Asset Protection ch. 14, Asset Protection Ch. 13, Asset Protection CH.11, Asset Protection Ch. 12
The two major federal agencies charged with homeland security are the U.S. Department of Homeland Security and the:
FBI
The computer maker _____ was accused of using illegal methods to obtain phone records of board members.
HP
Many private firms also are involved in information sharing through:
Information Sharing and Analysis Centers
A professional trade association for private investigators is:
NAIS
In 2002, as a result of numerous corporate financial scandals in the past decade, congress passed this act to protect investors.
Sarbanes-Oxley Act
A convoy is a deliberate attempt to evade surveillance and usually occurs when the subject feels they may be followed.
True
Bioterrorism involves such weapons of mass destruction as anthrax, botulism and smallpox.
True
Eco-terrorism is an attempt to inflict economic damage to those who profit from the destruction of the natural environment.
True
Homeland Security is concerned with defensive efforts within the borders of the U.S.
True
Surveillance is used in many private security non-criminal investigations such as domestic/marital and child custody.
True
A fictitious personal history is also known as:
a cover story
Most proprietary security investigations are conducted by contract security firms.
false
Special investigative units (SIU's) have been established by the FBI to investigate fraud.
false
Some high-profile U.S. religious facilities or symbols have added:
security directors
In _____, the investigator generally watches a particular house or building to see who enters and leaves.
stationary surveillance
In a covert operation, the individual who is being observed or tracked is the:
subject
The terms "rough tail," "loose tail," "close tail," or "tight tail," all refers to what?
surveillance
Written notes are essential in:
surveillance
When a company goes through a meeting area looking for electronic devices to prevent eavesdropping, the company is:
sweeping
The private security industry, in addition to providing vital protection services for corporations, is also used by:
the U.S. Military
If an investigator is assuming a role and identity that could be checked through examination of records, those records should be placed at:
the personnel office
ASIS offers professional certification and credentialing for private investigators through its Crime and Loss Prevention Program.
true
GPS is a network of twenty-four satellites that are used originally to pinpoint targets and guide bombs. These satellites are equipped with atomic clocks and equally accurate position-measuring telemetry gear. What agency has oversight over them?
DOD: Department of Defense
A common mistake in maintaining surveillances is to make the assumption that a subject has entered a store mall and will leave by another exit.
False
Although the response to terrorism by the federal government is crucial, when an act of terrorism occurs it is a local problem.
False
If a surveillant has good reason to believe she has been "made" she should continue the surveillance at a greater distance.
False
If the surveillance could involve following a person on foot, the surveillant should have a credit card to pay for items and transportation.
False
In using an automobile for surveillance it should be a distinctive and costly vehicle because the subject would not assume that an investigator would use such a vehicle.
False
Most of the time it is not necessary to utilize a cover story because a good investigator does not get that close to the subject of the investigation.
False
Terrorism is a new concept in world history which makes it difficult to devise plans to thwart it.
False
The Office of Inspector General serves as an independent and subjective inspection, audit, and investigative body.
False
The private investigator should never notify local police so they do not have their cover blown.
False
The two major federal agencies charged with homeland security are the U.S. Department of Homeland Security and the Department of Defense.
False
The word covert means unable to detect or locate.
False
Agroterrorism is a threat directed at what group or product within the United States?
Farmers and livestock/food supply
This agency is an excellent source for insurance fraud investigations because it provides investigative services for insurers and law enforcement agencies to stop those committing insurance fraud.
National Insurance Crime Bureau (NICB)
Even the _____ relies on private security companies to perform crucial jobs formerly entrusted to the military in the Middle East.
Pentagon
One of the largest contract security investigation companies is:
Pinkerton Consulting and Investigation
_____ is the covert observation of places, persons and vehicles for the purpose of obtaining information.
Surveillance
_____ allows us to see not only through darkness but also through fog, mist, and smoke. It is especially useful in penetrating many types of camouflaging.
Thermal imaging
While you are pretending to be somebody else, you must override your natural inclinations for:
associations
If an undercover investigator's true identity becomes known, s/he was:
burned
What type of fraud involves setting up a fake or ghost operation to qualify for card reader installation and use stolen data to make purchases over the Internet?
card-not-present fraud
Most of the academic study of homeland security has focused on the government, but the 9/11 commission confirmed this area would most likely be the primary target of terrorism in the future:
civilians
What type of security service is being utilized when the security personnel are not employees of the corporation but provide security for the organization?
contract
This is a deliberate attempt to evade surveillance and often involves prior knowledge that surveillance will occur.
convoy
This is defined by the FBI as terrorism that initiates, or threatens to initiate, the exploitation of or attack on information systems.
cyberterrorism
A common mistake in maintaining surveillances is to make the assumption that a subject has entered a store mall and will leave by another exit.
false
If a surveillant has good reason to believe she has been "made" she should continue the surveillance at a greater distance.
false
In most stationary surveillance cases it would be cost effective to rent a house or an apartment to conduct the surveillance so you can maintain constant observation.
false
In using an automobile for surveillance it should be a distinctive and costly vehicle because the subject would not assume that an investigator would use such a vehicle.
false
Most large corporations and businesses contract out their security services because it is cost effective.
false
Most private investigators are required to be licensed by the federal government.
false
The word covert means unable to detect or locate.
false
Financial-market analysts have commented that this segment of our economy is the fastest growing investment in our life-time:
homeland security
This term was used after 9/11 to describe defensive efforts within the borders of the United States.
homeland security
The Department of Homeland Security provides lucrative opportunities for technology companies to develop and sell:
homeland security technologies
A type of business fraud is the theft of these rights, including counterfeiting, which can cost the company millions of dollars.
intellectual property rights
In 2004 the National Counterterrorism Center (NCTC) was created to serve as the primary organization in the U.S. government for integrating and analyzing all:
intelligence
When doing automobile surveillance, it is preferable to have more than one vehicle so the cars can change positions often. This is referred to as?
leapfrog
What is one major problem in working undercover which can have a negative impact on the individual's life if they do not know how to handle it?
living a lie
If information needs to be delivered in writing, the undercover investigator should have these prearranged to allow for the dissemination of information?
mail drops
According to The Economist, in 2006, private security companies had grown into the 2nd largest _____ in Iraq.
military contingent
The quickest way to be identified as a law enforcement officer is to:
move too fast
Private security firms often offer this service to prospective business clients to test the efficiency of the retail operations staff?
mystery shoppers
The Graham-Leach-Bliley Act was passed in 2002 to prohibit any person from _____ financial information by making false statements to a financial institution.
obtaining
Although companies that are used to assist the military abroad are called private security companies, some are being referred to as _____ because they are replacing governmental troops.
paramilitary
Effective surveillance takes not only skill but also:
preparation
What is the form of trickery in which an individual calls a bank or phone company and claim to be the customer whose records they are seeking?
pretexting
The Gramm-Leach-Bliley Act was passed by congress in 2002 to _____ any person from obtaining financial information by making false, fictitious, or fraudulent statements to a bank or other financial institution.
prohibit
Most large corporations and businesses use what type of security services?
proprietary
DHS, in order to detect biological, radiation, bioagents, well as radiological and nuclear threats, are seeking:
refined sensor technology
With religious hostilities more evident since 9/11 and fears of violent attacks on houses of worship, some high profile U.S. religious facilities or symbols have added this role to their staff:
security director positions
A one- person tail, also known as a _____, is the least desirable way of following someone on foot.
shadow
Private investigating firms offer _____ to protective clients, to allow honest employees to report wrongdoings in the work place.
silent witness program
Some military leaders, however, are complaining that the lure of these salaries is:
siphoning away some of their most experienced special operations people at the very time their services are most in demand
In vehicle accident cases the investigators are trained to conduct accident reconstruction to aid their clients.
true
Investigators are hired to find people who are missing, have dropped out of sight or are trying to hide.
true
One of the largest contracting security investigation companies is Pinkerton Consulting and Investigation.
true
Very often private sector investigators are hired by companies as consultants for their company's security procedures and plans.
true
This may be defined as a form of investigation in which the investigator assumes a new identity in order to obtain information.
undercover operation
These surveillance tools can be equipped with cameras to transmit live video feeds to agents on the ground, miles away.
unmanned aerial vehicles (UAV's)
The Insurance Information Institute allows consumers to obtain information on:
various types of insurance
When tracking a subject it may be necessary to utilize these systems to allow you to maintain contact with the subject's vehicle.
vehicle tracking system