Chapter 7 Flashcards
Surveillance
Invigilation
Seizing and searching
Physical evidence
Theft investigative methods
Document examination
Audits
Electronic searches
Physical asset counts
Concealment investigative methods
Searching public records
Online resources
The net worth method
Conversion
Interviews and interrogation
Honesty testing
Inquiry investigative methods
Tool that explicitly considers all aspects of the fraud.
Vulnerability chart
Risky than stationary surveillance
Mobile or tailing
Can be conducted by anyone
Simple fixed or stationary
When there is predication Perceived cost Exposure of amount taken Signal that the investigation or non-investigation will send to the other Risks Public exposure Nature of fraud
When to investigate
Theft act investigative technique that involves close supervision of suspects during an examination period.
Invigilation
1) secure the device
2) clone the device
3) search the device manually
4) search the device using automated procedures
Process for gathering electronic evidence
Calculation based on the contents of a disk or file.
If CRC compared with sent number are different, the data were likely damaged.
Cyclic redundancy check number.
Encase forensic
Access data forensic tool kit
Software packages that search devices
Should of active memory should be done after seizure of the computer but before turning off the computer.
CRC checksum number
Legal counsel and human resources
What should be done before surveillance takes place
Record must must be kept of when a document is received and what has happened to it since its receipt.
Chain of custody