Chapter 7 Flashcards

1
Q

Surveillance
Invigilation
Seizing and searching
Physical evidence

A

Theft investigative methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Document examination
Audits
Electronic searches
Physical asset counts

A

Concealment investigative methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Searching public records
Online resources
The net worth method

A

Conversion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Interviews and interrogation

Honesty testing

A

Inquiry investigative methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tool that explicitly considers all aspects of the fraud.

A

Vulnerability chart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risky than stationary surveillance

A

Mobile or tailing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can be conducted by anyone

A

Simple fixed or stationary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
When there is predication
Perceived cost
Exposure of amount taken
Signal that the investigation or non-investigation will send to the other
Risks 
Public exposure 
Nature of fraud
A

When to investigate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Theft act investigative technique that involves close supervision of suspects during an examination period.

A

Invigilation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

1) secure the device
2) clone the device
3) search the device manually
4) search the device using automated procedures

A

Process for gathering electronic evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Calculation based on the contents of a disk or file.

If CRC compared with sent number are different, the data were likely damaged.

A

Cyclic redundancy check number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Encase forensic

Access data forensic tool kit

A

Software packages that search devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Should of active memory should be done after seizure of the computer but before turning off the computer.

A

CRC checksum number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Legal counsel and human resources

A

What should be done before surveillance takes place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Record must must be kept of when a document is received and what has happened to it since its receipt.

A

Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Case map

Masterfile

A

Used to index and store evidence

17
Q
Creation of docs
Sources of docs
The dates when the docs were obtained 
Brief descriptions of document contents
Subjects of docs
Identifying bates #
A

An organized database should contain the following

18
Q

Used by attorneys to track all documents

A

Bates numbers

19
Q

Software performs link analysis to find links between people, places, and events

A

Link analysis

20
Q

Statistically based method of analyzing a subset of transactions from a larger pool

A

Discovery sampling

21
Q

Usually only law enforcement officers or agents of grand jury can obtain documents by this

Failure to honor is punishable by law

22
Q
Abrasions 
Alterations
Disguised writings
Use of 2 color of inks
Torn pages
Pencil or carbon marks
A

If one or more of these exist a document should be submitted for examination

23
Q

Convert concrete experiences into higher levels of generalization

24
Q

Give concrete examples of certain categories of experience

25
The use of interpersonal space to convey meaning.
Proxemic communication
26
Use of time in interpersonal relationships to convey meaning
Chronemic communication
27
Seek to establish the credibility of the respondent
Assessment questions
28
Observing behavior before critical questions are asked
Norming or calibrating