Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity NewswireSecurity Leadership and ManagementSecurity & Business ResiliencePhysical SecurityCase Studies (Physical)Transportation/Logistics/Supply Chain/Distribution/ Warehousing

Employee investigations resolved faster with interview technology

By Emma Sanders
investigations

Image from Unsplash

December 15, 2022

Internal investigations are a necessary process in successfully combating threats to organizations such as cash and property loss and any disruptive employee behavior. But how do investigators solve these issues with time constraints, disgruntled employees and disruption to operations these investigations may cause?

Investigative challenges faced by security teams

In retail security, the investigative processes include conducting inventory shrinkage surveys, financial audits, and speaking with every employee in the department or area with access to or knowledge of who may have intentionally caused the theft, cash shortage or inventory shrinkage. The scope of this process is overwhelmingly broad and can be disruptive to operations, sales and employee morale. As investigative efforts continue, operations efficiency and employee cooperation tend to decrease at a faster rate than investigative progress can be achieved, resulting in a highly disrupted work environment. Employees, human resources and customers may become increasingly uncooperative as investigative measures lengthen, contributing to a counterproductive workplace environment.

While the Content Analysis (SCAN) or Behavioral Interview processes can be used on several employees during investigations, these methods may yield unreliable results due to the number of potential suspects and length it takes to complete the inquiry. During these investigations, the ability to expedite processes and preserve investigative precision is one of the most crucial components in successfully concluding the investigation.

In a recent example, a distribution center with high inventory shrinkage that employs over hundreds of workers including truck drivers, product handlers, shippers, receivers and laborers all working in and around the facility 24/7 suffered from typical investigative methods due to the size of the warehouse, volume of product, and interconnected processes that occur in the facility. CCTV systems, access control, and the other traditionally physical security technology proved ineffective in solving the shrinkage problem. Sending a team of inventory specialists with investigators to conduct system audits, surveillance and conduct inventory shrinkage survey interviews among employees did not yield substantial results on a time-efficient schedule, while reducing operational efficiency, causing disruption to production and distribution, and potentially negatively impacted departmental relationships.

Addressing investigative interview pitfalls

To address these challenges, security leaders can employ a number of strategies to narrow down suspects of a security investigation and increase investigative efficiency.

Former corporate security professional Russ Law recognized the downsides of current investigative strategy. “We know that the most successful way to gather information during an investigation is through a solid and professional interview. We also know that interviews didn’t scale. The investigator could only interview one person at a time, which used the investigator’s time and each interviewee’s time,” said Law, CEO and Founder of Verensics.

Corporate security executive Alan Saquella, CPP, found the investigative interview process from Verensics helped in a recent investigation. In a recent investigation, the technology narrowed the suspect pool from around eighty to just a handful, allowing the investigators to work and focus their efforts on interviewing just those few suspects resulting in the closure of the case with successful results, minimal costs and with removing the human errors caused by traditional methods, Saquella stated.

An electric narrowing interview process can help reduce the scope of suspects compared to traditional interview processes. This process uses electronic questionnaires that can be provided to hundreds of employees at the same time to discreetly narrow the pool of suspects while maintaining employee confidentiality and eliminating the disruption of sending investigators to the physical location.

The procedure progresses the interview to determine if the employee is involved in any workplace violations or has knowledge of others that are committing crimes or serious policy violations. The questions also work to determine if the employee is involved in similar violations or illegal activity based on answers to the questions are selected or by self-admissions of minor offenses during the electronic narrowing interview process.

Further, Saquella mentioned as a former investigator, polygraph examiner, interviewer, and interrogator with decades of experience investigating employee criminal activity and serious policy violations, the benefits of the electronic narrowing interview process are a welcomed addition to the tools for investigators. The technology applies to cases of bribery, dishonesty, workplace violence, information theft, sexual harassment, sabotage & vandalism, unethical supplier and vendor relationships to employees, fraud, illegal drug and alcohol violations, and bullying/harassment. This technology has been successfully applied in government and law enforcement internal employee investigations, as well as many public and private organizations.

KEYWORDS: case study employee risk internal investigations investigations manufacturing

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Emma sanders

Emma J. Sanders is a Senior at Embry-Riddle Aeronautical University studying Global Security & Intelligence Studies and minoring in Emergency Planning and Management, graduating May 2023. She is focusing on the Security Operations Management Track and is passionate about corporate security, investigations, risk and supply chain solutions. She is President of ASIS - Eagle Committee and has earned her Certified Associates in Project Management certification through the Project Management Institute. Emma currently works at ERAU as a Teaching Assistant for COM 223: Intelligence Writing and is an experienced technical writer and editor.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Untitled.png

    Watch and learn: Practical tips for security investigations and interview techniques

    See More
  • SEC1219-Prod-slide12_900px

    Enables Enterprises to Perform Investigations Faster

    See More
  • digital-forensics-freepik1170x658.jpg

    Digital forensics technology can help support cyber investigations, incident response

    See More

Related Products

See More Products
  • security book.jpg

    Security Investigations: A Professional’s Guide

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing