Private Security final exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

in the US there is an estimated ____ in cargo stolen annually

$30 billion

fraud steals about

$80 billion a year across all lines of insurance

how to detect insurance fraud

-a claimant who's totally calm and unflustered after submitting a large claim -a claimant who submit handwritten receipts for repairs on a covered its -a claimant who adds or increases homeowners or auto insurance coverage shortly before submitting a claim -a fire-damage claim for a home or auto where the fire started immediately after a family argument, or shorty after family members left the home/care -a medical claim submitted by a seasonal employee whose job is ending

how to make the perfect ghost persona

-an active investigator should have a generic account for basic collection and subject identification -once a subject is identified, ghost accounts that are tailored to the subject should be created to avoid suspicion -this account should ONLY be used for on investigation, then deactivated

make profiles for each type

-college kids -drug user -middle aged -employed/white collar -recruiter -high school kid repeat content make a blog ensure identities match, consider names that will have search results but aren't real

what are the 3 main goals of fraud

-detect fraud and pull potential fraudulent claims for in depth review -return non-fraudulent claims back into the claims cycle so honest customers are not upset -perform the first 2 operation as seamlessly in the business cycle as possible

tornados, hurricanes

-evacuate area if time. lock down building w alarm system up. and post notice on doors. -steel shutters cost $2500 per window. can be used in high crime areas for burglary deterrent. always look at adjacent businesses for access as well and adjust -if tornado get folks inside ad into shelter areas. use PA to get folks to where you are. if they want to leave do not stop them. -lock the doors for structural support. -count your pool, be aware that not everyone can recognize the danger of a tornado

the Facebook user ID

-everything on FB has a unique ID# -the FBID number is critical for evidence retention -the FBID gives access to additional content

floods, fires

-fix the root cause ex, fire extinguished, water mains shut off -inventory losses RGIS -insurance claim for every loss of $2500 -reorder product immediately -repair of floors, walls, area need to be started w in 24 hrs -normal business resumption asap -haul compactor away and replace. food spoilage

how to stop cargo theft

-high-tech GPS tracking tools -low-tech variety of locks -stay alert watch for signs -respond immediately report suspicious activity -know your supply chain -execute basic safety practices -screen and train employees

ghost accounts-personal identifiers

-names should match other identifiers for the account -the location should be close to the subject's location -use "fake name generator" -use "advanced options" to be able to select states and other key demographics

how to find a FBID

-navigate to profile -right click in the white space -select "view page source" -hit "ctrl+f" to open a search bar -type "profileID" without spaces

what are the hot spot states

-new york -florida -massachusetts -california

tornados and hurricanes cont'd

-once event passes take stock of site and surrounding area -look for power restoration updates using smart phones. these are not always right. -clearance of debris, removal of items to get business open -direct ship of all materials needed to get business open -trailers of vital march shipped ASAP -insurance clarims

the signs of a "fake profile"

-outdated layout -the "babe factor" -few photo uploads -inconsistent biography -blank "wall" -lots of "likes"

rules of writing a report

-reports should be well organized -reports should be factual, specific and detailed -reports should be written in past tense, first person, and active voice -reports should be accurate -reports should be objective -reports should be written in Standard written English

ghost accounts-education and employment

-schools should facilitate anonymity (online programs) -employments should be simple (self-employed), unemployed (actively looking), or generic (McDonalds, not White Lake,McDonalds)

behavior that can suggest possible victimization

-tardiness/unexplained absence -anxiety -lack of concentration -change in job performance -discomfort when communicating w others -disruptive phone calls or e-mail -sudden or unexplained requests to be moved from public locations in the workplace, such as sales or reception areas

Guidelines for investigators in creating effective testimony in court

-tell the truth -be prepared -stick to the facts -answer only the questions asked -be mindful of non-verbal communication -be respectful -speak directly, clearly, and confidently -listen and think before you speak -be professional

probable cause to arrest, search, or seize property exists when facts and circumstances known to the police officer would lead a reasonable person to believe:

-that the person to be arrested has committed a crime -that the police to be searched was the scene of a crime -that the place to be searched contains evidence of a crime; and/or -that property to be seized is contraband, stolen, or constitutes evidence of a crime

a good threat assessment will thoroughly analyze:

-the exact nature of he threat and/or threatening behavior -the identified target (general or specific) -the threatener's apparent motivation -the threatener's ability to carry to the threat -the threatener's background, including work history, criminal record, mental health history, and past behavior on the job

police ar allowed to search w out a warrant when

-they have consent from the person in charge of the premises -when conducting certain searches connected to a lawful arrest -in emergency situations which threaten public safety or the loss of evidence police also do not need a warrant to search or seize contraband "in plain site" when the officer has a right to be present

civil unrest

-tweetdeck -24 monitoring using investigation centers, news sites to follow path of impact -adjust team in buildings based on path and what is happening -merch protection use what is available -get the team out of the path -insurance claim, video review after the fact. use supplemental cameras if you have prewarnign of the event. ex. michael brown ferguson,MO 10 arrests

how are trailers are stolen for cargo theft

-wait until it is unattended -pay the drivers -steal the entire truck and make sure it is not being tracked -if trailer is already detached then they hook it up to their own truck

how many states make insurance fraud a specific crime

48 plus the District of Columbia

burglary question

48-72 hours rewind the tapes

U.S. vs. Josh Merigildo

4th amendment protections are not violated if you access a profile through a cooperating witness. If privacy settings allow for "friends" to view a site, government may access information through someone who is a "friend". Subjects have no justifiable expectation that "friends", the information is public and free to be used by "friends" in any way- including cooperating w LE. Posts that have more secure privacy settings may be constitutionally protected.

details of investigation ex. the retail equation (TRE)

It is "BLANK" policy to obtain a state/government issued ID to conduct any refund transaction for a customer at the point of sale. TRE is an online database that allows users to conduct queries using statistical information involving refunds conducted at "Blank" stores. This application contains personal information obtained from the identification provided by each customer who conducts a return. TRE generates a unique identification number for each customer, which allows the user to view the refund history details that include the name, address, refunding store, and merchandise being refunded

where are most of the ports

LA Houston New York

what 2 states do not have an insurance fraud law

Virginia and Oregon

open source

any publicly available information

why is New York a popular cargo theft port

because it is so popular

why is LA a popular cargo theft port

because it's closest to China

why is Houston a popular cargo theft port

closest to South America

medicare strike force

defendants collectively have billed Medicare more than $7 billion since Medicare Strike Force operations began in 2007. during this time the strike force has: charged more than 2,56 suspects involved in more than $8billion in fraud since 1997. largest ever takedown resulted in charges against a record 243 suspects for $712 million in false medicare and medicaid billing the medicare fraud strike force has 95% conviction rate and jail terms avg 4 years

body of your report

details of investigation -chronologicaly lays out the events -each event should have a dollar loss -can be divided into different jurisdictions if needed -should include definitions that will stand up in court -each incident documented should establish probable cause -use video snips to illustrate your points -embed video into the document if possible to facilitate ease of investigation

probable cause to seize property

exists when facts and circumstances known to the officer would lead a reasonable person to believe the the item is contraband, is stolen, or constitutes evidence of a crime -when a search warrant is in play police generally must search only for the items described in the warrant. however, any contraband or evidence of other crimes they come across amy for the most part be seized as well. should evidence prove to have resulted from an illegal search, it becomes subject to the "exclusionary rule" and cannot be used against the defendant in court. after hearing arguments fro the prosecuting and defense attorneys, the judge decides whether evidence should be excluded

probable cause for arrest

exists when facts and circumstances w in the police officer's knowledge would lead a reasonable person to believe that the suspect has committed, is committing, or is about to commit a crime. probable cause must come from specific facts and circumstances, rather than simply the officer's hunch or suspicion.

goods in peril

in the US the most highly sought after shipments are pharmaceuticals, consumer electronics, apparel, and food. as the demand and prices for certain goods rise, cargo thieves updat4e their lists of commodities to target and fence. for ex. when the price of metals such as gold , platinum, copper, or steel rises, their rate of theft increase

OSINT "mindset" evidence:

intelligence processed and collected for presentation

open source intelligence

intelligence that is the result of collecting and analyzing publicly available information

medicare

is designated as a high-risk program because of its size, complexity and vulnerability to improper payments

massachusetts

launched task forces in 13 communities that were successful

florida

no-fault auto insurance reforms

workplace violence

now recognized as a specific category of violent crime that calls for distinct responses from employers, law enforcement, and the community. this recognition is relatively recent. prior to the Edmond shootings, the few research and preventative efforts that existed were focused on particular issues-patient assaults on health care workers and the high robbery and murder risks facing taxi drivers and late-night convenience store clerks

what does OSINT stand for

open-source intelligence

how to write a report

proper spelling, grammar, chronological order, write it so that a kindergartener would be able to understand it

california

received 17,981 suspected fraudulent cases in 2012-13

building probable cause

refers to the requirement in criminal law that police have adequate reason to arrest someone, conduct a search, or seize property relating to an alleged crime -probable cause requirement comes from the 4th amendment

OSINT "mindset" intelligence:

reviewed, analyzed, and verified pieces of information

"detentions"

short of arrest do not require probable cause. such temporary detentions require only "reasonable suspicion" this includes: car stops, pedestrian stops and detention of occupants while officers execute a search warrant. "reasonable suspicion" means specific facts which would lead a reasonable person to believe criminal activity was at hand and further investigation was required. these can ripen into arrests, and the point where that happens in not always clear. Often police state that they are arresting person, place him/her in physical restraints or take other action crossing the line into arrest. these police actions may trigger the constitutional requirement of probable cause. someone arrested of charged w out probable cause may seek redress through a civil lawsuit or false arrest or malicious prosecution

cargo thieves are

sophisticated, organized, and generally, not home-grown. often recruited from theUS and trained by Cubans then sent to Florida to establish their operations

Katz vs. U.S.

the "voluntary disclosure" doctrine is highly cited as justification that heightened privacy setting are irrelevant, even if the agent used fictitious accounts to gain access. If a user accepts a friend/social connection through normal means, they no long have protection on what they share w those individuals. DEA and Mall of America learned the hard way.

the 4th amendment

the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated and no warrants shall issue but upon probable cause describing the place to be searched

warrants and probable cause

typically, to obtain a warrant an officer will sign an affidavit stating the facts as to why probable cause exists to arrest someone, conduct a search or seize property. judge issues warrants if they agree that probable cause exists. there are many instances where warrants are not required to arrest or search, such as arrests for felonies witnessed in public by an officer. here is more information on when warrants are not required if a warrantless arrest occurs, probable cause must still be shown after the fact, and will be required in order to prosecute a defendant

OSINT "mindset" information:

unverified data points relating to subject

the more popular insurance fraud scams involves

vehicle crashes that result in both legitimate and fake/exaggerate injuries

workplace violence type 1:

violence acts by criminals who have no other connection w the workplace but enter to commit robbery or another crime 80% the motive is usually theft, and typically the criminal is carrying a fun or other weapon

workplace violence type 3:

violence against coworkers, supervisors, or managers by a present or former employee

workplace violence type 4:

violence committed in the workplace by shoe who doesn't work there, but has a personal relationship with an employee-an abusive spouse or domestic partner

workplace violence type 2:

violence directed at employees by customers, clients, patients, students, inmates, or any others for whom an organization provides services the largest number of type 2 assaults are those in healthcare occupations who deal w psychiatric patients

intro of your report

who you are, what you do, geographical location being used, description of incidents and time and date of occurrences, brief and to the point of what your report will include

once you have the Facebook user ID

you can directly access a profile, even if display names change

what is different about a company/business search

you nee the PageID not ProfileID for a company page


Ensembles d'études connexes

ISDS 3115 - Graded Ch. 1 Homework

View Set

Investments Exam 2- Math from Chapters 5, 7, 8

View Set

comp 285 final exam practice questions

View Set

ACCT 3210: Review Chapter 11: PP&E and Intangible Assets-Utilization and Disposition

View Set

Biology - Chapter 5: Cell Division

View Set

Biochem Chapter 6 (Dont think any are from here)

View Set

Section 4 - Transfer and Recording of Title

View Set

Ch. 21 OSPF Network Types and Neighbors

View Set