Criminal Investigators and Special Agents
SOC: 33-3021.03 · Job Zone 3 (Medium preparation)
Investigate alleged or suspected criminal violations of Federal, state, or local laws to determine if evidence is sufficient to recommend prosecution.
Task Breakdown
22 tasks analyzed
Prepare reports that detail investigation findings.
Obtain and verify evidence by interviewing and observing suspects and witnesses or by analyzing records.
Identify case issues and evidence needed, based on analysis of charges, complaints, or allegations of law violations.
Investigate organized crime, public corruption, financial crime, copyright infringement, civil rights violations, bank robbery, extortion, kidnapping, and other violations of federal or state statutes.
Record evidence and documents, using equipment such as cameras and photocopy machines.
Obtain and use search and arrest warrants.
Testify before grand juries concerning criminal activity investigations.
Search for and collect evidence, such as fingerprints, using investigative equipment.
Determine scope, timing, and direction of investigations.
Collect and record physical information about arrested suspects, including fingerprints, height and weight measurements, and photographs.
Analyze evidence in laboratories or in the field.
Collaborate with other offices and agencies to exchange information and coordinate activities.
Develop relationships with informants to obtain information related to cases.
Perform undercover assignments and maintain surveillance, including monitoring authorized wiretaps.
Collaborate with other authorities on activities, such as surveillance, transcription, and research.
Examine records to locate links in chains of evidence or information.
Compare crime scene fingerprints with those from suspects or fingerprint files to identify perpetrators, using computers.
Manage security programs designed to protect personnel, facilities, and information.
Provide protection for individuals, such as government leaders, political candidates, and visiting foreign dignitaries.
Serve subpoenas or other official papers.
Administer counterterrorism and counternarcotics reward programs.
Issue security clearances.
| Task | Category | AI Capability | Risk Score | Time % |
|---|---|---|---|---|
| Prepare reports that detail investigation findings. | - | - | - | |
| Obtain and verify evidence by interviewing and observing suspects and witnesses or by analyzing records. | - | - | - | |
| Identify case issues and evidence needed, based on analysis of charges, complaints, or allegations of law violations. | - | - | - | |
| Investigate organized crime, public corruption, financial crime, copyright infringement, civil rights violations, bank robbery, extortion, kidnapping, and other violations of federal or state statutes. | - | - | - | |
| Record evidence and documents, using equipment such as cameras and photocopy machines. | - | - | - | |
| Obtain and use search and arrest warrants. | - | - | - | |
| Testify before grand juries concerning criminal activity investigations. | - | - | - | |
| Search for and collect evidence, such as fingerprints, using investigative equipment. | - | - | - | |
| Determine scope, timing, and direction of investigations. | - | - | - | |
| Collect and record physical information about arrested suspects, including fingerprints, height and weight measurements, and photographs. | - | - | - | |
| Analyze evidence in laboratories or in the field. | - | - | - | |
| Collaborate with other offices and agencies to exchange information and coordinate activities. | - | - | - | |
| Develop relationships with informants to obtain information related to cases. | - | - | - | |
| Perform undercover assignments and maintain surveillance, including monitoring authorized wiretaps. | - | - | - | |
| Collaborate with other authorities on activities, such as surveillance, transcription, and research. | - | - | - | |
| Examine records to locate links in chains of evidence or information. | - | - | - | |
| Compare crime scene fingerprints with those from suspects or fingerprint files to identify perpetrators, using computers. | - | - | - | |
| Manage security programs designed to protect personnel, facilities, and information. | - | - | - | |
| Provide protection for individuals, such as government leaders, political candidates, and visiting foreign dignitaries. | - | - | - | |
| Serve subpoenas or other official papers. | - | - | - | |
| Administer counterterrorism and counternarcotics reward programs. | - | - | - | |
| Issue security clearances. | - | - | - |
Explore other career paths
Compare displacement risk across occupations and find careers with stronger long-term prospects.
Risk scoring has not been run for this occupation yet. Scores will appear after the scoring pipeline runs.