ASIS CPP - Investigations P2 Flashcards

1
Q

An activity, capability or resource that enhances the effectiveness or sufficiency of the investigative function

A

Force Multiplier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 Important force multipliers in investigations

A
  1. Liaison
  2. Online information sources
  3. Intelligence information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Liaison

A
  1. Primarily a proactive medium
  2. Joint Task Forces (JTF’s) represent a highly-structured form of liaison
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sources - Types of Evidence

A

Interviewees or witnesses

Subject-matter experts

Physical evidence

Electronic evidence

Public records

Surveillance results

Open sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the corporate environment, most credible information on losses, sexual harassment and other reportable incidents comes from employee tips

A

Sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which are among the least accurate forms of investigative information?

A

Eyewitness Accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information obtained in undercover operations come from three sources?

A
  1. The operative
  2. Employee (subject( interviews
  3. Witness interviews
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2 Types of witnesses

A

Fact witness

Opinion witness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Investigative objectives tend to be _____ to the short-term expectations of the project?

A

Tactical

Specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Relative to the timeliness of an investigation it is important to

A
  1. Open an investigation as soon as possible
  2. Complete an investigation as quickly as possible
  3. Avoid closing an investigation prematurely
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The most important reasons for beginning an investigation as quickly as possible following the report of an incident or allegation are:

A
  1. The value of physical or electronic evidence diminishes rapidly
  2. Witnesses provide the best information when the incident is fresh in their memory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Formal documentation is among the first things to be neglected when caseloads increase

A

Management Responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Management should consider the purpose of the investigation at the:

A
  1. Case Level: sets the context within which the investigation will be conducted & helps keep focused
  2. Strategic level: Dictates the necessary planning, organizing equipping staffing & preparation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the main objective of Investigator Responsibilities?

A

For any preliminary investigation is to determine what crime or violation exists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Objective

A

Obtain information & evidence to be presented in a factual, final report to senior management can take appropriate action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Legal matters in investigations must be considered for two reasons:

A
  1. Protect the company against liability
  2. Ensure an appropriate conclusion if the case goes to court or another legal forum
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The objective of the Report

A

Enable the reader to readily understand what the investigator did, why, & what resulted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

5 basic steps of report writing

A
  1. Gather facts
  2. Record the facts immediately
  3. Organize the facts
  4. Write the report
  5. Evaluate & edit the report if necessary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Types of Investigative Reports

A
  1. Initial report (soon after the case is opened)
  2. Progress report (normally every 30 days)
  3. Special report (focused on unusual action may be supplemental to the progress report
  4. Final report (most important)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Who is the primary collector of relevant evidence

A

The Investigator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is critical to the credibility of the investigator

A

Preparing for a court appearance or deposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Surveillance can be broken down into three broad categories

A
  1. Physical (i.e. human observation or tracking)
  2. Psychological (i.e. behavioral analysis)
  3. Data (e.g. technical or electronic)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The interview is a process of gathering information

A
  1. “information interview” (non-accusatory) (Deming) or “general interview” (POA)
  2. “Administrative interview” (simple, unstructured, all interviews other than the subject) (Ferrara)
  3. Investigative & behavior - provoking questions to develop information
  4. When the interviewees become a subject target or the accused person in the interview it becomes on interrogation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An interrogation is the questioning of an accused or suspect person

A
  1. “Confrontational interview” (accusatory, highly-structured) (Deming & POA)
  2. “Investigatory interview” (complex, structured process focused on the subject (Ferrara)
  3. A monologue by investigator offering psychological justification) for the wrongful behavior
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Hostages form an emotional bond with their captors

A

Stockholm Syndrome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A persistently-held belief in another person such that the belief becomes reality

A

Pygmalion Effect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Experienced interviewers frequently finish introducing other persons present by inviting them to spend a few minutes with the interviewee

A

Yes Conditioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

“Floating Point” Strategy

A
  1. Continuously re-evaluating a hypothesis as information is obtained allows an investigation to adjust questions accordingly
  2. Inexperienced investigators often neglect the skill of listening when interviewing suspects
  3. Active listening includes attentiveness, concentration acceptance, detachment and patience
  4. Interviewers must be able to assess facts previously established in the light of information provided by the interviewee
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the most prized talent of an investigator?

A

The ability to obtain information through questioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Skilled interviewers must be:

A

Patient

Persistent

Prepared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the most important factor of a successful interview?

A

The ability of the interviewer to establish a favorable rapport with the interviewee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What sets the tone of the interview?

A

Demeanor

A negative attitude translates into negative results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

The value of each interview or interrogation is based on…

A

The investigator’s knowledge, skills in eliciting information, and ability to evaluate the veracity of the information obtained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Investigations that include searches must comply with what?

A

The Fourth Amendment to the US Constitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

An admission obtained by a private citizen who conducts an interrogation in violation of due process but otherwise follows constitutionally prescribed conduct may be admissible

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The court recognized union employees’ rights to representation at investigatory interviews that the employee reasonably believes might result in discipline

A

The Weingarten Rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

In 2000, the NLRB expanded Weingarten & held that the right to representation at investigatory interviews applies equally to union & nonunion employees

but then…

A

In 2004, the NLRB ruled that non-unionized employees are not entitled under Sect. 7 of the NLRA to have a coworker accompany them to an interview with their employer, even if the employee reasonably believes that the interview might result in discipline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Interview Planning & Preparation

A

The most critical preparatory action before an interview is to become thoroughly familiar with the case information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Key factors in Interview Planning

A

Location

Time factors

Questioning order

Questions to ask

Persons present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

The choice of interview site depends on

A
  1. Nature & phase of the investigation
  2. The apparent involvement of the interviewee
  3. The issue of interviewee confidentiality
  4. The desired level of formality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Where should uncooperative witnesses be interviewed?

A

In the security office or interview room

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Interview Environment

A
  1. The subject should face the interviewer an witness should be seated to the side
  2. The interview should not be conducted at a desk or table
  3. The distance between the subject and the investigator should be about five feet
  4. The subject should always have a clear path to the room’s exit
  5. Interview only one subject at a time
  6. Interviews should be conducted quickly after an event, to capture fresh recollections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Priority of Interviews (in order)

A
  1. Persons not likely to be available later
  2. Persons believed to have the most pertinent information
  3. Persons likely to be hostile
  4. The offender or offending group
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Documenting the Interview

A

Prepared notes are acceptable if the interviewer does not refer to them regularly during the interview

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

In interviews, the two types of questions generally asked are open & closed

A
  1. To put an interviewee at ease, the beginning of the interview should contain “closed” questions
  2. In the primary’s phase of an interview a narrative type of questioning should occur (“open”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What kind of question allow for an unlimited response from the witness in his or her own words, thereby generating a greater amount of unsolicited information

A

Open-ended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

The interviewer should avoid making any promise or guarantee explicit or implied that:

A
  1. Is illegal
  2. Cannot be confirmed by the client or senior management
  3. Cannot be fulfilled
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What may invalidate confessions or statements and may call for civil or criminal action

A

Coercion

Duress

Psychological constraint

Verbal abuse

Threats

Intimidation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What must be understood by the interviewee?

A

That they are free to leave the interview location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Most cases are solved with information developed during interviews and the subsequent efforts to corroborate or disprove interview findings

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Four formats of a written confession

A
  1. A statement was written by the suspect
  2. A statement authored by the interrogator but read & signed by the suspect
  3. The statement took down by a secretary or stenographer & transcribed into a typed document for the suspect to read and sign
  4. Recorded statement (studio video) by the suspect
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What must be done for a written statement or confession to be credible & admissible in US Court?

A

It must be given voluntarily be trustworthy. and include the following essential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is the best closing strategy for an interview?

A

Asking if there is anything to add & if he or she be called again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Reid Technique - 4 objectives of the interview

A
  1. Obtain valuable facts
  2. Eliminate the innocent
  3. Identify the guilty
  4. Obtain a confession
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Verbal responses include both spoken words & gestures that serve as word substitutes other verbal cues are

A

Tone

Pitch

Speed

Clarity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Non-verbal Responses Include

A

Body movements

Position changes

Gestures

Facial expressions

Eye contact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is responsible for more than half of the information & meaning of a message communicated ina conversation

A

Non-verbal Behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

The Truthful Person

A
  1. Makes general sweeping denials
  2. Offers unqualified, direct, & spontaneous answers
  3. Exhibits a reasonable memory
  4. Responds to questions in a rational manner & a clear tone of voice
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Deceptive Person

A
  1. Offers very specific denials
  2. Avoids realistic words
  3. Makes seemingly irrelevant comments
  4. Gives delayed, evasive, or vague answers
  5. Exhibits an unusually poor, selective, or remarkable memory
  6. Qualifies answers or uses religion or oaths to support statements
  7. Speaks in an irrational fragmented mumbled or subdued manner
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A Truthful Person

A
  1. Sits upright but not rigid
  2. Positions himself or herself in front of the questioner
  3. Leans towards the questioner when making a point
  4. Appears relaxed & casual
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

A Deceptive Person

A
  1. Slouches or leans back in the chair
  2. Sits unnaturally stiffy
  3. Sits off to the side, not directly in front of the questioner
  4. Pulls elbows close to side arms folded & locked in front with legs crossed
  5. Exhibits rapid & erratic posture changes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Nonverbal behavior accompanies a deceptive response in an attempt by the guilty suspects to relieve anxiety

A
  1. Distraction behavior
  2. Displacement behavior
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Shifts in body posture, bringing a hand to the face, crossing the arms, etc…

A

Distraction Behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Picking the lint off clothing, pacing, repetitious fast movement, etc…

A

Displacement Behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

No single word or nonverbal behavior automatically means a person is lying or telling the truth

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Activities suggesting deception

A
  1. Significant posture change
  2. Grooming gestures & cosmetic adjustments
  3. Supportive gestures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Which are a primary source of information & most critical aspect of an investigation?

A
  1. Interviews with victim
  2. Witnesses
  3. Informants
  4. Confidential informants
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

A person who has been involved in a physically debilitating situation should be interviewed briefly on the event’s crucial aspects before being allowed to rest

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A person who is physically debilitated or psychologically stressed should not be subjected to a lengthy interview

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Who should be questioned as to alcoholic beverages consumed within the last 24 hrs & 95 to any medication taken

A

The Interviewee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

The interviewer should begin with broad; general questions & then become more specific

A

Witness Interviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Several principles underlie the interviewing of a cooperative witness

A
  1. Maintain or reestablish rapport
  2. Personalize the interview by treating the witness as an individual
  3. State expectations
  4. Ask open-ended questions
  5. Avoid interruptions
  6. Allow pauses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Preparation begins long before litigation with an accurate & timely capture of facts & impressions of the incident in a report or notes

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

The testimonial evidence the security professional will be presenting in court is called “parol” or “spoken word” and the attorney will want to make sure it supports the case

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Produce all tangible evidence

A

Duces Tectum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

The legal process, where attorneys and/or judge ask questions to determine candidates’ sustainability to be on the jury

A

Voir dire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Theft and Fraud

A
  1. Most frequent & costly forms of dishonesty
  2. the most common motivation for an individual to commit an internal theft is one of economics or profit
  3. Employees may be an organization’s greatest threat second only to competition
  4. 30% of business failures result from employee theft with over one half of them failing in the first 3 years of their existence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Theft & Fraud

A
  1. Occupational fraud is a growing industry in which most perpetrators are first-time offenders
  2. US organizations lose to 6% of their annual revenues to fraud
  3. Small businesses suffer disproportionately larger losses than large businesses
  4. More than 2 million shoplifter apprehensions are made every year
    - They are only a fraction of the estimated 200 million annual shoplifting incidents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Theft & Fraud (cntd…)

A
  1. Various studies estimate employees steal over a billion dollars a week from their employees
  2. Some employees will steel to “the extent the organization will allow”
  3. In the retail industry, up to 70% of losses are perpetrated by employees
  4. For every dollar lost to shoplifting, employees, steel another $15
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Theft & Fraud (cntd..)

A
  1. In the foodservice industry, employee theft imposes a 4% tax an every customer dollar spent
  2. A serious form of embezzlement in the workplace is fraudulent cash disbursements
  3. Employees also steal time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Employee Theft & Fraud

A

Theft on the job is not necessarily correlated to external factors or influences; employees who are satisfied with their jobs are less likely to steel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What significantly affects individual employee attitudes toward theft

A

Peer Pressure & Attitude

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Theft is usually perpetrated by what kind of employees

A

Those with Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

The greater opportunity for theft the greater the chance it will occur; the greater the chance of detection, the less likely employees will steel

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Employees who steel…

A

are frequently involved in another counterproductive workplace activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Red Flags of Employee Theft

A
  1. Secretive relationships
  2. Missing documents
  3. Indicators of substance abuse
  4. Irregular hours of operation or building entry
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Primary Contributors to Employee Theft

A
  1. Lack of supervision
  2. Lack of effective processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Bi-modal Distribution

A
  1. A small number of employees take large amounts of property
  2. The vast majority of those who steel take only small amounts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Two methods of theft committed by managers

A
  1. Embezzlement
  2. Defalcation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

The fraudulent appropriation of property by a person to whom it is entrusted

A

Embezzlement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Misappropriation of trust funds or money held in a fiduciary capacity

A

Defalcation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Joseph Wells motivations for Fraud

A
  1. Financial pressures (gambling, drugs, living beyond one’s means, unexpected medical bills)
  2. A desire to be (or appear to be) successful
  3. Greed (predominant factor)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

How is the opportunity for fraud created?

A

Through the absence or weakness of internal controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Employees involved in theft have usually been involved in other misconduct

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

What is not an insurance against theft?

A

Tenure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Virtually every employee who steals has rationalized his or her dishonesty

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

No theft regardless how minor should be tolerated or ignored

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Virtually every theft or fraud could have been prevented by better management

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

What are the most common form of workplace embezzlement?

A

Cash Disbursements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Four characteristic principles involved in internal thefts include

A
  1. Diversion: when the money stops being spent in one area of business or on a product; & starts being spent on another
  2. Conversion: when someone gives away or sells property that does not belong to them
  3. Disguise
  4. Divergence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

The relevant facts or elements of most economic crimes are?

A

Motive

Opportunity

Ability (rationalization)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Most common rationalizations/myths by employers?

A
  1. Only the needy & greedy steal
  2. Good policies & procedures will catch most wrongdoers
  3. Audits identify most irregularities
  4. Prosecution is an effective deterrent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Most fraudsters are influenced by an opportunity to profit & a clear correlation exists between theft & opportunity

A

Opportunity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Employees displeased with their overall employment experience are most often those who engage in theft & other antisocial behavior at work

A

Job dissatisfaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Employees are greatly influenced by the informal social controls of co-workers such as peer-group gossip, ridicule & ostracism

A

Social Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Employee situational red flags for fraud

A
  1. High personal debts (medical, gambling, excessive speculation in the stock market, etc.)
  2. Poor credit rating or other financial difficulties
  3. Living beyond one’s means
  4. Excessive use of drugs or alcohol
  5. Perceived inequities (being passed over for promotion)
  6. Previous convictions for fraud or trust violations
  7. Low moral character
  8. Compulsive behavior
107
Q

Employee opportunity red flags for fraud

A
  1. Position of trust
  2. Significant knowledge of key operations
  3. Easy rationalization of contradictory behavior
  4. Close association with suppliers & contractors over a long period
  5. Lax or remote supervision
108
Q

Common elements that must be present in every fraud case

A
  1. Strong financial pressure
  2. Opportunity to commit fraud
  3. A means of justifying the fraud as appropriate
109
Q

Organization situational red flags for fraud…

A
  • Costs rising faster than revenues (profit squeeze)
  • Significantly aged or excess inventories
  • Extremely rapid expansion of overall business or particular lines of business
  • Constantly operating in a crisis mode
  • Unrealistic sales quotas or revenue targets
  • Significant cash flow problems
  • History of corruption in the company’s industry
  • Stiff competition
  • Outdating of the company’s products or services
  • A high rate of turnover among key financial positions
110
Q

Organizational opportunity red flags for fraud (cntd…)

A
  • Dominant, hierarchical, & secretive management styles
  • Unethical management models
  • Exploitation, abuse, and poor management of employees
  • Lack of employee training on the relationship between security and business success
  • Lax enforcement of internal controls
  • Heavy investments or losses
111
Q

Organization opportunity red flags for fraud

A
  • Line supervisors’ failure to develop on the effective loss-prevention environment
  • Urgent need for favorable earnings
  • Poor accounting records
  • Lack of separation of responsibility for ordering and receiving
  • Domination of operating & financial decisions by a single person
  • Failure to establish, communicate or enforce a code of business conduct
112
Q

A comprehensive model of theft & fraud prevention

Element 1: Prevention Problems

Components of prevention education include:

A
  1. Process for screening all applicants for past trust violations
  2. A code of business conduct that is communicated to employees, vendors & customers
  3. Proper accounting practices that record all the financial transactions of the business
  4. A clear separation of duties that limits the accessibility to key information that would allow an accounting individual to make changes in master files without someone knowing it
113
Q

A comprehensive model of theft & fraud prevention

Element 1: Prevention Problems

Components of prevention education include:

A
  1. An indicator of the effectiveness of prevention efforts is the quick & accurate reporting of suspected theft & fraud
114
Q

A comprehensive model of theft & fraud prevention

Element 2: Incident

Element 3: Incident Reporting

A
  • Fostering a culture of integrity & honesty is the best practice
  • The most ethical organizations (and most successful) regularly & passionately reward employees with recognition & gratitude
115
Q

A comprehensive model of theft & fraud prevention

Element 4: Investigation

A
  • Investigations are more successful when investigative roles & responsibilities are clearly defined
  • The main objective of any preliminary investigation is to determine what crime or violation exists
  • Under most circumstances, internal thefts & fraud investigations are conducted by in-house or private contractors & not by law enforcement
116
Q

A comprehensive model of theft & fraud prevention

Element 5: Action

A
  • Taking immediate action against theft & fraud perpetrators is one of the strongest deterrents to future losses
117
Q

A comprehensive model of theft & fraud prevention

Element 6: Resolution

A
  • Although discipline & prosecution can be effective deterrents, nothing makes a point like the payment of restitution by the perpetrator
118
Q

How can organizations better prevent theft & fraud?

A

Move from a reactive to a proactive approach

119
Q

What is the key to a fraud awareness program?

A

A continuous, well-developed & well-delivered

120
Q

What type of climate should be maintained?

A

Trust

Honesty

Cooperation

121
Q

What will significantly increase the chances of detecting vulnerabilities & systemic gaps before losses occur

A

Clear organizational policies procedures and practices

122
Q

How can organizations prevent much internal theft & fraud?

A

Reducing temptation & increasing the probability of detection

123
Q

Employees must feel confident that senior management will do what?

A
  1. Take issues seriously
  2. Will act with professionalism & discretion regarding reports made by employees
  3. Steadily demonstrate their resolve to handle offenders, properly at all levels of the organization
124
Q

Practices that punish all employees are generally more expensive & hurt employee morale

A
  • Draconian security methods such as searching employees at workplace exits are expensive and hurt employee morale
  • Demonstrating a sincere appreciation for the individual’s contributions to the organization instills a greater sense of ownership and belonging & translate into less workplace theft
125
Q

Policies & work rules must be?

A

Reasonable

Fair

Communicated properly

Enforced constantly

126
Q

What percentage of employees responsible for 95% of workplace theft should practitioners focus on?

A

5%

127
Q

What method can be used to deter dishonor employees & empower honest ones?

A

Anonymous Incident Report Systems

128
Q

More occupational fraud is revealed by anonymous tips provided by employees than by all formal internal audits combined

A
129
Q

The 3 “shuns”

A

Termination

Prosecution

Restitution

*the most difficult but does the victim the most good

130
Q

Two prominent theories of white-collar crime

A

Differential accusation theory

Non-shareable need theory

131
Q

Differential Association Theory

A
  • Edwin Sutherland
  • Criminal behavior is most often correlated with an individual’s association with a criminal environment; people who frequently associate with individuals who have criminal tendencies become criminals as a result of those relationships
  • Criminal behavior is not inherited but learned through other people by example & verbal communications
  • Individuals also learn incentives, rationalization & attitudes associated with particular crimes
  • Individuals learn the psychological machinations needed to commit a crime & justify it (rationalize)
132
Q

Non-shareable Need Theory

A
  • Donal Crossey
  • Defined as a violation of a position of financial trust
  • Trusted persons become trust violators when they visualize themselves having non-shareable financial problems & feel they can resolve the problems by violating their position of trust
133
Q

Non-shareable Need Theory

3 elements must be present before a fraud or similar crime can take place

A
  1. The perception of a non-shareable problem
  2. Opportunity for a trust violation
  3. Series of rationalizations that allow the individual to justify his or her behavior as appropriate for the situation
134
Q

A compliance program should be built on?

A

Clear corporate policy

135
Q

Purpose of a compliance program

Protect the organization against?

A
  1. Violation
  2. Lapses in business ethics
  3. Concomitant legal sanction
136
Q

An effective program encourages

A

Enforcement

Monitoring

Employee Training

137
Q

What is a key element of any compliance program?

A

An effective reporting mechanism

138
Q

Main categories of crime relevant to asset protection

A
  • Crimes based on unauthorized entry or presence
  • Crimes based on theft
  • Crimes based on force or threats of force against people
  • Crimes based on damage or threats of damage to property
  • Computer-related crimes
  • Environmental crimes
139
Q

The ultimate guide to what constitutes criminal conduct is the statutory language that describes the prohibited conduct

A
140
Q

A misdemeanor or felony

A

Crime

141
Q

An offense other than traffic violations that may include a sentence of 15 days to 1 yr.

A

Misdemeanor

142
Q

An offense for which a sentence to a term of imprisonment in excess of one year may be imposed

A

Felony

143
Q

Conduct punishable by a sentence to a term of imprisonment or to a fine as provided by a law

A

Offense

144
Q

Criminal laws are based on a concept that prohibited conduct is a wrong against the general public, not merely a wrong against a particular person

A
145
Q

What undermines the intent of criminal laws?

A

Treating crimes as though they affect only the parties involved - and not the whole community

146
Q

What describes the state of mind or wrongful purpose required by criminal laws?

A

Mens rea (guilty mind)

147
Q

What is an exception to “mens rea” requiring only negligent behavior that results in criminal inquiry without intent?

A

Criminal Negligence

148
Q

The guilty act itself?

A

“Actus reus”

149
Q

What are also an exception to Mens rea requiring the only completion of the criminal act?

A

Strict Liability

150
Q

Two categories of sources of legal information

A

Primary source

Secondary source

151
Q

In-state or federal statute or case

(a strong source of information)

A

Primary source

152
Q

Another state’s or jurisdiction statute case or legal journal

(should not be relied upon formally)

A

Secondary source

153
Q

What should be the last resource of legal review?

A

Trade Journals

154
Q

The main body of criminal law is codified in?

A

Title 18 of the USC

155
Q

An action of a legislative body that becomes a law when it is approved by the executive branch in the manner required by the constitution

A

Statutory Law

156
Q

Acts** or **omissions are frequently defined as criminal even if they are not specifically included in the criminal sections of any statutory code

A
157
Q

Laws passed by cities, towns, & villages that are not generally referred to as statutes because the local level of government is not sovereign

A

Ordinances

158
Q

Cases decided by the appellate courts of a state or federal jurisdiction

A

Case Law

159
Q

Instances of litigation (civil) or prosecution (criminal) handled by a district court are rarely used to proffer a legal argument and are considered merely persuasive

A
160
Q

The following of prior case law in a jurisdiction

A

Precedent or the Principle of “Stare Decisis”

161
Q

Cases overturned or “distinguished”

A

Determined not to apply to a particular case even if similar

162
Q

US Constitution

A
  • Basic document for US law
  • Defines federal government & its branches & powers
  • Grants the power to make laws to the legislative branch
  • Article VI is the “supremacy clause” which makes laws under the US Constitution “the supreme law of the land”
  • The US Constitution is the basis on which states & their citizens define the rights & duties at the government & the people
  • Constitutional safeguards protect citizens from the government but not from other private citizens
163
Q

The trespassing & asportation, obtaining or withholding of property belonging to another with the intent to permanently deprive the owner of the use & benefit of such property or to appropriate the property to the taker or some third party

A

Theft

164
Q

To establish that a burglary has been committed one must prove that

A
  1. The accused knew or should have known he did not have authority to be in the locale
  2. The intent to commit a crime in connection with the unlawful presence or entry
165
Q

The taking of property through the use of force or threat of force

A

Robbery

166
Q

Shoplifting

In practice security personnel should apprehend a suspect as soon as he/she passes the designated payment or checkout area; apprehending a suspect off company property may be dangerous

A
167
Q

Federal Criminal Sentencing Guidelines

Require convicted companies make restitution to injured parties & pay a non-tax deductible fee

A
168
Q

“Let the master answer” - A common-law doctrine holding an employer liable for an employee’s acts that are within the scope of employment

A

Respondeat Superior

169
Q

Any unauthorized listening whether done in person or by means of electronic or other equipment

A

Eavesdropping

170
Q

Title 3 of the Omnibus Crime Control & Safe Streets Act

A
  • Authorizes law enforcement of electronic surveillance
  • Safeguards wire & oral communications
  • Prohibits private possession/use of surveillence equipment
  • Creates acceptable uniform circumstance for electrical surveillance
  • Sets constitutionally acceptable procedures for government surveillance
171
Q

Electronic Communications Privacy Act

Extends Title III protection to cell phones, fiber, teleconferencing, voicemail, email, encrypted transmission & most pagers

A
172
Q

Allows government surveillance in the interest of national security

A

Foreign Surveillance Act

173
Q

Categories of computer-related crimes

A

The computer itself is targeted

The computer is used to facilitate a traditional crime

The computer is used as a storage device in the criminal activity

174
Q

Resource Conservation & Recovery Act 1976

A

First attempt to regulate the disposal of toxic waste

175
Q

Comprehensive Environmental Response Compensation & Liability Act

(CERCLA)

A

Establishes crime liability for failure to report the release of a hazardous substance

176
Q

Economic Espionage Act (1996)

All forms and types of business, technical, or economic information, tangible or intangible no matter how stored or compiled if:

-The owner thereof has taken reasonable measures to keep such information a secret

- The information derives independent economic value actual or potential from not being generally known to & not being readily ascertainable through proper means

A

Trade Secret

177
Q

Provides criminal penalties for “controlling persons” in corporations under certain conditions

  • Applies to any company having a class of securities registered pursuant to section 12 of the Securities Exchange Act of 1934
  • Also applies to any company required to file reports pursuant to Section 15(d) of the Securities Exchange Act of 1934
A

Foreign Corrupt Practices Act (FCPA)

178
Q

Makes it a criminal offense to offer a bribe to a foreign official to obtain or retain business

A

FCPA

179
Q

Intention to take the person into custody

  • Through actual or constructive seizure or detention
  • With the understanding of the arrestee that he is arrested
A

Elements of an Arrest

180
Q

An arrest can be made under these conditions

A
  • Pursuant to federal or state law
  • With or without a warrant
  • By police, peace, officer, & private citizen
181
Q

A judicial process issued upon probate cause authorizing or commanding an act

A

Warrant

182
Q

Authorizes the taking into custody of the named person

A

Arrest Warrant

183
Q

Authorizes the search of the named place under the conditions imposed

A

Search Warrant

184
Q

In what way does the criminal law require statements be made by persons against their own interest?

A

Voluntary

185
Q

An arrest without a warrant can be made by a police officer or a private person according to state law

A
186
Q
  • May arrest without a warrant with reasonable cause to believe the person committed an offense
  • With reasonable cause, the police officer will not be held liable for the arrest
A

Police Officers

187
Q
  • Citizens’ arrest authority is limited to:
  • Any crime committed in the presence of the arrested person
  • A felony even if not committed in that person’s presence
A

Private Person

188
Q

Private Person

A
  • A security officer could be subject to civil damages if he apprehends the wrong person
  • The arrested person must be taken “without unnecessary or unreasonable delay” before a court, judge, or police officer

*Failure to do so risks civil damages & criminal charges if force or threat of force was used

189
Q
  • The security officer must have authority to make the arrest & the person to be arrested must be made aware

* A lack of arrest authority (i.e.. no crime or wrong person) his actions may constitute a fake arrest or assault

A
190
Q

A person who is unlawfully arrested can resist with all reasonable force

A
191
Q

If a subject is killed int he process of an arrest, the officer may be guilty of manslaughter or murder

A
192
Q

Private individuals who hold a valid police officer appointment & who make an arrest without a warrant (pursuant to the appointment) are protected as police officers

A
193
Q

The inducement by an LEO of a person not otherwise disposed to do so, to commit a crime for the purpose of persecuting him

A

Entrapment

194
Q

Entrapment

A
  • Common (case) law for federal & some states; statutes in other states
  • Entrapment cannot result from a private person unless acting with law enforcement (in some states)
  • Conduct not constituting entrapment under the common law might still be considered a criminal act
  • The mere act of giving another the opportunity to commit an offense is neither facilitation nor solicitation nor is it entrapment under current common law
195
Q

Procuring another to commit a crime

A

Criminal Solicitation

196
Q

Rendering aid to another with the knowledge it is in aid of the commission of an offense

A

Criminal Facilitation

197
Q

The 4th Amendment

A
  • Prohibits unreasonable searches
  • Does not apply to searches by private persons
  • A warrantless search incidental to arrest is authorized but cannot extend beyond the immediate area
198
Q

Alternatives for when an employee is suspected of concealing evidence

A
  1. Arrest the employee on the charge of the crime
  2. Permit the employee to leave but file a criminal complaint with the police
  3. Take disciplinary action against the employee

* if doubtful a combo of the 2nd & 3rd alternatives might be wiser than a citizen’s arrest

199
Q

Conditions of searches in private organizations

A
  • Searches or inspections are consented to
  • Searches or inspections are made conditions of employment
  • Searches or inspections are not conducted in areas where the employee was given sole & exclusive right of possession & maintains a reasonable expectation of privacy, such as with a private locker or desk
200
Q

In federal matters, the request to the grand jury is made by who?

A

US Attorney or Assistant US Attorney

201
Q

In state actions, who makes the request or issues an “information”

A

US Attorney General

US Asst. Attorney General

District Attorney

County Attorney

Special Prosecutor

202
Q

Use of Force

Reasonably necessary force is generally allowed in?

A
  • Defense of oneself or others
  • To restrain others who one believes are about to commit suicide or do themselves serious harm
  • To correct a minor (if a parent or guardian has the authority to do so)
  • By a police officer or person directed by an officer to assist, or a private citizen to arrest or prevent escape of a criminal
203
Q

The permissible use of force varies jurisdiction to jurisdiction

A
204
Q

Generally, deadly force can only be used when?

A
  • Fear of one’s own life (where simply debilitating the offender is not an option)
  • Some jurisdictions require the attack or threat of attack be actual
  • Some jurisdictions require only a reasonable belief such an attack is occurring or threatened
  • Prevention of a crime involving deadly weapons or the apprehension of a criminal with a deadly weapon
205
Q

When using force in defense of another, some jurisdictions require that the defended person be authorized to use force to defend himself or herself in such cases the defender acts at his or her own peril

A
206
Q

The general rule is that a lawful occupant or an individual in charge of premises may use an amount of force reasonably necessary (but not deadly force) in preventing or terminating a perceived criminal trespass

A

Defense of Premises

207
Q

What are the two functions of locks alarms warning notices and other security measures?

A
  1. Serve as deterrents
  2. Provide a basis for appropriately invoking criminal sanctions against aggressors by security personnel acting in good faith
208
Q

Administrative law is an application of?

A

Civil Law

209
Q

Relates to functions powers and procedures of government administrative agencies and departments

A

Administrative Law

210
Q

Administrative law focuses on how government agencies do what?

A

Carry out assigned tasks under constitutions and statutes

211
Q

A government agency has an administrative role if it has the authority to?

A
  • Make determinations affecting private rights, especially the power to make rules
  • Adjudicate cases
  • Conduct investigations
  • Issue, suspend, revoke licenses
  • Institute prosecutions
212
Q

Administrative law is not a separate category of law but rather what?

A

The application of statutory civil law to government agencies

213
Q

Actions of government must meet minimum standards of Constitutional due process

A
214
Q

Government agencies that have access to, or distribute public information related to privacy, rulemaking, investigations, subpoenas, reports, inspections, hearings and informal reviews, licenses adjudications & judicial reviews (oversight of agency actions by the courts)

A

Administrative Procedures Act (APA)

215
Q

Congress establishes, modifies & terminates agencies; which branch appoints key personnel?

A

Executive

216
Q

In day-to-day activities, promulgation of rules & investigations agencies have very broad independence

A
217
Q

An independent agency has the power to determine private rights through?

A

Rule-making

Investigations

Prosecution

Licensing

Other informal actions

218
Q

Freedom of Information Act (FOIA) 1966

A
  • An amendment to the APA
  • Deals with the release & disclosure of certain kinds of information by the Federal Governemnt
219
Q

the FOIA requires federal agencies to disseminate & disclose information about their activities & proceedings

A
  • By publication in the Federal Register
  • Distribution of material for public inspection & copying
220
Q

Broad exemptions to the “Disclosure Rule”

A
  • National security information
  • Internal (agency) personnel rules & practices
  • Information specifically exempted by statute
  • Trade secrets & confidential commercial or financial information
221
Q

The courts have required that in addition to being confidential, there must be a showing of an adverse effect on future government cooperation and a showing that disclosure will have an unfavorable & substantial impact on a party’s competitive position

A
222
Q

A promise by a government agency, not to disclose information may not prevent later disclosure, by that agency or another

A
223
Q

Exemptions to the Disclosure Rule

A
  • Interagency & agency internal communication not normally available to parties in litigation with the agency
  • Personnel, medical, and personal records
  • Financial institutions information - financial institutions & agencies that regulate banks
224
Q

Exemptions to the disclosure rule

A
  • Geological information
  • Investigation records if it would: interfere with enforcement proceedings, deny a fair hearing to any party, or amount to an invasion of personal privacy
  • Disclose investigative techniques
  • Endanger the safety of LE personnel
225
Q

Health Insurance Portability & Accountability Act

HIPPA

A

Encouraged health care providers to engage in electronic transactions & required new safeguards to protect the security & confidentiality of the transactional information

226
Q

HIPPA

A
  • Covers health care entities that conduct certain financial & administrative transactions electronically
  • Covers all medical records & health information used or disclosed by a covered entity, in any form
227
Q

HIPAA

Covered entities generally must…

A
  1. Adopt written privacy procedures concerning who has access to protected information how it is used, & when it is disclosed
  2. Train employees on privacy procedures, and designate an individual responsible for ensuring the procedures are followed
228
Q

HIPPA is enforced by the HHS Office for Civil Rights (OCR)

A
229
Q

What is the main purpose of the Privacy Act?

A

Allow citizens to access information held by federal agencies about themselves

230
Q

Privacy Act applies only to federal agencies & not to the private sector

A
231
Q

Privacy Act provides following right & remedies

A
  • Notice to and comment from the individual before disclosure by the agency (ten exceptions exist)
  • A lawful FOIA application may require disclosure
  • Right to access one’s own record & request justifiable amendments
  • Right to civil damages if intentional improper disclosure caused injury
232
Q

Civil Law

A
  • Deals with private rights & remedies
  • Primarily establishes and adjudicates rights among private persons, both individual & corporate
  • Civil rights involve statutory law, rather than common law
  • 50 titles in the U.S.C. Title 18 is criminal law - others are primarily civil
  • There is greater diversity in state’s civil state law then criminal
233
Q

Categories of Civil Law

A
  • Statutory Law
  • Common Law

* Contract common law

* Tort Common law

234
Q

What do Federal & State Bills of Rights protect citizens from?

A

Other Citizens

235
Q

Civil Law

A
  • The number of subjects dealt with in civil law is much great
  • The subjects of civil law developed & containing the most legislation are usually the subjects related to a state’s economic center
236
Q

Common Law

A

When a federal court hears a common law dispute it applies the same legal principles applicable to state law at the same location

237
Q

Terms & conditions expressed in words

A

Express Contracts

238
Q

Terms & conditions not stated in words; based on the parties really intending the terms

A

Implied Contract

239
Q

Imposes an obligation on someone who has benefited from an act or lack of an act, for another

A

Implied in Law

240
Q

Based on parties’ conduct even without formal words, but not if some critical term is unstated

A

Implied in Fact

241
Q

The value of a product or service, determined by a court, when it is disputed in an implied contract

A

Implied Reasonable Value

242
Q

Liability for the acts of another without personal fault of the one liable

A

Vicarious Liability

243
Q

If several parties have been jointly negligent but the judgment was against only one; that party is entitled to a proportionate contribution from the others

A

Contribution

*Might be prevented by a “hold-harmless” or “indemnification” in a contract

244
Q

For an employer to be liable for its employee (agency relationship-vicarious liability)

A

The employee must have acted within the scope of his duties

245
Q

Depending on the circumstances of the action taken while performing duties for a private employer; a law enforcement officer may be:

A
  • Within the scope of employment of the LEA
  • Within the scope of employment of the private employer
  • Outside the scope of employment of either
246
Q

A willful or negligent wrong done to one person by another

A

Tort

247
Q

Unlike contract injuries, torts do not require any agreement between the parties & in cases of negligence may not depend on the intentions of the parties

A
248
Q

One in which the actor intends the consequence’s of the act or to do the act resulting in injury

A

Willful Tort

249
Q

The failure to use reasonable care & due diligence under the particular circumstances as a result of which another is injured or suffers some damage

A

Negligence

250
Q

Negligence does not require intent, even an intent to be negligent - rather it is the absence of an attitude or intent - to be duly careful - that characterizes negligence

A
251
Q

Negligence so gross or reckless as to be tantamount to acting with total disregard for the consequences of the action is sometimes held to be similar to an intentional wrong and may lead to heavier liability on the part of the negligent person

A
252
Q

Exemplary or punitive damages may be awarded multiplied by a factor of the actual damages to dissuade the negligent party from similar future behavior

A
253
Q

Examples of Torts

The actual use of force against another involves physical touching

A

Battery

254
Q

Examples of Tort

Putting another in fear that force will be used against him or her; do not involve physical contact

A

Assault

255
Q

Deprivation of another’s liberty or freedom which may involve actual physical restraint and may involve intimidation that physical force will be used if an escape is attempted

A

False Imprisonment

256
Q

Wrongful appropriation of the personal property of another or exercise of dominion by the converter over the personal property of another in a way inconsistent with rightful owner’s interest

A

Conversion

257
Q

Use of a trick, device, false scheme, or other deception that causes another to suffer loss because of reliance on the one committing the fraud

A

Fraud or Misrepresentation

258
Q

Behavior that results in annoying unwholesome or destructive conditions or produces substantial interference with another’s use or enjoyment of his property

A

Nuisance

259
Q

Damaging untrue oral (slanderous) & written (libelous) statements

A

Defamation

260
Q

The truth of a statement is generally an adequate defense to an action of defamation

A
261
Q

Occurs when without justification or proper cause there is

  • Intrusion into secret affairs of another
  • Disclosure of such affairs
  • Placing of another in a false public light
  • The appropriation of some private or secret aspect of another for the commercial use
A

Invasion of Privacy

262
Q

Federal Tort Claims Act (FTCA)

Allows individuals to recover from the US for property damage, personal injury, & wrongful death caused by the negligence of a federal employee

A

FTCA

263
Q

The government is liable if a law enforcement officer commits assault, battery, false imprisonment, false arrest, abuse of process or malicious prosecution

A
264
Q

The government is not liable if the claim against LEO is for libel, slander, misrepresentation, deceit or interference with contract

A