FORENSIC ACCOUNTING: A COMPREHENSIVE GUIDE TO CONDUCTING FINANCIAL FRAUD INVESTIGATIONS FOAC/14/01
|
|
- Leo Hamilton
- 8 years ago
- Views:
Transcription
1 FORENSIC ACCOUNTING: A COMPREHENSIVE GUIDE TO CONDUCTING FINANCIAL FRAUD INVESTIGATIONS FOAC/14/01
2 Table of Contents Fundamentals of Forensic Accounting... 1 Public Records and Other Information Sources... 2 Interviews and Interrogations... 3 Observational Evidence... 4 Link Analysis and Related Tools... 5 Paper and Electronic Evidence... 6 Data Analytics... 7 Fraud Responsibilities, Independence Issues, and Investigative Reports... 8 This product is intended to serve solely as an aid in continuing professional education. Due to the constantly changing nature of the subject of the materials, this product is not appropriate to serve as the sole resource for any tax and accounting opinion or return position, and must be supplemented for such purposes with other current authoritative materials. The information in this manual has been carefully compiled from sources believed to be reliable, but its accuracy is not guaranteed. In addition, Surgent McCoy CPE, LLC, its authors, and instructors are not engaged in rendering legal, accounting, or other professional services and will not be held liable for any actions or suits based on this manual or comments made during any presentation. If legal advice or other expert assistance is required, seek the services of a competent professional. Revised February 2014 Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01
3 Fundamentals of Forensic Accounting I. Overview 1 II. Introduction to fraud 1 A. Definition 1 B. AU 240 categories 1 1. Fraudulent financial reporting 1 2. Misappropriation of assets 1 C. ACFE categories 2 III. Introduction to forensic accounting 2 A. Definitions 2 1. According to a firm 2 2. According to a professional committee 2 3. According to an academic 2 B. Skills 3 C. Scope of services 4 IV. Procedures in forensic accounting 4 A. Scientific method 4 1. Ask a question 5 2. Do background research 6 3. Construct a hypothesis 7 4. Test the hypothesis 7 5. Analyze data and draw a conclusion 7 6. Communicate results 8 B. Asking a question -- revisited 8 C. Documenting the amount of the loss 9 D. Recouping the stolen assets 10 E. Improving internal control 10 V. Introduction to forensic evidence 12 A. Observations including surveillance 12 B. Documents 12 C. Physical evidence 12 D. Interviews and interrogations 13 E. Public records 13 F. Link analysis 13 G. Data and other analysis 13 1-i Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01
4 Public Records and Other Information Sources I. Public records 1 A. Overview 1 B. Background reports 2 1. Overview 2 2. Choosing a background check service: preliminary questions 2 3. Choosing a background check service: other features 2 4. Comparison chart 3 C. Tips on searching for a person or entity by name 5 1. Common trip-ups 5 2. Name variations 5 3. Additional information 6 4. Ambiguous entity names 6 D. Choosing what tools to use 6 E. Databases for legal information 7 1. CourtLink 7 2. PACER 7 F. Databases for individual and business searches 7 1. CLEAR 7 2. ACCURINT 8 G. Social media 8 H. Other sources of information 9 1. About businesses 9 2. About financial and legal status Traditional media 10 I. Case studies Uncovering collusion and a fake vendor Narrowing a pool of suspects 11 J. Public research limitations Red tape Unavailable formats Out-of-date information 13 II. Appendix: Online resources 14 A. Search engines 14 B. Locators of individuals and their contact information 14 C. Map providers 14 D. Public records sources 14 E. Legal resources 15 F. Government and criminal justice sites 15 G. Guidance for auditors 16 2-i Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01
5 Interviews and Interrogations I. Overview 1 II. Interviews 1 A. Interviewer qualities 1 B. Preparation 1 1. Interview plan 2 2. Physical environment 2 3. Number of interviewers 2 C. Interview phases 2 1. Introduction 2 2. Establishing rapport 3 3. Questioning 3 4. Summarization 3 5. Closing 3 III. Effective listening 3 A. Active listening 3 1. Eye contact 4 2. Caution 4 B. Avoiding interruption 4 C. Feedback checks with the interviewee 4 1. For clarification 4 2. For understanding of content 4 D. Distinguishing facts, opinions, and hearsay 5 1. Definitions 5 2. Verbal indicators 5 E. Probing 6 1. When to probe 6 2. How to probe 6 F. Avoiding mistakes 7 1. Behaviors that have negative effects on the interviewee 7 2. Keeping emotions positive 8 3. Expressing your needs 8 4. Using soft questions 8 IV. Body language 9 A. Overview 9 B. Frequently observed body language patterns Facial indicators Bodily indicators Verbal indicators 11 C. Limitations and exceptions 11 V. Materials in writing 12 A. Taking notes 12 B. The signed statement 12 VI. Basic questioning techniques 13 A. Overview 13 B. Free narrative (open-ended) 13 C. Direct questions Tips for interviewers asking direct questions 13 D. Cross-examination Definition Tips for cross-examiners 14 E. Question techniques to avoid Leading questions Negatively phrased questions Compound questions Overly complex questions 15 3-i Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01
6 F. Question charts 15 VII. Information specific to interrogations 19 A. As follow-ups to interviews 19 B. Findings on timing 19 C. Typical interrogation failures 19 3-ii Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01
7 Observational Evidence I. Overview 1 A. When peer observation is not enough 1 1. Exploitation of trust 2 2. Collusion and lax oversight 2 II. Observation techniques 3 A. Dumpster diving 3 B. Video devices 3 C. Devices placed on possessions 4 III. Surveillance 5 A. Categories of surveillance 5 1. Overt or covert 5 2. Mobile or fixed 6 3. Loose, close, or both 6 B. Surveillance tips 6 1. Before the operation 6 2. On the scene 7 IV. Undercover operations 8 A. Recent example 8 V. Electronic eavesdropping technologies 8 A. Computer data 8 1. Digital forensics 8 2. Deep packet inspection 9 3. Backdoor Trojans 9 4. Webmail interception 9 B. Phone interception IMSI catcher Mobile phone monitoring 10 4-i Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01
8 Link Analysis and Related Tools I. What is link analysis? 1 A. Social network analysis 2 B. Data mining 2 C. Potential relationship mappings 2 1. Trust network 2 2. Task network 2 3. Cash/financial resources network 2 II. Phases 2 A. Association matrix 2 B. Conversion into a diagram 3 1. Diagram construction process 3 III. Details of link analysis 4 A. Types of links 4 1. Explicit links 4 2. Aggregate links 4 3. Inferred relationships 5 B. Common tasks 5 1. Variable creation 5 2. Simple and complex searches 5 3. Network analysis 5 C. Applications 6 IV. Sample charts 6 A. Association matrix 6 B. Relationship network diagram 7 C. Telephone frequency analysis chart 8 D. Commodity flowchart 9 E. Timeline event flowchart 10 V. Predicting financial criminal behavior 11 A. Important concepts Risk scoring tools Fuzzy logic 12 B. Software Algorithms Geolocation 13 C. Data issues Available products 14 5-i Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01
9 Paper and Electronic Evidence Learning Objectives 1 I. Overview 1 A. Introduction to the electronic format 1 B. Information specific to the paper format 2 1. Paper forgery 2 II. The Federal Rules of Evidence 4 A. Evidence that satisfies the authentication requirement 4 B. The business record exception 5 1. Determining reliability 5 2. Determining authenticity 6 C. Self-authenticating documents 6 1. Definition 6 2. Examples 6 D. Chain of custody 7 1. What to document 8 E. Best evidence rule 8 F. Admissibility of electronic evidence 9 G. Authentication of certain types of electronic evidence s and text messages Computer-generated records Public records Proving content 11 III. Recent developments in ESI readiness 11 A. Relevant cases Swofford v. Eslinger Tango Transport, LLC v. Transport International Pool, Inc Magana v. Hyundai Motor Am. 12 B. In-depth example: Coleman (Parent) Holdings, Inc. v. Morgan Stanley & Co. Inc The case The findings Later trouble 15 C. Effective strategies 15 IV. Electronic crime scene investigation 16 A. Overview 16 B. Electronic devices: types, descriptions, and potential uses as evidence Computer system Storage devices Handheld devices Peripheral devices Computer networks Other potential sources of digital evidence 18 C. Materials for collecting digital evidence 18 D. At the crime scene 19 E. Documenting the electronic crime scene 20 F. Handling of electronic evidence 20 G. Other forms of evidence 21 H. Packaging, transporting, and storing digital evidence Packaging procedures Transportation procedures Storage procedures 22 I. Case-specific evidence suggestions Counterfeiting investigation Problem gambling investigation Online or economic fraud investigation 23 6-i Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01
10 Data Analytics I. Overview of unstructured and structured data 1 A. Unstructured data 1 B. Structured data 2 C. Analysis of both structured and unstructured data 2 II. Forensic analysis -- Deloitte s four-step methodology 2 A. Data identification 2 1. Mapping of electronically stored information 2 2. Identification of structured and unstructured data 3 3. Identification of relevant third-party data 3 B. Forensic collection 3 1. Standard-conscientious collection 3 2. Data integrity check 3 C. Data fusion 3 D. Forensic analytics 4 1. Detection 4 2. Modeling 4 III. Data mining 5 A. Definition 5 B. Tasks 5 1. Anomaly detection (Outlier/change/deviation detection) 5 2. Association rule learning (Dependency modeling) 5 3. Clustering 5 4. Classification 6 5. Regression 6 6. Summarization 6 IV. Tools 6 A. Overview 6 B. Duplicate payment detection 6 C. Benford s law 7 1. In fraud detection 7 D. Fraud, error, or neither: Red flags that can be identified 8 1. Payments 8 2. Invoices 8 3. Vendors 9 V. Case study 10 7-i Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01
11 Fraud Responsibilities, Independence Issues, and Investigative Reports I. Responsibility for the prevention and detection of fraud 1 A. Management s responsibility 1 1. Professional standards 1 2. Anti-fraud program 1 B. External auditor s responsibilities 5 1. Overview 5 2. Auditor s inability to complete the audit 5 3. Communications concerning identified or possible fraud 5 II. Independence and forensic accounting services 6 A. Overview 6 1. AICPA Code of Conduct: Independence, Section (General Requirements for Performing Nonattest Sevices) 6 B. Nonattest services 7 1. Litigation services 7 2. Investigative services 8 III. Forensic accountant s report 9 A. Overview 9 B. Characteristics of a good investigative report 9 1. Effective writing 9 2. Style and tone 9 C. Evidence-related issues 9 1. Possibly extraneous evidence 9 2. Questionable facts 10 D. Sections of the report Introduction Background Presentation of allegations Findings Discussion Conclusions Other matters Recommendations 12 E. Cautionary note 12 8-i Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01
Diploma in Forensic Accounting (Level 4) Course Structure & Contents
Brentwood Open Learning College Diploma in Forensic Accounting (Level 4) Course Structure & Contents Diploma in Forensic Accounting Course Structure & Contents Page 1 Unit 1 Introduction Forensic Accounting
More informationForensic Auditing: The Audit of the Future, Today. Instructor: Ron Durkin, CFE, CPA/CFF, CIRA
Forensic Auditing: The Audit of the Future, Today Instructor: Ron Durkin, CFE, CPA/CFF, CIRA 1 1 Agenda Current events and developments in forensic accounting Define the term forensic auditing What is
More informationFighting Fraud with Data Mining & Analysis
Fighting Fraud with Data Mining & Analysis Leonard W. Vona December 2008 Fraud Auditing, Inc. Phone: 518-784-2250 www.fraudauditing.net E-mail: leonard@leonardvona.com Copyright 2008 Leonard Vona and Fraud
More informationChapter 15. Conducting Investigations and Report Writing
Chapter 15 Conducting Investigations and Report Writing 1 Learning Objectives Understand the circumstances that may necessitate an internal investigation. Identify who should be part of a fraud examination
More informationCan Financial Statement Auditors Detect More Fraud? How Can PCAOB Make that Happen?
Can Financial Statement Auditors Detect More Fraud? How Can PCAOB Make that Happen? David L. Cotton, CPA, CFE, CGFM Cotton & Company, LLP November 20, 2014 The views expressed in these slides are solely
More informationJOB TITLE JOB CODE PAY GRADE EFFECTIVE Medicaid Fraud Intake Officer 26140AG 29 11/15/2015
`STATE OF OHIO (DAS) CLASSIFICATION SPECIFICATION SERIES PURPOSE CLASSIFICATION SERIES Medicaid Special Agent MAJOR AGENCIES Attorney General Only SERIES NUMBER 2614AG EFFECTIVE 11/15/2015 The purpose
More informationCheckpoint Learning Forensic Accounting Certificate Program
Checkpoint Learning Forensic Accounting Certificate Program Powered by CPEasy, part of the Checkpoint Learning portfolio Firm Admin & User s Guide Develop Technical Forensic Accounting Knowledge Tax &
More informationProcurement Fraud Identification & Role of Data Mining
The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application
More informationTypes of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down
Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients
More informationSUN PRAIRIE AREA SCHOOL DISTRICT COURSE POWER STANDARDS. Curriculum Area: Science Course Length: Semester
SUN PRAIRIE AREA SCHOOL DISTRICT COURSE POWER STANDARDS Course Title: Forensic Science Curriculum Area: Science Course Length: Semester Credit Status: ½ Physical Science Credit Date submitted: 7/09 Expected
More informationCONSTRUCTION CONTRACTORS: CRITICAL ACCOUNTING, AUDITING, AND TAX ISSUES IN TODAY S ENVIRONMENT CONS/14/01
CONSTRUCTION CONTRACTORS: CRITICAL ACCOUNTING, AUDITING, AND TAX ISSUES IN TODAY S ENVIRONMENT CONS/14/01 Table of Contents The Construction Industry An Overview... 1 U.S. GAAP and the Construction Industry...
More informationSTATEMENT OF AUDITING STANDARDS 300 AUDIT RISK ASSESSMENTS AND ACCOUNTING AND INTERNAL CONTROL SYSTEMS
STATEMENT OF AUDITING STANDARDS 300 AUDIT RISK ASSESSMENTS AND ACCOUNTING AND INTERNAL CONTROL SYSTEMS (Issued January 1997; revised January 2004) SAS 300 (revised January 04) Contents Paragraphs Introduction
More informationRED FLAGS OF FRAUD MAY 13, 2014 IIA AUSTIN CHAPTER
MAY 13, 2014 IIA AUSTIN CHAPTER 2014 by the Association of Certified Fraud Examiners, Inc. Revised: 3/26/14 No portion of this work may be reproduced or transmitted in any form or by any means electronic
More informationDemystifying Big Data Analytics
Demystifying Big Data Analytics Practical approaches to business intelligence and forensic analytics 9 May 2013 Discussion topics Big Data & Big Data Analytics Current fraud risks - industry research Components
More informationSoftware Engineering. Requirements elicitation - Facts finding. Software Engineering Requirements Elicitation Slide 1
Software Engineering Requirements elicitation - Facts finding Software Engineering Requirements Elicitation Slide 1 Chapter Objectives To introduce software the Requirements Engineering Process To describe
More informationProactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you
3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud
More informationby: Scott Baranowski, CIA
Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf
More informationChapter 7 Conducting Interviews and Investigations
Chapter 7 Conducting Interviews and Investigations Chapter Outline 1. Introduction 2. Planning the Interview 3. Interviewing Skills 4. Interviewing Clients 5. Interviewing Witnesses 6. Planning and Conducting
More informationACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances
ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3
More informationHow To Audit A Financial Statement
INTERNATIONAL STANDARD ON 400 RISK ASSESSMENTS AND INTERNAL CONTROL (This Standard is effective, but will be withdrawn when ISA 315 and 330 become effective) * CONTENTS Paragraph Introduction... 1-10 Inherent
More informationUsing Data Analytics to Detect Fraud. Other Data Analysis Techniques
Using Data Analytics to Detect Fraud Other Data Analysis Techniques Qualitative Data Analysis Most data analysis techniques require the use of data in the form of numbers. Qualitative data analysis is
More informationCriminal Justice II, August 2013, Page 1 of 5
Indiana Department of Education Academic Course Framework CRIMINAL JUSTICE II Criminal Justice II introduces students to concepts and practices in controlling traffic as well as forensic investigation
More informationWhy is Internal Audit so Hard?
Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets
More informationFRD506. Financial investigation and Forensic Accounting - 30 hours. Objectives
FRD506 Financial investigation and Forensic Accounting - 30 hours Objectives This course Financial Investigation and Forensic Accounting, Third Edition examines different types of offenses with a financial
More informationFraud Control Theory
13 Fraud Control Theory Using a variation of a saying from the 1960s, fraud happens. Like all costs of doing business, fraud must be managed. Management must recognize that people commit fraudulent acts
More informationNeil Meikle, Associate Director, Forensic Technology, PwC
Case Study: Big Data Forensics Neil Meikle, Associate Director, Forensic Technology, PwC 6 November 2012 About me Transferred to Kuala Lumpur from PwC s Forensic Technology practice in London, England
More informationFraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview
More informationA Preliminary Investigation of the Necessary Skills, Education Requirements, and Training Requirements for Forensic Accountants
Journal of Forensic & Investigative Accounting Vol. 2, Issue 2 A Preliminary Investigation of the Necessary Skills, Education Requirements, and Training Requirements for Forensic Accountants Dorothy A.
More informationGAO. Government Auditing Standards: Implementation Tool
United States Government Accountability Office GAO By the Comptroller General of the United States December 2007 Government Auditing Standards: Implementation Tool Professional Requirements Tool for Use
More informationUsing Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG
Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG MACPA Government & Non Profit Conference April 26, 2013 Isaiah Goodall, Director of Business
More informationSTATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION
STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION TITLE GRADE EEO-4 CODE AG Deputy Chief Investigator 42 D 13.246 SERIES CONCEPT Criminal Investigators
More informationA Guide to Forensic Accounting Investigation. 2nd Edition
Brochure More information from http://www.researchandmarkets.com/reports/2211320/ A Guide to Forensic Accounting Investigation. 2nd Edition Description: Recent catastrophic business failures have caused
More informationIntroduction. IMF Conference September 2008
Live Forensic Acquisition as Alternative to Traditional Forensic Processes Marthie Lessing* Basie von Solms Introduction The Internet and technology developments introduced a sharp increase in computer
More informationThis position is a Pay Band 65.
NEW MEXICO STATE PERSONNEL OFFICE invites applications for the position of: Detective and Criminal Investigator-Advanced (PRC #4182) SALARY: $14.68 - $26.11 Hourly $30,534.40 - $54,308.80 Annually OPENING
More informationItem 10 Appendix 1d Final Internal Audit Report Performance Management Greater London Authority April 2010
Item 10 Appendix 1d Final Internal Audit Report Performance Management Greater London Authority April 2010 This report has been prepared on the basis of the limitations set out on page 16. Contents Page
More informationFraud Prevention and Deterrence
Fraud Prevention and Deterrence Fraud Prevention Programs 2016 Association of Certified Fraud Examiners, Inc. Fraud Prevention Policy The best way to sell the establishment of a fraud policy is by stressing
More informationFraud Risk Management and Internal Audting
Fraud Risk Management and Internal Audting Waheed Alkahtani CFE and CCEP-I Saudi Aramco Internal Auditing Special Audits Division Copyright 2015, Saudi Aramco. All rights reserved. February 2015 What do
More informationForensic Audit Building a World Class Program
Forensic Audit Building a World Class Program PAUL E. ZIKMUND DIRECTOR GLOBAL INTEGRITY AND FORENSIC AUDIT 1 2012 ACFE ANNUAL FRAUD CONFERENCE ORLANDO, FL Why the Need for Forensic Audit Program In response
More informationServices. Computer Forensic Investigations
DataTriangle, Inc. is uniquely structured to provide you with a high quality expert as expeditiously as possible. Charles Snipes has nearly 15 years of experience with criminal investigations in the areas
More informationThe State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology
The State of Insurance Fraud Technology A study of insurer use, strategies and plans for anti-fraud technology September 2014 The State of Insurance Fraud Technology A study of insurer use, strategies
More informationCyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
More informationDan French Founder & CEO, Consider Solutions
Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The
More informationDIGITAL FORENSIC TECHNOLOGY SEE BEYOND THE NUMBERS
DIGITAL FORENSIC TECHNOLOGY Key Terms and Definitions Forensic Technology e-discovery Computer Forensics Data Analysis / Data Mining FRCP - Revised Key Terms and Definitions Forensic Technology - The application
More informationCONTENTS PREFACE 1 INTRODUCTION 1 2 DATA VISUALIZATION 19
PREFACE xi 1 INTRODUCTION 1 1.1 Overview 1 1.2 Definition 1 1.3 Preparation 2 1.3.1 Overview 2 1.3.2 Accessing Tabular Data 3 1.3.3 Accessing Unstructured Data 3 1.3.4 Understanding the Variables and Observations
More informationForensic accounting and the law: The forensic accountant in the capacity of an expert witness
MPRA Munich Personal RePEc Archive Forensic accounting and the law: The forensic accountant in the capacity of an expert witness Marianne Ojo Covenant University 18. April 2012 Online at https://mpra.ub.uni-muenchen.de/38180/
More informationSecurity, and Intelligence
Machine Learning Forensics for Law Enforcement, Security, and Intelligence Jesus Mena CRC Press Taylor &. Francis Group Boca Raton London NewYork CRC Press is an imprint of the Taylor & Francis Croup,
More informationUsing Technology to Automate Fraud Detection Within Key Business Process Areas
Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd
More informationILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION STATE POLICE EVIDENCE TECHNICIAN SERIES
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION STATE POLICE EVIDENCE TECHNICIAN SERIES CLASS TITLE POSITION CODE STATE POLICE EVIDENCE TECHNICIAN I 41901 STATE POLICE EVIDENCE TECHNICIAN
More informationUsing Data Mining to Detect Insurance Fraud
IBM SPSS Modeler Using Data Mining to Detect Insurance Fraud Improve accuracy and minimize loss Highlights: combines powerful analytical techniques with existing fraud detection and prevention efforts
More informationIII. Best Practices/Resources
Reviewing the Application/Resume Before beginning the screening process, take a few minutes to review the job description and the established evaluation criteria. The purpose of the initial screening of
More informationMay 2011 Report No. 11-030. An Audit Report on Substance Abuse Program Contract Monitoring at the Department of State Health Services
John Keel, CPA State Auditor An Audit Report on Substance Abuse Program Contract Monitoring at the Department of State Health Services Report No. 11-030 An Audit Report on Substance Abuse Program Contract
More informationVirginia English Standards of Learning Grade 8
A Correlation of Prentice Hall Writing Coach 2012 To the Virginia English Standards of Learning A Correlation of, 2012, Introduction This document demonstrates how, 2012, meets the objectives of the. Correlation
More information(1) Commercial Crime Insurance or Employee Fidelity Bond
INSURANCE (A) GENERAL CONSIDERATIONS This document presents the minimum insurance requirements as set forth by the United States Trustee Program (USTP). A standing trustee must purchase property insurance
More informationThe Anti-fraud Plan Guide that follows is principally intended to benefit those property and casualty insurers who must file Pennsylvania anti-fraud
The Anti-fraud Plan Guide that follows is principally intended to benefit those property and casualty insurers who must file Pennsylvania anti-fraud plans with the Department. Separately, a Model Pennsylvania
More informationTHE FRAUD PREVENTION CHECK-UP 1 HOW COMPLETING THIS CHECK-UP CAN BENEFIT YOUR ORGANIZATION
THE FRAUD PREVENTION CHECK-UP 1 HOW COMPLETING THIS CHECK-UP CAN BENEFIT YOUR ORGANIZATION It can help your organization survive an increasingly inhospitable business environment. Due in part to a long-term,
More informationGuidelines for Investigations
Guidelines for Investigations Table of Contents Investigative Responsibility Page 3 Investigations...Page 4 Qualitative Standards.Page 5 Investigative Techniques and Suggestions Page 7 Interviewing the
More informationACE elite fraudprotector
ACE elite fraudprotector Commercial Crime Insurance Policy ACE elite fraudprotector Insurance Policy (ed. AU 09/10) It wouldn t happen to us ACE elite fraudprotector Insurance Policy Fraud is a major threat
More informationInformation Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
More informationHow To Prevent Fraud On A Credit Card
Fraud Detection and Prevention Financial Management Advisory Council August 28, 2014 Sarah Mahugh, CPA, MBA Financial Audit Audit Manager Overview Fraud trends Fraud Risks and internal controls Case Studies
More informationQi Liu Rutgers Business School ISACA New York 2013
Qi Liu Rutgers Business School ISACA New York 2013 1 What is Audit Analytics The use of data analysis technology in Auditing. Audit analytics is the process of identifying, gathering, validating, analyzing,
More informationSan Francisco Chapter. Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young
Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young Learning Objectives Understand how data analysis can impact/improve business Understand typical data analysis challenges Understand the various
More informationAdvanced Data Analytics, the Fraudsters Worst Enemy
Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability
More informationLEN 221: Principles of Criminal Investigation Syllabus 3 lecture hours / 3 credits CATALOG DESCRIPTION
1 LEN 221: Principles of Criminal Investigation Syllabus 3 lecture hours / 3 credits CATALOG DESCRIPTION Prerequisite: Undergraduate level RDG 099 Minimum Grade of P or Undergraduate level RDG 055 Minimum
More informationCourse Forensic Science. Unit II History
Course Forensic Science Unit II History Essential Question What is legally and ethically expected of forensic scientists and Crime Scene Investigators? TEKS 130.295(c) (4)(C) Prior Student Learning History
More informationSTATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION
STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION TITLE GRADE EEO-4 CODE SUPERVISORY CRIMINAL INVESTIGATOR II 43* D 13.241 SUPERVISORY CRIMINAL INVESTIGATOR
More informationKeith Barger MFS, MCSE, CCE
Keith Barger MFS, MCSE, CCE Principal/Practice Leader Advisory Services Keith Barger is a Principal in the Advisory Services practice with Grant Thornton and the Practice Leader for Forensic Accounting
More informationILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES CLASS TITLE POSITION CODE EFFECTIVE FORENSIC SCIENTIST TRAINEE 15897 5/1/10 FORENSIC SCIENTIST I 15891 5/1/10
More informationPROPOSAL GRADUATE CERTIFICATE IN FORENSIC ACCOUNTING FRAUD INVESTIGATION TO BE OFFERED AT PURDUE UNIVERSITY CALUMET
Graduate Council Document 08-41a Approved by the Graduate Council on May 6, 2010 PROPOSAL GRADUATE CERTIFICATE IN FORENSIC ACCOUNTING & FRAUD INVESTIGATION TO BE OFFERED AT PURDUE UNIVERSITY CALUMET Proposal
More informationBig Data s Big Impact In Financial Investigations
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Big Data s Big Impact In Financial Investigations
More informationCYBERSECURITY EXAMINATION SWEEP SUMMARY
This Risk Alert provides summary observations from OCIE s examinations of registered broker-dealers and investment advisers, conducted under the Cybersecurity Examination Initiative, announced April 15,
More informationTHE ABC S OF DATA ANALYTICS
THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable
More informationForensic Audit and Automated Oversight Federal Audit Executive Council September 24, 2009
Forensic Audit and Automated Oversight Federal Audit Executive Council September 24, 2009 Dr. Brett Baker, CPA, CISA Assistant Inspector General for Audit U.S. Department of Commerce OIG Overview Forensic
More informationSUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
More informationTASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631)
TASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631) 1. Initiates investigations of alleged loss or theft of department property such as inventory, assets, and/or cash after notification of such
More informationStages of the Audit Process
Chapter 5 Stages of the Audit Process Learning Objectives Upon completion of this chapter you should be able to explain: LO 1 Explain the audit process. LO 2 Accept a new client or confirming the continuance
More informationAPPENDIX B STATEMENT OF WORK WORKERS COMPENSATION FRAUD INVESTIGATION SERVICES
APPENDIX B STATEMENT OF WORK WORKERS COMPENSATION FRAUD INVESTIGATION SERVICES TABLE OF CONTENTS SECTION TITLE PAGE 1.0 SCOPE OF WORK... 1 2.0 RESPONSIBILITIES... 1 COUNTY 2.1 Work Order... 1 2.2 Personnel...
More informationSouth Australia Police POSITION INFORMATION DOCUMENT
South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-7 Service : Crime Service Position
More informationFraud Prevention Training
Fraud Prevention Training Kim Turner, Chief Audit Executive Emily Knopp, Audit Director Fraud Prevention: WHAT YOU WILL LEARN & FRAUD FACTS What you will take away with you: Glossary of Fraud Terms Details
More informationREPORT WRITING MANUAL
REPORT WRITING MANUAL III. WRITING FRAUD EXAMINATION REPORTS Report Structure Report formats vary widely. Some organizations, especially governmental investigative bodies, use report forms so that case
More informationK-12 EDUCATION Introduction and Capabilities K-12 Education
K-12 EDUCATION Introduction and Capabilities Hanover provides high-quality, timely, and well-articulated services working closely with our staff. Whether working with staff who have significant grant and
More informationPREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM
IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM Auditors need to understand that while audit findings are common, they are not necessarily fraud and due care is needed in building evidence.
More informationAntifraud program and controls assessment grid*
Advisory Services Antifraud program and * Fraud risks & controls February 2008 *connectedthinking 2008 PricewaterhouseCoopers LLP. All rights reserved. PricewaterhouseCoopers refers to PricewaterhouseCoopers
More informationThis report provides the project s findings, including its three practical, actionable products:
Executive Summary Security metrics support the value proposition of an organization s security operation. Without compelling metrics, security professionals and their budgets continue largely on the intuition
More informationFraud Prevention and Deterrence
Fraud Prevention and Deterrence Fraud Risk Assessment 2016 Association of Certified Fraud Examiners, Inc. What Is Fraud Risk? The vulnerability that an organization faces from individuals capable of combining
More informationTYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order 360.01 9/25/2014 9/25/2014
TYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order 360.01 9/25/2014 9/25/2014 SUBJECT TITLE PREVIOUSLY ISSUED DATES Criminal Investigations 7/4/2014 REFERENCE RE-EVALUATION DATE CALEA
More informationFINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
More informationQUESTION ONE (31 MARKS) INSTRUCTIONS: Answer Question One and Any Other Three Questions
UNIVERSITY EXAMINATIONS: 2012/2013 EXAMINATION FOR THE MASTERS OF SCIENCE (MSC) IN COMMERCE (FINANCE AND ACCOUNTING) MFA 601 FORENSIC ACCOUNTING AND LEGAL ENVIRONMENT DATE: APRIL, 2014 TIME: 3 HOURS INSTRUCTIONS:
More informationInformation for Management of a Service Organization
Information for Management of a Service Organization Copyright 2011 American Institute of Certified Public Accountants, Inc. New York, NY 10036-8775 All rights reserved. For information about the procedure
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
More informationGLOBAL PORTS INVESTMENTS PLC
Adopted by the Directors of GLOBAL PORTS INVESTMENTS PLC Resolution of 14 July 2008 GLOBAL PORTS INVESTMENTS PLC (previously GLOBAL PORTS INVESTMENTS LTD) ANTI-FRAUD POLICY TABLE OF CONTENTS 1. INTRODUCTION.....
More informationPartner With Your Auditor on Controls
WHITE PAPER Partner With Your Auditor on Controls How management can help its auditors address PCAOB inspections findings on internal control Written by Thomas Ray, Distinguished Lecturer at Baruch College
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
More informationCertified Forensic Accounting Professional
Certified Forensic Accounting Professional Insurance Specialization Certification in Insurance Frauds Certified Forensic Accounting Professional is the premier certification in India in the antifraud domain.
More informationTHE IMPACT AND REALITY OF FRAUD AUDITING GETTING STARTED WITH A FRAUD INVESTIGATION
THE IMPACT AND REALITY OF FRAUD AUDITING GETTING STARTED WITH A FRAUD INVESTIGATION This presentation addresses the fundamentals related to initiating a fraud investigation, including the handling of tips,
More informationCorporate Resiliency Managing g the Growing Risk of Fraud and Corruption
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption Toby Bishop, Director, Deloitte Forensic Center Deloitte Financial Advisory Services LLP Contents Why corporate resiliency? What
More informationA BEST PRACTICE APPROACH TO LIVE FORENSIC ACQUISITION
A BEST PRACTICE APPROACH TO LIVE FORENSIC ACQUISITION MM Grobler 1, SH von Solms 2 1 Council for Scientific and Industrial Research, Pretoria, South Africa 2 Academy for Information Technology, University
More informationBenefits fraud: Shrink the risk Gain group plan sustainability
Benefits fraud: Shrink the risk Gain group plan sustainability Life s brighter under the sun Fraud: A real threat to group plan sustainability Fraud in group benefits has always existed, but never has
More informationMARKET CONDUCT ASSESSMENT REPORT
MARKET CONDUCT ASSESSMENT REPORT PART 1 STATUTORY ACCIDENT BENEFITS SCHEDULE (SABS) PART 2 RATE VERIFICATION PROCESS Phase 1 (2012) Financial Services Commission of Ontario (FSCO) Market Regulation Branch
More informationSemi-structured interviews
Semi-structured interviews 3 rd December 2014 Prof. Edwin van Teijlingen BU Graduate School Aim of this session: introduce various ways of conducting interviews with qualitative methods; outline strength
More information