Deck 11: Surveillance and Undercover Operations
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 11: Surveillance and Undercover Operations
1
Corporations can largely obtain information about each other's business, operations and technology legally through:
A) internet searches
B) the Freedom of Information Act
C) googling
D) asking
A) internet searches
B) the Freedom of Information Act
C) googling
D) asking
B
2
A professional trade association for private investigators is:
A) BCCFCA
B) PIAMBIA
C) NAIS
D) CFEA
A) BCCFCA
B) PIAMBIA
C) NAIS
D) CFEA
C
3
One of the largest contract security investigation companies is:
A) Peel Security Consultants
B) Pinkerton Consulting and Investigation
C) CMP Group
D) 2Cw Consulting Services
A) Peel Security Consultants
B) Pinkerton Consulting and Investigation
C) CMP Group
D) 2Cw Consulting Services
B
4
In 2002, as a result of numerous corporate financial scandals in the past decade, congress passed this act to protect investors.
A) Hawes-Cooper Act
B) Little Lindbergh Act
C) Sarbanes-Oxley Act
D) Affirmative Action Act
A) Hawes-Cooper Act
B) Little Lindbergh Act
C) Sarbanes-Oxley Act
D) Affirmative Action Act
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
What type of security service is being utilized when the security personnel are not employees of the corporation but provide security for the organization?
A) proprietary
B) contract
C) independent investigators
D) hybrid
A) proprietary
B) contract
C) independent investigators
D) hybrid
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
What type of fraud involves setting up a fake or ghost operation to qualify for card reader installation and use stolen data to make purchases over the Internet?
A) point-of-sale fraud
B) card-not-present fraud
C) e-commerce fraud
D) ATM fraud
A) point-of-sale fraud
B) card-not-present fraud
C) e-commerce fraud
D) ATM fraud
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
The Graham-Leach-Bliley Act was passed in 2002 to prohibit any person from _________ financial information by making false statements to a financial institution.
A) keeping
B) embezzling
C) obtaining
D) copying
A) keeping
B) embezzling
C) obtaining
D) copying
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Proprietary investigations by in-house security teams concentrate on background checks, loss prevention, insurance cases, and:
A) external crime investigations
B) escorting of executives
C) credit applications
D) off site investigations
A) external crime investigations
B) escorting of executives
C) credit applications
D) off site investigations
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
What term refers to the practice of obtaining business or technological information through surreptitious means?
A) Industrial Worms
B) Back Door OPS
C) Black OPS
D) Industrial espionage
A) Industrial Worms
B) Back Door OPS
C) Black OPS
D) Industrial espionage
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
ATM-related credit-card fraud occurs most often when consumers___________ and keep it in their wallet.
A) write down hints to remember
B) write down PIN numbers
C) write down passwords
D) write down checking account numbers
A) write down hints to remember
B) write down PIN numbers
C) write down passwords
D) write down checking account numbers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
When a company goes through a meeting area looking for electronic devices to prevent eavesdropping, the company is:
A) combing
B) sweeping
C) debugging
D) dusting
A) combing
B) sweeping
C) debugging
D) dusting
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
A type of business fraud is the theft of these rights, including counterfeiting, which can cost the company millions of dollars.
A) intellectual property rights
B) patent rights
C) credit card contracts
D) deeds and land titles
A) intellectual property rights
B) patent rights
C) credit card contracts
D) deeds and land titles
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Private investigatory services are provided in all of the following ways, except for:
A) proprietary
B) contract
C) independent private investigator
D) legislative
A) proprietary
B) contract
C) independent private investigator
D) legislative
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Most large corporations and businesses use what type of security services?
A) proprietary
B) contract
C) independent investigators
D) hybrid
A) proprietary
B) contract
C) independent investigators
D) hybrid
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
This agency is an excellent source for insurance fraud investigations because it provides investigative services for insurers and law enforcement agencies to stop those committing insurance fraud.
A) Federal Bureau of Investigation (FBI)
B) National Insurance Crime Bureau (NICB)
C) NAFTA (North American Free Trade Agreement)
D) BBB (Better Business Bureau)
A) Federal Bureau of Investigation (FBI)
B) National Insurance Crime Bureau (NICB)
C) NAFTA (North American Free Trade Agreement)
D) BBB (Better Business Bureau)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
A private investigator may be hired by a company to conduct what type of investigation, where a client has claimed to be injured by what the company sells?
A) strict liability
B) product liability
C) company liability
D) production liability
A) strict liability
B) product liability
C) company liability
D) production liability
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
The computer maker _______ was accused of using illegal methods to obtain phone records of board members.
A) Dell
B) HP
C) Gateway
D) Compaq
A) Dell
B) HP
C) Gateway
D) Compaq
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
What term is defined as theft by the intentional use of deceit or trickery?
A) fraud
B) scam
C) collusion
D) embezzlement
A) fraud
B) scam
C) collusion
D) embezzlement
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
The Insurance Information Institute allows consumers to obtain information on:
A) proprietary investigators
B) various types of insurance
C) customers
D) transport drivers
A) proprietary investigators
B) various types of insurance
C) customers
D) transport drivers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Companies employ ______ in an attempt to prevent and thwart hostile espionage?
A) counterespionage
B) subterfuge
C) surveillance
D) sabotage
A) counterespionage
B) subterfuge
C) surveillance
D) sabotage
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Special investigative units (SIU's) have been established by the FBI to investigate fraud.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
ASIS offers professional certification and credentialing for private investigators through its Crime and Loss Prevention Program.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
In vehicle accident cases the investigators are trained to conduct accident reconstruction to aid their clients.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
What is the form of trickery in which an individual calls a bank or phone company and claim to be the customer whose records they are seeking?
A) snooping
B) pretexting
C) subterfuge
D) scamming
A) snooping
B) pretexting
C) subterfuge
D) scamming
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
__________________ investigations are a major portion of private sector investigations, which typically include medical issues or losses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
A method of thwarting espionage is _________ any locations where important meetings and discussions are held.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Security professionals report that _____________ thieves have become easier to catch through modern technology.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Very often private sector investigators are hired by companies as consultants for their company's security procedures and plans.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Investigators are hired to find people who are missing, have dropped out of sight or are trying to hide.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
______________ crimes are various crimes committed by corporations or their employees for the benefit of the corporation.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Private sector investigators can assist financial organizations by providing investigations such as due diligence investigations that investigate companies with whom they are contemplating doing business.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Most large corporations and businesses contract out their security services because it is cost effective.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
_________________ fraud is a major problem and can be committed by the health care provider, patient, or both, which makes investigating difficult.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Private persons or corporations that provide detective or computerized databases to private sector investigators are called:
A) databanks
B) information brokers
C) squirrels
D) vaults
A) databanks
B) information brokers
C) squirrels
D) vaults
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
One of the largest contracting security investigation companies is Pinkerton Consulting and Investigation.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Most private investigators are required to be licensed by the federal government.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
The American Institute of Certified Public Accountants maintains:
A) a credit-card database
B) financial controls
C) auditing standards
D) undercover investigators
A) a credit-card database
B) financial controls
C) auditing standards
D) undercover investigators
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
One ruse used to obtain information is to send an individual a check for a small rebate from a dummy company.When the individual cashes the check the sender then has the bank account information.This is known as a:
A) trojan check
B) italian job
C) ghost check
D) transparent check
A) trojan check
B) italian job
C) ghost check
D) transparent check
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
The Gramm-Leach-Bliley Act was passed by congress in 2002 to ________________ any person from obtaining financial information by making false, fictitious, or fraudulent statements to a bank or other financial institution.
A) allow
B) prohibit
C) inform on
D) deter
A) allow
B) prohibit
C) inform on
D) deter
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Most proprietary security investigations are conducted by contract security firms.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Credit card fraud is a major problem for security investigators.There are basic types of credit card fraud.List and discuss these types of frauds.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
The Gramm-Leach-Bliley Act prohibits any person from obtaining _________ information they should not have access to.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
List and discuss the duties performed by proprietary and contract investigations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Many companies have developed specific measures to prevent employee theft.Discuss these measures.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
In 2006, the computer maker Hewlett-Packard (HP) was accused of using illegal methods to obtain phone records of board members, journalists, and others in order to investigate leaks of confidential information by corporate board members about the company's corporate strategy.Among the major issues discovered was the use of _______________ by investigators, to obtain calling records from a phone company.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Industrial espionage has become a fact of life in the business world.Discuss several ways in which industrial espionage can be accomplished, and ways to combat it.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
The Federal Trade Commission was the agency initially given the responsibility to monitor and screen websites for offers to obtain _____________ information.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
__________ has a multibillion dollar counterfeiting industry consisting of high-margin but relatively low-tech products.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
List some additional duties that are performed by private security investigations beyond background or pre-employment.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
The _______________ has become a valuable tool for the investigator by giving them access to various records, which previously would have been difficult to obtain.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck