Chapter 7 Flashcards

1
Q

Surveillance
Invigilation
Seizing and searching
Physical evidence

A

Theft investigative methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Document examination
Audits
Electronic searches
Physical asset counts

A

Concealment investigative methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Searching public records
Online resources
The net worth method

A

Conversion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Interviews and interrogation

Honesty testing

A

Inquiry investigative methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tool that explicitly considers all aspects of the fraud.

A

Vulnerability chart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risky than stationary surveillance

A

Mobile or tailing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can be conducted by anyone

A

Simple fixed or stationary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
When there is predication
Perceived cost
Exposure of amount taken
Signal that the investigation or non-investigation will send to the other
Risks 
Public exposure 
Nature of fraud
A

When to investigate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Theft act investigative technique that involves close supervision of suspects during an examination period.

A

Invigilation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

1) secure the device
2) clone the device
3) search the device manually
4) search the device using automated procedures

A

Process for gathering electronic evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Calculation based on the contents of a disk or file.

If CRC compared with sent number are different, the data were likely damaged.

A

Cyclic redundancy check number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Encase forensic

Access data forensic tool kit

A

Software packages that search devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Should of active memory should be done after seizure of the computer but before turning off the computer.

A

CRC checksum number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Legal counsel and human resources

A

What should be done before surveillance takes place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Record must must be kept of when a document is received and what has happened to it since its receipt.

A

Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Case map

Masterfile

A

Used to index and store evidence

17
Q
Creation of docs
Sources of docs
The dates when the docs were obtained 
Brief descriptions of document contents
Subjects of docs
Identifying bates #
A

An organized database should contain the following

18
Q

Used by attorneys to track all documents

A

Bates numbers

19
Q

Software performs link analysis to find links between people, places, and events

A

Link analysis

20
Q

Statistically based method of analyzing a subset of transactions from a larger pool

A

Discovery sampling

21
Q

Usually only law enforcement officers or agents of grand jury can obtain documents by this

Failure to honor is punishable by law

A

Subpoena

22
Q
Abrasions 
Alterations
Disguised writings
Use of 2 color of inks
Torn pages
Pencil or carbon marks
A

If one or more of these exist a document should be submitted for examination

23
Q

Convert concrete experiences into higher levels of generalization

A

Induction

24
Q

Give concrete examples of certain categories of experience

A

Deduction

25
Q

The use of interpersonal space to convey meaning.

A

Proxemic communication

26
Q

Use of time in interpersonal relationships to convey meaning

A

Chronemic communication

27
Q

Seek to establish the credibility of the respondent

A

Assessment questions

28
Q

Observing behavior before critical questions are asked

A

Norming or calibrating