Chapters 7 & 8 - Investigating and Concealing Theft Acts Flashcards

1
Q

Fraud investigation contains elements of 4 methods

A

theft investigation methods

concealment investigation methods

conversion investigation methods

inquiry investigation methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what factors to consider when deciding to investigate a fraud or not?

A

1 predication (fraud symptoms, tip, anomalies)

  • cost
  • strength of evidence
  • public exposure risk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Proper sequence of events to resolve allegations:

A
  1. identify the allegation
  2. review source documents and records
  3. employ other investigative procedures
  4. interview those you think are innocent
  5. interview suspect(s)

these steps move from outward to inward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is invigilation

A

a period of extremely tight controls making it nearly impossible for someone to continue their fraud. purpose is to establish a baseline to see how much fraud is really taking place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a period of extremely tight controls for the purpose of establishing a baseline of normal activity

A

invigilation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

things to be careful about when imposing invigilation

A
  • its expensive

- its invasive and people may quit, so get management’s approval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

steps to gathering electronic evidence

A
  1. secure the device and perform initial task
  2. clone the device and calculate a CRC checksum
  3. search the device manually
  4. . searching the device using automated procedures (forensic software)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

explain securing the device and performing initial tasks

A
  • must have a right to seize it
  • must maintain a clean chain of custody
  • take pictures of seizure site, have witnesses
  • pull computer plug, DO NOT shut down normally
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

explain cloning the device and calculate CRC Checksum

A
  • perform a copy of the hard drive
  • calculate CRC Checksum
  • seal away original disk
  • perform investigation on the cloned copy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

explain searching the device manually

A

search cloned copy for

  • web history
  • documents
  • trash bin
  • emails
  • usb drives
  • recently loaded files
  • have someone check the server for their deleted emails
How well did you know this?
1
Not at all
2
3
4
5
Perfectly