FORENSIC ACCOUNTING: A COMPREHENSIVE GUIDE TO CONDUCTING FINANCIAL FRAUD INVESTIGATIONS FOAC/14/01

Size: px
Start display at page:

Download "FORENSIC ACCOUNTING: A COMPREHENSIVE GUIDE TO CONDUCTING FINANCIAL FRAUD INVESTIGATIONS FOAC/14/01"

Transcription

1 FORENSIC ACCOUNTING: A COMPREHENSIVE GUIDE TO CONDUCTING FINANCIAL FRAUD INVESTIGATIONS FOAC/14/01

2 Table of Contents Fundamentals of Forensic Accounting... 1 Public Records and Other Information Sources... 2 Interviews and Interrogations... 3 Observational Evidence... 4 Link Analysis and Related Tools... 5 Paper and Electronic Evidence... 6 Data Analytics... 7 Fraud Responsibilities, Independence Issues, and Investigative Reports... 8 This product is intended to serve solely as an aid in continuing professional education. Due to the constantly changing nature of the subject of the materials, this product is not appropriate to serve as the sole resource for any tax and accounting opinion or return position, and must be supplemented for such purposes with other current authoritative materials. The information in this manual has been carefully compiled from sources believed to be reliable, but its accuracy is not guaranteed. In addition, Surgent McCoy CPE, LLC, its authors, and instructors are not engaged in rendering legal, accounting, or other professional services and will not be held liable for any actions or suits based on this manual or comments made during any presentation. If legal advice or other expert assistance is required, seek the services of a competent professional. Revised February 2014 Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01

3 Fundamentals of Forensic Accounting I. Overview 1 II. Introduction to fraud 1 A. Definition 1 B. AU 240 categories 1 1. Fraudulent financial reporting 1 2. Misappropriation of assets 1 C. ACFE categories 2 III. Introduction to forensic accounting 2 A. Definitions 2 1. According to a firm 2 2. According to a professional committee 2 3. According to an academic 2 B. Skills 3 C. Scope of services 4 IV. Procedures in forensic accounting 4 A. Scientific method 4 1. Ask a question 5 2. Do background research 6 3. Construct a hypothesis 7 4. Test the hypothesis 7 5. Analyze data and draw a conclusion 7 6. Communicate results 8 B. Asking a question -- revisited 8 C. Documenting the amount of the loss 9 D. Recouping the stolen assets 10 E. Improving internal control 10 V. Introduction to forensic evidence 12 A. Observations including surveillance 12 B. Documents 12 C. Physical evidence 12 D. Interviews and interrogations 13 E. Public records 13 F. Link analysis 13 G. Data and other analysis 13 1-i Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01

4 Public Records and Other Information Sources I. Public records 1 A. Overview 1 B. Background reports 2 1. Overview 2 2. Choosing a background check service: preliminary questions 2 3. Choosing a background check service: other features 2 4. Comparison chart 3 C. Tips on searching for a person or entity by name 5 1. Common trip-ups 5 2. Name variations 5 3. Additional information 6 4. Ambiguous entity names 6 D. Choosing what tools to use 6 E. Databases for legal information 7 1. CourtLink 7 2. PACER 7 F. Databases for individual and business searches 7 1. CLEAR 7 2. ACCURINT 8 G. Social media 8 H. Other sources of information 9 1. About businesses 9 2. About financial and legal status Traditional media 10 I. Case studies Uncovering collusion and a fake vendor Narrowing a pool of suspects 11 J. Public research limitations Red tape Unavailable formats Out-of-date information 13 II. Appendix: Online resources 14 A. Search engines 14 B. Locators of individuals and their contact information 14 C. Map providers 14 D. Public records sources 14 E. Legal resources 15 F. Government and criminal justice sites 15 G. Guidance for auditors 16 2-i Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01

5 Interviews and Interrogations I. Overview 1 II. Interviews 1 A. Interviewer qualities 1 B. Preparation 1 1. Interview plan 2 2. Physical environment 2 3. Number of interviewers 2 C. Interview phases 2 1. Introduction 2 2. Establishing rapport 3 3. Questioning 3 4. Summarization 3 5. Closing 3 III. Effective listening 3 A. Active listening 3 1. Eye contact 4 2. Caution 4 B. Avoiding interruption 4 C. Feedback checks with the interviewee 4 1. For clarification 4 2. For understanding of content 4 D. Distinguishing facts, opinions, and hearsay 5 1. Definitions 5 2. Verbal indicators 5 E. Probing 6 1. When to probe 6 2. How to probe 6 F. Avoiding mistakes 7 1. Behaviors that have negative effects on the interviewee 7 2. Keeping emotions positive 8 3. Expressing your needs 8 4. Using soft questions 8 IV. Body language 9 A. Overview 9 B. Frequently observed body language patterns Facial indicators Bodily indicators Verbal indicators 11 C. Limitations and exceptions 11 V. Materials in writing 12 A. Taking notes 12 B. The signed statement 12 VI. Basic questioning techniques 13 A. Overview 13 B. Free narrative (open-ended) 13 C. Direct questions Tips for interviewers asking direct questions 13 D. Cross-examination Definition Tips for cross-examiners 14 E. Question techniques to avoid Leading questions Negatively phrased questions Compound questions Overly complex questions 15 3-i Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01

6 F. Question charts 15 VII. Information specific to interrogations 19 A. As follow-ups to interviews 19 B. Findings on timing 19 C. Typical interrogation failures 19 3-ii Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01

7 Observational Evidence I. Overview 1 A. When peer observation is not enough 1 1. Exploitation of trust 2 2. Collusion and lax oversight 2 II. Observation techniques 3 A. Dumpster diving 3 B. Video devices 3 C. Devices placed on possessions 4 III. Surveillance 5 A. Categories of surveillance 5 1. Overt or covert 5 2. Mobile or fixed 6 3. Loose, close, or both 6 B. Surveillance tips 6 1. Before the operation 6 2. On the scene 7 IV. Undercover operations 8 A. Recent example 8 V. Electronic eavesdropping technologies 8 A. Computer data 8 1. Digital forensics 8 2. Deep packet inspection 9 3. Backdoor Trojans 9 4. Webmail interception 9 B. Phone interception IMSI catcher Mobile phone monitoring 10 4-i Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01

8 Link Analysis and Related Tools I. What is link analysis? 1 A. Social network analysis 2 B. Data mining 2 C. Potential relationship mappings 2 1. Trust network 2 2. Task network 2 3. Cash/financial resources network 2 II. Phases 2 A. Association matrix 2 B. Conversion into a diagram 3 1. Diagram construction process 3 III. Details of link analysis 4 A. Types of links 4 1. Explicit links 4 2. Aggregate links 4 3. Inferred relationships 5 B. Common tasks 5 1. Variable creation 5 2. Simple and complex searches 5 3. Network analysis 5 C. Applications 6 IV. Sample charts 6 A. Association matrix 6 B. Relationship network diagram 7 C. Telephone frequency analysis chart 8 D. Commodity flowchart 9 E. Timeline event flowchart 10 V. Predicting financial criminal behavior 11 A. Important concepts Risk scoring tools Fuzzy logic 12 B. Software Algorithms Geolocation 13 C. Data issues Available products 14 5-i Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01

9 Paper and Electronic Evidence Learning Objectives 1 I. Overview 1 A. Introduction to the electronic format 1 B. Information specific to the paper format 2 1. Paper forgery 2 II. The Federal Rules of Evidence 4 A. Evidence that satisfies the authentication requirement 4 B. The business record exception 5 1. Determining reliability 5 2. Determining authenticity 6 C. Self-authenticating documents 6 1. Definition 6 2. Examples 6 D. Chain of custody 7 1. What to document 8 E. Best evidence rule 8 F. Admissibility of electronic evidence 9 G. Authentication of certain types of electronic evidence s and text messages Computer-generated records Public records Proving content 11 III. Recent developments in ESI readiness 11 A. Relevant cases Swofford v. Eslinger Tango Transport, LLC v. Transport International Pool, Inc Magana v. Hyundai Motor Am. 12 B. In-depth example: Coleman (Parent) Holdings, Inc. v. Morgan Stanley & Co. Inc The case The findings Later trouble 15 C. Effective strategies 15 IV. Electronic crime scene investigation 16 A. Overview 16 B. Electronic devices: types, descriptions, and potential uses as evidence Computer system Storage devices Handheld devices Peripheral devices Computer networks Other potential sources of digital evidence 18 C. Materials for collecting digital evidence 18 D. At the crime scene 19 E. Documenting the electronic crime scene 20 F. Handling of electronic evidence 20 G. Other forms of evidence 21 H. Packaging, transporting, and storing digital evidence Packaging procedures Transportation procedures Storage procedures 22 I. Case-specific evidence suggestions Counterfeiting investigation Problem gambling investigation Online or economic fraud investigation 23 6-i Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01

10 Data Analytics I. Overview of unstructured and structured data 1 A. Unstructured data 1 B. Structured data 2 C. Analysis of both structured and unstructured data 2 II. Forensic analysis -- Deloitte s four-step methodology 2 A. Data identification 2 1. Mapping of electronically stored information 2 2. Identification of structured and unstructured data 3 3. Identification of relevant third-party data 3 B. Forensic collection 3 1. Standard-conscientious collection 3 2. Data integrity check 3 C. Data fusion 3 D. Forensic analytics 4 1. Detection 4 2. Modeling 4 III. Data mining 5 A. Definition 5 B. Tasks 5 1. Anomaly detection (Outlier/change/deviation detection) 5 2. Association rule learning (Dependency modeling) 5 3. Clustering 5 4. Classification 6 5. Regression 6 6. Summarization 6 IV. Tools 6 A. Overview 6 B. Duplicate payment detection 6 C. Benford s law 7 1. In fraud detection 7 D. Fraud, error, or neither: Red flags that can be identified 8 1. Payments 8 2. Invoices 8 3. Vendors 9 V. Case study 10 7-i Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01

11 Fraud Responsibilities, Independence Issues, and Investigative Reports I. Responsibility for the prevention and detection of fraud 1 A. Management s responsibility 1 1. Professional standards 1 2. Anti-fraud program 1 B. External auditor s responsibilities 5 1. Overview 5 2. Auditor s inability to complete the audit 5 3. Communications concerning identified or possible fraud 5 II. Independence and forensic accounting services 6 A. Overview 6 1. AICPA Code of Conduct: Independence, Section (General Requirements for Performing Nonattest Sevices) 6 B. Nonattest services 7 1. Litigation services 7 2. Investigative services 8 III. Forensic accountant s report 9 A. Overview 9 B. Characteristics of a good investigative report 9 1. Effective writing 9 2. Style and tone 9 C. Evidence-related issues 9 1. Possibly extraneous evidence 9 2. Questionable facts 10 D. Sections of the report Introduction Background Presentation of allegations Findings Discussion Conclusions Other matters Recommendations 12 E. Cautionary note 12 8-i Copyright 2014 Surgent McCoy CPE, LLC -- FOAC/14/01

Diploma in Forensic Accounting (Level 4) Course Structure & Contents

Diploma in Forensic Accounting (Level 4) Course Structure & Contents Brentwood Open Learning College Diploma in Forensic Accounting (Level 4) Course Structure & Contents Diploma in Forensic Accounting Course Structure & Contents Page 1 Unit 1 Introduction Forensic Accounting

More information

Forensic Auditing: The Audit of the Future, Today. Instructor: Ron Durkin, CFE, CPA/CFF, CIRA

Forensic Auditing: The Audit of the Future, Today. Instructor: Ron Durkin, CFE, CPA/CFF, CIRA Forensic Auditing: The Audit of the Future, Today Instructor: Ron Durkin, CFE, CPA/CFF, CIRA 1 1 Agenda Current events and developments in forensic accounting Define the term forensic auditing What is

More information

Fighting Fraud with Data Mining & Analysis

Fighting Fraud with Data Mining & Analysis Fighting Fraud with Data Mining & Analysis Leonard W. Vona December 2008 Fraud Auditing, Inc. Phone: 518-784-2250 www.fraudauditing.net E-mail: leonard@leonardvona.com Copyright 2008 Leonard Vona and Fraud

More information

Chapter 15. Conducting Investigations and Report Writing

Chapter 15. Conducting Investigations and Report Writing Chapter 15 Conducting Investigations and Report Writing 1 Learning Objectives Understand the circumstances that may necessitate an internal investigation. Identify who should be part of a fraud examination

More information

Can Financial Statement Auditors Detect More Fraud? How Can PCAOB Make that Happen?

Can Financial Statement Auditors Detect More Fraud? How Can PCAOB Make that Happen? Can Financial Statement Auditors Detect More Fraud? How Can PCAOB Make that Happen? David L. Cotton, CPA, CFE, CGFM Cotton & Company, LLP November 20, 2014 The views expressed in these slides are solely

More information

JOB TITLE JOB CODE PAY GRADE EFFECTIVE Medicaid Fraud Intake Officer 26140AG 29 11/15/2015

JOB TITLE JOB CODE PAY GRADE EFFECTIVE Medicaid Fraud Intake Officer 26140AG 29 11/15/2015 `STATE OF OHIO (DAS) CLASSIFICATION SPECIFICATION SERIES PURPOSE CLASSIFICATION SERIES Medicaid Special Agent MAJOR AGENCIES Attorney General Only SERIES NUMBER 2614AG EFFECTIVE 11/15/2015 The purpose

More information

Checkpoint Learning Forensic Accounting Certificate Program

Checkpoint Learning Forensic Accounting Certificate Program Checkpoint Learning Forensic Accounting Certificate Program Powered by CPEasy, part of the Checkpoint Learning portfolio Firm Admin & User s Guide Develop Technical Forensic Accounting Knowledge Tax &

More information

Procurement Fraud Identification & Role of Data Mining

Procurement Fraud Identification & Role of Data Mining The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application

More information

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients

More information

SUN PRAIRIE AREA SCHOOL DISTRICT COURSE POWER STANDARDS. Curriculum Area: Science Course Length: Semester

SUN PRAIRIE AREA SCHOOL DISTRICT COURSE POWER STANDARDS. Curriculum Area: Science Course Length: Semester SUN PRAIRIE AREA SCHOOL DISTRICT COURSE POWER STANDARDS Course Title: Forensic Science Curriculum Area: Science Course Length: Semester Credit Status: ½ Physical Science Credit Date submitted: 7/09 Expected

More information

CONSTRUCTION CONTRACTORS: CRITICAL ACCOUNTING, AUDITING, AND TAX ISSUES IN TODAY S ENVIRONMENT CONS/14/01

CONSTRUCTION CONTRACTORS: CRITICAL ACCOUNTING, AUDITING, AND TAX ISSUES IN TODAY S ENVIRONMENT CONS/14/01 CONSTRUCTION CONTRACTORS: CRITICAL ACCOUNTING, AUDITING, AND TAX ISSUES IN TODAY S ENVIRONMENT CONS/14/01 Table of Contents The Construction Industry An Overview... 1 U.S. GAAP and the Construction Industry...

More information

STATEMENT OF AUDITING STANDARDS 300 AUDIT RISK ASSESSMENTS AND ACCOUNTING AND INTERNAL CONTROL SYSTEMS

STATEMENT OF AUDITING STANDARDS 300 AUDIT RISK ASSESSMENTS AND ACCOUNTING AND INTERNAL CONTROL SYSTEMS STATEMENT OF AUDITING STANDARDS 300 AUDIT RISK ASSESSMENTS AND ACCOUNTING AND INTERNAL CONTROL SYSTEMS (Issued January 1997; revised January 2004) SAS 300 (revised January 04) Contents Paragraphs Introduction

More information

RED FLAGS OF FRAUD MAY 13, 2014 IIA AUSTIN CHAPTER

RED FLAGS OF FRAUD MAY 13, 2014 IIA AUSTIN CHAPTER MAY 13, 2014 IIA AUSTIN CHAPTER 2014 by the Association of Certified Fraud Examiners, Inc. Revised: 3/26/14 No portion of this work may be reproduced or transmitted in any form or by any means electronic

More information

Demystifying Big Data Analytics

Demystifying Big Data Analytics Demystifying Big Data Analytics Practical approaches to business intelligence and forensic analytics 9 May 2013 Discussion topics Big Data & Big Data Analytics Current fraud risks - industry research Components

More information

Software Engineering. Requirements elicitation - Facts finding. Software Engineering Requirements Elicitation Slide 1

Software Engineering. Requirements elicitation - Facts finding. Software Engineering Requirements Elicitation Slide 1 Software Engineering Requirements elicitation - Facts finding Software Engineering Requirements Elicitation Slide 1 Chapter Objectives To introduce software the Requirements Engineering Process To describe

More information

Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you

Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you 3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud

More information

by: Scott Baranowski, CIA

by: Scott Baranowski, CIA Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf

More information

Chapter 7 Conducting Interviews and Investigations

Chapter 7 Conducting Interviews and Investigations Chapter 7 Conducting Interviews and Investigations Chapter Outline 1. Introduction 2. Planning the Interview 3. Interviewing Skills 4. Interviewing Clients 5. Interviewing Witnesses 6. Planning and Conducting

More information

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3

More information

How To Audit A Financial Statement

How To Audit A Financial Statement INTERNATIONAL STANDARD ON 400 RISK ASSESSMENTS AND INTERNAL CONTROL (This Standard is effective, but will be withdrawn when ISA 315 and 330 become effective) * CONTENTS Paragraph Introduction... 1-10 Inherent

More information

Using Data Analytics to Detect Fraud. Other Data Analysis Techniques

Using Data Analytics to Detect Fraud. Other Data Analysis Techniques Using Data Analytics to Detect Fraud Other Data Analysis Techniques Qualitative Data Analysis Most data analysis techniques require the use of data in the form of numbers. Qualitative data analysis is

More information

Criminal Justice II, August 2013, Page 1 of 5

Criminal Justice II, August 2013, Page 1 of 5 Indiana Department of Education Academic Course Framework CRIMINAL JUSTICE II Criminal Justice II introduces students to concepts and practices in controlling traffic as well as forensic investigation

More information

Why is Internal Audit so Hard?

Why is Internal Audit so Hard? Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets

More information

FRD506. Financial investigation and Forensic Accounting - 30 hours. Objectives

FRD506. Financial investigation and Forensic Accounting - 30 hours. Objectives FRD506 Financial investigation and Forensic Accounting - 30 hours Objectives This course Financial Investigation and Forensic Accounting, Third Edition examines different types of offenses with a financial

More information

Fraud Control Theory

Fraud Control Theory 13 Fraud Control Theory Using a variation of a saying from the 1960s, fraud happens. Like all costs of doing business, fraud must be managed. Management must recognize that people commit fraudulent acts

More information

Neil Meikle, Associate Director, Forensic Technology, PwC

Neil Meikle, Associate Director, Forensic Technology, PwC Case Study: Big Data Forensics Neil Meikle, Associate Director, Forensic Technology, PwC 6 November 2012 About me Transferred to Kuala Lumpur from PwC s Forensic Technology practice in London, England

More information

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview

More information

A Preliminary Investigation of the Necessary Skills, Education Requirements, and Training Requirements for Forensic Accountants

A Preliminary Investigation of the Necessary Skills, Education Requirements, and Training Requirements for Forensic Accountants Journal of Forensic & Investigative Accounting Vol. 2, Issue 2 A Preliminary Investigation of the Necessary Skills, Education Requirements, and Training Requirements for Forensic Accountants Dorothy A.

More information

GAO. Government Auditing Standards: Implementation Tool

GAO. Government Auditing Standards: Implementation Tool United States Government Accountability Office GAO By the Comptroller General of the United States December 2007 Government Auditing Standards: Implementation Tool Professional Requirements Tool for Use

More information

Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG

Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG MACPA Government & Non Profit Conference April 26, 2013 Isaiah Goodall, Director of Business

More information

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION TITLE GRADE EEO-4 CODE AG Deputy Chief Investigator 42 D 13.246 SERIES CONCEPT Criminal Investigators

More information

A Guide to Forensic Accounting Investigation. 2nd Edition

A Guide to Forensic Accounting Investigation. 2nd Edition Brochure More information from http://www.researchandmarkets.com/reports/2211320/ A Guide to Forensic Accounting Investigation. 2nd Edition Description: Recent catastrophic business failures have caused

More information

Introduction. IMF Conference September 2008

Introduction. IMF Conference September 2008 Live Forensic Acquisition as Alternative to Traditional Forensic Processes Marthie Lessing* Basie von Solms Introduction The Internet and technology developments introduced a sharp increase in computer

More information

This position is a Pay Band 65.

This position is a Pay Band 65. NEW MEXICO STATE PERSONNEL OFFICE invites applications for the position of: Detective and Criminal Investigator-Advanced (PRC #4182) SALARY: $14.68 - $26.11 Hourly $30,534.40 - $54,308.80 Annually OPENING

More information

Item 10 Appendix 1d Final Internal Audit Report Performance Management Greater London Authority April 2010

Item 10 Appendix 1d Final Internal Audit Report Performance Management Greater London Authority April 2010 Item 10 Appendix 1d Final Internal Audit Report Performance Management Greater London Authority April 2010 This report has been prepared on the basis of the limitations set out on page 16. Contents Page

More information

Fraud Prevention and Deterrence

Fraud Prevention and Deterrence Fraud Prevention and Deterrence Fraud Prevention Programs 2016 Association of Certified Fraud Examiners, Inc. Fraud Prevention Policy The best way to sell the establishment of a fraud policy is by stressing

More information

Fraud Risk Management and Internal Audting

Fraud Risk Management and Internal Audting Fraud Risk Management and Internal Audting Waheed Alkahtani CFE and CCEP-I Saudi Aramco Internal Auditing Special Audits Division Copyright 2015, Saudi Aramco. All rights reserved. February 2015 What do

More information

Forensic Audit Building a World Class Program

Forensic Audit Building a World Class Program Forensic Audit Building a World Class Program PAUL E. ZIKMUND DIRECTOR GLOBAL INTEGRITY AND FORENSIC AUDIT 1 2012 ACFE ANNUAL FRAUD CONFERENCE ORLANDO, FL Why the Need for Forensic Audit Program In response

More information

Services. Computer Forensic Investigations

Services. Computer Forensic Investigations DataTriangle, Inc. is uniquely structured to provide you with a high quality expert as expeditiously as possible. Charles Snipes has nearly 15 years of experience with criminal investigations in the areas

More information

The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology

The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology The State of Insurance Fraud Technology A study of insurer use, strategies and plans for anti-fraud technology September 2014 The State of Insurance Fraud Technology A study of insurer use, strategies

More information

Cyber Security Metrics Dashboards & Analytics

Cyber Security Metrics Dashboards & Analytics Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics

More information

Dan French Founder & CEO, Consider Solutions

Dan French Founder & CEO, Consider Solutions Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The

More information

DIGITAL FORENSIC TECHNOLOGY SEE BEYOND THE NUMBERS

DIGITAL FORENSIC TECHNOLOGY SEE BEYOND THE NUMBERS DIGITAL FORENSIC TECHNOLOGY Key Terms and Definitions Forensic Technology e-discovery Computer Forensics Data Analysis / Data Mining FRCP - Revised Key Terms and Definitions Forensic Technology - The application

More information

CONTENTS PREFACE 1 INTRODUCTION 1 2 DATA VISUALIZATION 19

CONTENTS PREFACE 1 INTRODUCTION 1 2 DATA VISUALIZATION 19 PREFACE xi 1 INTRODUCTION 1 1.1 Overview 1 1.2 Definition 1 1.3 Preparation 2 1.3.1 Overview 2 1.3.2 Accessing Tabular Data 3 1.3.3 Accessing Unstructured Data 3 1.3.4 Understanding the Variables and Observations

More information

Forensic accounting and the law: The forensic accountant in the capacity of an expert witness

Forensic accounting and the law: The forensic accountant in the capacity of an expert witness MPRA Munich Personal RePEc Archive Forensic accounting and the law: The forensic accountant in the capacity of an expert witness Marianne Ojo Covenant University 18. April 2012 Online at https://mpra.ub.uni-muenchen.de/38180/

More information

Security, and Intelligence

Security, and Intelligence Machine Learning Forensics for Law Enforcement, Security, and Intelligence Jesus Mena CRC Press Taylor &. Francis Group Boca Raton London NewYork CRC Press is an imprint of the Taylor & Francis Croup,

More information

Using Technology to Automate Fraud Detection Within Key Business Process Areas

Using Technology to Automate Fraud Detection Within Key Business Process Areas Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd

More information

ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION STATE POLICE EVIDENCE TECHNICIAN SERIES

ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION STATE POLICE EVIDENCE TECHNICIAN SERIES ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION STATE POLICE EVIDENCE TECHNICIAN SERIES CLASS TITLE POSITION CODE STATE POLICE EVIDENCE TECHNICIAN I 41901 STATE POLICE EVIDENCE TECHNICIAN

More information

Using Data Mining to Detect Insurance Fraud

Using Data Mining to Detect Insurance Fraud IBM SPSS Modeler Using Data Mining to Detect Insurance Fraud Improve accuracy and minimize loss Highlights: combines powerful analytical techniques with existing fraud detection and prevention efforts

More information

III. Best Practices/Resources

III. Best Practices/Resources Reviewing the Application/Resume Before beginning the screening process, take a few minutes to review the job description and the established evaluation criteria. The purpose of the initial screening of

More information

May 2011 Report No. 11-030. An Audit Report on Substance Abuse Program Contract Monitoring at the Department of State Health Services

May 2011 Report No. 11-030. An Audit Report on Substance Abuse Program Contract Monitoring at the Department of State Health Services John Keel, CPA State Auditor An Audit Report on Substance Abuse Program Contract Monitoring at the Department of State Health Services Report No. 11-030 An Audit Report on Substance Abuse Program Contract

More information

Virginia English Standards of Learning Grade 8

Virginia English Standards of Learning Grade 8 A Correlation of Prentice Hall Writing Coach 2012 To the Virginia English Standards of Learning A Correlation of, 2012, Introduction This document demonstrates how, 2012, meets the objectives of the. Correlation

More information

(1) Commercial Crime Insurance or Employee Fidelity Bond

(1) Commercial Crime Insurance or Employee Fidelity Bond INSURANCE (A) GENERAL CONSIDERATIONS This document presents the minimum insurance requirements as set forth by the United States Trustee Program (USTP). A standing trustee must purchase property insurance

More information

The Anti-fraud Plan Guide that follows is principally intended to benefit those property and casualty insurers who must file Pennsylvania anti-fraud

The Anti-fraud Plan Guide that follows is principally intended to benefit those property and casualty insurers who must file Pennsylvania anti-fraud The Anti-fraud Plan Guide that follows is principally intended to benefit those property and casualty insurers who must file Pennsylvania anti-fraud plans with the Department. Separately, a Model Pennsylvania

More information

THE FRAUD PREVENTION CHECK-UP 1 HOW COMPLETING THIS CHECK-UP CAN BENEFIT YOUR ORGANIZATION

THE FRAUD PREVENTION CHECK-UP 1 HOW COMPLETING THIS CHECK-UP CAN BENEFIT YOUR ORGANIZATION THE FRAUD PREVENTION CHECK-UP 1 HOW COMPLETING THIS CHECK-UP CAN BENEFIT YOUR ORGANIZATION It can help your organization survive an increasingly inhospitable business environment. Due in part to a long-term,

More information

Guidelines for Investigations

Guidelines for Investigations Guidelines for Investigations Table of Contents Investigative Responsibility Page 3 Investigations...Page 4 Qualitative Standards.Page 5 Investigative Techniques and Suggestions Page 7 Interviewing the

More information

ACE elite fraudprotector

ACE elite fraudprotector ACE elite fraudprotector Commercial Crime Insurance Policy ACE elite fraudprotector Insurance Policy (ed. AU 09/10) It wouldn t happen to us ACE elite fraudprotector Insurance Policy Fraud is a major threat

More information

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

Information Technology Audit & Forensic Techniques. CMA Amit Kumar Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques

More information

How To Prevent Fraud On A Credit Card

How To Prevent Fraud On A Credit Card Fraud Detection and Prevention Financial Management Advisory Council August 28, 2014 Sarah Mahugh, CPA, MBA Financial Audit Audit Manager Overview Fraud trends Fraud Risks and internal controls Case Studies

More information

Qi Liu Rutgers Business School ISACA New York 2013

Qi Liu Rutgers Business School ISACA New York 2013 Qi Liu Rutgers Business School ISACA New York 2013 1 What is Audit Analytics The use of data analysis technology in Auditing. Audit analytics is the process of identifying, gathering, validating, analyzing,

More information

San Francisco Chapter. Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young

San Francisco Chapter. Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young Learning Objectives Understand how data analysis can impact/improve business Understand typical data analysis challenges Understand the various

More information

Advanced Data Analytics, the Fraudsters Worst Enemy

Advanced Data Analytics, the Fraudsters Worst Enemy Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability

More information

LEN 221: Principles of Criminal Investigation Syllabus 3 lecture hours / 3 credits CATALOG DESCRIPTION

LEN 221: Principles of Criminal Investigation Syllabus 3 lecture hours / 3 credits CATALOG DESCRIPTION 1 LEN 221: Principles of Criminal Investigation Syllabus 3 lecture hours / 3 credits CATALOG DESCRIPTION Prerequisite: Undergraduate level RDG 099 Minimum Grade of P or Undergraduate level RDG 055 Minimum

More information

Course Forensic Science. Unit II History

Course Forensic Science. Unit II History Course Forensic Science Unit II History Essential Question What is legally and ethically expected of forensic scientists and Crime Scene Investigators? TEKS 130.295(c) (4)(C) Prior Student Learning History

More information

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION TITLE GRADE EEO-4 CODE SUPERVISORY CRIMINAL INVESTIGATOR II 43* D 13.241 SUPERVISORY CRIMINAL INVESTIGATOR

More information

Keith Barger MFS, MCSE, CCE

Keith Barger MFS, MCSE, CCE Keith Barger MFS, MCSE, CCE Principal/Practice Leader Advisory Services Keith Barger is a Principal in the Advisory Services practice with Grant Thornton and the Practice Leader for Forensic Accounting

More information

ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES

ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES CLASS TITLE POSITION CODE EFFECTIVE FORENSIC SCIENTIST TRAINEE 15897 5/1/10 FORENSIC SCIENTIST I 15891 5/1/10

More information

PROPOSAL GRADUATE CERTIFICATE IN FORENSIC ACCOUNTING FRAUD INVESTIGATION TO BE OFFERED AT PURDUE UNIVERSITY CALUMET

PROPOSAL GRADUATE CERTIFICATE IN FORENSIC ACCOUNTING FRAUD INVESTIGATION TO BE OFFERED AT PURDUE UNIVERSITY CALUMET Graduate Council Document 08-41a Approved by the Graduate Council on May 6, 2010 PROPOSAL GRADUATE CERTIFICATE IN FORENSIC ACCOUNTING & FRAUD INVESTIGATION TO BE OFFERED AT PURDUE UNIVERSITY CALUMET Proposal

More information

Big Data s Big Impact In Financial Investigations

Big Data s Big Impact In Financial Investigations Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Big Data s Big Impact In Financial Investigations

More information

CYBERSECURITY EXAMINATION SWEEP SUMMARY

CYBERSECURITY EXAMINATION SWEEP SUMMARY This Risk Alert provides summary observations from OCIE s examinations of registered broker-dealers and investment advisers, conducted under the Cybersecurity Examination Initiative, announced April 15,

More information

THE ABC S OF DATA ANALYTICS

THE ABC S OF DATA ANALYTICS THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable

More information

Forensic Audit and Automated Oversight Federal Audit Executive Council September 24, 2009

Forensic Audit and Automated Oversight Federal Audit Executive Council September 24, 2009 Forensic Audit and Automated Oversight Federal Audit Executive Council September 24, 2009 Dr. Brett Baker, CPA, CISA Assistant Inspector General for Audit U.S. Department of Commerce OIG Overview Forensic

More information

SUPPLIER SECURITY STANDARD

SUPPLIER SECURITY STANDARD SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard

More information

TASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631)

TASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631) TASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631) 1. Initiates investigations of alleged loss or theft of department property such as inventory, assets, and/or cash after notification of such

More information

Stages of the Audit Process

Stages of the Audit Process Chapter 5 Stages of the Audit Process Learning Objectives Upon completion of this chapter you should be able to explain: LO 1 Explain the audit process. LO 2 Accept a new client or confirming the continuance

More information

APPENDIX B STATEMENT OF WORK WORKERS COMPENSATION FRAUD INVESTIGATION SERVICES

APPENDIX B STATEMENT OF WORK WORKERS COMPENSATION FRAUD INVESTIGATION SERVICES APPENDIX B STATEMENT OF WORK WORKERS COMPENSATION FRAUD INVESTIGATION SERVICES TABLE OF CONTENTS SECTION TITLE PAGE 1.0 SCOPE OF WORK... 1 2.0 RESPONSIBILITIES... 1 COUNTY 2.1 Work Order... 1 2.2 Personnel...

More information

South Australia Police POSITION INFORMATION DOCUMENT

South Australia Police POSITION INFORMATION DOCUMENT South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-7 Service : Crime Service Position

More information

Fraud Prevention Training

Fraud Prevention Training Fraud Prevention Training Kim Turner, Chief Audit Executive Emily Knopp, Audit Director Fraud Prevention: WHAT YOU WILL LEARN & FRAUD FACTS What you will take away with you: Glossary of Fraud Terms Details

More information

REPORT WRITING MANUAL

REPORT WRITING MANUAL REPORT WRITING MANUAL III. WRITING FRAUD EXAMINATION REPORTS Report Structure Report formats vary widely. Some organizations, especially governmental investigative bodies, use report forms so that case

More information

K-12 EDUCATION Introduction and Capabilities K-12 Education

K-12 EDUCATION Introduction and Capabilities K-12 Education K-12 EDUCATION Introduction and Capabilities Hanover provides high-quality, timely, and well-articulated services working closely with our staff. Whether working with staff who have significant grant and

More information

PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM

PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM Auditors need to understand that while audit findings are common, they are not necessarily fraud and due care is needed in building evidence.

More information

Antifraud program and controls assessment grid*

Antifraud program and controls assessment grid* Advisory Services Antifraud program and * Fraud risks & controls February 2008 *connectedthinking 2008 PricewaterhouseCoopers LLP. All rights reserved. PricewaterhouseCoopers refers to PricewaterhouseCoopers

More information

This report provides the project s findings, including its three practical, actionable products:

This report provides the project s findings, including its three practical, actionable products: Executive Summary Security metrics support the value proposition of an organization s security operation. Without compelling metrics, security professionals and their budgets continue largely on the intuition

More information

Fraud Prevention and Deterrence

Fraud Prevention and Deterrence Fraud Prevention and Deterrence Fraud Risk Assessment 2016 Association of Certified Fraud Examiners, Inc. What Is Fraud Risk? The vulnerability that an organization faces from individuals capable of combining

More information

TYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order 360.01 9/25/2014 9/25/2014

TYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order 360.01 9/25/2014 9/25/2014 TYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order 360.01 9/25/2014 9/25/2014 SUBJECT TITLE PREVIOUSLY ISSUED DATES Criminal Investigations 7/4/2014 REFERENCE RE-EVALUATION DATE CALEA

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

QUESTION ONE (31 MARKS) INSTRUCTIONS: Answer Question One and Any Other Three Questions

QUESTION ONE (31 MARKS) INSTRUCTIONS: Answer Question One and Any Other Three Questions UNIVERSITY EXAMINATIONS: 2012/2013 EXAMINATION FOR THE MASTERS OF SCIENCE (MSC) IN COMMERCE (FINANCE AND ACCOUNTING) MFA 601 FORENSIC ACCOUNTING AND LEGAL ENVIRONMENT DATE: APRIL, 2014 TIME: 3 HOURS INSTRUCTIONS:

More information

Information for Management of a Service Organization

Information for Management of a Service Organization Information for Management of a Service Organization Copyright 2011 American Institute of Certified Public Accountants, Inc. New York, NY 10036-8775 All rights reserved. For information about the procedure

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student

More information

GLOBAL PORTS INVESTMENTS PLC

GLOBAL PORTS INVESTMENTS PLC Adopted by the Directors of GLOBAL PORTS INVESTMENTS PLC Resolution of 14 July 2008 GLOBAL PORTS INVESTMENTS PLC (previously GLOBAL PORTS INVESTMENTS LTD) ANTI-FRAUD POLICY TABLE OF CONTENTS 1. INTRODUCTION.....

More information

Partner With Your Auditor on Controls

Partner With Your Auditor on Controls WHITE PAPER Partner With Your Auditor on Controls How management can help its auditors address PCAOB inspections findings on internal control Written by Thomas Ray, Distinguished Lecturer at Baruch College

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student

More information

Certified Forensic Accounting Professional

Certified Forensic Accounting Professional Certified Forensic Accounting Professional Insurance Specialization Certification in Insurance Frauds Certified Forensic Accounting Professional is the premier certification in India in the antifraud domain.

More information

THE IMPACT AND REALITY OF FRAUD AUDITING GETTING STARTED WITH A FRAUD INVESTIGATION

THE IMPACT AND REALITY OF FRAUD AUDITING GETTING STARTED WITH A FRAUD INVESTIGATION THE IMPACT AND REALITY OF FRAUD AUDITING GETTING STARTED WITH A FRAUD INVESTIGATION This presentation addresses the fundamentals related to initiating a fraud investigation, including the handling of tips,

More information

Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption

Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption Toby Bishop, Director, Deloitte Forensic Center Deloitte Financial Advisory Services LLP Contents Why corporate resiliency? What

More information

A BEST PRACTICE APPROACH TO LIVE FORENSIC ACQUISITION

A BEST PRACTICE APPROACH TO LIVE FORENSIC ACQUISITION A BEST PRACTICE APPROACH TO LIVE FORENSIC ACQUISITION MM Grobler 1, SH von Solms 2 1 Council for Scientific and Industrial Research, Pretoria, South Africa 2 Academy for Information Technology, University

More information

Benefits fraud: Shrink the risk Gain group plan sustainability

Benefits fraud: Shrink the risk Gain group plan sustainability Benefits fraud: Shrink the risk Gain group plan sustainability Life s brighter under the sun Fraud: A real threat to group plan sustainability Fraud in group benefits has always existed, but never has

More information

MARKET CONDUCT ASSESSMENT REPORT

MARKET CONDUCT ASSESSMENT REPORT MARKET CONDUCT ASSESSMENT REPORT PART 1 STATUTORY ACCIDENT BENEFITS SCHEDULE (SABS) PART 2 RATE VERIFICATION PROCESS Phase 1 (2012) Financial Services Commission of Ontario (FSCO) Market Regulation Branch

More information

Semi-structured interviews

Semi-structured interviews Semi-structured interviews 3 rd December 2014 Prof. Edwin van Teijlingen BU Graduate School Aim of this session: introduce various ways of conducting interviews with qualitative methods; outline strength

More information