200 likes | 223 Views
Learn methods for investigating fraud, including surveillance, invigilation, and evidence analysis. Discover how to conduct theft investigations effectively.
E N D
FRAUD EXAMINATIONALBRECHT, ALBRECHT, & ALBRECHT Investigating Theft Acts CHAPTER 7
Learning Objectives • Understanding theft investigation methods and how they are used to investigate suspected fraud. • Know how to coordinate an investigation, using a vulnerability chart. • Describe the nature of surveillance and covert operations. • Understand the effectiveness of invigilation to investigate fraud.
Learning Objectives • Realize how physical evidence can be used in a fraud investigation. • Recognize how to seize and analyze computers, including hard drive information and e-mail messages. • Use trash and other social engineering methods to investigate fraud.
Match the Following Concepts. Uniquely Marked, Make Copy, Store Original Safely, Use Copies in Investigation Chain of Custody Originals Preferred, Sometimes a Copy Can Be Used Marking Evidence Carefully Maintain Record of Every Movement or Examination Organization of Evidence Rules Concerning Originals Organization Key to Retrieving & Maintaining a Database