0% found this document useful (0 votes)
8 views28 pages

Security Investigation 2

The document outlines the multifaceted nature of security investigations, emphasizing their role in determining facts related to asset loss or damage. It details various tools and methods used in investigations, including information gathering, interrogation, and analysis of data, particularly in the context of addressing counterfeit medications in a pharmaceutical company. The investigation's systematic approach includes defining the problem, collecting relevant data, and verifying information to ensure effective resolution of the issue.

Uploaded by

Jayson Parilla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views28 pages

Security Investigation 2

The document outlines the multifaceted nature of security investigations, emphasizing their role in determining facts related to asset loss or damage. It details various tools and methods used in investigations, including information gathering, interrogation, and analysis of data, particularly in the context of addressing counterfeit medications in a pharmaceutical company. The investigation's systematic approach includes defining the problem, collecting relevant data, and verifying information to ensure effective resolution of the issue.

Uploaded by

Jayson Parilla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

SECURITY

INVESTIGATION
FOR
EVERY
ONE!
The function of the investigation is many and

1
multifaceted. From its Latin derivative, vestigare,
investigation implies a tracking, a search, as
assimilation, or collection of information and facts.
Today,many business firms and other organizations
employ investigators directly as part of their in-house
security programs.
2
SECURITY INVESTIGATION
This is the planned and organized
determination of facts concerning specific loss
or damage of assets due to the threats, hazards
or unsecured condition.
3
TOOLS OF SECURITY
INVESTIGATION
There are four specific types of investigation which may be
applicable to security, there are;
1. Information- Knowledge which the
investigator gathers from the other person.
a. Acquired from regular sources-
Conscientious and public –spirit citizens,
company files, school files, or records file of
other agencies.
b. Acquired from cultivated sources –paid
information bartenders, cab driver and
others.
2. INTERROGATION- THE SKILLFUL
QUESTIONING OF A PERSON WHO IS
RELUCTANT TO DIVULGE
INFORMATION CONCERNING THE
OFFENSE UNDER INVESTIGATION
3. INTERVIEW- THE SIMPLE
QUESTIONING OF A WITNESS WHO
HAS NO PERSONAL REASON TO
WITHHOLD INFORMATION.
3. INSTRUMENTATION- THE APPLICATION OF
INSTRUMENTS AND METHODS OF PHYSICAL
SCIENCES TO THE DETECTION OF CRIMES. IN
OTHER WORDS, THE SUM TOTAL OF THE
APPLICATION OF ALL SCIENCES IN CRIME
DETECTION OTHERWISE KNOWN AS
CRIMINALISTICS.
SYSTEMATIC APPROACH
TO AN INVESTIGATOR
4
1.Define the following Problem
a. Know the reason for the investigation
b. Know the particular phases or elements of
investigation assigned to the investigator
c. Know whether the investigation is to be
handled overtly or discreetly.
d. Know the priority and suspense date assigned
to the investigator.
e. Know the origin of the information
A multinational corporation
specializing in pharmaceuticals
receives reports of counterfeit
medications being distributed in
certain regions where their products
are sold. The company decides to
launch an investigation to address the
issue.
Problem: The problem is the presence
of counterfeit medications in the
market, which poses serious risks to
public health and safety, tarnishes
the company's reputation, and
undermines consumer trust in their
products.
Reason for the Investigation: The
investigation aims to identify the source of
the counterfeit medications, assess the
extent of their distribution, determine any
weaknesses in the supply chain or
distribution channels that allowed the
counterfeits to enter the market, and take
appropriate legal and regulatory action to
mitigate the problem.
Phases or Elements of Investigation Assigned to the
Investigator: The investigation involves multiple phases,
including:

Inspecting supply chain and distribution facilities to


identify potential points of entry for counterfeit products.
Interviewing stakeholders, including wholesalers, retailers,
and customers, to gather information about suspicious
transactions or products.
Analyzing product samples to identify counterfeit
characteristics and trace their origins.
Implementing measures to strengthen supply chain
security and enhance product authentication methods.
Handling Overtly or Discreetly: Due to the
sensitive nature of the investigation and the
potential involvement of criminal
organizations, the company decides to
handle the investigation discreetly. They
avoid publicizing their efforts to avoid tipping
off counterfeiters and compromising the
integrity of the investigation.
Priority and Suspense Date Assigned to the
Investigator: Given the urgency of addressing the
issue and protecting public health, the
investigation is assigned the highest priority. The
company sets a suspense date of three months for
the investigator to gather sufficient evidence and
formulate a comprehensive strategy to combat
counterfeit medications effectively.
Origin of the Information: The initial reports of
counterfeit medications come from healthcare
professionals and consumers who notice
discrepancies in the appearance and effects of
certain products. Additionally, regulatory
agencies provide alerts and warnings about
suspicious activities in the pharmaceutical
market, prompting the company to take action
and launch an investigation.
3.Collection of Relevant data
a. Prepare written investigation plan-
represent a guide for work. This covers:

1.Information Needed
2.Methods used in gathering information
3. Location of source to furnish this
information
Information Needed:

Identification of regions where counterfeit


medications are prevalent.
Details of suspicious transactions or suppliers
involved in the distribution of counterfeit
products.
Analysis of product samples to identify counterfeit
characteristics.
Regulatory requirements and guidelines for
reporting and addressing counterfeit medications.
Methods Used in Gathering Information:

Market Research: Conduct surveys and analyze sales data


to identify regions where counterfeit medications are
prevalent.
Covert Investigations: Deploy undercover agents or
investigators to infiltrate counterfeit medication distribution
networks and gather intelligence on suppliers, distribution
channels, and transaction methods.
Product Testing: Collect samples of suspected counterfeit
medications from the market and conduct laboratory
analysis to identify counterfeit characteristics, such as
packaging discrepancies, incorrect labeling, or substandard
ingredients.
Location of Sources to Furnish this Information:

Laboratories: Utilize accredited laboratories equipped


with analytical instruments to conduct product
testing and identify counterfeit characteristics in
samples obtained from the market.
Regulatory Agencies: Collaborate with local and
international regulatory agencies responsible for
overseeing pharmaceutical products to obtain
guidance, share intelligence, and coordinate
enforcement actions against counterfeiters.
3.Collection of Relevant data
b. Methods of sources to be used. Methods
available to and investigator are as follows;

1.Personal Observation
Undercover/used of and agent
Surveillance
Raid and seizure
Direct visit the scene
b. Methods of sources to be used.
Methods available to and investigator are
as follows;

2. Study of document and records


Operational Files
Identity of document
News Papers
b. Methods of sources to be used.
Methods available to and investigator are
as follows;

3. Used of the interrogation and interview


4. Used of the recruited informants
5. Liaison with agencies who poses
information.
5
ANALYSIS AND VERIFIED OF THE
INFORMATION IN TERMS OF:
a. Analysis involves a study of the
information in terms of the questions
set out to answer.

1.) Data collected should be appropriate


and complete.
2.) Information supplied must be factual.
b. Verification Method Involves:

1.) Personal observation of the agent.


2.) Secure reliable statements from
individuals making personal observation
through experience.
3.) Documents or physical evidence –
consulting official records.
DRAWING THE

6 CONCLUSION
It is the function and responsibility of the
person requesting the investigation.

You might also like