Chapter 7 Flashcards
Surveillance
Invigilation
Seizing and searching
Physical evidence
Theft investigative methods
Document examination
Audits
Electronic searches
Physical asset counts
Concealment investigative methods
Searching public records
Online resources
The net worth method
Conversion
Interviews and interrogation
Honesty testing
Inquiry investigative methods
Tool that explicitly considers all aspects of the fraud.
Vulnerability chart
Risky than stationary surveillance
Mobile or tailing
Can be conducted by anyone
Simple fixed or stationary
When there is predication Perceived cost Exposure of amount taken Signal that the investigation or non-investigation will send to the other Risks Public exposure Nature of fraud
When to investigate
Theft act investigative technique that involves close supervision of suspects during an examination period.
Invigilation
1) secure the device
2) clone the device
3) search the device manually
4) search the device using automated procedures
Process for gathering electronic evidence
Calculation based on the contents of a disk or file.
If CRC compared with sent number are different, the data were likely damaged.
Cyclic redundancy check number.
Encase forensic
Access data forensic tool kit
Software packages that search devices
Should of active memory should be done after seizure of the computer but before turning off the computer.
CRC checksum number
Legal counsel and human resources
What should be done before surveillance takes place
Record must must be kept of when a document is received and what has happened to it since its receipt.
Chain of custody
Case map
Masterfile
Used to index and store evidence
Creation of docs Sources of docs The dates when the docs were obtained Brief descriptions of document contents Subjects of docs Identifying bates #
An organized database should contain the following
Used by attorneys to track all documents
Bates numbers
Software performs link analysis to find links between people, places, and events
Link analysis
Statistically based method of analyzing a subset of transactions from a larger pool
Discovery sampling
Usually only law enforcement officers or agents of grand jury can obtain documents by this
Failure to honor is punishable by law
Subpoena
Abrasions Alterations Disguised writings Use of 2 color of inks Torn pages Pencil or carbon marks
If one or more of these exist a document should be submitted for examination
Convert concrete experiences into higher levels of generalization
Induction
Give concrete examples of certain categories of experience
Deduction
The use of interpersonal space to convey meaning.
Proxemic communication
Use of time in interpersonal relationships to convey meaning
Chronemic communication
Seek to establish the credibility of the respondent
Assessment questions
Observing behavior before critical questions are asked
Norming or calibrating