, not original
- Audit trail of all access and analysis
- Expert witness statement on methodology
National Institute of Standards and Technology (NIST) Guidelines:
- Collection: Minimize contamination, document fully
- Examination: Use validated tools, maintain original
- Analysis: Document methodology, consider alternative explanations
- Reporting: Present findings objectively, acknowledge limitations
4.3 Physical Evidence Management
Crime Scene Management:
- Scene preservation (cordons, access control)
- Scene documentation (photography, video, sketches)
- Systematic search (grid, spiral, line, zone methods)
- Evidence marking and collection
- Scene log (all personnel, times, actions)
Laboratory Submission:
- Exhibit continuity maintained
- Submission forms with specific questions
- Priority flagging for time-sensitive analysis
- Consultation with forensic experts on collection methods
Storage and Security:
- Climate-controlled facilities
- Access-controlled evidence rooms
- Segregation (by case, by evidence type)
- Regular audits
- Disposal protocols (after case closure and appeal periods)
5. IOPC Investigation Standards
The Independent Office for Police Conduct (IOPC) provides external oversight of police conduct and serious incidents.
5.1 IOPC Mandate
Jurisdiction:
- Police use of force resulting in death or serious injury
- Deaths in custody or following police contact
- Serious sexual offences by police officers
- Serious corruption
- Discriminatory behavior
Investigation Types:
- Independent Investigation: IOPC investigators, no police involvement
- Directed Investigation: Police investigators under IOPC direction and control
- Supervised Investigation: Police investigation with IOPC oversight
- Local Investigation: Police investigation with IOPC notification
5.2 IOPC Investigation Standards
Independence Requirements:
- No involvement by officers from same force (for serious cases)
- Dedicated IOPC investigators with no police background (independent investigations)
- Clear terms of reference published
- Family involvement and information sharing
Methodological Requirements:
- Full PACE compliance
- Evidence-based decision-making
- Consideration of organizational/systemic factors (not just individual conduct)
- Expert input where specialist knowledge required
- Trauma-informed approach to witnesses and families
Transparency Requirements:
- Regular updates to families and complainants
- Published investigation reports (subject to legal restrictions)
- Recommendations for organizational learning
- Appeals process
Outcomes:
- Criminal prosecution (referred to Crown Prosecution Service)
- Gross misconduct proceedings
- Misconduct proceedings
- Organizational learning recommendations
- No case to answer
5.3 Learning and Accountability
Post-Investigation:
- Published reports identify systemic failures
- Recommendations for policy/training changes
- Monitoring of implementation
- National dissemination of learning
Key Insight: IOPC standards recognize that individual accountability must be complemented by organizational accountability. Many serious incidents result from systemic failures, not merely individual error.
6. Legal Framework
6.1 Police and Criminal Evidence Act 1984 (PACE)
PACE governs police powers and safeguards for suspects and witnesses.
Key Provisions:
Arrest (Section 24):
- Necessity test: arrest only if necessary for investigation
- Grounds: reasonable suspicion of involvement in offence
- Rights: caution, notification of reason for arrest
Detention (Sections 37-46):
- Custody officer independence (not involved in investigation)
- Detention reviews (6 hours, then 9 hours, then magistrates' court)
- Maximum pre-charge detention: 24 hours (36 hours for indictable offences, 96 hours for terrorism)
- Conditions of detention (meals, rest, medical care)
Interviews (Code C):
- Caution required
- Right to legal advice (free, independent)
- Appropriate adult for juveniles and vulnerable persons
- Audio/video recording mandatory
- No oppressive conduct
- Regular breaks
Search and Seizure (Sections 8, 18, 19, 32):
- Warrant requirements for premises search
- Powers to search person on arrest
- Seizure of evidence relevant to offence
- Return of seized property if not required
Samples (Sections 61-65):
- Intimate samples require consent (except DNA in serious cases)
- Non-intimate samples without consent if arrested for recordable offence
- Destruction rules (if not convicted)
PACE Codes of Practice:
- Code A: Stop and search
- Code B: Search of premises
- Code C: Detention, treatment, questioning
- Code D: Identification procedures
- Code E: Audio recording
- Code F: Video recording
- Code G: Arrest
- Code H: Terrorism detention
6.2 Criminal Procedure and Investigations Act 1996 (CPIA)
CPIA establishes disclosure obligations and imposes investigative discipline.
Disclosure Obligations:
Prosecution Duty:
- Disclose all material that might reasonably be considered capable of undermining the prosecution case or assisting the defence case
- Not limited to admissible evidence
- Includes material that weakens prosecution or strengthens defence
- Continuing duty (obligation survives up to and during trial)
Defence Statement:
- Defence must provide statement of defence case
- Identifies issues in dispute
- Sets out alibis and defence witnesses
- Triggers secondary disclosure obligation
Unused Material:
- Investigator duty to record and retain all material obtained
- Disclosure Officer duty to review and schedule
- Prosecutor duty to assess and disclose
- Sanctions for non-disclosure (case dismissal, conviction overturn)
Reasonable Lines of Enquiry:
- Positive obligation to pursue enquiries that undermine prosecution case
- Not merely reactive to defence requests
- Documented rationale for not pursuing potential lines of enquiry
- Subject to judicial review
Code of Practice:
- Material definition: anything obtained in investigation
- Recording requirements: contemporaneous logs
- Retention requirements: until case closed and appeals exhausted
- Disclosure schedule: lists all material with sensitivity assessments
- Public Interest Immunity (PII) for sensitive material
Key Principle: CPIA reflects the adversarial system's fairness imperative. The state's superior investigative resources impose a corresponding obligation to disclose material that assists the accused.
6.3 MG Forms (Manual of Guidance Forms)
MG forms provide the national standard for prosecution file structure.
Core Forms:
MG3 - Case Summary and Prosecution Recommendation
- Summary of evidence
- Offence charged
- Defendant details
- Recommendation for prosecution/disposal
MG5 - Case Summary (Extended)
- Detailed case narrative
- Chronology of events
- Evidence summary
- Legal framework
- Public interest factors
MG6 - Witness List
- All witnesses with contact details
- Summary of expected evidence
- Availability for court
- Special measures requirements
MG7 - Defendant Summary
- Previous convictions
- Bail/custody status
- Personal circumstances
- Risk assessment
MG11 - Witness Statement
- Standard format statement
- Signature and declaration
- CPS standard formatting
MG15 - Record of Tape-Recorded Interview
- Summary of interview
- Significant questions and answers
- Exhibits referenced
- Attached transcript or audio
MG16 - Evidential Sample/Impressions Report
- Forensic evidence summary
- Laboratory findings
- Expert conclusions
MG20 - Death Report
- Sudden death circumstances
- Post-mortem report
- Cause of death
Digital Case File:
- Increasingly, MG forms submitted electronically
- Integration with case management systems
- Streamlined CPS review process
7. Quality Assurance and Peer Review
7.1 Supervisory Oversight
Tiered Review Structure:
First-Line Supervision:
- Daily action review by sergeants/inspectors
- Case file review before submission
- Interview strategy approval
- Ethical compliance monitoring
Second-Line Supervision:
- Detective inspectors/chief inspectors
- Investigation strategy review
- Resource allocation decisions
- Risk assessment and mitigation
Senior Management:
- Superintendent/chief superintendent review for major incidents
- Policy decisions
- Multi-agency coordination
- Media and political liaison
7.2 Peer Review
Gold Group (Major Incidents):
- Multi-agency strategic coordination
- External expertise input
- Independent challenge to SIO decisions
- Resource allocation at force/national level
Critical Incident Review:
- Independent review of major investigations
- Retired senior investigators or external experts
- Focus on methodology, decision-making, missed opportunities
- Recommendations for improvement
Cold Case Review:
- Periodic review of unsolved serious crimes
- Fresh eyes on evidence
- New forensic techniques applied to retained exhibits
- Witness re-engagement
7.3 Professional Standards Monitoring
Complaint Investigation:
- Professional Standards Department (internal)
- IOPC oversight (external)
- Investigation of allegations of misconduct
- Disciplinary proceedings
Vetting and Ethics:
- Pre-employment vetting
- Security clearance reviews
- Financial monitoring
- Associations and relationships scrutiny
Continuous Professional Development:
- Annual performance reviews
- Training needs analysis
- National Detective Programme courses
- Specialist development (digital forensics, financial investigation)
8. Investigation Workflows and Orchestration
8.1 Standard Investigation Lifecycle
1. Initial Report
- Incident logging (CAD - Computer Aided Dispatch)
- Initial risk assessment (threat, harm, risk, vulnerability)
- Resource allocation
- Preservation of evidence instructions
2. Preliminary Assessment
- First officer attending (FOA) assessment
- Scene preservation
- Victim/witness identification
- Initial investigative hypothesis
- Solvability factors (evidence availability, witness cooperation)
3. Investigation Planning
- Lead investigator assignment
- Investigative strategy development
- Resource requirement identification
- Timeline and milestones
- Risk assessment (to investigation, to public, to officers)
4. Evidence Gathering
- Witness interviews
- Scene examination and forensic recovery
- CCTV and digital evidence acquisition
- Intelligence development
- Expert consultation
5. Analysis and Evaluation
- Evidence assessment against 5WH framework
- Timeline construction
- Suspect identification/elimination
- Hypothesis testing
- Gap analysis (missing evidence, unanswered questions)
6. Decision Making
- Arrest/interview strategy
- Charge decision (in consultation with CPS for complex cases)
- Bail/remand assessment
- Alternative disposals (caution, restorative justice)
7. Prosecution Preparation
- File construction (MG forms)
- Disclosure schedule preparation
- Witness management
- Expert witness briefing
- CPS consultation and advice
8. Trial Support
- Witness attendance coordination
- Officer briefing for court testimony
- Real-time evidence issues resolution
- CPS liaison during trial
9. Case Closure
- Outcome recording (charge, conviction, acquittal, discontinued)
- Victim/witness debrief
- Post-case review and learning
- Evidence disposal/retention
- Intelligence dissemination
8.2 Investigation Orchestration Principles
Parallel Processing:
- Multiple lines of enquiry pursued simultaneously
- Task allocation based on officer specialization
- Regular coordination meetings to share findings
Iterative Refinement:
- Investigation plan as living document
- Regular reviews adjust strategy based on findings
- Flexibility to pivot when evidence contradicts hypothesis
Intelligence Integration:
- Criminal intelligence database (CID) queries
- Multi-agency intelligence sharing (regional/national)
- Open-source intelligence (OSINT)
- Covert human intelligence sources (CHIS) managed through dedicated units
Forensic Strategy:
- Early consultation with forensic experts
- Prioritization of forensic submissions (fast-track for time-sensitive)
- Forensic intelligence (rapid screening) vs. evidential examination
Victim and Witness Management:
- Victim personal statement
- Special measures assessment
- Witness care unit coordination
- Protection measures for intimidated witnesses
9. Investigation Reporting Structures
9.1 Internal Reporting
Investigation Log:
- Chronological record of all actions
- Decision-making rationale
- Officer assignments
- Evidence recovered
- Interviews conducted
Progress Reports:
- Regular updates to supervision
- Resource utilization
- Milestones achieved
- Obstacles and risks
- Revised timelines
Policy File (Major Incidents):
- SIO decision-making record
- Strategic rationale for major decisions
- Consultation records
- Risk assessments
- Resource allocation justification
9.2 External Reporting
Crown Prosecution Service:
- Pre-charge advice requests (complex cases)
- File submission (MG forms)
- Disclosure schedules
- Trial preparation conferences
IOPC:
- Mandatory referrals (deaths, serious injury, serious corruption)
- Progress updates during investigations
- Final investigation reports
Victims and Witnesses:
- Initial case update (suspect arrested/charged)
- Regular updates on case progress
- Trial date notification
- Outcome notification
- Victim Right to Review (if case not prosecuted)
Media:
- Press releases for major incidents
- Appeals for witnesses
- Reassurance to community
- Outcome announcements (post-conviction)
10. Practical Application Examples
10.1 Volume Crime Investigation (PIP Level 1)
Scenario: Residential burglary, forced entry, property stolen.
5WH Application:
- What: Burglary dwelling, multiple rooms searched, jewelry and electronics stolen
- Who: Unknown suspect(s), householder victim, neighbor witness
- When: Between 09:00-17:00 on [date] (householder at work)
- Where: [Address], rear door forced
- Why: Financial gain (targeted valuable items)
- How: Forced rear door with crowbar, methodical search
Investigation Actions:
- Scene examination: forced entry marks photographed, fingerprint examination
- House-to-house enquiries: neighbor CCTV canvass
- Intelligence checks: similar MO burglaries in area
- Victim statement: property list, recent suspicious activity
- CCTV review: local authority and private cameras
- Pawn shop/online marketplace monitoring for stolen goods
Evidence Assessment:
- Fingerprints: checked against database
- CCTV: vehicle identified near scene at relevant time
- Intelligence: linked to three similar burglaries (MO match)
- Forensic: DNA from blood on broken glass at entry point
Outcome: Suspect identified from DNA match, arrested, charged with four burglaries, convicted.
Learning: Systematic scene examination and intelligence linking enabled series detection. Single DNA hit solved multiple offences.
10.2 Major Incident Investigation (PIP Level 3)
Scenario: Suspicious death, body discovered in woodland.
Initial Response:
- Scene preservation: 500m cordon, scene guard, log established
- SIO appointment: PIP Level 3 qualified detective chief inspector
- HOLMES2 activation: case created, team assigned
- MIR established: physical location, staffing, equipment
- Post-mortem: Home Office pathologist attended scene and conducted examination
5WH Framework:
- What: Death by strangulation (post-mortem finding)
- Who: Victim identified via fingerprints, no suspect initially
- When: Death estimated 48-72 hours before discovery
- Where: Secondary crime scene (body moved), primary scene unknown
- Why: Unknown (no obvious motive, no robbery, sexual assault ruled out)
- How: Manual strangulation, significant force, probable male assailant
Investigation Strategy:
- Victimology: full background investigation, relationships, lifestyle, risks
- Last sighting: witness appeals, CCTV from last confirmed location
- Communications: phone records (cell site, calls, messages)
- Financial: bank records, transactions around time of death
- Associates: interview all known contacts
- Forensic: DNA, fiber analysis, entomology (time of death refinement)
- Intelligence: criminal associates, threats, disputes
Key Breakthrough:
- Cell site analysis placed victim's phone in specific area at time of death
- CCTV from that area showed victim with male
- Male identified via vehicle registration
- Male's phone also cell-sited to same location
- Male initially denied contact, confronted with evidence, admitted meeting but claimed victim alive when left
- Forensic: victim's DNA found in male's vehicle
- Re-interview: partial admission, claimed argument, victim fell and hit head
- Post-mortem inconsistent with fall (strangulation clear)
- Full confession obtained after forensic evidence presented
Outcome: Conviction for murder.
Learning: Cell site analysis provided investigative direction. Forensic evidence contradicted suspect account, facilitating confession. HOLMES2 system enabled integration of multiple evidence sources.
10.3 Vulnerable Witness Interview (ABE)
Scenario: Child witness to domestic violence.
Preparation:
- Child development specialist consulted
- Pre-interview assessment: communication level, trauma response
- Rapport-building session (separate from evidential interview)
- Visual aids prepared (house layout diagram, timeline cards)
- Specialist interviewer and supporter assigned
- Video recording equipment tested
Interview Conduct:
- Extended rapport phase: neutral topics, favorite activities, school
- Ground rules explained: "I wasn't there, so I need you to tell me everything"
- Free narrative: "Tell me what happened"
- Open questions: "What happened next?" "Where were you?"
- Minimal interruptions: child-led pace
- Visual aids: child placed figures on house diagram
- Closure: return to neutral topics, explain next steps
Evidence Quality:
- Child's account clear and consistent
- Video admissible as evidence-in-chief (no live testimony required)
- Defendant pled guilty after viewing video interview (spared child cross-examination)
Learning: Specialist interviewing and video recording enabled child's evidence to be heard without retraumatization. Guilty plea saved child from trial.
11. Key Takeaways for System Design
11.1 Human-Centered Design
Principle: Systems must augment investigative thinking, not replace it.
Implementation:
- Present evidence, don't interpret
- Surface contradictions and gaps, don't draw conclusions
- Enable hypothesis testing, don't prescribe hypotheses
- Support documentation, don't impose rigid workflows
- Facilitate analytical reasoning, don't automate judgment
11.2 Accountability and Audit
Principle: Every action and decision must be documented and defensible.
Implementation:
- Comprehensive logging (who, what, when, why)
- Decision rationale capture (not just outcomes)
- Version control for evolving assessments
- Chain of custody for evidence
- Access controls and audit trails
11.3 Balanced Investigation
Principle: Pursue evidence both towards and away from hypotheses.
Implementation:
- Surface exculpatory evidence prominently
- Flag confirmation bias risks
- Require documented consideration of alternative explanations
- Track evidence for and against each hypothesis
- Disclosure schedules generated automatically
11.4 Quality Control Integration
Principle: Build review and oversight into workflow, not as afterthought.
Implementation:
- Supervisor approval gates at key decision points
- Peer review of analytical products
- Consistency checks (timeline contradictions, evidence gaps)
- Compliance monitoring (PACE, CPIA, interview standards)
- Learning loops (post-case review feeding training and policy)
11.5 Evidence Integrity
Principle: Maintain evidential value from collection to court.
Implementation:
- Digital chain of custody (immutable logs)
- Hash verification for digital evidence
- Access controls and tamper detection
- Metadata preservation
- Export formats compatible with legal requirements
11.6 Scalability and Complexity Management
Principle: System must handle volume crime and major incidents.
Implementation:
- Modular architecture (activate features based on case complexity)
- HOLMES2-like linking and analysis for major cases
- Lightweight workflows for routine cases
- Multi-user coordination for team investigations
- Integration with external systems (forensics, intelligence, CPS)
11.7 Trauma-Informed Approach
Principle: Recognize impact of investigation on victims and witnesses.
Implementation:
- Special measures flagging and tracking
- Victim communication logs
- Witness care integration
- ABE interview support tools
- Minimization of repeat interviews/testimony
12. Sources
Primary Sources
-
College of Policing. (2023). Core Investigative Doctrine. London: College of Policing. Available at: https://www.college.police.uk/app/investigation/core-investigative-doctrine
-
College of Policing. (2023). Professionalising Investigation Programme (PIP). London: College of Policing. Available at: https://www.college.police.uk/career-learning/learning-catalogue/professionalising-investigation-programme-pip
-
Home Office. (1984). Police and Criminal Evidence Act 1984 (PACE). London: The Stationery Office. Available at: https://www.legislation.gov.uk/ukpga/1984/60/contents
-
Home Office. (1996). Criminal Procedure and Investigations Act 1996 (CPIA). London: The Stationery Office. Available at: https://www.legislation.gov.uk/ukpga/1996/25/contents
-
Home Office. (2024). PACE Codes of Practice (Codes A-H). London: The Stationery Office. Available at: https://www.gov.uk/guidance/police-and-criminal-evidence-act-1984-pace-codes-of-practice
-
Independent Office for Police Conduct (IOPC). (2023). Statutory Guidance. Canary Wharf: IOPC. Available at: https://www.policeconduct.gov.uk/publications/statutory-guidance
Interview Methodologies
-
Clarke, C. & Milne, R. (2001). National Evaluation of the PEACE Investigative Interviewing Course. London: Home Office.
-
Fisher, R. P. & Geiselman, R. E. (1992). Memory-Enhancing Techniques for Investigative Interviewing: The Cognitive Interview. Springfield, IL: Charles C. Thomas.
-
Geiselman, R. E., Fisher, R. P., Firstenberg, I., Hutton, L. A., Sullivan, S. J., Avetissian, I. V., & Prosk, A. L. (1984). "Enhancement of Eyewitness Memory: An Empirical Evaluation of the Cognitive Interview." Journal of Police Science and Administration, 12(1), 74-80.
-
Ministry of Justice. (2011). Achieving Best Evidence in Criminal Proceedings: Guidance on Interviewing Victims and Witnesses, and Guidance on Using Special Measures. London: Ministry of Justice. Available at: https://www.cps.gov.uk/legal-guidance/achieving-best-evidence-criminal-proceedings
-
Kassin, S. M., Drizin, S. A., Grisso, T., Gudjonsson, G. H., Leo, R. A., & Redlich, A. D. (2010). "Police-Induced Confessions: Risk Factors and Recommendations." Law and Human Behavior, 34(1), 3-38. [Reid Technique critique and false confession data]
Case Management Systems
-
Home Office. (2020). HOLMES2 User Guide. London: Police ICT Company. [Restricted distribution - operational guidance]
-
National Crime Agency. (2021). Major Incident Room Standardised Administrative Procedures (MIRSAP). London: NCA. Available at: https://www.nationalcrimeagency.gov.uk/
-
Stelfox, P. (2009). Criminal Investigation: An Introduction to Principles and Practice. Cullompton: Willan Publishing. [Academic analysis of HOLMES2 and MIR procedures]
Evidence and Forensics
-
Federal Bureau of Investigation (FBI). (2018). Handbook of Forensic Services. Quantico, VA: FBI Laboratory. Available at: https://www.fbi.gov/file-repository/handbook-of-forensic-services-pdf.pdf
-
National Institute of Standards and Technology (NIST). (2022). Digital Evidence Guidelines. Gaithersburg, MD: NIST. Available at: https://www.nist.gov/digital-evidence
-
Association of Chief Police Officers (ACPO). (2012). Good Practice Guide for Digital Evidence. London: ACPO. [Now superseded by NPCC guidance but foundational document]
Legal and Ethical Framework
-
Crown Prosecution Service (CPS). (2023). Director's Guidance on Disclosure. London: CPS. Available at: https://www.cps.gov.uk/legal-guidance/disclosure-guidance
-
Attorney General's Office. (2022). Attorney General's Guidelines on Disclosure. London: The Stationery Office. Available at: https://www.gov.uk/government/publications/attorney-generals-guidelines-on-disclosure
-
Criminal Cases Review Commission (CCRC). (2023). Casework Guidance. Birmingham: CCRC. Available at: https://ccrc.gov.uk/ [Analysis of disclosure failures in miscarriages of justice]
International Standards
-
International Association of Chiefs of Police (IACP). (2019). Investigation: Model Policy. Alexandria, VA: IACP.
-
INTERPOL. (2021). Global Guidelines for Digital Forensics Laboratories. Lyon: INTERPOL. Available at: https://www.interpol.int/
Academic and Professional Literature
-
Rossmo, D. K. (2008). Criminal Investigative Failures. Boca Raton, FL: CRC Press. [Analysis of failed investigations and systemic issues]
-
Innes, M. (2003). Investigating Murder: Detective Work and the Police Response to Criminal Homicide. Oxford: Oxford University Press.
-
Stelfox, P. & Pease, K. (2005). "Cognition and Detection: Reluctant Bedfellows?" In M. J. Smith & N. Tilley (Eds.), Crime Science: New Approaches to Preventing and Detecting Crime (pp. 191-207). Cullompton: Willan Publishing.
-
Brookman, F. & Innes, M. (2013). "The Problem of Success: What is a 'Good' Homicide Investigation?" Policing and Society, 23(3), 292-310.
-
Smith, K. & Flanagan, C. (2000). The Effective Detective: Identifying the Skills of an Effective SIO. London: Home Office Policing and Reducing Crime Unit. Police Research Series Paper 122.
Cognitive and Psychological Research
-
Kebbell, M. R. & Wagstaff, G. F. (1999). "Face Value? Evaluating the Accuracy of Eyewitness Information." Police Research Series Paper 102. London: Home Office.
-
Wells, G. L. & Olson, E. A. (2003). "Eyewitness Testimony." Annual Review of Psychology, 54, 277-295.
-
Meissner, C. A., Redlich, A. D., Michael, S. W., Evans, J. R., Camilletti, C. R., Bhatt, S., & Brandon, S. (2014). "Accusatorial and Information-Gathering Interrogation Methods and Their Effects on True and False Confessions: A Meta-Analytic Review." Journal of Experimental Criminology, 10(4), 459-486. [PEACE vs. Reid comparative effectiveness]
Document Control
Version: 1.0 Date: 2026-01-16 Author: Research compilation for Phronesis FCIP Classification: Reference document - Professional investigative frameworks Review Cycle: Annual update recommended to reflect evolving standards and technology
Usage License: This document synthesizes publicly available professional standards and academic research. It is intended for reference in designing investigative support systems and training materials. No proprietary operational methodologies are disclosed.
"Investigation is fundamentally human. Systems must support investigative thinking, not replace it. Balance structure with flexibility while maintaining accountability."
End of Document