Premium Essay

Bus Radio Theft Investigation

In:

Submitted By katrice88
Words 1540
Pages 7
Bus Radio Theft Investigation Case
Joseph Hawley
Sec/430
October 28, 2013
Damain Torres

Bus Radio Theft Investigation Case
In every crime discovered by the authorities, expect an investigation. It is done for the authorities to know more about the case at hand, to find out the responsible party, their reasons, why they chose the victims and so on. It is used to create a case and to give justice to what the victims has experienced. Although the main reason for investigating us take for example a case in Kelsey known as the “Bus Radio Theft Case”. It happened at one of the schools in Kelsey which is the Unified School District. The perpetrators choose to steal radios from school buses. Although the case happened a few years back, there are some aspects of investigations used in this case that we want to study and show you. In reviewing the said incident, we can simply learn one thing, how to solve the mystery involving radio bus thefts. We will take a look at how the investigators of the said case created and accumulated their documents, how they made observations and derive their resolutions from it. We will also take a look at some o the important and useful techniques they used to make the investigation a success including choosing the right people for questioning. The way these investigators compiled the information they gathered will be taken into consideration as well.
The investigation about the bus radio theft incidents started after a report came in saying there has been multiple incidents already. The area of investigation is in Kelsey, somewhere in the Southwest of the region. The target bus is Kelsey Unified School bus which is normally park in the school yard or area. Once a new radio comes in and gets installed, a new a report comes in saying it got stolen again that is only after a month or so of installation (Apollo Group, 2011, p. 1). A new

Similar Documents

Free Essay

Bus Radio Theft Investigation, University of Phoenix

...of Investigation Bus Radio Theft Investigation This paper discusses the bus theft investigation scenario from the simulation web link. This work will describe documents, interviews, direct observations, and tactics for conducting the investigation. The questions asked, technological tools, and documentation will also be described. During the last three years there have been thefts of radios from buses in the Kellsey Unified School District vehicle yard. Most of the thefts occur one to three weeks after installation of the radios. Interviews included the security guard, Suley Smiley. He stated that he was on duty but did not see anything. Earl Folley the transportation director said that he was just dropping off his wife. Documentation included the footprint on bus 19. The footprint was photographed and documented in the notes in case it matches the foot of a future suspect. The area near where the radio was taken from bus 19 was also photographed and fingerprinted. Technological tools included photography and fingerprinting on bus 19. In practice an investigator would likely take pen and paper notes then probably use a computer to author final reports. In practice an investigator might also use a recording device to preserve witness statements. Other sources of information might include employee personnel files and background checks. The files and the checks might reveal persons who have a history of criminal behavior. The bus theft investigation included...

Words: 255 - Pages: 2

Free Essay

Sec 430

...Bus Radio Theft Investigation Case Charles Roberts SEC/430 June 2, 2014 David Lastra Bus Radio Theft Investigation Case One word or term you will always here when you hear about a crime or theft is the word investigation. An investigation will take place after a crime or theft in order for authorities to learn more about the case they are undertaking, and also to find out the reasons for the thefts, possible reasons for the thefts, and why they chose the location or victims of the theft. The case in this example we will discuss is known as Kelsey more specifically as the “Bus Radio Theft Case.” This incident took place at one of the schools in the town of Kelsey, which is known as the Unified School District. The perpetrators, another term known during investigations, were stealing radios from school buses at the Kelsey bus yard. This case took place a few years ago, but there are lessons to be learned by doing a study of the facts, and in doing that one should be able to solve the mystery of the bus radio thefts. I will evaluate how the investigation team of this case produced and accumulated their information, how they made observations, and the consequences from these resolutions built from this information. We will also take a look at a few of the important and very helpful techniques the team used to make this investigation into a success, including conducting interviews with the right people and asking the right questions, as well as how the...

Words: 1378 - Pages: 6

Premium Essay

Gqendkekek,, Y, Y

...Bus 109 qn 1 5pts Draw a demand and supply curve . Label properly with axis. Explain the curve and how it works . How to shift both curves. How to shift demand curve. 10 pts increase demand by doing what ?: Make people want it more. Marketing or advertising . Red line goes up. Not enough supply. New equilibrium point (higher on the price axis) *shift to the right. * price increase and quantity increase. 10 pts draw and explain increase in technology and how it effects the graph: Supply increases so it is cheaper to produce. The supply curve shifts to the right because more quantity produced. Price also decreases. Qn2 Personal Insurance. Liability automobile insurance bodily injury liability : held legally liable for damage caused by car or driving eg disability,death, breadwinner is handicapped and can no longer earn for the family. Property damage liability insurance damage to the other persons car or other property eg house that you drove into. COGS in a truck that's hit. Uninsured motorist. The person has no auto insurance. Bodily damages , breadwinner, medical bills. (first party insurance covers your own family and own party) Medical payments only medical bills. Group insurance also included. Possibly not first party liability but if it was your fault. Personal injury protection (no fault states only. Only two no fault states) take care of major injuries. Time off work(breadwinner situation) , medical bills. Physical damage protection ...

Words: 2229 - Pages: 9

Free Essay

Kevin Mitnick - Social Engineering and Computer Hacking Mastermind

...Kevin Mitnick – Social Engineering and Computer Hacking Mastermind Shelby Descoteaux Professor Kabay IS 340 A Nov. 22, 2013 Table of Contents Introduction 3 Kevin Mitnick 3 Hackers and Their Motives 3 The Early Years 4 Adolescence 5 Kevin in Trouble 6 Kevin’s Final Visit from the FBI 7 Hacker or Engineer? 8 Impact on Computer Security 8 Conclusion 9 Works Cited 10 Introduction Most people today are aware of the detrimental risk that hackers pose to their computers. They might know about identity theft, viruses, Trojans and worms however what they fail to recognize is how these things are accomplished and if they have actually fallen victim to one of these horrible attacks. But what about attacks with even greater impacts…like someone hacking into the computer system of a car that controls the brakes? Perhaps penetrating the systems that control nuclear power plants? Although it seems unlikely that either of these extremely scary scenarios would ever happen, it is most definitely possible. One researcher for IBM’s Internet Security Systems told the owners of a nuclear power station that he could hack into their system through the Internet. The power station took this as a joke, responding to Scott Lunsford, the IBM researcher, with a laugh in his face saying that it was “impossible”. In response, Scott took up the power plant on their words and proved them wrong. In less than twenty-four hours, Scott’s team had infiltrated the system and in...

Words: 4016 - Pages: 17

Free Essay

Hewkjrhwerhwekjuewhrhthwe

...of Nash-Rocky Mount Public Schools are committed to providing a safe, orderly, secure and disruption free environment that will produce globally competitive students, who are prepared for bright and prosperous futures, when they graduate. High quality instruction will offer challenging curriculum based on rigor, relevance and adequate resources for all students. Expectations for student behavior are high in every school. The Code of Student Conduct is revised annually to align with state and federal laws and to address other issues critical to providing a safe and quality educational environment. Included in the Code of Conduct are expectations for behavior on school buses that you should be aware of even if your child does not ride a bus to or from school since these expectations apply for field trips, athletic contest trips and other school approved activities. To ensure consistency with student understanding of school division expectations, the Code of Student Conduct is reviewed at the beginning of each school year. In addition, I urge each parent to read and review this material with your child to ensure that you understand our expectations prior to any potential issues. Being unaware of the rules of conduct and behavior is not a defense if your child actually violates any item covered in the Code of Student Conduct. Also included is the Responsible Use of Technology policy and Procedures for Social Media for you to review with your child prior to their use of our...

Words: 22743 - Pages: 91

Free Essay

Notes

...1 – Introduction to Computer Concepts History of Computer * Often referred to the different generations of computing devices. * The circuitry is smaller and more advanced than previous generation. * First Generation - 1940-1956: Vacuum Tubes * Often enormous, very expensive, use a great deal of electricity and generate a lot of heat. * E.g., UNIVAC, ENIAC * Second Generation - 1956-1963: Transistors * Computers are smaller, faster, cheaper, more energy-efficient and more reliable. * Third Generation - 1964-1971: Integrated Circuits * Miniaturized Transistors were placed on silicon chips called semiconductors. * Increased speed and efficiency. * Fourth Generation - 1971-Present: Microprocessors * Thousands of Integrated Circuits (IC) were onto a silicon chip. * Computers are more powerful and linked to networks. * Fifth Generation - Present and Beyond: Artificial Intelligence * Uses parallel processing, quantum computation and nano-technology. * Respond to natural language input and capable of learning and self-organization. Computer Literacy * Knowledge and understanding of computers and their uses. Computer * An electronic device that transform input into output. Information Processing Cycle * Is a series of Input, Process, Output and Storage. Components of a Computer * Input, Process, Output, Storage and Communication Computer Systems * It has data inputs, processes that transform data...

Words: 10287 - Pages: 42

Free Essay

Management Information Systems

...Find more on www.studymaterial.ca ADMS 2511 MIS Notes Ch 1 – Modern Organization in the Global, Web-Based Environment Management information systems (MIS)- deals with the planning of info tech to help people perform tasks related to info processing and management Information technology (IT)- any computer-based tool used with info to support the needs of an org Importance of Planning for IT -a new info system can apply to the whole org, or a specific area of the org Application portfolios- are groups of new system proposals (apps that have to be added/modified) IT Planning -begins with an organizational strategic plan -states  the  firm’s  mission,  goals,  and  steps  to  reach  those  goals -IT architecture describes  the  way  an  org’s  info  resources  should  be  used  to  accomplish  its  mission -includes both technical (hardware operating systems) and managerial aspects (managing the IT dpt, how area managers will be involved) IT strategic plan- LT goals that describe the IT infrastructure and major IT initiatives to achieve the organization’s  goals -it must meet three main objectives: -must  be  aligned  with  the  org’s  strategic  plan -must provide for an IT architecture that networks users, apps, and databases -must efficiently allocate IS resources among different projects so they can all be completed on time, within budget, and function properly IT steering committee- composed of managers/staff who rep diff organizational units -they  establish  IT  priorities...

Words: 24496 - Pages: 98

Premium Essay

Scanning Applications

...U.S. Department of Justice Federal Bureau of Investigation 2012 The Strategic Information and Operations Center at FBI Headquarters is the 24/7 command post that monitors FBI operations and law enforcement activities around the globe. An FBI agent examines a potentially contaminated letter during a white powder training exercise. 2012 The FBI Story I A Message from FBI Director Robert S. Mueller, III For the FBI and its partners, 2012 was a year that reminded us once again of the seriousness of the security threats facing our nation. During the year, extremists plotted to attack—unsuccessfully, thanks to the work of our Joint Terrorism Task Forces—the U.S. Capitol, the New York Federal Reserve Bank, and other landmarks on U.S. soil. Tragically, on the 11th anniversary of 9/11, a hateful attack in Benghazi took the lives of the U.S. Ambassador to Libya and three other Americans. In the cyber realm, a rising tide of hackers took electronic aim at global cyber infrastructure, causing untold damages. High-dollar white-collar crimes of all kinds also continued to siphon significant sums from the pocketbooks of consumers. And in Newtown, Connecticut, 20 young children and six adults lost their lives in one of the worst mass shootings in American history, ending a year of violence that saw similar tragedies around the country. Working with its colleagues around the globe, the FBI is committed to taking a leadership role in protecting the nation. As you can see from...

Words: 67387 - Pages: 270

Premium Essay

Logistics

...1st Edition Logistics Disaster Management Training Programme DHA/94/2 GE.94-00020 Logistics 1st Edition Module prepared by R.S. Stephenson, Ph.D. Disaster Management Training Programme 1993 2 STRUCTURE AND ORGANIZATION OF RELIEF LOGISTICS CONTENTS Acknowledgements ................................................................................6 Introduction ............................................................................................7 Part 1 Relief logistics ..................................................................... 9 Introduction ............................................................................................9 Relief logistics .........................................................................................9 The operating environment ....................................................................12 Case Study – Part 1 .............................................................................12 Planning for effective implementation of logistics programs .....................14 International involvement .......................................................................15 Part 2 Structure and organization of relief logistics ................. 17 The flow of transport and goods ............................................................17 Facilities and equipment ........................................................................19 Operational and support functions ................

Words: 16078 - Pages: 65

Premium Essay

Business Law.Types of Companies

...Definition: An information system can be any organized combination of people, hardware, software, computer networks and data resources that stores and retrieves, transforms, and disseminates information in an organization. Roles of IS in Business: There are three fundamental reasons for all business applications of information technology. They are found in the three vital roles that information system can perform for a business enterprise.  Support of its business processes and operations.  Support of decision making by its employees and managers.  Support of its strategies for competitive advantage. Trends in IS: The business applications of information systems have expanded significantly over the years.  Data Processing (1950s – 1960s): Electronic data processing systems which includes transaction processing, record keeping, and traditional accounting applications.  Management Reporting (1960s – 1970s): Management information systems that include preparation of management reports of pre specified information to support decision making.  Decision Support (1970s – 1980s): Decision support systems include interactive ad hoc support of managerial decision making process.  Strategic and End User Support (1980s – 1990s): o End user computing systems: Direct computing support for end user productivity and work group collaboration. o Executive information systems: Critical information for top management. o Expert Systems: Knowledge based expert advice for...

Words: 13881 - Pages: 56

Premium Essay

Main Paper

...Special Publication 800-48 Wireless Network Security Tom Karygiannis Les Owens 802.11, Bluetooth and Handheld Devices NIST Special Publication 800-48 Wireless Network Security 802.11, Bluetooth and Handheld Devices Recommendations of the National Institute of Standards and Technology Tom Karygiannis and Les Owens C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 November 2002 U.S. Department of Commerce Donald L. Evans, Secretary Technology Administration Phillip J. Bond, Under Secretary for Technology National Institute of Standards and Technology Arden L. Bement, Jr., Director W IRELESS NETWORK SECURITY Note to Readers This document is a publication of the National Institute of Standards and Technology (NIST) and is not subject to U.S. copyright. Certain commercial products are described in this document as examples only. Inclusion or exclusion of any product does not imply endorsement or non-endorsement by NIST or any agency of the U.S. Government. Inclusion of a product name does not imply that the product is the best or only product suitable for the specified purpose. Acknowledgments The authors wish to express their sincere thanks to numerous members of government, industry, and academia who have commented on this document. First, the authors wish to express their thanks to the staff at Booz Allen Hamilton...

Words: 52755 - Pages: 212

Premium Essay

Miss

...Store Manager Incentive Design and Retail Performance: An Exploratory Investigation Headnote Store managers perform multiple tasks within a store, and the way in which they are evaluated and rewarded for these tasks affects their behavior. Using empirical data from multiple stores of a consumer electronics retailer, Tweeter Home Entertainment Group, we highlight the extent to which store manager incentive design impacts store manager behavior and, consequently, retail performance. More specifically, we describe the shift in store manager behavior resulting from a change in incentives, which, in part, altered the importance of sales relative to inventory shrinkage in the store manager compensation plan. Store managers, following this change, directed less attention to the prevention of inventory shrinkage and more toward sales-generating activities and made different process choices within the store. We observed increases in the level of inventory shrinkage and sales within these stores. Controlling for alternative drivers of sales and inventory shrinkage, we find this change in incentive design to be associated with a profit improvement of 4.2% of sales. This work indicates that altering how store managers are compensated impacts retail performance. Moreover, our findings underscore the importance of balancing the rewardsgiven for different types of activities in contexts where agents face multiple competing tasks. Key words: incentives; multitasking agent; retailoperations;...

Words: 10708 - Pages: 43

Free Essay

Hrm Thesis

...Perception of College Students towards Advertisement of Selected………… Chapter 1 Introduction and Background of the Study The term 'motel' in the United States is outdated and very few motel chains still exist. Motels, very popular starting in the 1960s when travel by car was on the rise, have now been replaced by budget chain hotels typically used by road warriors. In the year 2000, the American Hotel-Motel Association removed 'motel' from its name after doing considerable market research and finding the term to be passed. This national association is now called the American Hotel and Lodging Association. The association felt that using the term 'lodging', instead of 'motel', more accurately reflects the large variety of different style hotels including luxury and boutique hotels, suites, inns, budget, and extended stay hotels. Perception is subjective in interpretation as brought about by experiences. A particular object can mean differently to varied individuals. Some think it is a positive, others think negative, or they are unaware of the stimulus. Perception is the whole system by which stimuli affect whatever is the cognition and behaviour of the individual automatically responding to the stimuli. Advertising is a form of communication intended to persuade an audience (viewers, readers or listeners) to purchase or take some action upon products, ideas, or services. It includes the name of a product or service and how that product or service...

Words: 9882 - Pages: 40

Free Essay

Hate Crimes

...Hate Crimes in American Society in the Twentieth and Twenty-first Centuries Sample Student Research Paper Project of Sociology Table of Contents I. Thesis Statement…………………………………………….………….....Page 4 II. Introduction and Summary………………………………….………….....Page 4 III. Literature Review………………………………………………………....Page 6 IV. Methods………………………………………………………….......….. Page 16 V. Socio-Historical Analysis………………………………………………. .Page 18 A. 20th Century 1. Lynching 2. Ku Klux Klan 3. Rodney King and the Los Angeles Riots 4. Matthew Shepard B. 21st Century 1. Post 9/11 2. Jena Six VI. Cause and Effect Analysis…………………………………………… ....Page 24 A. Causes 1. Prejudice a. Stereotypes b. Scapegoats c. Presence of Hate in American Culture d. Need for Status and Power 2. Reasons for Crime a. Sending a Message b. Thrill Seeking c. Defensive B. Effects 1. Psychological Trauma 2. Undo Social Progress 3. Community Unrest 4. Threat of Retaliation VII. Descriptive Analysis……………………………………………….........Page 30 A. Description of Victims 1. Bias against a Particular Race 2. Bias against a Particular Religion 3. Bias against a Particular Sexual Orientation 4. Bias against a Particular Ethnicity/National Origin 5. Bias against a Disability B. Description of Offenses and Offenders This must be your new section? VIII. Comparative Analysis…………………………………………………. Page 36 A. United States Justice Department Definition of Hate Crime B. International Justice...

Words: 11067 - Pages: 45

Premium Essay

Students Guide

...Student Life @UNSW Global Education Global Networks Global Opportunities contents 3 sydney People ___________________________________________________________________________ 3 Places of Interest __________________________________________________________________ 4 Multicultural sydney ________________________________________________________________ 5 suburbs Around UnsW_____________________________________________________________ 6 Climate __________________________________________________________________________ 18 World Times______________________________________________________________________ 18 21 AboUT UnsW UnsW – The organisation _________________________________________________________ 22 UnsW Campuses_________________________________________________________________ 24 University Glossary _______________________________________________________________ 26 Faculty of Arts and social sciences _________________________________________________ 28 Faculty of the built environment_____________________________________________________ 30 Australian school of business ______________________________________________________ 32 College of Fine Arts (CoFA) ________________________________________________________ 34 Faculty of engineering ____________________________________________________________ 36 Faculty of Law ____________________________________________________________________ 38 Faculty of Medicine _______________________________________________________________ 40...

Words: 24950 - Pages: 100