ASIS CPP "Investigation " Flashcards Help in Exam
ASIS CPP "Investigation "
Flashcards Help in Exam
Investigation: fact-finding searching, examining, observing, collecting, and studying in order to respond to an inquiry or problem so a hypothesis or conclusion can be drawn
Personnel costs: principle cost of investigations
3 tools: information, interviewing, instrumentation
3 investigative goals: ID parties involved, ID information sources, present evidence
3 types: applicant/background, incident investigations, administrative inquiries
5 investigative elements: objectivity, thorough, relevance, accuracy, timeliness
6 questions: who, what, where, when, how, and why
2 Purpose: Thoroughly documenting, identifying suspect
5 qualities: Objectivity, thoroughness, relevance, accuracy & timeliness
3 key points: Open soon, complete quick & avoid premature closing
3 goals: Identify parties involved, identify sources with information & present evidentiary factors to support
6 objectives: who? what? where? when? why? & how?
3 Tools (3Is): Information, Interrogation & instrumentation
4 techniques: Interview & interrogation, record / database checks, surveillance & computer forensic
Purpose: Protect interest of employing enterprise
Management issues: organizing for investigations, managing investigations at strategic, operational & case levels
Goals: Consistent with parent organization’s strategic direction
Significant issue: Ethics
Investigative budget: Difficult to predict
Investigative Unit (IU): Privacy & Secure storage space
IU factors: Company’s mission, size, and scope
Liaison: Most significant force multiplier in investigative function
Establishing liaison contacts: Professional and civic association
Background investigations: advise applicant, and secure permission
Pre-employment: intended to determine character, experience, and past practices
Inhibitors: various laws and court decisions regarding techniques and/or instruments
Post-employment (current): determining promotion or transfer appropriateness
Both Background investigations: Pre-employment: are governed by industry practices, statutory rules, and common law
Statement of release: to be executed prior to any investigative activities
Disclosure to interviewees: “inquiry is in connection with a position of trust”
Rule of ten: one in ten applications will have major omissions
7 major: claims, misconduct, explosion/arson, sabotage, theft, traffic, and undercover
Interviews: start with those not likely to be available for later interview
Best questioning approach: believing a suspect is innocent until proven guilty
Hostile interviewee: conduct the interview in the security office near end of investigation
Personal contact investigation is the best technique significant/sensitive claims
Information to be obtained: statements of material witnesses, claimants, and witnesses
Statements: narrative, and question/answer
Indexing: single most important administrative control in investigations
Misconduct Investigations Designed to determine violations of company rules/policies and/or state/federal laws
NLRB v. Weingartten: union representative to be present if requested by union member
Epilepsy foundation of northeast Ohio: provides “Weingartten” for non-union employees
Discretion: essential in an employee misconduct investigation
Internal investigative techniques: selected interviews, searches, surveillance, CI, photos, record checks
Indicators of substance abuse: absenteeism, accidents, arrests, reports from others
Embezzlement contributors: extravagance, wagering/substance abuse, associates
Embezzlement countermeasures: disciplined environment with audits/safeguards
Fraud forms: employee application/records, accident/injury claims, expense reporting
Accident/injury fraud: most difficult; no effective preventative measure
Gambling investigations: investigator to cooperate at local/county/state/federal levels
Explosion: a sudden, violent, and noisy gaseous expansion
3 explosion categories: flash fire, explosions, detonations (compounded explosions)
5 fundamental explosions: boiler, flammable gas, chemical, dust, nuclear
Low explosive s: black powder, smokeless powder, nitrocellulose
High (self-consume): nitro, dynamite, picric acid (yellow crystal), mercury, lead
Arson motives: economic, personal satisfaction, sabotage, pyromania, concealment
Fires: all to be investigated regardless of size
Fire triangle: oxygen, heat, and fuel
Plant: devise designed to ignite combustible material after initiating action
3 Types of explosions: Mechanical, Chemical & nuclear
Key motives: Economic, personal, sabotage, pyromania
Pyromania: An irresistible desire to start fires
Sabotage suspected: Notify law enforcement, preserve evidence
Motives of sabotage: disgruntled employee, union conflict, outside contractor, organized crime, foreign manipulation & rioting
Key elements of effective loss prevention: Preventive aids, prompt reporting, prompt action, prosecution & remedial actions
Who is or Better Whois: Computer forensic common tools
Competitive intelligence: A form of espionage but legal
Sabotage: obstruct the purpose of the organization (hard to prove/ fire is most common)
Sabotage motives: disgruntled employee, union, contractor, OC, foreign, rioting
Key information: serial/model numbers, distinctive marks, value
Key documentation: shipping/transfer/inventory, ownership, date/time of discovery, to whom reported, exact location of loss, circumstances (e.g., forced entry), extent of search, internal control/security measures contributing to theft
Phase 1 (emergency): care, control hazards (fire/traffic), drivers/witnesses, and evidence
Phase 2: conduct interviews, condition of vehicles, photos, hospitals/tow yards, weather/road conditions, traffic control devices, contributors, examine tire marks, etc.
Surveillance: secretive observation of persons/places/things to obtain information
Surveillance: legal in most jurisdictions, but must stop short of invasion of privacy
2 types of surveillance: physical (human) and technical (electronic)
Requirements: Investigator must be known to the population must fit logically to assignment
2 control scheme: control person & control plan
Communication: Operative initiate contacts (daily)
5 phases: Planning & preparation, information gathering, verification & analysis, disciplinary & corrective actions, prevention & education
Telephone surveillance: not normally used in a gambling investigation conducted by a proprietary investigative force
Undercover: willingness, self-confidence, resourceful/adaptable, patience, judgment
3 most common undercover techniques: informants, surveillance, and operative
Start/Close: when and how to start/close an undercover operation is critical
Potential problems: injury, exposure, Unfair Labor Practices, Civil Actions for Damage
Credible cover: the most important aspect of an undercover operation
Due process requirements: if law enforcement has been invited to participate
Evidence for prosecution: not a requirement for undercover investigation
Problems with UI: injury, exposure, unfair labor practice, civil actions for damage, new bargaining issue
Termination: Without exposing
Removing an operative: Kept in as long as possible
Questioned document: genuineness is questioned due to origin, authenticity, age, or circumstances under which the document was written
Exemplar: a document duplicating the text of a questioned document in order to show that it is the product of a particular person or machine (e.g., handwriting/typewriter)
Written statements: affidavit, Q/A, non-sworn, and memorandum of interview
Chain of custody: chronological written record of evidence custody
Real evidence: speaks for itself (e.g., fingerprints)
Physical evidence: articles/materials that aid in identifying a suspect or the circumstances of a crime
Evidence gathering: obtain, mark, wrap/package/protect, establish chain of custody
Evidence categories: movable, fixed, fragile
Relevant evidence: relates directly to the investigation
Immaterial evidence: no relevance or importance to investigation
Competent evidence: responsible evidence
Documentary evidence: best type of evidence
Acid phosphate test: semen enzyme found in large quantity
Walker test: locates nitrates on skin/clothing (i.e., proximity to discharged firearm)
Henry fingerprint system: designating numerical values to fingers by studying ridges, loops, whorls
Kinesics: study of body language based on behavioral patterns of non verbal communication
Semantics: study of words, meanings, and human interaction through communication
Social engineering: subtle elicitation of information without revealing the true purpose of call
Alligatoring: charred wood in scaled pattern
Craze lines: pattern of thin irregular lines in glass exposed to high temperatures
Hackle marks: minute irregular lines on the edge of broken glass caused by sudden/powerful force
2 rules of handling: Photograph or sketch & restrict handling
3 classes: Direct, circumstantial and real
Real evidence: Speaks itself
2 basic category: Direct & indirect
Physical evidence: Visible or trace evidence
Dealt by: Forensic professional
Identification: marking or tagging, CS description
Evidence integrity: Not altered, kept in its original condition & change can be explained
Testimonial evidence: Obtained by communication
Trace evidence: Collected with forceps, placed in bottles
Blood stained materials: Not stored in air tight containers
Interviewing: general to specific of a person believed to have relevant information
Principle tool of interviewing: questions
Interrogation (confrontational interview): questioning of a suspect or reluctant person
Coercion: to compel by force
Duress: physical hardship
Psychological constraint: unlawful restraint by instilling fear
Ready, willing, able suspects: not to be interrogated
Notes: taking notes during the interrogation can disrupt the interrogator’s rhythm
Deception detectors: polygraph or psychological (voice) stress evaluation
Polygraphs: may be used in ongoing investigation of certain kinds of workplace crimes, or pre-employment screening of certain prospective employee candidates
Polygraphs: accuracy depends upon the professional capabilities of the investigator accuracy depends upon the professional capabilities of the investigator
Control questions: base-line questions in polygraph
Key of investigative process: Investigator’s ability to interview
3 types of interview: General, informational & administrative
2 types of interrogation: Confrontational & investigatory
Suspect: Believed to have committed offense
Witness: Other than suspect
8 Classification of informants: one time, occasional, employee, anonymous, criminal, personal, mentally disturbed & control informants
Criminal informants: Provides information in exchange of something (quid pro quo)
Quid pro quo: Something for something
Control informants: Directly involved in the activities under investigation
4 objectives of interview: Obtain valuable facts, eliminate innocent, identify the guilty & obtain a confession
3 Preparation of an interview: gathering information, planning the interview & subject factors
5 planning for interview: Location, time factors, questioning order, question to ask, person present
5 subject factors: Intoxication, physical / psychological condition, prejudice, perception, age
5 stages of interview: Familiarity with case, interviewee’s background, ,beginning, gathering information & endings
Effective communication: Organized, active listener, avoiding obstacles, patient, flexible & tenacious
4 basic techniques: ask to think, report everything, recall events, change perspective
Supportive setting: Subject’s home or office
Non supportive: Hotel suite, management or security office
2 device to detect deception: Psychological stress evaluation, polygraph
Polygraph prevention act: Employee Polygraph Prevention Act of 1988
3 defense mechanism: projection, minimization & identification
3 non-verbal communication: behavior analysis, non verbal response, comparative postures
BAI: evaluation of subject’s verbal & non verbal behavior
Lie signs: Evasive answers
Indicative truth: direct & offers general denials
6 Rights of interviewees: Weingarten rule, statement & confession, promises & guarantees, duress, consent & access to meal/rest room
Weingarten rule: Special right of union employees
Information source: database, evidence, real & historic
Principal resource: people, information, credibility, physical assets and financial assets
Requirements: training, relationships, communications & financial resources
Information: Lifeblood of investigative mission
Intelligence information: Check your own file first
Coroner’s office: the best source when investigating a homicide or suicide
Bureau of Vital Statistics: marriage licenses
8 informant types: one-time, occasional, employee, anonymous, criminal, personal, mental, controlled
AFIS: automatic fingerprint identification system
AIMS: arson information management system
Blood evidence storage: 40 – 50 degrees
4 spatial zones: public (>=12ft.), social (1-12 ft.), personal (1.5 to 4 ft.), intimate (< 1.5 ft.)
Secretors: persons whose non-blood fluids contain substances similar to red blood cells; 75% of pop
Gunshot primer residue (GSR): test for antimony and barium found on persons/articles within 10 ft.of discharge (note: .22 cal ammunition might not contain either antimony or barium)
Homicide facts: 50% 8 PM – 2 AM Fri/Sat; 65% w/firearms; 20% knives
Report: Basis for post investigation administrative action
5 basic steps: Gather record & organize the facts, write the report & evaluate if necessary
4 types of report: Initial, progress, special & final
Administrative information: name of the subject, case number, type & status of case, reporting investigator & date of report
2 elements of report: summary, narrative, conclusive & enclosure
Arriving the scene: Initial response & prioritization of efforts
Process the scene: determining team composition, contamination control, documentation, evidence collection
Crime scene search pattern: strip or lane search, grid search, zone search, point to point search, spiral search, clockwise-counter clockwise search
Visual documentation: video tapping & photography: investigative / general
Sketch: Assure complete coverage of the discussed matter
Reference point: From which measurements are made to locate spots or items of investigative interest
Triangulation: A system for locating a spot in an area by measurements from two or more reference points
Finished drawing: Used for trial
4 points to remember: avoid obliterating evidence, distinct mark, include date & mark itself
Blood stains: Dry before packing
Hairs specimen: At least 50
Never: Loose fibers in mailing envelope
Questioned document: Genuineness is questioned
7 accountability of evidence: Who saw first, who touch first, where it was taken, by whom, how was it stored, was the storage area locked, who has the key or access code?
Surveillance: Observing another secretly
Purpose: Information about identities those under investigation
3 categories: Physical (human observation), psychological (behavior analysis), data
Subject: The person being observed
Surveilants: The person conducting the surveillance
Covert: secret without subject’s knowledge, overt: visible & identified
2 types of operation: personal & electronic
Surveillance planning: establish objective, area scrutiny, subject’s background
Surveillance resources: personnel requirements & communication
Personnel requirements: minimum 2 surveillants, familiarity with every steps of operations, incident response plan
Surveillance considerations: privacy issue, recording, surveillance log & record retention period
3 methods: loose, close & combined loose and close
Observation post: Short term (storefront or apartment), long term (rooftop or rented dwelling)
Indoor VS Outdoor: Indoor (max. use of equipments) outdoor (disguised vans / trucks)
Foot surveillance: Best is leapfrogging
Vehicle: Best if used tracer
Audio surveillance: Evasedropping, wiretapping & bugging
Pen register: Record out going calls
Trap and trace: record incoming calls
Field notebook: Maintained by police officer
Moving surveillance: Most difficult type
Confession: Acknowledgement of guilt
Admission: Admit a fact which can tend to guilt
Eavesdropping: Unauthorized listening
Wiretapping: Interception of a communication circuit
Bugging: Interception with an electronic device
Probation: release under certain condition
Parole: release from confinement under certain conditions
Equal pay act 1963: Men & Women pay equally
Age Discrimination in Employment (ADEA) 1967: Prohibits employment discrimination basis of age
Rehabilitation Act of 1973: Hire those with physical or mental handicaps
Americans with Disabilities (ADA) 1990: Prohibits discrimination against disabilities
Family & Medical Leave Act 1993: 12 weeks of unpaid leave


Comments
Post a Comment