Asset Protection ch. 14, Asset Protection Ch. 13, Asset Protection CH.11, Asset Protection Ch. 12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The two major federal agencies charged with homeland security are the U.S. Department of Homeland Security and the:

FBI

The computer maker _____ was accused of using illegal methods to obtain phone records of board members.

HP

Many private firms also are involved in information sharing through:

Information Sharing and Analysis Centers

A professional trade association for private investigators is:

NAIS

In 2002, as a result of numerous corporate financial scandals in the past decade, congress passed this act to protect investors.

Sarbanes-Oxley Act

A convoy is a deliberate attempt to evade surveillance and usually occurs when the subject feels they may be followed.

True

Bioterrorism involves such weapons of mass destruction as anthrax, botulism and smallpox.

True

Eco-terrorism is an attempt to inflict economic damage to those who profit from the destruction of the natural environment.

True

Homeland Security is concerned with defensive efforts within the borders of the U.S.

True

Surveillance is used in many private security non-criminal investigations such as domestic/marital and child custody.

True

A fictitious personal history is also known as:

a cover story

Most proprietary security investigations are conducted by contract security firms.

false

Special investigative units (SIU's) have been established by the FBI to investigate fraud.

false

Some high-profile U.S. religious facilities or symbols have added:

security directors

In _____, the investigator generally watches a particular house or building to see who enters and leaves.

stationary surveillance

In a covert operation, the individual who is being observed or tracked is the:

subject

The terms "rough tail," "loose tail," "close tail," or "tight tail," all refers to what?

surveillance

Written notes are essential in:

surveillance

When a company goes through a meeting area looking for electronic devices to prevent eavesdropping, the company is:

sweeping

The private security industry, in addition to providing vital protection services for corporations, is also used by:

the U.S. Military

If an investigator is assuming a role and identity that could be checked through examination of records, those records should be placed at:

the personnel office

ASIS offers professional certification and credentialing for private investigators through its Crime and Loss Prevention Program.

true

GPS is a network of twenty-four satellites that are used originally to pinpoint targets and guide bombs. These satellites are equipped with atomic clocks and equally accurate position-measuring telemetry gear. What agency has oversight over them?

DOD: Department of Defense

A common mistake in maintaining surveillances is to make the assumption that a subject has entered a store mall and will leave by another exit.

False

Although the response to terrorism by the federal government is crucial, when an act of terrorism occurs it is a local problem.

False

If a surveillant has good reason to believe she has been "made" she should continue the surveillance at a greater distance.

False

If the surveillance could involve following a person on foot, the surveillant should have a credit card to pay for items and transportation.

False

In using an automobile for surveillance it should be a distinctive and costly vehicle because the subject would not assume that an investigator would use such a vehicle.

False

Most of the time it is not necessary to utilize a cover story because a good investigator does not get that close to the subject of the investigation.

False

Terrorism is a new concept in world history which makes it difficult to devise plans to thwart it.

False

The Office of Inspector General serves as an independent and subjective inspection, audit, and investigative body.

False

The private investigator should never notify local police so they do not have their cover blown.

False

The two major federal agencies charged with homeland security are the U.S. Department of Homeland Security and the Department of Defense.

False

The word covert means unable to detect or locate.

False

Agroterrorism is a threat directed at what group or product within the United States?

Farmers and livestock/food supply

This agency is an excellent source for insurance fraud investigations because it provides investigative services for insurers and law enforcement agencies to stop those committing insurance fraud.

National Insurance Crime Bureau (NICB)

Even the _____ relies on private security companies to perform crucial jobs formerly entrusted to the military in the Middle East.

Pentagon

One of the largest contract security investigation companies is:

Pinkerton Consulting and Investigation

_____ is the covert observation of places, persons and vehicles for the purpose of obtaining information.

Surveillance

_____ allows us to see not only through darkness but also through fog, mist, and smoke. It is especially useful in penetrating many types of camouflaging.

Thermal imaging

While you are pretending to be somebody else, you must override your natural inclinations for:

associations

If an undercover investigator's true identity becomes known, s/he was:

burned

What type of fraud involves setting up a fake or ghost operation to qualify for card reader installation and use stolen data to make purchases over the Internet?

card-not-present fraud

Most of the academic study of homeland security has focused on the government, but the 9/11 commission confirmed this area would most likely be the primary target of terrorism in the future:

civilians

What type of security service is being utilized when the security personnel are not employees of the corporation but provide security for the organization?

contract

This is a deliberate attempt to evade surveillance and often involves prior knowledge that surveillance will occur.

convoy

This is defined by the FBI as terrorism that initiates, or threatens to initiate, the exploitation of or attack on information systems.

cyberterrorism

A common mistake in maintaining surveillances is to make the assumption that a subject has entered a store mall and will leave by another exit.

false

If a surveillant has good reason to believe she has been "made" she should continue the surveillance at a greater distance.

false

In most stationary surveillance cases it would be cost effective to rent a house or an apartment to conduct the surveillance so you can maintain constant observation.

false

In using an automobile for surveillance it should be a distinctive and costly vehicle because the subject would not assume that an investigator would use such a vehicle.

false

Most large corporations and businesses contract out their security services because it is cost effective.

false

Most private investigators are required to be licensed by the federal government.

false

The word covert means unable to detect or locate.

false

Financial-market analysts have commented that this segment of our economy is the fastest growing investment in our life-time:

homeland security

This term was used after 9/11 to describe defensive efforts within the borders of the United States.

homeland security

The Department of Homeland Security provides lucrative opportunities for technology companies to develop and sell:

homeland security technologies

A type of business fraud is the theft of these rights, including counterfeiting, which can cost the company millions of dollars.

intellectual property rights

In 2004 the National Counterterrorism Center (NCTC) was created to serve as the primary organization in the U.S. government for integrating and analyzing all:

intelligence

When doing automobile surveillance, it is preferable to have more than one vehicle so the cars can change positions often. This is referred to as?

leapfrog

What is one major problem in working undercover which can have a negative impact on the individual's life if they do not know how to handle it?

living a lie

If information needs to be delivered in writing, the undercover investigator should have these prearranged to allow for the dissemination of information?

mail drops

According to The Economist, in 2006, private security companies had grown into the 2nd largest _____ in Iraq.

military contingent

The quickest way to be identified as a law enforcement officer is to:

move too fast

Private security firms often offer this service to prospective business clients to test the efficiency of the retail operations staff?

mystery shoppers

The Graham-Leach-Bliley Act was passed in 2002 to prohibit any person from _____ financial information by making false statements to a financial institution.

obtaining

Although companies that are used to assist the military abroad are called private security companies, some are being referred to as _____ because they are replacing governmental troops.

paramilitary

Effective surveillance takes not only skill but also:

preparation

What is the form of trickery in which an individual calls a bank or phone company and claim to be the customer whose records they are seeking?

pretexting

The Gramm-Leach-Bliley Act was passed by congress in 2002 to _____ any person from obtaining financial information by making false, fictitious, or fraudulent statements to a bank or other financial institution.

prohibit

Most large corporations and businesses use what type of security services?

proprietary

DHS, in order to detect biological, radiation, bioagents, well as radiological and nuclear threats, are seeking:

refined sensor technology

With religious hostilities more evident since 9/11 and fears of violent attacks on houses of worship, some high profile U.S. religious facilities or symbols have added this role to their staff:

security director positions

A one- person tail, also known as a _____, is the least desirable way of following someone on foot.

shadow

Private investigating firms offer _____ to protective clients, to allow honest employees to report wrongdoings in the work place.

silent witness program

Some military leaders, however, are complaining that the lure of these salaries is:

siphoning away some of their most experienced special operations people at the very time their services are most in demand

In vehicle accident cases the investigators are trained to conduct accident reconstruction to aid their clients.

true

Investigators are hired to find people who are missing, have dropped out of sight or are trying to hide.

true

One of the largest contracting security investigation companies is Pinkerton Consulting and Investigation.

true

Very often private sector investigators are hired by companies as consultants for their company's security procedures and plans.

true

This may be defined as a form of investigation in which the investigator assumes a new identity in order to obtain information.

undercover operation

These surveillance tools can be equipped with cameras to transmit live video feeds to agents on the ground, miles away.

unmanned aerial vehicles (UAV's)

The Insurance Information Institute allows consumers to obtain information on:

various types of insurance

When tracking a subject it may be necessary to utilize these systems to allow you to maintain contact with the subject's vehicle.

vehicle tracking system


Ensembles d'études connexes

Medical Sociology (Chapter 1, 2 and 8)

View Set

Chapter 1: Introduction to Nursing

View Set

Descriptive statistics, Statistics 2022

View Set

Chapter 14: The Autonomic Nervous System

View Set

Structure and Function of Neurons

View Set