Gathering Information Flashcards

1
Q

What are common techniques for hiding assets?

A

transferring assets into foreign trusts,

overpaying taxes

prepaying on a home mortgage

obtaining a life insurance policy

and transferring assets into someone else’s name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a letter rogatory?

A

A formal request by the courts of one country seeking judicial assistance from the courts of another country

also permit formal communication between the judiciary, a prosecutor, or a law enforcement official of one country and their counterpart in another country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asset hiders generally prefer the financial vehicles they use to have what characteristics ?

A

want products that are difficult to trace or untraceable

want products that are secure and accessible

want products that are liquid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the exceptions for allowing the processing and dissemination of credit and personal data?

A

The individual has given consent.

It is necessary for the extension of credit or to enter into a contract with the subject.

It is necessary to protect the subject’s vital interest.

It is necessary to comply with other legal requirements.

An employer is conducting a background check for hiring or other employment purposes (consent is still required in many jurisdictions).

It is necessary to serve the public interest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is The net-worth method?

A

(or comparative net-worth analysis)

used to prove illicit income circumstantially by showing that a person’s assets or expenditures for a given period exceed that which can be accounted for from known or admitted legitimate sources of income

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What situations have covert operations traditionally worked well

A

There is reliable information about criminal activity or asset losses, but there is insufficient detail for prevention or apprehension.

Losses are known to be occurring in an area, but there is no information as to how they are occurring or who is responsible.

It is desirable to gather information concerning personal relationships or to identify the contacts made with or by certain people.

It is desirable to compare actual practices with supposed or required practices.

It is important to obtain information in an indirect manner from people believed to possess it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Methods to trace assets?

A

The expenditures method

The bank deposits method

The asset method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The asset method

A

allows the fraud examiner to prove income circumstantially by showing that the subject’s assets for a given period exceed those that can be accounted for from known or admitted sources of income

use the asset method when it is suspected that the subject has accumulated wealth and acquired assets with illicit proceeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The expenditures method

A

(also known as the sources and application of funds method)

compares the suspect’s known expenditures and known sources of funds during a given period of time.

this analysis seeks to quantify the cost of the subject’s lifestyle and determine whether the subject’s reported income is sufficient to support his lifestyle.

best used when the subject spends illicit income on consumables (e.g., travel and entertainment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The bank deposits method

A

primary method of proof when most of the subject’s income is deposited and the subject’s books and records are unavailable, withheld, incomplete, or maintained on a cash basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the DEEP WEB?

A

(also known as the invisible Web)

Web content that is not indexed by standard search engines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why does the DEEP WEB EXIST?

A

These deep Web resources include:

  • websites without any links pointing to them
  • certain file formats that search engines cannot handle
  • websites that have been blocked from Web crawler access
  • password-protected websites
  • information stored in databases.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the WAYBACK MACHINE?

A

allows users to see archived versions of Web pages throughout time.

can use to find historical information, such as:

  • A photo posted on a website that has been removed
  • Content, views, writing, and opinions rescinded by an author
  • A company’s old job ads, statements, affiliations, or product lines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

actual investigation to trace transactions should involve what elements

A

Collect information.

Profile the subject (i.e., assemble the personal—financial and behavioral—profile).

Review information for leads and prioritize leads.

Trace the illicit transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What to consider when computing subjects net worth?

A

All assets should be valued at cost, not fair market value.

Subsequent appreciation or depreciation of assets should be ignored.

The amount of funds available to the subject from legitimate sources should be estimated or computed generously.

The subject should be interviewed to identify all alleged sources of funds and to negate defenses that he might raise later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is ENTRAPMENT?

A

occurs when law enforcement officers or government agents induce a person to commit a crime that he is not previously disposed to commit.

17
Q

What can electronic payment records reveal?

A

Assets the subject has purchased

The locations of the subject’s assets

The locations of the subject’s residences and businesses

Loans the subject has obtained

Payments made to nonexistent employees with direct deposit

The true owner of a property

The cities and countries in which the subject conducts business

18
Q

What is PRETEXTING?

A

act of impersonating someone else or making false or misleading statements to obtain, sell, or buy information about a person or organization.

19
Q

What is the DIRECT and INDIRECT method?

A

fraud examiners can trace illicit transactions using a direct method or an indirect method.

direct method uses the subject’s books and records (or financial transaction records belonging to third parties) to analyze the relationship between a suspect’s receipt and subsequent disposition of funds or assets.

Indirect method employs circumstantial evidence to analyze the relationship between a suspect’s receipt and subsequent disposition of funds or assets.

20
Q

Where are the TWO forms of covert operations?

A

undercover operations and surveillance operations.

Undercover operations often use deception and disguise to obtain evidence directly from those involved in the illicit activity.

surveillance operations use observation to gather information about individuals suspected of misconduct.

21
Q

What is MLA

A

Mutual legal assistance

rocess by which countries request and provide assistance in law enforcement matters, such as gathering information, obtaining provisional remedies, and enforcing foreign orders and judgments.