Free Essay

Bus Radio Theft Investigation, University of Phoenix

In:

Submitted By MaryHaw
Words 255
Pages 2
University of Phoenix

SEC430 - Principles of Investigation

Bus Radio Theft Investigation

This paper discusses the bus theft investigation scenario from the simulation web link. This work will describe documents, interviews, direct observations, and tactics for conducting the investigation. The questions asked, technological tools, and documentation will also be described.

During the last three years there have been thefts of radios from buses in the Kellsey Unified School District vehicle yard. Most of the thefts occur one to three weeks after installation of the radios.

Interviews included the security guard, Suley Smiley. He stated that he was on duty but did not see anything. Earl Folley the transportation director said that he was just dropping off his wife.

Documentation included the footprint on bus 19. The footprint was photographed and documented in the notes in case it matches the foot of a future suspect. The area near where the radio was taken from bus 19 was also photographed and fingerprinted.

Technological tools included photography and fingerprinting on bus 19. In practice an investigator would likely take pen and paper notes then probably use a computer to author final reports. In practice an investigator might also use a recording device to preserve witness statements.

Other sources of information might include employee personnel files and background checks. The files and the checks might reveal persons who have a history of criminal behavior.

The bus theft investigation included documents, interviews, direct observations and investigative tactics for solving the crime. Continued investigation is needed to help solve the case.

Similar Documents

Premium Essay

Scanning Applications

...U.S. Department of Justice Federal Bureau of Investigation 2012 The Strategic Information and Operations Center at FBI Headquarters is the 24/7 command post that monitors FBI operations and law enforcement activities around the globe. An FBI agent examines a potentially contaminated letter during a white powder training exercise. 2012 The FBI Story I A Message from FBI Director Robert S. Mueller, III For the FBI and its partners, 2012 was a year that reminded us once again of the seriousness of the security threats facing our nation. During the year, extremists plotted to attack—unsuccessfully, thanks to the work of our Joint Terrorism Task Forces—the U.S. Capitol, the New York Federal Reserve Bank, and other landmarks on U.S. soil. Tragically, on the 11th anniversary of 9/11, a hateful attack in Benghazi took the lives of the U.S. Ambassador to Libya and three other Americans. In the cyber realm, a rising tide of hackers took electronic aim at global cyber infrastructure, causing untold damages. High-dollar white-collar crimes of all kinds also continued to siphon significant sums from the pocketbooks of consumers. And in Newtown, Connecticut, 20 young children and six adults lost their lives in one of the worst mass shootings in American history, ending a year of violence that saw similar tragedies around the country. Working with its colleagues around the globe, the FBI is committed to taking a leadership role in protecting the nation. As you can see from...

Words: 67387 - Pages: 270

Premium Essay

Research

...Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States SEVENTH EDITION Data Communications and Computer Networks A Business User’s Approach Curt M. White DePaul University Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Data Communications and Computer Networks: A Business User’s Approach, Seventh Edition Curt M. White Editor-In-Chief: Joe Sabatino Senior Acquisitions Editor: Charles McCormick, Jr. Senior Product Manager: Kate Mason Editorial Assistant: Courtney Bavaro Marketing Director: Keri Witman Marketing Manager: Adam Marsh Senior Marketing Communications Manager: Libby Shipp Marketing Coordinator: Suellen Ruttkay Media Editor: Chris Valentine Art and Cover Direction, Production Management, and Composition: PreMediaGlobal Cover Credit: © Masterfile Royalty Free Manufacturing Coordinator: Julio Esperas © 2013 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means—graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act—without the prior written permission of the publisher. For product information and technology assistance...

Words: 234459 - Pages: 938

Premium Essay

Ethics

...ETHICS IN INFORMATION TECHNOLOGY Third Edition This page intentionally left blank ETHICS IN INFORMATION TECHNOLOGY Third Edition George W. Reynolds Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Ethics in Information Technology, Third Edition by George W. Reynolds VP/Editorial Director: Jack Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick Jr. Senior Product Manager: Kate Hennessy Mason Development Editor: Mary Pat Shaffer Editorial Assistant: Nora Heink Marketing Manager: Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission...

Words: 204343 - Pages: 818

Premium Essay

Management Information Systems

...Course Technology’s Management Information Systems Instructor and Student Resources Introduction to IS/MIS Principles of Information Systems, Eighth Edition • Stair, Reynolds Fundamentals of Information Systems, Fourth Edition • Stair, Reynolds Management Information Systems, Sixth Edition • Oz Information Technology in Theory • Aksoy, DeNardis Office Applications in Business Problem-Solving Cases in Microsoft Access & Excel, Sixth Annual Edition • Brady, Monk Succeeding in Business Applications with Microsoft Office 2007 • Bast, Gross, Akaiwa, Flynn, et.al Succeeding in Business with Microsoft Office Excel 2007 • Gross, Akaiwa, Nordquist Succeeding in Business with Microsoft Office Access 2007 • Bast, Cygman, Flynn, Tidwell Databases Database Systems, Eighth Edition • Rob, Coronel Concepts of Database Management, Sixth Edition • Pratt, Adamski Data Modeling and Database Design • Umanath, Scamell A Guide to SQL, Seventh Edition • Pratt A Guide to MySQL • Pratt, Last Guide to Oracle 10g • Morrison, Morrison, Conrad Oracle 10g Titles Oracle9i Titles Enterprise Resource Planning Concepts in Enterprise Resource Planning, Third Edition • Monk, Wagner Data Communications Data Communications and Computer Networks: A Business User’s Approach, Fourth Edition • White Systems Analysis and Design Systems Analysis and Design in a Changing World, Fifth Edition • Satzinger, Jackson, Burd Object-Oriented Analysis and Design with the Unified Process • Satzinger, Jackson, Burd Systems Analysis and...

Words: 223685 - Pages: 895

Premium Essay

Pr Cases

...organizations Public relations support for international branding and market entry The importance of internal communications during international mergers The integration of public relations and marketing communications Business-to-business communication The cases examined in this book demonstrate the breadth of contemporary public relations practice and the increasing importance of the public relations function in both public and private sector organizations worldwide. Danny Moss is Co-Director of the Centre for Corporate and Public Affairs at the Manchester Metropolitan University, and Course Leader for the University’s Master’s Degree in Public Relations. His previous publications include Perspectives on Public Relations Research (1999), co-edited with Dejan Vercic and Gary Warnaby, also published by Routledge. Barbara DeSanto is Assistant Professor at the School of Journalism and Broadcasting, Oklahoma State University, where she teaches graduate and...

Words: 107599 - Pages: 431

Premium Essay

Integrated Marketing Communications

...Advertising, Promotion, and other aspects of Integrated Marketing Communications Terence A. Shimp University of South Carolina Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Advertising, Promotion, & Other Aspects of Integrated Marketing Communications, 8e Terence A. Shimp Vice President of Editorial, Business: Jack W. Calhoun Vice President/Editor-in-Chief: Melissa S. Acuna Acquisitions Editor: Mike Roche Sr. Developmental Editor: Susanna C. Smart Marketing Manager: Mike Aliscad Content Project Manager: Corey Geissler Media Editor: John Rich Production Technology Analyst: Emily Gross Frontlist Buyer, Manufacturing: Diane Gibbons Production Service: PrePressPMG Sr. Art Director: Stacy Shirley Internal Designer: Chris Miller/cmiller design Cover Designer: Chris Miller/cmiller design Cover Image: Getty Images/The Image Bank Permission Aquistion Manager/Photo: Deanna Ettinger Permission Aquistion Manager/Text: Mardell Glinski Schultz © 2010, 2007 South-Western, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright hereon may be reproduced or used in any form or by any means—graphic, electronic, or mechanical, including photocopying, recording, taping, Web distribution, information storage and retrieval systems, or in any other manner—except as may be permitted by the license terms herein. For product information and technology assistance, contact us at Cengage Learning Customer &...

Words: 219845 - Pages: 880

Premium Essay

Managing Information Technology (7th Edition)

...CONTENTS: CASE STUDIES CASE STUDY 1 Midsouth Chamber of Commerce (A): The Role of the Operating Manager in Information Systems CASE STUDY I-1 IMT Custom Machine Company, Inc.: Selection of an Information Technology Platform CASE STUDY I-2 VoIP2.biz, Inc.: Deciding on the Next Steps for a VoIP Supplier CASE STUDY I-3 The VoIP Adoption at Butler University CASE STUDY I-4 Supporting Mobile Health Clinics: The Children’s Health Fund of New York City CASE STUDY I-5 Data Governance at InsuraCorp CASE STUDY I-6 H.H. Gregg’s Appliances, Inc.: Deciding on a New Information Technology Platform CASE STUDY I-7 Midsouth Chamber of Commerce (B): Cleaning Up an Information Systems Debacle CASE STUDY II-1 Vendor-Managed Inventory at NIBCO CASE STUDY II-2 Real-Time Business Intelligence at Continental Airlines CASE STUDY II-3 Norfolk Southern Railway: The Business Intelligence Journey CASE STUDY II-4 Mining Data to Increase State Tax Revenues in California CASE STUDY II-5 The Cliptomania™ Web Store: An E-Tailing Start-up Survival Story CASE STUDY II-6 Rock Island Chocolate Company, Inc.: Building a Social Networking Strategy CASE STUDY III-1 Managing a Systems Development Project at Consumer and Industrial Products, Inc. CASE STUDY III-2 A Make-or-Buy Decision at Baxter Manufacturing Company CASE STUDY III-3 ERP Purchase Decision at Benton Manufacturing Company, Inc. CASE STUDY III-4 ...

Words: 239887 - Pages: 960

Premium Essay

Fundamentals of Human Resources Preview

...es acculpa dolecae. Re nes eum nescimos inci dolum venihilitem ius, aut earchic ideriss equam, omnim nonet voles est quaere reptas am fugiatiis et rempelibus alibus. Ommost od et ulpa quid et mo blaut odi testios et, officia sitaqua sperum ipid qui blandaecus aperum dit vidis vollenda nimporr ovitatem nonet accusdaeris et aut earchilique porent. Itat odis nulpa se proreni sinciae. Ent eatur, coria voluptation ex et estionet remporporum quid ma culpa quate mincil moloria ndaestrunt. Minctas mi, tesciis delesti stiorrorest modipic iusdaniata nobit et lamet eum fuga. At rerspid itempor as quunt ationet omniendipis vendios con nulluptur, si deles pos magnam incid quos delique essequam nes dendis sae poremqui dit occabora in est, nimuscitiore di omnimodit quatum voluptas acerupit invenim inienimet volorecabo. Nam, ni omnis min res experio. Et omnimil lestruptate in est, ium volupis delest lique lab illoritatus. Henihit atiorestia dolor sit perspel endignis quo mod mincit quist fugit inci qui rehenis repero mo voles management in practice Riassi dentiumquam, officiis aligenihita nossimint. For Certificate IV BSB41013 and Diploma BSB50613 ly volorrum rehent officabo. Corio maiore ni ullore quis et quaecepremo et on Lisimaxi magnihicit esciendit que eratem. Non eos ipsam quo to maximagnam human resource management in practice e ese ped eveliquis il mi, ommolup tatinis etur sequiscienis autaque earibus. pl alitior estrund emquodiatur...

Words: 40577 - Pages: 163

Premium Essay

Freakonomics-Expanded

...FREAKONOMICS A Rogue Economist Explores the Hidden Side of Everything Revised and Expanded Edition Steven D. Levitt and Stephen J. Dubner CONTENTS AN EXPLANATORY NOTE In which the origins of this book are clarified. vii PREFACE TO THE REVISED AND EXPANDED EDITION xi 1 INTRODUCTION: The Hidden Side of Everything In which the book’s central idea is set forth: namely, if morality represents how people would like the world to work, then economics shows how it actually does work. Why the conventional wisdom is so often wrong . . . How “experts”— from criminologists to real-estate agents to political scientists—bend the facts . . . Why knowing what to measure, and how to measure it, is the key to understanding modern life . . . What is “freakonomics,” anyway? 1. What Do Schoolteachers and Sumo Wrestlers Have in Common? 15 In which we explore the beauty of incentives, as well as their dark side—cheating. Contents Who cheats? Just about everyone . . . How cheaters cheat, and how to catch them . . . Stories from an Israeli day-care center . . . The sudden disappearance of seven million American children . . . Cheating schoolteachers in Chicago . . . Why cheating to lose is worse than cheating to win . . . Could sumo wrestling, the national sport of Japan, be corrupt? . . . What the Bagel Man saw: mankind may be more honest than we think. 2. How Is the Ku Klux Klan Like a Group of Real-Estate Agents? 49 In which it is argued that nothing is more powerful than information,...

Words: 105214 - Pages: 421

Premium Essay

Critical Thinking

...fourth EDItION fourth EDItION This clear, learner-friendly text helps today’s students bridge the gap between Its comprehensiveness allows instructors to tailor the material to their individual teaching styles, resulting in an exceptionally versatile text. Highlights of the Fourth Edition: Additional readings and essays in a new Appendix as well as in Chapters 7 and 8 nearly double the number of readings available for critical analysis and classroom discussion. An online chapter, available on the instructor portion of the book’s Web site, addresses critical reading, a vital skill for success in college and beyond. Visit www.mhhe.com/bassham4e for a wealth of additional student and instructor resources. Bassham I Irwin Nardone I Wallace New and updated exercises and examples throughout the text allow students to practice and apply what they learn. MD DALIM #1062017 12/13/09 CYAN MAG YELO BLK Chapter 12 features an expanded and reorganized discussion of evaluating Internet sources. Critical Thinking thinking, using real-world examples and a proven step-by-step approach. A student ' s Introduction A student's Introduction everyday culture and critical thinking. It covers all the basics of critical Critical Thinking Ba ssha m I Irwin I Nardone I Wall ace CRITICAL THINKING A STUDENT’S INTRODUCTION FOURTH EDITION Gregory Bassham William Irwin Henry Nardone James M. Wallace King’s College TM bas07437_fm_i-xvi.indd i 11/24/09 9:53:56 AM TM Published by McGraw-Hill...

Words: 246535 - Pages: 987

Premium Essay

Marketing

...fourth EDItION Critical Thinking A student ' s Introduction Ba ssha m I I rwi n I N ardon e I Wal l ac e CRITICAL THINKING A STUDENT’S INTRODUCTION FOURTH EDITION Gregory Bassham William Irwin Henry Nardone James M. Wallace King’s College TM TM Published by McGraw-Hill, an imprint of The McGraw-Hill Companies, Inc., 1221 Avenue of the Americas, New York, NY 10020. Copyright © 2011, 2008, 2005, 2002. All rights reserved. No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written consent of The McGraw-Hill Companies, Inc., including, but not limited to, in any network or other electronic storage or transmission, or broadcast for distance learning. This book is printed on acid-free paper. 1 2 3 4 5 6 7 8 9 0 DOC/DOC 0 ISBN: 978-0-07-340743-2 MHID: 0-07-340743-7 Vice President, Editorial: Michael Ryan Director, Editorial: Beth Mejia Sponsoring Editor: Mark Georgiev Marketing Manager: Pam Cooper Managing Editor: Nicole Bridge Developmental Editor: Phil Butcher Project Manager: Lindsay Burt Manuscript Editor: Maura P. Brown Design Manager: Margarite Reynolds Cover Designer: Laurie Entringer Production Supervisor: Louis Swaim Composition: 11/12.5 Bembo by MPS Limited, A Macmillan Company Printing: 45# New Era Matte, R. R. Donnelley & Sons Cover Image: © Brand X/JupiterImages Credits: The credits section for this book begins on page C-1 and is considered...

Words: 240232 - Pages: 961

Premium Essay

Contemplating Realities and Paradoxes in the Global War on Terror

...Contemplating Realities and Paradoxes in the Global War on Terror John B. Alexander, Ph.D. Introduction The approach of this monograph is to examine paradoxes encountered in the Global War on Terror (GWOT). The intent is to spark debate on disputatious issues. Clearly, many of the existing situations appear intractable given the emotional investment that has been made by the public, and exacerbated by political manipulation of elected officials. Also unavoidable are the fiscal constraints that are becoming increasingly binding. Examined in Section One are problematic premises related to the four fundamental approaches to countering terrorism; increased security, eliminating the terrorists, attacking the support infrastructure, and altering conditions that breed discontent. Despite trite, albeit politically popular, commentary proposing those methods, execution of those concepts is extremely difficult, often controversial, and sometimes counterproductive. Section Two of this monograph addresses several other policy decisions that generate problems that are difficult to resolve, but directly impact the forces involved. Among those topics are; roles of contractors, individual loyalties versus national interests, alliances of convenience, foreign response to our policy on preemption of weapons of mass destruction (WMDs), the consequences of our stated objective of spreading democracy, the impact of U.S. presence in the Gulf region, and quandary associated with defining...

Words: 28095 - Pages: 113

Premium Essay

Consumers Survey

...A ∑ E= mc 2 This eBook is provided by www.PlentyofeBooks.net Plenty of eBooks is a blog with an aim of helping people, especially students, who cannot afford to buy some costly books from the market. For more Free eBooks and educational material visit www.PlentyofeBooks.net Uploaded By Bhavesh Pamecha (samsexy98) 1 INFLUENCE The Psychology of Persuasion ROBERT B. CIALDINI PH.D. This book is dedicated to Chris, who glows in his father’s eye Contents Introduction 1 Weapons of Influence 2 Reciprocation: The Old Give and Take…and Take 3 Commitment and Consistency: Hobgoblins of the Mind 4 Social Proof: Truths Are Us 5 Liking: The Friendly Thief 6 Authority: Directed Deference 7 Scarcity: The Rule of the Few Epilogue Instant Influence: Primitive Consent for an Automatic Age Notes Bibliography Index Acknowledgments About the Author Cover Copyright About the Publisher v 1 13 43 87 126 157 178 205 211 225 241 INTRODUCTION I can admit it freely now. All my life I’ve been a patsy. For as long as I can recall, I’ve been an easy mark for the pitches of peddlers, fundraisers, and operators of one sort or another. True, only some of these people have had dishonorable motives. The others—representatives of certain charitable agencies, for instance—have had the best of intentions. No matter. With personally disquieting frequency, I have always found myself in possession of unwanted magazine subscriptions or tickets to the sanitation workers’ ball. Probably...

Words: 111279 - Pages: 446

Premium Essay

Art of Deception

...THE ART OF DECEPTION Controlling the Human Element of Security KEVIN D. MITNICK & William L. Simon Foreword by Steve Wozniak Scanned by kineticstomp, revised and enlarged by swift For Reba Vartanian, Shelly Jaffe, Chickie Leventhal, and Mitchell Mitnick, and for the late Alan Mitnick, Adam Mitnick, and Jack Biello For Arynne, Victoria, and David, Sheldon,Vincent, and Elena. Social Engineering Social Engineering uses influence and persuasion to deceive people by convincing them that the social engineer is someone he is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology. Contents Foreword Preface Introduction Part 1 Behind the Scenes Chapter 1 Security's Weakest Link Part 2 The Art of the Attacker Chapter 2 When Innocuous Information Isn't Chapter 3 The Direct Attack: Just Asking for it Chapter 4 Building Trust Chapter 5 "Let Me Help You" Chapter 6 "Can You Help Me?" Chapter 7 Phony Sites and Dangerous Attachments Chapter 8 Using Sympathy, Guilt and Intimidation Chapter 9 The Reverse Sting Part 3 Intruder Alert Chapter 10 Entering the Premises Chapter 11 Combining Technology and Social Engineering Chapter 12 Attacks on the Entry-Level Employee Chapter 13 Clever Cons Chapter 14 Industrial Espionage Part 4 Raising the Bar Chapter 15 Information Security Awareness and Training Chapter 16 Recommended Corporate Information Security Policies Security at a Glance Sources...

Words: 125733 - Pages: 503

Premium Essay

Book

...decisions have been organized into three categories: (1) strategic, (2) operational, and (3) additional. In this third category, new factors such as balance sheet and income statement considerations, dimensions of risk, and environmental and social considerations are considered. Visit the text’s Online Learning Center at www.mhhe.com/Johnson14e Michiel R. Leenders, D.B.A., PMAC Fellow Professor of Purchasing Management Emeritus Richard Ivey School of Business The University of Western Ontario Anna E. Flynn, Ph.D., C.P.M. Formerly Clinical Associate Professor Supply Chain Management Thunderbird School of Global Management Formerly Associate Professor Institute for Supply Management TM Johnson Leenders Flynn Purchasing and Supply Management Johnson Leenders Flynn MD DALIM #1093963 06/05/10 BLUE GREEN P. Fraser Johnson, Ph.D. Leenders Purchasing Management Association of Canada Chair Associate Professor, Operations Management Richard Ivey School of Business The University of Western Ontario Purchasing and Supply Management company issues and opportunities. Fourteenth Edition Purchasing and Supply Management joh77899_fm_i-xviii.indd i 6/9/10 10:05 PM The McGraw-Hill/Irwin Series Operations and Decision Sciences OPERATIONS MANAGEMENT Beckman and Rosenfield, Operations, Strategy:...

Words: 188430 - Pages: 754