Bus Radio Theft Investigation

In: Science

Submitted By katrice88
Words 1540
Pages 7
Bus Radio Theft Investigation Case
Joseph Hawley
October 28, 2013
Damain Torres

Bus Radio Theft Investigation Case
In every crime discovered by the authorities, expect an investigation. It is done for the authorities to know more about the case at hand, to find out the responsible party, their reasons, why they chose the victims and so on. It is used to create a case and to give justice to what the victims has experienced. Although the main reason for investigating us take for example a case in Kelsey known as the “Bus Radio Theft Case”. It happened at one of the schools in Kelsey which is the Unified School District. The perpetrators choose to steal radios from school buses. Although the case happened a few years back, there are some aspects of investigations used in this case that we want to study and show you. In reviewing the said incident, we can simply learn one thing, how to solve the mystery involving radio bus thefts. We will take a look at how the investigators of the said case created and accumulated their documents, how they made observations and derive their resolutions from it. We will also take a look at some o the important and useful techniques they used to make the investigation a success including choosing the right people for questioning. The way these investigators compiled the information they gathered will be taken into consideration as well.
The investigation about the bus radio theft incidents started after a report came in saying there has been multiple incidents already. The area of investigation is in Kelsey, somewhere in the Southwest of the region. The target bus is Kelsey Unified School bus which is normally park in the school yard or area. Once a new radio comes in and gets installed, a new a report comes in saying it got stolen again that is only after a month or so of installation (Apollo Group, 2011, p. 1). A new…...

Similar Documents

Anti-Theft System

...administrator for hazardous materials safety in DOT’s Pipeline and Hazardous Materials Safety Administration (PHMSA), and to his staff, particularly Bob Richard, Ed Mazzullo, and Susan Gorsky, who helped us understand the current state of PHMSA rulemaking. Our special thanks go to Ana Trejo, a contract employee with PHMSA who worked many hours with our staff analyzing complex data from the Hazardous Materials Information Reporting System (HMIRS). Steve Ernst, senior engineer for Safety and Security in DOT’s Federal Highway Administration helped us understand efforts to improve the resilience of highway infrastructure to fire and blast. Finally, Anthony Tisdale of the Federal Transit Administration (FTA) provided invaluable assistance on tanker thefts. Our thanks go to Transportation Security Administration’s (TSA) Motor Carrier Division in the Department of Homeland Security (DHS), particularly to Managing Director Bill Arrington, along with staff member Bud Hunt, for sharing TSA’s recommended industry security action items. TSA’s Mike Filaggi and Science Applications International Corporation’s (SAIC) Mark Carter provided considerable assistance in understanding the current state and future direction of the TSA Hazmat Truck Security Pilot. Science and Technology Directorate’s Mary Ellen Hynes and her staff provided key information on the susceptibility of infrastructure to fire and blast, and on research under way to mitigate those effects. We received a wealth of......

Words: 21989 - Pages: 88


...perspectives and worldviews? | | | | |Were there any questionable assumptions implicit in the story? | | | | |Were any implications ignored while others were emphasized? | | | | |Why is it important to make distinctions when undertaking a critical evaluation? | | | | |How would you evaluate this story if it were on the television news versus reading it online? What | | | | |about on the radio? | | | | | | | | | |Format your paper consistent with Associate Level Writing Style Handbook guidelines. | | | | | | | | | |The following resources may be of assistance when writing this paper: | | | | ......

Words: 4724 - Pages: 19

Identity Theft

...Lab 10: Identity Theft Identity theft is on the rise every day and we do not even know when it happens. Identity theft occurs when someone wrongfully obtains another’s personal information without their knowledge to commit theft or fraud (Federal Bureau of Investigation, n.d.). Identity theft crimes include credit card fraud, internet fraud, mail fraud, and many others. Anybody is at risk of identity theft; nobody is safe. As beginning IT students, it is important to learn the basic way to protect ourselves right now. Working on the Internet exposes your identity to many people. When a person uses your information without your consent and causes any type of harm is considered identity theft. Along with names, Social Security numbers and dates of birth, fraudsters also use Medicare numbers, addresses, birth certificates, passport numbers, financial account numbers (bank account or credit card), passwords (like mother’s maiden name, father’s middle name), telephone numbers, and biometric data (like fingerprints, iris scans) to commit identity theft (Federal Bureau of Investigation, n.d.). As you can see there are many types of information that can be used to steal your identity. Once your identity is stolen the restoration process is long and tedious. Beginning IT students should be aware of what precautions to take when handling important information. Knowing the facts will prevent or minimize the percentage of becoming an identity theft victim. Clear your logins and......

Words: 479 - Pages: 2

Bus Radio Theft Investigation, University of Phoenix

...of Investigation Bus Radio Theft Investigation This paper discusses the bus theft investigation scenario from the simulation web link. This work will describe documents, interviews, direct observations, and tactics for conducting the investigation. The questions asked, technological tools, and documentation will also be described. During the last three years there have been thefts of radios from buses in the Kellsey Unified School District vehicle yard. Most of the thefts occur one to three weeks after installation of the radios. Interviews included the security guard, Suley Smiley. He stated that he was on duty but did not see anything. Earl Folley the transportation director said that he was just dropping off his wife. Documentation included the footprint on bus 19. The footprint was photographed and documented in the notes in case it matches the foot of a future suspect. The area near where the radio was taken from bus 19 was also photographed and fingerprinted. Technological tools included photography and fingerprinting on bus 19. In practice an investigator would likely take pen and paper notes then probably use a computer to author final reports. In practice an investigator might also use a recording device to preserve witness statements. Other sources of information might include employee personnel files and background checks. The files and the checks might reveal persons who have a history of criminal behavior. The bus theft investigation......

Words: 255 - Pages: 2


...Project on theft - Section 378 of IPC INTRODUCTION In common usage, theft is the taking of another person's property without that person's permission or consent with the intent to deprive the rightful owner of it. The word is also used as an informal shorthand term for some crimes against property, such as burglary, embezzlement, larceny, looting, robbery, shoplifting and fraud. In some jurisdictions, theft is considered to be synonymous with larceny; in others, theft has replaced larceny. For the offence of theft there is punishment of imprisonment of either description which may extend to 3 years, with fine, or both according to the Indian Penal Code. The offence of theft is even though cognizable [1] and non-bailable [2] it is compoundable[3]. So according to the criminal justice jurisprudence when the offence is compoundable then generally it cannot be term as serious category of an offence. Otherwise also the seriousness and gravity of an offence can be assessed by the fact and circumstances involve in any incidence of crime. Every citizen in a free country is having right to do fair, law based analysis of any judgment given by any courts in India without challenging the integrity of the person working as judge. According to SECTION 378 OF INDIAN PENAL CODE, Whoever, intending to take dishonestly any moveable property out of the possession of any person without that per­son’s consent, moves that property in order to such taking, is said to commit theft.......

Words: 5244 - Pages: 21


...RADIO FREQUENCY IDENTIFICATION Introduction RFID is a technology which enables detecting and identifying objects using electromagnetic radio waves. This is processed through exchange of information between a reader and a tag being attached to the object that includes the data associated with the object. This can be used to detect and classify vehicles, animals, patients, shipment goods and airline baggage. [1] RFID technology involves two main components, they are transponders which are also known as tags or labels, contain the relevant information about the object and other the interrogators, also known as readers or transceivers, that extract the data from the tags. These tags can be passive or active tags. Passive tags use the energy from the EM radiation of the reader for its processing, where as active tags receive power from an internal battery for its processing and communication with the reader. An integrated electronic circuit is embedded in tags for storage and processing operations and an antenna that transmits and receives the RF signal. [2] Figure : components of RFID Source : http://www.docstoc.com/docs/17328767/Draft-SP800-98 The tags used in RFID are enabled with read-write operations, with a large storage capacity. Data can be modified any number of times. Tag and reader act as two way radio communication in which each antenna carries the modulation and demodulation of RF signals, with operation frequency ranges from low frequency to UHF. As......

Words: 939 - Pages: 4


...existence that proved highly effective and efficient for business firms. “Social media marketing is the process of gaining website traffic or attention through social media sites. Social media marketing programs usually center on efforts to create content that attracts attention and encourages readers to share it across their social network” (Wikipedia, 2014). As said by Nielsen’s (2011), State of the Media: Social Media reports that 70% of social media users are engaged in online shopping (Nielsen, 2011).Consumers can access any site and get their needs fulfilled from any part of the world. Multi-national companies such as Apple, Samsung etc. have taken advantage of the growing opportunities in the field of social media marketing. This investigation focusses on the topic advantages and tools of social media marketing for various business firms. Social media marketing proves advantageous in providing a competent for companies that include social media marketing within their marketing strategies , one of the major advantage of social media marketing is the cost effectiveness , companies can communicate their ideas to large wide spread community all over the world in a minimum cost , this not only reduces the overall costs but also helps companies understand the consumer behavior and feedback of variety of consumers towards their respective product or service that they are providing which can help them innovate and improve the existing product or service, . Social media......

Words: 796 - Pages: 4

Identity Theft

...IDENTITY THEFT: IN MORE WAYS THAN ONE Identity Theft: In More Ways than One Justin S. Evangelist CMRJ 306 D002 Criminal Investigation American Military University Identity Theft: In More Ways than One We have all watched the news; we have all heard the stories. It’s on commercials and television shows. Identity theft is sweeping across the nation and it something we should all take very seriously. Identity theft is a form of fraud or taking away someone else’s identity in order to gain something, usually financial means (Swanson, Chamelin, Territo & Taylor, 2009). The Federal Trade Commission estimates that as many as nine million Americans have their identity stole each year, resulting in over 50 billion dollars of financial loss (Mercuri, 2006). There are several different forms of identity fraud, several which not everyone has heard of. The three main types of identity theft consist of criminal identity theft, medical identity theft and child identity theft. Criminal identity theft occurs when a victim’s name, address, and other personal details are given to law enforcement officials during the commission of a crime. The victim is then mistakenly arrested (Mercuri, 2006). Often times, the imposter has obtained some sort of tangible, personal information from the victim, usually a driver’s license. Once the name of an innocent identity theft victim is assigned to the criminal act of the true perpetrator, it can be very difficult for the identity theft......

Words: 998 - Pages: 4

Theft and Concealment Investigation

...Theft and Concealment Investigation Case Study 1 1. Describe the stages and all aspects of coordinating an investigation in a manner that would not arouse the suspicions of Cummings and Baptiste. When it comes to investigating in a manner that will not arouse suspicions, there should be as few people involved as possible. People should not be wrongfully incriminated, especially when they are innocent. One word to avoid saying is “investigation”. Words like “audit” and “inquiry” should be used instead. The person suspected of the theft should not know about the investigation until they are interviewed. When the suspect is interviewed you should have sufficient evidence to have a powerful interview without giving away your case ahead of time. 2. Design a vulnerability chart to coordinate the various elements of the possible fraud. Case study 2 Based on your understanding of a fraud examiner's responsibilities regarding documents what should the audit firm personnel have done with their documents if they had suspected that fraud had occurred. Components of the fraud triangle, which are pressure, opportunity and justification, are similar to the fuel, spark and oxygen which together cause fire (Ozkul & Pamukcu, p. 22). These components come together when white-collar crimes are committed. Many people face pressures every day. Some people handle them better than others. If someone is a drug or alcohol addict or is a gambler or likes to go out to clubs......

Words: 528 - Pages: 3

Identity Theft

... The Two Mrs. Jane Does Diana Sours DeVry University The Two Mrs. Jane Does Identity theft, it can and will catch you off guard if you are not careful with your information, and it can have a devastating effect. “Another pre-screened credit offer?” thought Mrs. Jane Doe, as she walked back up to her house from checking her mail. She quickly realized that was not the case at all, as she opened the “offer” from Visa. Instead, what she was staring at was a bill addressed to her, that she had no recollection of making. She was now faced with the probability of being a victim of identity theft. Identity theft, in short, is using someone else’s personal information for one’s own financial gain. Identity theft laws need to be improved because this crime costs businesses money, costs credit card companies money, and financially hurts ordinary consumers. In 2006, “U.S. companies average identity theft-related costs of $182 per compromised record. While that figure averaged $660,000 per company in notification expenses and indirect costs, the total estimate, including lost business, tops $2.5 million. This staggering amount also includes costs and fees associated with legal expenses, fines, investigation, auditing, class action litigation, public relations damage control, and setting up monitoring, remediation practices, and a dedicated customer support phone number.” (Identitytheft.lifetips.com, 2014) Some of this cost is passed along to the credit card companies in the form of......

Words: 855 - Pages: 4


...Radio Script 1) RADIOHEATWAVE TOP OF THE HOUR (TOH) SWEEPER (est. 19sec) Bring down the Netia A fader SLIGHTLY & GRADUALLY in order to talk above volume levels of the TOH music. If not, your voice will be drowned out! Intro (hottest campus radio station…): *ON MIC* Hey, it’s Jocelyn on Radio Heatwave, this is Love Dose. And you know what, coming up on today’s show, I’m going to share with you three tips for your first date. Meantime though, This is Marvin Gaye by Charlie Puth Featuring Meghan Trainor only on the hottest thing on campus (Radio Heatwave). *OFF MIC* Music #1 – Marvin Gaye – Charlie Puth Featuring Meghan Trainor (3 min 6 sec) (Until the dawn, let’s Marvin Gaye and get it on WOO) *ON MIC* Talk set #1: That was Marvin Gaye by Charlie Puth Featuring Meghan Trainor … You’re on Love Dose with me, Jocelyn, on Radio Heatwave! Meghan Trainor and Charlie Puth’s (POOFS) make out session after their performance together at the recent American Music Awards was the most O-M-G moment! Hmm, talk about Lips are Moving… according, to sources close to them, they’re really good friends and the whole make out session was actually rehearsed and planned! But regardless, let’s Marvin Gaye and get it on! Coming right up, I’ll be sharing the three tips for your first date! And if you have been Waiting for Love just like this song by Avicii, well, you got to stay with me on Radio Heatwave. *OFF MIC* Music #2 – Waiting for Love – Avicii (3 min...

Words: 627 - Pages: 3

Identity Theft

...Identity Theft: Fastest Growing Crime Tracy A. Baggett DeVry University Keller Graduate School of Management Identity Theft; Fastest Growing Crime Imagine waking up to news that you had accumulated hundreds of thousands in debt after someone used your identity for unauthorized purchases. This is exactly what happened to John Harrison, a Connecticut salesman. Jerry Phillips, the twenty year old who stole John Harrison’s identity went on a shopping spree that included purchases to Home Depot, JC Penny, Sears, Lowes and even bought two cars from Ford, a Kawasaki and a Harley. In just four months Jerry Phillips was able to accumulate $ 265,000 in purchases. Jerry Phillips was later arrested and imprisoned for three years. He even went as far as to apologize to John Harrison saying, “Sorry. You know, I wish I could make it up to you.” John Harrison felt that the nightmare was over with the criminal behind bars and even verbally acknowledging his regret over the crime. But despite all of this and a letter from the Justice Department confirming that John Harrison was a victim, he still found himself owing $140,000 to different creditors. How about waking up in the middle of the night realizing that federal agents just entered your home with guns pointed certainly qualifies as one of the most horrifying ordeals in anyone’s life. This is exactly what happened to Carlos Gomez, a UPS driver accused of being involved in a million dollar money laundering operation headed by a......

Words: 3754 - Pages: 16

Radio Station

...Batangas State University College of Engineering, Architecture and Fine Arts ECE/ ICE/ MexE Department ECE 551 ECE Laws, Ethics and Contracts Radio Stations and Licenses Endaya, Ron-Ron Godoy, Rose Ann E. Macutong, Jhon Carlo C. Nuguid, Karen Mae L. Vergara, Lyka M. Engr. Antonette V. Chua Instructor December 17, 2015 Karen Mae L. Nuguid ECE- 5201 Definition of Radio Stations and Services * Station – One or more transmitters or receivers or a combination of transmitters and receivers, including the accessory equipment, necessary at one location for carrying on a radio communication service. * Fixed Service – A service of radio-communication between specified fixed points. * Fixed Station – A station in the fixed service. * Aeronautical Fixed Service – A fixed service intended for the transmission of information relating to air navigation, preparation for and safety of flight. * Broadcasting Service – A radiocommunication service in which the transmissions are intended for direct reception by the general public. * Broadcasting Station – A station in the broadcasting service. * Mobile Service – A service of radiocommunication between mobile and land stations, or between mobile stations. * Land Station – A station in the mobile service not intended to be used while in motion. * Mobile Station – A station in the mobile service intended to be used while in motion or during halts at unspecified points. *......

Words: 7970 - Pages: 32


...Jamel Vilmont 10/26/15 Investigation #3 Analyzing Evidence 1. The solvents are the three sample, Water, Hexane and Ethanol used. The sample are the coo laid used which was red blue and yellow and the markers used which was orange, blue, black, red, and green. 3. The solvent of water mixed with the Kool-Aid created a mixed color of red and yellow for the red Kool-Aid and high streak for the blue Kool-Aid and a disappearance of the yellow Kool-Aid. With markers dipped in ethanol, it created a yellowish orange streak, s short blue streak with little bit of red at the top and a long black streak. 4. the two that I found very similar in my experiment was the H2O blue Kool-Aid with similar features as the blue ethanol. The H20 orange, blue and black markers with the hexane orange blue and black markers as well. Interpreting Evidence 1. from my results we come to a conclusion that the Kool-aid where more soluble in water while the markers weren’t. 2. the one with the highest number of components was the read kool-aid that was dipped in water and the orange and blue markers that was dipped in ethanol. No matter what the Kool-Aid reacted the most to each solvent Making Claims All the markers acted differently with in water, ethanol and hexon and all the coolaids acted the same way excepted with ethanol but for all of the yellow Kool-Aid, they all acted the same....

Words: 258 - Pages: 2

Data Theft

...Data Theft Paper Data Theft Paper Data theft is when information is unlawfully copied or taken from a business or individual. This information is user information such as passwords, social security numbers, credit card information, other personal information, and confidential corporate information. Within this paper several examples will be giving as, I explore how data theft has affected individuals and organizations. What can organizations and individuals do to protect them from becoming victims of this type of fraud. When stolen data happens such as people’s identities or an organization’s information the potential harm is huge with major economic and legal implications. The worst thing about the data theft is that it can remain undetected. It is devastating when you find out as a boss that an ex-employee has stolen the company information for personal gain, profit, or to ruining the company completely. A survey released by Information Week (informationweek.com) and Accenture in July 2007 showed that 89 percent of 1,010 U.S. companies still felt vulnerable to data theft (McNurlin, Sprague, & Bui, 2009). For example the Boeing Company had an ex-employee who illegally downloaded thousands of pages of significant business documents to his computer. It was anticipated if any of those documents had gotten into the wrong hands of Boeing’s competitors it could have cost them $5 to $14 billion dollars (McNurlin, Sprague, & Bui, 2009). In 2008, a data......

Words: 2318 - Pages: 10