Deck 7: Investigating Theft Acts
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
Play
Full screen (f)
Deck 7: Investigating Theft Acts
1
Which investigation technique relies on a person's senses, especially hearing and seeing?
A) Invigilation
B) Surveillance and covert operations
C) Computer-based searches
D) Honesty testing
A) Invigilation
B) Surveillance and covert operations
C) Computer-based searches
D) Honesty testing
B
A: It does not rely on the senses
C: It does not rely on the senses
D: It does not rely on the senses
A: It does not rely on the senses
C: It does not rely on the senses
D: It does not rely on the senses
2
A vulnerability chart is used to
A) Organize answers to investigative questions
B) Identify who had the opportunity to commit the fraud
C) Determine the possible motive for the fraud
D) All of the above
A) Organize answers to investigative questions
B) Identify who had the opportunity to commit the fraud
C) Determine the possible motive for the fraud
D) All of the above
D
A: This is one of the purposes of a vulnerability chart, but not the only one listed as an answer.
B: This is one of the purposes of a vulnerability chart, but not the only one listed as an answer.
C: This is one of the purposes of a vulnerability chart, but not the only one listed as an answer.
D: All of the above are purposes of a vulnerability chart (p. 183)
A: This is one of the purposes of a vulnerability chart, but not the only one listed as an answer.
B: This is one of the purposes of a vulnerability chart, but not the only one listed as an answer.
C: This is one of the purposes of a vulnerability chart, but not the only one listed as an answer.
D: All of the above are purposes of a vulnerability chart (p. 183)
3
In considering the fraud triangle plus inquiry approach to investigation, surveillance, invigilation, and physical evidence are all:
A) Theft act investigation methods
B) Conversion investigations methods
C) Inquiry investigation methods
D) Concealment investigations methods
A) Theft act investigation methods
B) Conversion investigations methods
C) Inquiry investigation methods
D) Concealment investigations methods
A
A: Correct; they are all theft act investigation methods
A: Correct; they are all theft act investigation methods
4
The final step in a fraud investigation is
A) Search public records
B) Interview former employers and co-workers
C) Surveillance and invigilation.
D) Interview suspect
A) Search public records
B) Interview former employers and co-workers
C) Surveillance and invigilation.
D) Interview suspect
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
Characteristics of invigilation include which of the following?
A) A method of creating a loosely monitored environment that catches the fraudulent action
B) An inexpensive method to monitor the suspect for a short time period.
C) A method comparing regular periods with a temporary period of enhanced controls
D) A method of watching and recording physical facts and movement
A) A method of creating a loosely monitored environment that catches the fraudulent action
B) An inexpensive method to monitor the suspect for a short time period.
C) A method comparing regular periods with a temporary period of enhanced controls
D) A method of watching and recording physical facts and movement
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
Invigilation is
A) A theft investigation technique that analyzes physical evidence
B) A theft investigation technique that closely supervises suspects closely
C) A type of undercover operation
D) Interviewing the suspect at the beginning of the investigation
A) A theft investigation technique that analyzes physical evidence
B) A theft investigation technique that closely supervises suspects closely
C) A type of undercover operation
D) Interviewing the suspect at the beginning of the investigation
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is the last step in an investigation?
A) Interview suspect
B) Interview former employees
C) Interview other buyers or co-workers
D) Invigilation
A) Interview suspect
B) Interview former employees
C) Interview other buyers or co-workers
D) Invigilation
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is not an essential part of documenting a surveillance or observation investigation?
A) Name of observer
B) Position of observance
C) Time of observance
D) Distance from scene
E) All of the above are essential
A) Name of observer
B) Position of observance
C) Time of observance
D) Distance from scene
E) All of the above are essential
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
Surveillance is usually used to investigate
A) Theft acts
B) Concealment
C) Conversion
A) Theft acts
B) Concealment
C) Conversion
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
When would an undercover operation not be recommended?
A) When large-scale collusion is suspected
B) When other investigation methods have failed
C) When investigation is difficult to monitor
D) When there is significant reason to believe that massive fraud is occurring
A) When large-scale collusion is suspected
B) When other investigation methods have failed
C) When investigation is difficult to monitor
D) When there is significant reason to believe that massive fraud is occurring
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
The best pattern to use to conduct a fraud/theft investigation includes:
A) Search public records, interview suspect, invigilation
B) Check personnel records, invigilation, interview suspect
C) Interview suspect, invigilation, interview former employers
D) Interview co-workers, interview former employers, interview suspect
A) Search public records, interview suspect, invigilation
B) Check personnel records, invigilation, interview suspect
C) Interview suspect, invigilation, interview former employers
D) Interview co-workers, interview former employers, interview suspect
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
Invigilation is one of the techniques used as a method for ________ investigation.
A) Concealment
B) Theft
C) Conversion
D) Inquiry
A) Concealment
B) Theft
C) Conversion
D) Inquiry
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following statements is false?
A) Seasoned fraud investigators are careful to begin their investigations in a manner that does not arouse suspicion.
B) Seasoned fraud investigators avoid using words like "investigation"
C) Seasoned fraud investigators usually start by approaching a suspect
D) Seasoned fraud investigators focus on gathering the strongest types of evidence.
A) Seasoned fraud investigators are careful to begin their investigations in a manner that does not arouse suspicion.
B) Seasoned fraud investigators avoid using words like "investigation"
C) Seasoned fraud investigators usually start by approaching a suspect
D) Seasoned fraud investigators focus on gathering the strongest types of evidence.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is not an investigation technique for fraud?
A) Theft act investigation methods
B) Concealment investigation methods
C) Inquiry investigation methods
D) Rationalization investigation methods.
A) Theft act investigation methods
B) Concealment investigation methods
C) Inquiry investigation methods
D) Rationalization investigation methods.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
Subjects of covert operations are protected against unreasonable breaches of privacy under:
A) The Fourth Amendment.
B) The Fifth Amendment.
C) Foreign Corrupts Practices Act.
D) The Seventh Amendment.
A) The Fourth Amendment.
B) The Fifth Amendment.
C) Foreign Corrupts Practices Act.
D) The Seventh Amendment.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
Undercover operations should only be used when:
A) Other investigation methods fail.
B) The results can remain hidden from law enforcement.
C) Small-scale or irregular fraud is suspected.
D) A top manager is the suspected perpetrator.
A) Other investigation methods fail.
B) The results can remain hidden from law enforcement.
C) Small-scale or irregular fraud is suspected.
D) A top manager is the suspected perpetrator.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is not a type of surveillance?
A) Stationary or fixed point
B) Covert invigilation
C) Moving or tailing
D) Electronic surveillance
A) Stationary or fixed point
B) Covert invigilation
C) Moving or tailing
D) Electronic surveillance
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is not a method for theft investigation?
A) covert operations (surveillance)
B) computer searches
C) Invigilation
D) Physical Evidence
A) covert operations (surveillance)
B) computer searches
C) Invigilation
D) Physical Evidence
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
Methods for theft act investigations include all of the following EXCEPT:
A) Surveillance and covert operations
B) Interviews and interrogation
C) Invigilation
D) Physical evidence
A) Surveillance and covert operations
B) Interviews and interrogation
C) Invigilation
D) Physical evidence
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
When investigating fraud, detectives should usually interview suspects:
A) At the beginning of the investigation to really put the heat on them
B) In the middle of the investigation to make them feel like their not really a suspect
C) At the end of the investigation to allow time to find the most evidence against them
A) At the beginning of the investigation to really put the heat on them
B) In the middle of the investigation to make them feel like their not really a suspect
C) At the end of the investigation to allow time to find the most evidence against them
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following should not be the first step you take in a fraud investigation?
A) Interview employees who are not suspects
B) Check company records
C) Search public records
D) Interview suspects
A) Interview employees who are not suspects
B) Check company records
C) Search public records
D) Interview suspects
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
All of the following could be used in an investigation of suspected kickbacks except:
A) Interview unsuccessful buyers
B) Search public records to gather evidence about the person's lifestyle
C) Check the employee's personnel records of financial difficulties
D) Interview unsuccessful vendors
E) All of above could be used in the investigation
A) Interview unsuccessful buyers
B) Search public records to gather evidence about the person's lifestyle
C) Check the employee's personnel records of financial difficulties
D) Interview unsuccessful vendors
E) All of above could be used in the investigation
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
The following are all part of the process for gathering electronic evidence except:
A) Clone the device
B) Calculate CRC checksum
C) Scan the device for errors
D) Check the device manually
E) All of the above are part of the process for gathering electronic evidence
A) Clone the device
B) Calculate CRC checksum
C) Scan the device for errors
D) Check the device manually
E) All of the above are part of the process for gathering electronic evidence
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
The following are all types of surveillance except:
A) Stationary surveillance
B) Moving surveillance
C) Electronic surveillance
D) Wiretapping
E) All of the above are types of surveillance
A) Stationary surveillance
B) Moving surveillance
C) Electronic surveillance
D) Wiretapping
E) All of the above are types of surveillance
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
__________ is much more risky than stationary surveillance and is a job best left to professionals.
A) Forensic accounting
B) Electronic surveillance
C) Invigilation
D) Tailing
A) Forensic accounting
B) Electronic surveillance
C) Invigilation
D) Tailing
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
Locating a scene to be observed, anticipating the actions that are most likely to occur at the scene, and keeping detailed notes on tape or film is:
A) Static surveillance
B) Electronic Surveillance
C) Stationary surveillance
D) Moving surveillance
A) Static surveillance
B) Electronic Surveillance
C) Stationary surveillance
D) Moving surveillance
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following is true about invigilation?
A) Detailed records are obtained before and after the period of invigilation
B) During the period of invigilation, evidence is presented to suspects with the hopes of getting a confession
C) When invigilation is conducted, it is best to cover all aspects of the business
D) Invigilation can be accomplished in as short as 2-3 days
A) Detailed records are obtained before and after the period of invigilation
B) During the period of invigilation, evidence is presented to suspects with the hopes of getting a confession
C) When invigilation is conducted, it is best to cover all aspects of the business
D) Invigilation can be accomplished in as short as 2-3 days
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
Imposing strict temporary controls to supervise an employee is an example of:
A) Vulnerability chart analysis
B) Surveillance
C) Honesty Testing
D) Invigilation
A) Vulnerability chart analysis
B) Surveillance
C) Honesty Testing
D) Invigilation
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
A vulnerability chart coordinates the various elements of a possible fraud including all the following except:
A) Pressures on the company
B) Concealment possibilities
C) Conversion possibilities
D) Symptoms observed
E) A, B, and D
F) None of the above
A) Pressures on the company
B) Concealment possibilities
C) Conversion possibilities
D) Symptoms observed
E) A, B, and D
F) None of the above
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
In most investigations of a fraud suspect, investigators should begin by:
A) Confronting the suspect.
B) Checking personal and company records
C) Interviewing co-workers.
D) Performing invigilation.
A) Confronting the suspect.
B) Checking personal and company records
C) Interviewing co-workers.
D) Performing invigilation.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
Undercover operations are costly and time-consuming and should be used with extreme care. In which of the following situations would it be ineffective to conduct an undercover operation?
A) When Law enforcement authorities are informed.
B) When the investigation can be closely monitored
C) When other investigation methods are applicable
D) When the investigation can remain secretive
A) When Law enforcement authorities are informed.
B) When the investigation can be closely monitored
C) When other investigation methods are applicable
D) When the investigation can remain secretive
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
Invigilation is an effective way to remove which element of the fraud triangle?
A) Rationalization
B) Opportunity
C) Pressure
D) None of the above
A) Rationalization
B) Opportunity
C) Pressure
D) None of the above
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following conditions is not necessary to conduct undercover operations:
A) The investigation can remain secretive
B) Large-scale collusion is likely
C) Subpoena has been issued by a court
D) Other investigation methods fail
A) The investigation can remain secretive
B) Large-scale collusion is likely
C) Subpoena has been issued by a court
D) Other investigation methods fail
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
A ___________________ is a tool that coordinates the various elements of a fraud investigation to help identify possible suspects.
A) Vulnerability chart
B) Subpoena
C) Chain of custody
D) Invigilation
A) Vulnerability chart
B) Subpoena
C) Chain of custody
D) Invigilation
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
Legal undercover operations are __________ and ____________ and should be used with extreme care. (Choose the option that best describes legal undercover operations.)
A) Costly, time-consuming
B) Fun , exciting
C) Invasive, embarrassing
D) Quick, Dangerous
A) Costly, time-consuming
B) Fun , exciting
C) Invasive, embarrassing
D) Quick, Dangerous
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
Undercover operations are costly and time-consuming and should be used with extreme care. In which situation would it better NOT to conduct an undercover operation?
A) Law enforcement authorities are informed when appropriate evidence has been accumulated
B) The investigation can be closely monitored
C) Other investigation methods are applicable
D) The investigation can remain secretive
A) Law enforcement authorities are informed when appropriate evidence has been accumulated
B) The investigation can be closely monitored
C) Other investigation methods are applicable
D) The investigation can remain secretive
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
Why do fraud investigations initially involve few people and avoid the word "investigation?"
A) To avoid alerting suspects about the investigation
B) To avoid incriminating innocent people
C) To avoid unnecessary stress or suspicion among employees
D) All of the above
A) To avoid alerting suspects about the investigation
B) To avoid incriminating innocent people
C) To avoid unnecessary stress or suspicion among employees
D) All of the above
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
Theft investigation usually begins with which of the following.
A) Involve very few people and avoid using words like 'investigation'
B) Interview the prime suspect
C) Interview other buyers, co-workers, etc.
D) Inform employees that an investigation is under way.
A) Involve very few people and avoid using words like 'investigation'
B) Interview the prime suspect
C) Interview other buyers, co-workers, etc.
D) Inform employees that an investigation is under way.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following are not methods of investigations for theft?
A) Surveillance
B) Invigilation
C) Physical Evidence
D) None of the Above
A) Surveillance
B) Invigilation
C) Physical Evidence
D) None of the Above
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
Experts recommend that invigilation must continue for at least:
A) 7 days
B) 14 days
C) 21 days
D) Experts do not agree on the length that invigilation must continue
A) 7 days
B) 14 days
C) 21 days
D) Experts do not agree on the length that invigilation must continue
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck