ASIS CPP - Investigations P2 Flashcards

(264 cards)

1
Q

An activity, capability or resource that enhances the effectiveness or sufficiency of the investigative function

A

Force Multiplier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 Important force multipliers in investigations

A
  1. Liaison
  2. Online information sources
  3. Intelligence information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Liaison

A
  1. Primarily a proactive medium
  2. Joint Task Forces (JTF’s) represent a highly-structured form of liaison
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sources - Types of Evidence

A

Interviewees or witnesses

Subject-matter experts

Physical evidence

Electronic evidence

Public records

Surveillance results

Open sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the corporate environment, most credible information on losses, sexual harassment and other reportable incidents comes from employee tips

A

Sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which are among the least accurate forms of investigative information?

A

Eyewitness Accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information obtained in undercover operations come from three sources?

A
  1. The operative
  2. Employee (subject( interviews
  3. Witness interviews
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2 Types of witnesses

A

Fact witness

Opinion witness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Investigative objectives tend to be _____ to the short-term expectations of the project?

A

Tactical

Specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Relative to the timeliness of an investigation it is important to

A
  1. Open an investigation as soon as possible
  2. Complete an investigation as quickly as possible
  3. Avoid closing an investigation prematurely
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The most important reasons for beginning an investigation as quickly as possible following the report of an incident or allegation are:

A
  1. The value of physical or electronic evidence diminishes rapidly
  2. Witnesses provide the best information when the incident is fresh in their memory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Formal documentation is among the first things to be neglected when caseloads increase

A

Management Responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Management should consider the purpose of the investigation at the:

A
  1. Case Level: sets the context within which the investigation will be conducted & helps keep focused
  2. Strategic level: Dictates the necessary planning, organizing equipping staffing & preparation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the main objective of Investigator Responsibilities?

A

For any preliminary investigation is to determine what crime or violation exists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Objective

A

Obtain information & evidence to be presented in a factual, final report to senior management can take appropriate action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Legal matters in investigations must be considered for two reasons:

A
  1. Protect the company against liability
  2. Ensure an appropriate conclusion if the case goes to court or another legal forum
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The objective of the Report

A

Enable the reader to readily understand what the investigator did, why, & what resulted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

5 basic steps of report writing

A
  1. Gather facts
  2. Record the facts immediately
  3. Organize the facts
  4. Write the report
  5. Evaluate & edit the report if necessary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Types of Investigative Reports

A
  1. Initial report (soon after the case is opened)
  2. Progress report (normally every 30 days)
  3. Special report (focused on unusual action may be supplemental to the progress report
  4. Final report (most important)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Who is the primary collector of relevant evidence

A

The Investigator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is critical to the credibility of the investigator

A

Preparing for a court appearance or deposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Surveillance can be broken down into three broad categories

A
  1. Physical (i.e. human observation or tracking)
  2. Psychological (i.e. behavioral analysis)
  3. Data (e.g. technical or electronic)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The interview is a process of gathering information

A
  1. “information interview” (non-accusatory) (Deming) or “general interview” (POA)
  2. “Administrative interview” (simple, unstructured, all interviews other than the subject) (Ferrara)
  3. Investigative & behavior - provoking questions to develop information
  4. When the interviewees become a subject target or the accused person in the interview it becomes on interrogation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An interrogation is the questioning of an accused or suspect person

A
  1. “Confrontational interview” (accusatory, highly-structured) (Deming & POA)
  2. “Investigatory interview” (complex, structured process focused on the subject (Ferrara)
  3. A monologue by investigator offering psychological justification) for the wrongful behavior
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Hostages form an emotional bond with their captors
Stockholm Syndrome
26
A persistently-held belief in another person such that the belief becomes reality
Pygmalion Effect
27
Experienced interviewers frequently finish introducing other persons present by inviting them to spend a few minutes with the interviewee
Yes Conditioning
28
"Floating Point" Strategy
1. Continuously re-evaluating a hypothesis as information is obtained allows an investigation to adjust questions accordingly 2. Inexperienced investigators often neglect the skill of listening when interviewing suspects 3. Active listening includes attentiveness, concentration acceptance, detachment and patience 4. Interviewers must be able to assess facts previously established in the light of information provided by the interviewee
29
What is the most prized talent of an investigator?
The ability to obtain information through questioning
30
Skilled interviewers must be:
Patient Persistent Prepared
31
What is the most important factor of a successful interview?
The ability of the interviewer to establish a favorable rapport with the interviewee
32
What sets the tone of the interview?
Demeanor A negative attitude translates into negative results
33
The value of each interview or interrogation is based on...
The investigator's knowledge, skills in eliciting information, and ability to evaluate the veracity of the information obtained
34
Investigations that include searches must comply with what?
The _Fourth Amendment_ to the _US Constitution_
35
An admission obtained by a private citizen who conducts an interrogation in violation of due process but otherwise follows constitutionally prescribed conduct may be admissible
36
The court recognized union employees' rights to representation at investigatory interviews that the employee reasonably believes might result in discipline
The Weingarten Rule
37
In 2000, the NLRB expanded Weingarten & held that the right to representation at investigatory interviews applies equally to union & nonunion employees but then...
In 2004, the NLRB ruled that non-unionized employees are not entitled under Sect. 7 of the NLRA to have a coworker accompany them to an interview with their employer, even if the employee reasonably believes that the interview might result in discipline
38
Interview Planning & Preparation
The most critical preparatory action before an interview is to become thoroughly familiar with the case information
39
Key factors in Interview Planning
Location Time factors Questioning order Questions to ask Persons present
40
The choice of interview site depends on
1. Nature & phase of the investigation 2. The apparent involvement of the interviewee 3. The issue of interviewee confidentiality 4. The desired level of formality
41
Where should uncooperative witnesses be interviewed?
In the security office or interview room
42
Interview Environment
1. The subject should face the interviewer an witness should be seated to the side 2. The interview should not be conducted at a desk or table 3. The distance between the subject and the investigator should be about five feet 4. The subject should always have a clear path to the room's exit 5. Interview only one subject at a time 6. Interviews should be conducted quickly after an event, to capture fresh recollections
43
Priority of Interviews (in order)
1. Persons not likely to be available later 2. Persons believed to have the most pertinent information 3. Persons likely to be hostile 4. The offender or offending group
44
Documenting the Interview
Prepared notes are acceptable if the interviewer does not refer to them regularly during the interview
45
In interviews, the two types of questions generally asked are open & closed
1. To put an interviewee at ease, the beginning of the interview should contain "closed" questions 2. In the primary's phase of an interview a narrative type of questioning should occur ("open"
46
What kind of question allow for an unlimited response from the witness in his or her own words, thereby generating a greater amount of unsolicited information
Open-ended
47
The interviewer should avoid making any promise or guarantee explicit or implied that:
1. Is illegal 2. Cannot be confirmed by the client or senior management 3. Cannot be fulfilled
48
What may invalidate confessions or statements and may call for civil or criminal action
Coercion Duress Psychological constraint Verbal abuse Threats Intimidation
49
What must be understood by the interviewee?
That they are free to leave the interview location
50
Most cases are solved with information developed during interviews and the subsequent efforts to corroborate or disprove interview findings
51
Four formats of a written confession
1. A statement was written by the suspect 2. A statement authored by the interrogator but read & signed by the suspect 3. The statement took down by a secretary or stenographer & transcribed into a typed document for the suspect to read and sign 4. Recorded statement (studio video) by the suspect
52
What must be done for a written statement or confession to be credible & admissible in US Court?
It must be given voluntarily be trustworthy. and include the following essential information
53
What is the best closing strategy for an interview?
Asking if there is anything to add & if he or she be called again
54
Reid Technique - 4 objectives of the interview
1. Obtain valuable facts 2. Eliminate the innocent 3. Identify the guilty 4. Obtain a confession
55
Verbal responses include both spoken words & gestures that serve as word substitutes other verbal cues are
Tone Pitch Speed Clarity
56
Non-verbal Responses Include
Body movements Position changes Gestures Facial expressions Eye contact
57
What is responsible for more than half of the information & meaning of a message communicated ina conversation
Non-verbal Behavior
58
The Truthful Person
1. Makes general sweeping denials 2. Offers unqualified, direct, & spontaneous answers 3. Exhibits a reasonable memory 4. Responds to questions in a rational manner & a clear tone of voice
59
Deceptive Person
1. Offers very specific denials 2. Avoids realistic words 3. Makes seemingly irrelevant comments 4. Gives delayed, evasive, or vague answers 5. Exhibits an unusually poor, selective, or remarkable memory 6. Qualifies answers or uses religion or oaths to support statements 7. Speaks in an irrational fragmented mumbled or subdued manner
60
A Truthful Person
1. Sits upright but not rigid 2. Positions himself or herself in front of the questioner 3. Leans towards the questioner when making a point 4. Appears relaxed & casual
61
A Deceptive Person
1. Slouches or leans back in the chair 2. Sits unnaturally stiffy 3. Sits off to the side, not directly in front of the questioner 4. Pulls elbows close to side arms folded & locked in front with legs crossed 5. Exhibits rapid & erratic posture changes
62
Nonverbal behavior accompanies a deceptive response in an attempt by the guilty suspects to relieve anxiety
1. Distraction behavior 2. Displacement behavior
63
Shifts in body posture, bringing a hand to the face, crossing the arms, etc...
Distraction Behavior
64
Picking the lint off clothing, pacing, repetitious fast movement, etc...
Displacement Behavior
65
No single word or nonverbal behavior automatically means a person is lying or telling the truth
66
Activities suggesting deception
1. Significant posture change 2. Grooming gestures & cosmetic adjustments 3. Supportive gestures
67
Which are a primary source of information & most critical aspect of an investigation?
1. Interviews with victim 2. Witnesses 3. Informants 4. Confidential informants
68
A person who has been involved in a physically debilitating situation should be interviewed briefly on the event's crucial aspects before being allowed to rest
69
A person who is physically debilitated or psychologically stressed should not be subjected to a lengthy interview
70
Who should be questioned as to alcoholic beverages consumed within the last 24 hrs & 95 to any medication taken
The Interviewee
71
The interviewer should begin with broad; general questions & then become more specific
Witness Interviews
72
Several principles underlie the interviewing of a cooperative witness
1. Maintain or reestablish rapport 2. Personalize the interview by treating the witness as an individual 3. State expectations 4. Ask open-ended questions 5. Avoid interruptions 6. Allow pauses
73
Preparation begins long before litigation with an accurate & timely capture of facts & impressions of the incident in a report or notes
74
The testimonial evidence the security professional will be presenting in court is called "parol" or "spoken word" and the attorney will want to make sure it supports the case
75
Produce all tangible evidence
Duces Tectum
76
The legal process, where attorneys and/or judge ask questions to determine candidates' sustainability to be on the jury
Voir dire
77
Theft and Fraud
1. Most frequent & costly forms of dishonesty 2. the most common motivation for an individual to commit an internal theft is one of economics or profit 3. Employees may be an organization's greatest threat second only to competition 4. 30% of business failures result from employee theft with over one half of them failing in the first 3 years of their existence
78
Theft & Fraud
1. Occupational fraud is a growing industry in which most perpetrators are first-time offenders 2. US organizations lose to 6% of their annual revenues to fraud 3. Small businesses suffer disproportionately larger losses than large businesses 4. More than 2 million shoplifter apprehensions are made every year - They are only a fraction of the estimated 200 million annual shoplifting incidents
79
Theft & Fraud (cntd...)
5. Various studies estimate employees steal over a billion dollars a week from their employees 6. Some employees will steel to "the extent the organization will allow" 7. In the retail industry, up to 70% of losses are perpetrated by employees 8. For every dollar lost to shoplifting, employees, steel another $15
80
Theft & Fraud (cntd..)
9. In the foodservice industry, employee theft imposes a 4% tax an every customer dollar spent 10. A serious form of embezzlement in the workplace is fraudulent cash disbursements 11. Employees also steal time
81
Employee Theft & Fraud
Theft on the job is not necessarily correlated to external factors or influences; employees who are satisfied with their jobs are less likely to steel
82
What significantly affects individual employee attitudes toward theft
Peer Pressure & Attitude
83
Theft is usually perpetrated by what kind of employees
Those with Access
84
The greater opportunity for theft the greater the chance it will occur; the greater the chance of detection, the less likely employees will steel
85
Employees who steel...
are frequently involved in another counterproductive workplace activities
86
Red Flags of Employee Theft
1. Secretive relationships 2. Missing documents 3. Indicators of substance abuse 4. Irregular hours of operation or building entry
87
Primary Contributors to Employee Theft
1. Lack of supervision 2. Lack of effective processes
88
Bi-modal Distribution
1. A small number of employees take large amounts of property 2. The vast majority of those who steel take only small amounts
89
Two methods of theft committed by managers
1. Embezzlement 2. Defalcation
90
The fraudulent appropriation of property by a person to whom it is entrusted
Embezzlement
91
Misappropriation of trust funds or money held in a fiduciary capacity
Defalcation
92
Joseph Wells motivations for Fraud
1. Financial pressures (gambling, drugs, living beyond one's means, unexpected medical bills) 2. A desire to be (or appear to be) successful 3. Greed (predominant factor)
93
How is the opportunity for fraud created?
Through the absence or weakness of internal controls
94
Employees involved in theft have usually been involved in other misconduct
95
What is not an insurance against theft?
Tenure
96
Virtually every employee who steals has rationalized his or her dishonesty
97
No theft regardless how minor should be tolerated or ignored
98
Virtually every theft or fraud could have been prevented by better management
99
What are the most common form of workplace embezzlement?
Cash Disbursements
100
Four characteristic principles involved in internal thefts include
1. Diversion: when the money stops being spent in one area of business or on a product; & starts being spent on another 2. Conversion: when someone gives away or sells property that does not belong to them 3. Disguise 4. Divergence
101
The relevant facts or elements of most economic crimes are?
Motive Opportunity Ability (rationalization)
102
Most common rationalizations/myths by employers?
1. Only the needy & greedy steal 2. Good policies & procedures will catch most wrongdoers 3. Audits identify most irregularities 4. Prosecution is an effective deterrent
103
Most fraudsters are influenced by an opportunity to profit & a clear correlation exists between theft & opportunity
Opportunity
104
Employees displeased with their overall employment experience are most often those who engage in theft & other antisocial behavior at work
Job dissatisfaction
105
Employees are greatly influenced by the informal social controls of co-workers such as peer-group gossip, ridicule & ostracism
Social Control
106
Employee situational red flags for fraud
1. High personal debts (medical, gambling, excessive speculation in the stock market, etc.) 2. Poor credit rating or other financial difficulties 3. Living beyond one's means 4. Excessive use of drugs or alcohol 5. Perceived inequities (being passed over for promotion) 6. Previous convictions for fraud or trust violations 7. Low moral character 8. Compulsive behavior
107
Employee opportunity red flags for fraud
1. Position of trust 2. Significant knowledge of key operations 3. Easy rationalization of contradictory behavior 4. Close association with suppliers & contractors over a long period 5. Lax or remote supervision
108
Common elements that must be present in every fraud case
1. Strong financial pressure 2. Opportunity to commit fraud 3. A means of justifying the fraud as appropriate
109
Organization situational red flags for fraud...
- Costs rising faster than revenues (profit squeeze) - Significantly aged or excess inventories - Extremely rapid expansion of overall business or particular lines of business - Constantly operating in a crisis mode - Unrealistic sales quotas or revenue targets - Significant cash flow problems - History of corruption in the company's industry - Stiff competition - Outdating of the company's products or services - A high rate of turnover among key financial positions
110
Organizational opportunity red flags for fraud (cntd...)
- Dominant, hierarchical, & secretive management styles - Unethical management models - Exploitation, abuse, and poor management of employees - Lack of employee training on the relationship between security and business success - Lax enforcement of internal controls - Heavy investments or losses
111
Organization opportunity red flags for fraud
- Line supervisors' failure to develop on the effective loss-prevention environment - Urgent need for favorable earnings - Poor accounting records - Lack of separation of responsibility for ordering and receiving - Domination of operating & financial decisions by a single person - Failure to establish, communicate or enforce a code of business conduct
112
_A comprehensive model of theft & fraud prevention_ Element 1: Prevention Problems *Components of prevention education include:*
1. Process for screening all applicants for past trust violations 2. A code of business conduct that is communicated to employees, vendors & customers 3. Proper accounting practices that record all the financial transactions of the business 4. A clear separation of duties that limits the accessibility to key information that would allow an accounting individual to make changes in master files without someone knowing it
113
_A comprehensive model of theft & fraud prevention_ Element 1: Prevention Problems *Components of prevention education include:*
7. An indicator of the effectiveness of prevention efforts is the quick & accurate reporting of suspected theft & fraud
114
A comprehensive model of theft & fraud prevention Element 2: Incident Element 3: Incident Reporting
- Fostering a culture of integrity & honesty is the best practice - The most ethical organizations (and most successful) regularly & passionately reward employees with recognition & gratitude
115
A comprehensive model of theft & fraud prevention Element 4: Investigation
- Investigations are more successful when investigative roles & responsibilities are clearly defined - The main objective of any preliminary investigation is to determine what crime or violation exists - Under most circumstances, internal thefts & fraud investigations are conducted by in-house or private contractors & not by law enforcement
116
A comprehensive model of theft & fraud prevention Element 5: Action
- Taking immediate action against theft & fraud perpetrators is one of the strongest deterrents to future losses
117
A comprehensive model of theft & fraud prevention Element 6: Resolution
- Although discipline & prosecution can be effective deterrents, nothing makes a point like the payment of restitution by the perpetrator
118
How can organizations better prevent theft & fraud?
Move from a reactive to a proactive approach
119
What is the key to a fraud awareness program?
A continuous, well-developed & well-delivered
120
What type of climate should be maintained?
Trust Honesty Cooperation
121
What will significantly increase the chances of detecting vulnerabilities & systemic gaps before losses occur
Clear organizational policies procedures and practices
122
How can organizations prevent much internal theft & fraud?
Reducing temptation & increasing the probability of detection
123
Employees must feel confident that senior management will do what?
1. Take issues seriously 2. Will act with professionalism & discretion regarding reports made by employees 3. Steadily demonstrate their resolve to handle offenders, properly at all levels of the organization
124
Practices that punish all employees are generally more expensive & hurt employee morale
- Draconian security methods such as searching employees at workplace exits are expensive and hurt employee morale - Demonstrating a sincere appreciation for the individual's contributions to the organization instills a greater sense of ownership and belonging & translate into less workplace theft
125
Policies & work rules must be?
Reasonable Fair Communicated properly Enforced constantly
126
What percentage of employees responsible for 95% of workplace theft should practitioners focus on?
5%
127
What method can be used to deter dishonor employees & empower honest ones?
Anonymous Incident Report Systems
128
More occupational fraud is revealed by _anonymous tips_ provided by _employees_ than by all formal internal audits combined
129
The 3 "shuns"
Termination Prosecution Restitution \*the most difficult but does the victim the most good
130
Two prominent theories of white-collar crime
Differential accusation theory Non-shareable need theory
131
Differential Association Theory
- Edwin Sutherland - Criminal behavior is most often correlated with an individual's association with a criminal environment; people who frequently associate with individuals who have criminal tendencies become criminals as a result of those relationships - Criminal behavior is not inherited but learned through other people by example & verbal communications - Individuals also learn incentives, rationalization & attitudes associated with particular crimes - Individuals learn the psychological machinations needed to commit a crime & justify it (rationalize)
132
Non-shareable Need Theory
- Donal Crossey - Defined as a violation of a position of financial trust - Trusted persons become trust violators when they visualize themselves having non-shareable financial problems & feel they can resolve the problems by violating their position of trust
133
Non-shareable Need Theory 3 elements must be present before a fraud or similar crime can take place
1. The perception of a non-shareable problem 2. Opportunity for a trust violation 3. Series of rationalizations that allow the individual to justify his or her behavior as appropriate for the situation
134
A compliance program should be built on?
Clear corporate policy
135
_Purpose of a compliance program_ Protect the organization against?
1. Violation 2. Lapses in business ethics 3. Concomitant legal sanction
136
An effective program encourages
Enforcement Monitoring Employee Training
137
What is a key element of any compliance program?
An effective reporting mechanism
138
Main categories of crime relevant to asset protection
- Crimes based on unauthorized entry or presence - Crimes based on theft - Crimes based on force or threats of force against people - Crimes based on damage or threats of damage to property - Computer-related crimes - Environmental crimes
139
The ultimate guide to what constitutes criminal conduct is **_the statutory language that describes the prohibited conduct_**
140
A misdemeanor or felony
Crime
141
An offense other than traffic violations that may include a sentence of 15 days to 1 yr.
Misdemeanor
142
An offense for which a sentence to a term of imprisonment in excess of one year may be imposed
Felony
143
Conduct punishable by a sentence to a term of imprisonment or to a fine as provided by a law
Offense
144
Criminal laws are based on a concept that prohibited conduct **_is a wrong against the general public, not merely a wrong against a particular person_**
145
What undermines the intent of criminal laws?
Treating crimes as though they affect only the parties involved - and not the whole community
146
What describes the state of mind or wrongful purpose required by criminal laws?
Mens rea (guilty mind)
147
What is an exception to "mens rea" requiring only negligent behavior that results in criminal inquiry without intent?
Criminal Negligence
148
The guilty act itself?
"Actus reus"
149
What are also an exception to Mens rea requiring the only completion of the criminal act?
Strict Liability
150
Two categories of sources of legal information
Primary source Secondary source
151
In-state or federal statute or case (a strong source of information)
Primary source
152
Another state's or jurisdiction statute case or legal journal (should not be relied upon formally)
Secondary source
153
What should be the last resource of legal review?
Trade Journals
154
The main body of criminal law is codified in?
Title 18 of the USC
155
An action of a legislative body that becomes a law when it is approved by the executive branch in the manner required by the constitution
Statutory Law
156
**_Acts**_ or _**omissions_** are frequently defined as criminal even if they are not specifically included in the criminal sections of any statutory code
157
Laws passed by cities, towns, & villages that are not generally referred to as statutes because the local level of government is not sovereign
Ordinances
158
Cases decided by the appellate courts of a state or federal jurisdiction
Case Law
159
Instances of litigation (civil) or prosecution (criminal) handled by a district court are **_rarely used to proffer a legal argument and are considered merely persuasive_**
160
The following of prior case law in a jurisdiction
Precedent or the Principle of **"Stare Decisis"**
161
Cases overturned or "distinguished"
**_Determined_** not to apply to a particular case even if **_similar_**
162
US Constitution
- Basic document for US law - Defines federal government & its branches & powers - Grants the power to make laws to the legislative branch - Article VI is the "supremacy clause" which makes laws under the US Constitution "the supreme law of the land" - The US Constitution is the basis on which states & their citizens define the rights & duties at the government & the people - Constitutional safeguards protect citizens from the government but not from other private citizens
163
The trespassing & asportation, obtaining or withholding of property belonging to another with the intent to permanently deprive the owner of the use & benefit of such property or to appropriate the property to the taker or some third party
Theft
164
To establish that a burglary has been committed one must prove that
1. The accused knew or should have known he did not have authority to be in the locale 2. The intent to commit a crime in connection with the unlawful presence or entry
165
The taking of property through the use of force or threat of force
Robbery
166
_Shoplifting_ In practice security personnel should apprehend a suspect **_as soon as he/she passes the designated payment or checkout area;_** apprehending a suspect off company property may be dangerous
167
_Federal Criminal Sentencing Guidelines_ Require convicted companies make restitution to injured parties & pay a non-tax deductible fee
168
"Let the master answer" - A common-law doctrine holding an employer liable for an employee's acts that are within the scope of employment
Respondeat Superior
169
Any unauthorized listening whether done in person or by means of electronic or other equipment
Eavesdropping
170
Title 3 of the Omnibus Crime Control & Safe Streets Act
- Authorizes law enforcement of electronic surveillance - Safeguards wire & oral communications - Prohibits private possession/use of surveillence equipment - Creates acceptable uniform circumstance for electrical surveillance - Sets constitutionally acceptable procedures for government surveillance
171
_Electronic Communications Privacy Act_ Extends Title III protection to cell phones, fiber, teleconferencing, voicemail, email, encrypted transmission & most pagers
172
Allows government surveillance in the interest of national security
Foreign Surveillance Act
173
Categories of computer-related crimes
The computer itself is targeted The computer is used to facilitate a traditional crime The computer is used as a storage device in the criminal activity
174
Resource Conservation & Recovery Act 1976
First attempt to regulate the disposal of toxic waste
175
Comprehensive Environmental Response Compensation & Liability Act (CERCLA)
Establishes crime liability for failure to report the release of a hazardous substance
176
_Economic Espionage Act (1996)_ All forms and types of business, technical, or economic information, tangible or intangible no matter how stored or compiled if: **-****The owner thereof has taken reasonable measures to keep such information a secret** **- The information derives independent economic value actual or potential from not being generally known to & not being readily ascertainable through proper means**
Trade Secret
177
Provides criminal penalties for "controlling persons" in corporations under certain conditions - Applies to any company having a class of securities registered pursuant to section 12 of the Securities Exchange Act of 1934 - Also applies to any company required to file reports pursuant to Section 15(d) of the Securities Exchange Act of 1934
**_Foreign Corrupt Practices Act (FCPA)_**
178
Makes it a criminal offense to offer a bribe to a foreign official to obtain or retain business
FCPA
179
**Intention to take the person into custody** - Through actual or constructive seizure or detention - With the understanding of the arrestee that he is arrested
Elements of an Arrest
180
An arrest can be made under these conditions
- Pursuant to federal or state law - With or without a warrant - By police, peace, officer, & private citizen
181
A judicial process issued upon probate cause authorizing or commanding an act
Warrant
182
Authorizes the taking into custody of the named person
Arrest Warrant
183
Authorizes the search of the named place under the conditions imposed
Search Warrant
184
In what way does the criminal law require statements be made by persons against their own interest?
Voluntary
185
An arrest without a warrant can be made by **a police officer or a private person according to state law**
186
- May arrest without a warrant with reasonable cause to believe the person committed an offense - With reasonable cause, the police officer will not be held liable for the arrest
Police Officers
187
- Citizens' arrest authority is limited to: - Any crime committed in the presence of the arrested person - A felony even if not committed in that person's presence
Private Person
188
Private Person
- A security officer could be subject to civil damages if he apprehends the wrong person - The arrested person must be taken "without unnecessary or unreasonable delay" before a court, judge, or police officer \*Failure to do so risks civil damages & criminal charges if force or threat of force was used
189
- The security officer **_must have authority to make the arrest_** & the person to be arrested must be made aware \* A lack of arrest authority (i.e.. no crime or wrong person) his actions may constitute a fake arrest or assault
190
A person who is ***unlawfully arrested*** can resist with all reasonable force
191
If a subject is killed int he process of an arrest, the officer may be guilty of **_manslaughter or murder_**
192
Private individuals who hold a valid police officer appointment & who make an arrest without a warrant **_(pursuant to the appointment) are protected as police officers_**
193
The inducement by an LEO of a person not otherwise disposed to do so, to commit a crime for the purpose of persecuting him
Entrapment
194
_Entrapment_
- Common (case) law for federal & some states; statutes in other states - Entrapment cannot result from a private person unless acting with law enforcement (in some states) - Conduct not constituting entrapment under the common law might still be considered a criminal act - The mere act of giving another the opportunity to commit an offense is neither facilitation nor solicitation nor is it entrapment under current common law
195
Procuring another to commit a crime
Criminal Solicitation
196
Rendering aid to another with the knowledge it is in aid of the commission of an offense
Criminal Facilitation
197
The 4th Amendment
- Prohibits unreasonable searches - Does not apply to searches by private persons - A warrantless search incidental to arrest is authorized but cannot extend beyond the immediate area
198
Alternatives for when an employee is suspected of concealing evidence
1. Arrest the employee on the charge of the crime 2. Permit the employee to leave but file a criminal complaint with the police 3. Take disciplinary action against the employee \* if doubtful a combo of the 2nd & 3rd alternatives might be wiser than a citizen's arrest
199
Conditions of searches in private organizations
- Searches or inspections are consented to - Searches or inspections are made conditions of employment - Searches or inspections are not conducted in areas where the employee was given sole & exclusive right of possession & maintains a reasonable expectation of privacy, such as with a private locker or desk
200
In federal matters, the request to the grand jury is made by who?
US Attorney or Assistant US Attorney
201
In state actions, who makes the request or issues an "information"
US Attorney General US Asst. Attorney General District Attorney County Attorney Special Prosecutor
202
_Use of Force_ Reasonably necessary force is generally allowed in?
- Defense of oneself or others - To restrain others who one believes are about to commit suicide or do themselves serious harm - To correct a minor (if a parent or guardian has the authority to do so) - By a police officer or person directed by an officer to assist, or a private citizen to arrest or prevent escape of a criminal
203
The permissible use of force varies jurisdiction to jurisdiction
204
Generally, deadly force can only be used when?
- Fear of one's own life (where simply debilitating the offender is not an option) - Some jurisdictions require the attack or threat of attack be actual - Some jurisdictions require only a reasonable belief such an attack is occurring or threatened - Prevention of a crime involving deadly weapons or the apprehension of a criminal with a deadly weapon
205
When using force in defense of another, some jurisdictions **require that the defended person be authorized to use force to defend himself or herself in such cases the defender acts at his or her own peril**
206
The general rule is that a lawful occupant or an individual in charge of premises may use an amount of force reasonably necessary (but not deadly force) in preventing or terminating a perceived criminal trespass
Defense of Premises
207
What are the two functions of locks alarms warning notices and other security measures?
1. Serve as deterrents 2. Provide a basis for appropriately invoking criminal sanctions against aggressors by security personnel acting in good faith
208
Administrative law is an application of?
Civil Law
209
Relates to functions powers and procedures of government administrative agencies and departments
Administrative Law
210
Administrative law focuses on how government agencies do what?
Carry out assigned tasks under constitutions and statutes
211
A government agency has an administrative role if it has the authority to?
- Make determinations affecting private rights, especially the power to make rules - Adjudicate cases - Conduct investigations - Issue, suspend, revoke licenses - Institute prosecutions
212
Administrative law is not a separate category of law but rather what?
The application of statutory civil law to government agencies
213
Actions of government must meet minimum standards of **_Constitutional due process_**
214
Government agencies that have access to, or distribute public information related to privacy, rulemaking, investigations, subpoenas, reports, inspections, hearings and informal reviews, licenses adjudications & judicial reviews **_(oversight of agency actions by the courts)_**
Administrative Procedures Act (APA)
215
Congress establishes, modifies & terminates agencies; which branch appoints key personnel?
Executive
216
In day-to-day activities, promulgation of rules & investigations _agencies have very broad independence_
217
An independent agency has the power to determine private rights through?
Rule-making Investigations Prosecution Licensing Other informal actions
218
Freedom of Information Act (FOIA) 1966
- An amendment to the APA - Deals with the release & disclosure of certain kinds of information by the Federal Governemnt
219
the FOIA requires federal agencies to disseminate & disclose information about their activities & proceedings
- By publication in the Federal Register - Distribution of material for public inspection & copying
220
Broad exemptions to the "Disclosure Rule"
- National security information - Internal (agency) personnel rules & practices - Information specifically exempted by statute - Trade secrets & confidential commercial or financial information
221
The courts have required that in addition to being confidential, there must be a **showing of an adverse effect on future government cooperation and a showing that disclosure will have an unfavorable & substantial impact on a party's competitive position**
222
A promise by a government agency, not to disclose information may not prevent later disclosure, by that agency or another
223
Exemptions to the Disclosure Rule
- Interagency & agency internal communication not normally available to parties in litigation with the agency - Personnel, medical, and personal records - Financial institutions information - financial institutions & agencies that regulate banks
224
Exemptions to the disclosure rule
- Geological information - Investigation records if it would: interfere with enforcement proceedings, deny a fair hearing to any party, or amount to an invasion of personal privacy - Disclose investigative techniques - Endanger the safety of LE personnel
225
Health Insurance Portability & Accountability Act HIPPA
Encouraged health care providers to engage in electronic transactions & required new safeguards to protect the security & confidentiality of the transactional information
226
HIPPA
- Covers health care entities that conduct certain financial & administrative transactions electronically - Covers all medical records & health information used or disclosed by a covered entity, in any form
227
HIPAA Covered entities generally must...
1. Adopt written privacy procedures concerning who has access to protected information how it is used, & when it is disclosed 2. Train employees on privacy procedures, and designate an individual responsible for ensuring the procedures are followed
228
HIPPA is enforced by the HHS Office for Civil Rights (OCR)
229
What is the main purpose of the Privacy Act?
Allow citizens to access information held by federal agencies about themselves
230
Privacy Act applies only to federal agencies & not to the private sector
231
Privacy Act provides following right & remedies
- Notice to and comment from the individual before disclosure by the agency (ten exceptions exist) - A lawful FOIA application may require disclosure - Right to access one's own record & request justifiable amendments - Right to civil damages if intentional improper disclosure caused injury
232
Civil Law
- Deals with private rights & remedies - Primarily establishes and adjudicates rights among private persons, both individual & corporate - Civil rights involve statutory law, rather than common law - 50 titles in the U.S.C. Title 18 is criminal law - others are primarily civil - There is greater diversity in state's civil state law then criminal
233
Categories of Civil Law
- Statutory Law - Common Law \* Contract common law \* Tort Common law
234
What do Federal & State Bills of Rights protect citizens from?
Other Citizens
235
Civil Law
- The number of subjects dealt with in civil law is much great - The subjects of civil law developed & containing the most legislation are usually the subjects related to a state's economic center
236
Common Law
When a federal court hears a common law dispute it applies the same legal principles applicable to state law at the same location
237
Terms & conditions expressed in words
Express Contracts
238
Terms & conditions not stated in words; based on the parties really intending the terms
Implied Contract
239
Imposes an obligation on someone who has benefited from an act or lack of an act, for another
Implied in Law
240
Based on parties' conduct even without formal words, but not if some critical term is unstated
Implied in Fact
241
The value of a product or service, determined by a court, when it is disputed in an implied contract
Implied Reasonable Value
242
Liability for the acts of another without personal fault of the one liable
Vicarious Liability
243
If several parties have been jointly negligent but the judgment was against only one; that party is entitled to a proportionate contribution from the others
Contribution \*Might be prevented by a "hold-harmless" or "indemnification" in a contract
244
For an employer to be liable for its employee (agency relationship-vicarious liability)
The employee must have acted within the scope of his duties
245
Depending on the circumstances of the action taken while performing duties for a private employer; a law enforcement officer may be:
- Within the scope of employment of the LEA - Within the scope of employment of the private employer - Outside the scope of employment of either
246
A willful or negligent wrong done to one person by another
Tort
247
Unlike contract injuries, torts do not require any agreement between the parties & in cases of negligence may not depend on the intentions of the parties
248
One in which the actor intends the consequence's of the act or to do the act resulting in injury
Willful Tort
249
The failure to use reasonable care & due diligence under the particular circumstances as a result of which another is injured or suffers some damage
Negligence
250
Negligence does not require intent, even an intent to be negligent - rather it is the absence of an attitude or intent - to be duly careful - that characterizes negligence
251
Negligence so gross or reckless as to be tantamount to acting with total disregard for the consequences of the action is sometimes held to be similar to an intentional wrong and may lead to heavier liability on the part of the negligent person
252
Exemplary or punitive damages may be awarded multiplied by a factor of the actual damages to dissuade the negligent party from similar future behavior
253
Examples of Torts The actual use of force against another involves physical touching
Battery
254
Examples of Tort Putting another in fear that force will be used against him or her; do not involve physical contact
Assault
255
Deprivation of another's liberty or freedom which may involve actual physical restraint and may involve intimidation that physical force will be used if an escape is attempted
False Imprisonment
256
Wrongful appropriation of the personal property of another or exercise of dominion by the converter over the personal property of another in a way inconsistent with rightful owner's interest
Conversion
257
Use of a trick, device, false scheme, or other deception that causes another to suffer loss because of reliance on the one committing the fraud
Fraud or Misrepresentation
258
Behavior that results in annoying unwholesome or destructive conditions or produces substantial interference with another's use or enjoyment of his property
Nuisance
259
Damaging untrue oral (slanderous) & written (libelous) statements
Defamation
260
The truth of a statement is generally an adequate defense to an action of defamation
261
Occurs when without justification or proper cause there is - Intrusion into secret affairs of another - Disclosure of such affairs - Placing of another in a false public light - The appropriation of some private or secret aspect of another for the commercial use
Invasion of Privacy
262
Federal Tort Claims Act (FTCA) Allows individuals to recover from the US for property damage, personal injury, & wrongful death caused by the negligence of a federal employee
FTCA
263
The government is liable if a law enforcement officer commits assault, battery, false imprisonment, false arrest, abuse of process or malicious prosecution
264
The government is not liable if the claim against LEO is for libel, slander, misrepresentation, deceit or interference with contract