Data Analysis Techniques:
Investigative Methods:
Theft Investigative Methods
Concealment Investigative Methods
Conversion Investigative Methods
Inquiry Investigative Methods
Four steps to seizing and searching computers:
Methods for obtaining documentary evidence:
Rules to follow regarding documentary evidence:
What type of information do credit reporting agencies maintain?
vulnerability chart:
a tool that explicitly considers all aspects of the fraud.
theft act investigation:
activities that directly investigate the fraud act
surveillance:
watching or recording the physical facts, acts, and movements, which are part of the theft act of a fraud
invigilation:
a theft act investigative technique that involves close supervision of suspects during an examination period.
computer forensics:
gathering of electronic evidence
document examination:
a specialized form of investigation that applies forensic chemistry, microscopy, light, and photography in making determinations about documents.
postal inspectors:
investigators who handle major fraud cases involving the use of mail, and they work for the prosecution of offenders who violate postal laws.
opting out:
sending written notice to the bank denying the bank the right to sell someone’s personal bank information.