Plan for Suspect Interview Pe

Only available on StudyMode
  • Download(s) : 107
  • Published : April 18, 2012
Open Document
Text Preview
Plan for Suspect Interview PE
1.Date of Interview:
2.Student Name:
3.Class Name and Number: CITP 118-AW
4.Name of Suspect: Spencer Gavoni
5.Location of Interview: My partner and I will interview the suspect, Gavoni, at the procurement building in a traditional office setup. We will clearly communicate with his Supervisor, Carl Rodgers, and request an office to use. We will ask Rodgers not to tell Gavoni anything about the situation. After we arrive and preset the office space to our liking we will call Rodgers and request that he tell Gavoni to report to the designated office immediately and fully cooperate. We don’t want Gavoni to know about the suspect interview until the moment he walks into the designated office. This will be crucial for a powerful element of surprise. With the interview being in an environment we prescreened the risk factors for officer safety greatly diminish. However, Gavoni can feel uncomfortable and decline to interview. Gavoni can call in sick or decide to skip work on 00-00-00. 6.Statutes Under Investigation:

§ 1029. Fraud and related activity in connection with access ¬devices

(a) Whoever

(1) knowingly and with intent to defraud produces, uses, or traffics in one or more counterfeit access devices;

(2) knowingly and with intent to defraud traffics in or uses one or more unauthorized access devices during any one-year period, and by such conduct obtains anything of value aggregating $1,000 or more during that period;

(3) knowingly and with intent to defraud possesses fifteen or more devices which are counterfeit or unauthorized access ¬devices;

(4) knowingly, and with intent to defraud, produces, traffics in, has control or custody of, or possesses device-making equipment;

(5) knowingly and with intent to defraud effects transactions, with 1 or more access devices issued to another person or persons, to receive payment or any other thing of value during any 1-year period the aggregate value of which is equal to or greater than $1,000;

(6) without the authorization of the issuer of the access device, knowingly and with Intent to defraud solicits a person for the purpose of—

(A) offering an access device; or

(B) selling information regarding or an application to obtain an access device; (7) knowingly and with intent to defraud uses, produces, traffics in, has control or custody of, or possesses a telecommunications instrument that has been modified or altered to obtain unauthorized use of telecommunications services;

(8) knowingly and with intent to defraud uses, produces, traffics in, has control or custody of, or possesses a scanning receiver;

(9) knowingly uses, produces, traffics in, has control or custody of, or possesses hardware or software, knowing it has been configured to insert or modify telecommunication identifying information associated with or contained in a telecommunications instrument so that such instrument may be used to obtain telecommunications service without authorization; or

(10) without the authorization of the credit card system member or its agent, knowingly and with intent to defraud causes or arranges for another person to present to the member or its agent, for payment, 1 or more evidences or records of transactions made by an access device; shall, if the offense affects interstate or foreign commerce, be punished as provided in subsection

(c) Penalties.—

(1) Generally.— The punishment for an offense under subsection (a) of this section is—

(A) in the case of an offense that does not occur after a conviction for another offense under this section—

(i) if the offense is under paragraph (1), (2), (3), (6), (7), or (10) of subsection (a), a fine under this title or imprisonment for not more than 10 years, or both; and

(ii) if the offense is under paragraph (4), (5), (8), or (9) of subsection (a), a fine under this title or imprisonment for not more than 15 years, or both;

7....
tracking img