Exam 11: Surveillance and Undercover Operations

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Credit card fraud is a major problem for security investigators.There are basic types of credit card fraud.List and discuss these types of frauds.

Free
(Essay)
4.9/5
(31)
Correct Answer:
Answered by Examlex AI Copilot

Credit card fraud is indeed a major problem for security investigators, and there are several basic types of credit card fraud that they need to be aware of. These types of fraud include:

1. Counterfeit card fraud: This type of fraud occurs when a criminal creates a fake credit card using stolen card information. They may use a skimming device to steal the card information or obtain it through a data breach. The counterfeit card is then used to make unauthorized purchases.

2. Card-not-present fraud: This type of fraud occurs when a criminal uses stolen card information to make online or phone purchases where the physical card is not required. This can happen when a criminal obtains card information through phishing scams, data breaches, or other means.

3. Lost or stolen card fraud: This type of fraud occurs when a criminal uses a lost or stolen credit card to make unauthorized purchases. They may use the physical card or attempt to make online or phone purchases before the cardholder has a chance to report the card as lost or stolen.

4. Application fraud: This type of fraud occurs when a criminal uses stolen or fake personal information to apply for a credit card in someone else's name. They may then use the card to make unauthorized purchases before the victim realizes what has happened.

Each of these types of credit card fraud presents unique challenges for security investigators, and it is important for them to stay informed about the latest tactics and technologies used by criminals to commit fraud. By understanding these types of fraud and staying vigilant, security investigators can work to prevent and investigate credit card fraud effectively.

The Graham-Leach-Bliley Act was passed in 2002 to prohibit any person from _________ financial information by making false statements to a financial institution.

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

C

Most proprietary security investigations are conducted by contract security firms.

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

False

One of the largest contracting security investigation companies is Pinkerton Consulting and Investigation.

(True/False)
4.9/5
(33)

A professional trade association for private investigators is:

(Multiple Choice)
4.8/5
(31)

In 2002, as a result of numerous corporate financial scandals in the past decade, congress passed this act to protect investors.

(Multiple Choice)
4.8/5
(41)

Many companies have developed specific measures to prevent employee theft.Discuss these measures.

(Essay)
4.8/5
(23)

A method of thwarting espionage is _________ any locations where important meetings and discussions are held.

(Essay)
4.9/5
(37)

One ruse used to obtain information is to send an individual a check for a small rebate from a dummy company.When the individual cashes the check the sender then has the bank account information.This is known as a:

(Multiple Choice)
4.9/5
(38)

Private persons or corporations that provide detective or computerized databases to private sector investigators are called:

(Multiple Choice)
4.9/5
(37)

One of the largest contract security investigation companies is:

(Multiple Choice)
4.8/5
(32)

The _______________ has become a valuable tool for the investigator by giving them access to various records, which previously would have been difficult to obtain.

(Essay)
4.8/5
(35)

ATM-related credit-card fraud occurs most often when consumers___________ and keep it in their wallet.

(Multiple Choice)
4.8/5
(32)

Investigators are hired to find people who are missing, have dropped out of sight or are trying to hide.

(True/False)
4.9/5
(46)

In 2006, the computer maker Hewlett-Packard (HP) was accused of using illegal methods to obtain phone records of board members, journalists, and others in order to investigate leaks of confidential information by corporate board members about the company's corporate strategy.Among the major issues discovered was the use of _______________ by investigators, to obtain calling records from a phone company.

(Essay)
4.9/5
(26)

______________ crimes are various crimes committed by corporations or their employees for the benefit of the corporation.

(Essay)
4.9/5
(39)

What type of security service is being utilized when the security personnel are not employees of the corporation but provide security for the organization?

(Multiple Choice)
5.0/5
(36)

__________ has a multibillion dollar counterfeiting industry consisting of high-margin but relatively low-tech products.

(Essay)
4.9/5
(38)

The Gramm-Leach-Bliley Act prohibits any person from obtaining _________ information they should not have access to.

(Essay)
4.8/5
(35)

Most large corporations and businesses contract out their security services because it is cost effective.

(True/False)
4.8/5
(33)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)