Covert Operations Flashcards
When a fraud examiner prepares a memorandum reflecting the information furnished by a confidential source, how should the fraud examiner identify the source?
A. The fraud examiner should identify the source using the source’s initials.
B. The fraud examiner should not write confidential source information in a memorandum.
C. The fraud examiner should identify the source by the source’s full name.
D. The fraud examiner should use symbols to denote the source’s identity.
D. The fraud examiner should use symbols to denote the source’s identity.
Which of the following is the type of covert operation in which a fraud examiner observes situations and interactions to gather information about individuals’ activity?
A. An undercover operation
B. A source operation
C. An entrapment operation
D. A surveillance operation
D. A surveillance operation
Which of the following factors should a fraud examiner consider when determining the legality of electronic recordings?
A. Whether the interaction to be recorded will take place in a public or private setting
B. Whether the parties involved in the conversation have consented to being recorded
C. Whether the jurisdiction allows a combination of audio and/or video to be recorded
D. All of the above
D. All of the above
Which of the following is a valid legal defense to allegations of entrapment against a fraud examiner who is a federal law enforcement officer?
A. There is proof of the suspect’s modus operandi.
B. The suspect made exculpatory statements.
C. The fraud examiner had suspicion of foul play.
D. The fraud examiner acted with proper predication.
D. The fraud examiner acted with proper predication.
___________ refers to an instance when law enforcement officers or government agents induce a person to commit a crime that they are not previously disposed to commit.
A. Entrapment
B. False imprisonment
C. Covert operation
D. Collusion
A. Entrapment
A memorandum that outlines the basis for a covert investigation should state which of the following?
A. The operatives under the fraud examiner’s care or control
B. The identities of any known suspects
C. The information expected to be gained
D. All of the above
D. All of the above
Covert operations are designed to obtain legal and admissible evidence through the use of agents whose true intentions are NOT communicated to the target.
A. True
B. False
True
Spencer, a fraud examiner, plans to use a confidential informant. The informant agrees to aid Spencer in exchange for cash. Spencer prepares a receipt for the transfer of cash to the informant and asks the informant to sign it, but the informant refuses. What should Spencer do?
A. Refuse to pay the cash without a receipt, even if it means the informant will not aid Spencer
B. Give the informant the cash, but do not make any record of the transaction
C. Have a witness observe the transfer of cash and sign a statement attesting to the transaction
D. None of the above
A. Refuse to pay the cash without a receipt, even if it means the informant will not aid Spencer
If the fraud examiner is NOT a government employee, then promises of unqualified confidentiality for informants or sources are encouraged to get them to participate.
A. True
B. False
False
Which of the following is the type of covert operation in which a fraud examiner uses disguise and deceit to actively seek evidence from people involved in the offense?
A. An undercover operation
B. An entrapment operation
C. A surveillance operation
D. An informant operation
A. An undercover operation
For a recording of a private conversation to be permissible, most jurisdictions require consent from at least one of the parties involved in the conversation.
A. True
B. False
True
Which of the following repercussions might an investigator incur if mistakes are made during a covert operation?
A. Physical harm
B. Legal consequences
C. Reputational damage
D. All of the above
D. All of the above
It is best practice for fraud examiners to conduct covert operations at the same time that they are employing conventional methods of gathering evidence.
A. True
B. False
False
Covert operations are beneficial to investigations because they pose little risk to investigators and the investigation itself.
A. True
B. False
False
When using a confidential informant who demands payment in exchange for their information, a fraud examiner should only agree to provide compensation after the informant has delivered the information.
A. True
B. False
True