. . . . . "Interview suspects and victims to learn what data -- text messages, email, images, apps data, or other material -- helps you pinpoint a suspect." .