You are on page 1of 1

CHAPTER 7

Investigating Theft Acts

LEARNING OBJECTIVES TO THE STUDENT

After studying this chapter, you should be able to: Investigation is one of the
most interesting facets of be-
• Discuss theft investigation methods and how they are used to investigate suspected
ing a fraud investigator. This
fraud.
chapter introduces you to
• Understand how to coordinate an investigation, using a vulnerability chart. the different methods used
• Describe the nature of surveillance and covert operations. for investigation, from sur-
veillance to invigilation to
• Understand the effectiveness of invigilation to investigate fraud. electronic and computer
• Explain how to obtain physical evidence and how it can be used in a fraud searches. As you read the
investigation. chapter, think of where each
method would be most use-
• Understand how to seize and analyze electronic information from cell phones, hard
ful, and consider the skills
drives, e-mail, and other sources.
you need to master each
one.

209
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

You might also like