Investigations Flashcards
Prior to conducting an interview, an investigator should prepare a thorough list of questions to ensure that the interview is well structured and that no predetermined lines of inquiry are forgotten. True or False
False, Whenever possible, do not prepare a list of predetermined questions to ask the subject. The interview should flow freely. The interviewer might, however, want to develop a list of key points to cover during the interview.
When confessing to fraud, suspects tend to provide accurate details on the amount of funds involved and number of instances to relieve themselves of the guilt of their dishonest actions. True or False
False, This is probably because of the human mind’s natural tendency to suppress unpleasant matters.
With cloud computing, clients of cloud service providers do not have physical control of the media or the network on which their data reside, which can complicate digital forensic investigations in cloud environments. True or False
True, clients of cloud service providers do not have physical control of the media or the network on which their data reside.
In admission-seeking interviews, an innocent person often reacts differently to the initial accusation than a culpable person. Which of the following reactions to the initial accusation is common to an innocent person?
- Strong Denials
- Weak Denials
- Mumbled Denials
- Silence
Strong Denials.
When accused of wrongdoing, the typical guilty person reacts in which of the following ways
- Strong Denials
- Crying
- Weak Denials
- Laughing
Silence
Which tactic is normally used to diffuse alibis
- Present all implicating evidence at once
- Reveal small portions incrementally
Reveal small portions incrementally
Which type of question is used to establish the respondent’s credibility? A. Leading B. Closed C. Assessment D. Open
Assessment, Assessment questions seek to establish the respondent’s credibility. They are used only when the interviewer considers previous statements by the respondent to be inconsistent because of possible deception. When evaluating a subject’s response to an assessment question for credibility, it is critical to observe both verbal and nonverbal reactions.
Simone, a manager at a major company, is suspected of financial statement fraud. During an admission-seeking interview with Simone, the investigator states, “A lot of employees count on the company doing well. I know you only did this to help the company succeed. Isn’t that right?” This technique is known as:
- Extrinsic Rewards
- Genuine need
- Depersonalizing the victim
- Altruism
Altruism, the interviewer should try to convince the respondent that confessing is the most advantageous option available. To do this, the interviewer must offer a morally acceptable reason that allows the accused to confess to a misdeed without feeling ashamed. In many cases,
Simone, a manager at a major company, is suspected of financial statement fraud. During an admission-seeking interview with Simone, the investigator states, “A lot of employees count on the company doing well. I know you only did this to help the company succeed. Isn’t that right?” This technique is known as:
- Extrinsic Rewards
- Genuine need
- Depersonalizing the victim
- Altruism
Altruism, the interviewer should try to convince the respondent that confessing is the most advantageous option available. To do this, the interviewer must offer a morally acceptable reason that allows the accused to confess to a misdeed without feeling ashamed. In many cases,
Credit card records and statements pertaining to a subject can provide insight into the subject’s movements and habits, but they do not reveal people with whom the subject does business. True or False
True
Generally, the rules of admissibility for digital evidence are stricter than such rules for tangible evidence. True or False
False, Although digital evidence is different from—and more volatile than—tangible evidence, the rules regarding the admissibility of digital evidence in court are really no different from the rules regarding the admissibility of any other type of evidence.
Pam, a Certified Fraud Examiner (CFE), is conducting an admission-seeking interview of Luca, a fraud suspect. Luca has decided to confess. How should Pam go about getting all the relevant information?
A. Obtain the details in reverse chronological order
B. Obtain the details in order of relevance
C. Get the general information and then move to the specifics
D. None of the above
Get the general information and then move to the specific, During the admission-seeking interview, it is best to first confirm the general details of the offense. For example, the interviewer will want the accused to provide estimates of the amounts involved, name other parties involved in the offense, and give the location of physical evidence. After obtaining these basic facts, the interviewer can return to the specifics, in chronological order.
Which of the following statements about electronically recording interviews is MOST ACCURATE?
- They distract subjects and inhibit response
- No jurisdiction prohibits
- Examiners are permited to covertly record
Distract subjects and inhibit response
Which of the following is an appropriate moral excuse clause to include in a signed confession?
- I didn’t know it was illegal
- I didn’t do it on purpose
- I didn’t mean to do it
- I didn’t mean to hurt anyone
I didn’t mean to hurt anyone, The signed statement should include the confessor’s moral excuse, but the fraud examiner should ensure that the wording of the excuse clause does not diminish legal responsibility. Instead of using language like “I didn’t mean to do it,” which implies lack of intent, the interviewer should focus on an excuse that provides only a moral explanation for the misconduct.
To better prepare for the possibility that interview records will be subpoenaed, fraud examiners should document their notes for each interview separately, even when documenting electronic recordings. True or False
True, When taking notes, fraud examiners should follow a few basic rules. First, the interview notes for each interview should be recorded on a separate document. This can be especially helpful if documents from a particular interview are subpoenae
Beth, a Certified Fraud Examiner (CFE), is conducting a routine interview of someone who does not know her. In such situations, it is usually best for Beth to omit her title when introducing herself.
True, Beth must introduce herself before the interview commences. Generally, an interviewer should indicate their name and company, but they should avoid stating their title if possible. In some instances, the interviewer cannot avoid giving their title, and in such cases, the interviewer should use a title that will not conjure up emotions or possible fear in the respondent’s mind.
Jayna, an employee at a retail store, is accused of skimming money from the register. During an admission-seeking interview with Jayna, the investigator states, "This is a huge corporation with more than a hundred stores, so it’s not like a few dollars here and there is going to affect anyone personally. Is that how you saw it?" This technique is known as: A. Unfair Treatment B. Extrinsic Rewards C. Depersonalizing the victim D. Genuine Need
Depersonalizing the victim,
When seizing a running computer for forensic examination, the seizing party should perform a graceful shutdown by turning the computer off using the normal shutdown process. True or False
False, When seizing a computer that is running, the seizing party should not perform a graceful shutdown by turning it off using the normal shutdown process. If a system is turned off using normal shutdown routines, a number of temporary files will be deleted and possibly overwritten during the shutdown process, and such files might be important to the investigation.
Ashton, a digital forensic examiner for Cadence Irrigation, is conducting an internal investigation into the alleged theft of trade secrets from Cadence. Kirby, a Cadence employee, is the prime suspect. Ashton decides to seize Kirby’s work computer for forensic examination. If, at the time of seizure, Kirby’s computer is turned off, Ashton should turn it on before seizing it.. True or False
False, A computer system that is switched off should not be turned on during the seizure process. Turning a system on might damage and taint any evidence that it contains.
Christie is undertaking a data analysis engagement to identify potential fraud at XYZ Corporation. Which of the following lists the MOST appropriate order in which she should conduct the steps involved in the data analysis process? I. Cleanse and normalize the data. II. Build a profile of potential frauds. III. Analyze the data. IV. Obtain the data. V. Monitor the data.
II,IV,I,III,V
Which of the following is a limitation of Benford’s Law?
A. Only works on data sets with assigned numbers
B. Applied best on data sets with 3 digit numbers
C. Cannot be applied to data sets with non natural numbers such as check or invoice numbers
D. Can only be applied to data sets with currency numbers
C. Cannot be applied to data sets with non natural numbers such as check or invoice numbers
Which of the following functions does a Benford’s Law analysis help to achieve?
A. Identifying fictitious numbers
B. Identifying duplicate payments
C. Extracting usable information from unstructured data
D. Measuring the relation between items
A. Identifying fictitious numbers, Benford’s Law provides that the distribution of the digits in multi-digit natural numbers is not random; instead, it follows a predictable pattern.
Although rules vary depending on the jurisdiction, the presence of a third party at an admission-seeking interview could have liability consequences. True or False
True,
A(n) ______________ interview is one that has the potential to bring about strong emotional reactions in the respondent.
a. Evasive
b. Volatile
c. Chronic
d. None of the above
b. Volatile
Freddie calls Alex’s bank, claiming to be Alex, with the intention of stealing Alex’s identity. Freddie tells the bank representative that he needs to make sure the bank has the correct government identification number on his account because he had noticed an error on his statement. The bank representative refuses to give the number, so Freddie hangs up. Assuming that each of the following is illegal in the relevant jurisdiction, which of the following crimes did Freddie commit?
A. Defalcation
B. Pretexting with a financial institution
C. Embezzlement
D. Fraud in inducement
B. Pretexting with a financial institution,
Broadly defined, pretexting is the act of impersonating someone else or making false or misleading statements to obtain, sell, or buy information about a person or organization.
\_\_\_\_\_\_\_\_\_\_\_ can BEST be described as a data analytics approach involving a learning algorithm that identifies similarities, patterns, or anomalies within a data set on its own, without human involvement. A. Predictive analytics B. Link analysis C. Supervised machine learning D. Unsupervised machine learning
D. Unsupervised machine learning
\_\_\_\_\_\_\_\_ is a data analysis software function that allows users to relate several files by defining relationships in collected data, without the use of the Join command. A. Multi File processing B. Record selection C. Correlation analysis D. Verifying multiples of a number
A. Multi File processing