Investigation Techniques



Similar documents
Chapter 15. Conducting Investigations and Report Writing

ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS

SECURITIES TRADING AND INVESTMENT POLICY

Chapter 13: Repayment of All or Part of the Debts of an Individual with Regular Income ($235 filing fee, $39 administrative fee: Total fee $274)

EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

Alice s Integrity* Loan Fund

June 10, Legislative Amendments to the Indiana Code Relating to First Lien Mortgage Act (the Act )

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2007 S 1 SENATE BILL 1198

Evergreen Solar, Inc. Code of Business Conduct and Ethics

Gerber Finance Inc. Credit Application

M E M O R A N D U M. The Policy provides for blackout periods during which you are prohibited from buying or selling Company securities.

Asterias Biotherapeutics, Inc. Code Of Business Conduct And Ethics. March 10, 2013

Message from the Co-Chairmen and Chief Executive Officers

Company s Chief Compliance Officer. There will be no retaliation for reports made in good faith.

NON-RESIDENTS PURCHASING REAL PROPERTY IN THE U.S.

Chapter 21 Credit Services Organizations Act

Nebraska Loan Broker Act Chapter 45, Article 1, Section f to

OFFICE OF INSURANCE REGULATION Company Admissions

OKLAHOMA LAWS RELATING TO IDENTITY THEFT

Debt Collection. Federal Trade Commission consumer.ftc.gov

Code of Ethics. I. Definitions

By Directors, Officers and Employees of Hellaby Holdings Limited and its Subsidiaries ( The Company )

HIPAA NOTICE OF PRIVACY PRACTICES

Commercial Loan Application. The Corporation for Economic Development in Des. Company Information. Company Ownership. Affiliate Businesses

LAKE COUNTY BOARD OF DD/DEEPWOOD BOARD POLICY I. SUBJECT: FALSE CLAIMS PREVENTION AND WHISTLEBLOWER PROTECTION

51ST LEGISLATURE - STATE OF NEW MEXICO - FIRST SESSION, 2013

We will not collect, use or disclose your personal information without your consent, except where required or permitted by law.

Understanding Regulation U

NOTICE OF PRIVACY PRACTICES Allergy Treatment Center of New Jersey, P.C. Effective Date: April 14, 2003

CHAPTER 332B DEBT SETTLEMENT SERVICES

INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT. IC Chapter 5.5. False Claims and Whistleblower Protection

WHAT IS TITLE INSURANCE?

NOTICE TO USERS OF CONSUMER REPORTS: OBLIGATIONS OF USERS UNDER THE FCRA I. OBLIGATIONS OF ALL USERS OF CONSUMER REPORTS

CODE OF ETHICS FOR SENIOR FINANCIAL OFFICERS

AC 3290-S (Rev. 9/13) NEW YORK STATE VENDOR RESPONSIBILITY QUESTIONNAIRE FOR-PROFIT BUSINESS ENTITY

PHI Air Medical, L.L.C. Compliance Plan

Public Information Program

BANKRUPTCY INFORMATION SHEET

UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS. Revised as of March 3, 2014

DOWNRIVER COMMUNITY FEDERAL CREDIT UNION VISA BUSINESS CREDIT CARD AGREEMENT

Destiny Media Technology s Code of Conduct

CIVEO CORPORATION CORPORATE CODE OF BUSINESS CONDUCT AND ETHICS. Effective as of May 5, 2014

UNITED STATES BANKRUPTCY COURT NORTHERN DISTRICT OF ALABAMA SOUTHERN DIVISION

WESTERN ASSET MORTGAGE CAPITAL CORPORATION CODE OF CONDUCT

PART VIII. AUTOMATED CRIMINAL JUSTICE INFORMATION SYSTEMS

Privacy Impact Assessment

TITLE 18 INSURANCE DELAWARE ADMINISTRATIVE CODE Consumer Rights. 906 Use of Credit Information [Formerly Regulation 87]

Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan

Agent Appointment Application Transamerica Life Insurance Company Partner: Munich Re Stop Loss, Inc.

Senate Bill No. 38 Committee on Transportation and Homeland Security

How To Get A Lawyer In South Shore, Martha M.A.

Personal Information Protection Act (PIPA) Privacy & Landlord - Tenant Matters Frequently Asked Questions

CODE OF ETHICS AND BUSINESS CONDUCT

HIPAA PRIVACY NOTICE PLEASE REVIEW IT CAREFULLY

INNOVATION FUND Loan Application

IMPORTANT INFORMATION ABOUT BANKRUPTCY ASSISTANCE SERVICES FROM AN ATTORNEY OR BANKRUPTCY PETITION PREPARER.

ILLINOIS IDENTITY THEFT RANKING BY STATE: Rank 11, 80.2 Complaints Per 100,000 Population, Complaints (2007) Updated November 30, 2008

Emerald Financial Commercial Funding COMMERCIAL LOAN APPLICATION

ANTI-FRAUD POLICY Adopted August 13, 2015

Car Title Loans. What is a car title loan? How does a car title loan work?

Ford & Thomas Insurance Agency

Inca One Gold Corp. Insider Trading Policy

MANDATORY REPORTING LAWS & RULES

CHAPTER I I. Formation of a limited liability company CHAPTER I. GENERAL PROVISIONS

All About Credit Reports from A to Z

Massachusetts Major City Chiefs. Best Practices in Eyewitness Identification and the Recording of Suspect Interviews

Protecting your privacy

Lion One Metals Ltd. Insider Trading Policy

Arkansas State Board of Public Accountancy

Chapter EDITION. Accountants; Tax Consultants and Preparers

An Investigator Appears: Are You Ready? Presentation Slides

Minerals Technologies Inc. Summary of Policies on Business Conduct

1. Compliance with Laws, Rules and Regulations

Consumer Guides to Credit Reporting and Credit Scores (Appropriate for General Distribution)

Summary of Changes to Chapter 494, Florida Statutes Senate Bill Florida Legislative Session

Due Diligence Primer Registered Investment Advisers and Broker-Dealers

A GUIDE TO FILING FOR BANKRUPTCY PROTECTION UNDER CHAPTER 7 OF THE BANKRUPTCY CODE

Credit Services Organization Act 24 O.S

Online Lead Generation: Data Security Best Practices

Chapter 16. Transfer of Ownership Rights and Interests A. TITLE AND EVIDENCE OF GOOD AND MARKETABLE TITLE DEFINITION OF TITLE

EADS-NA Code of Ethics

STATE OF MICHIGAN. Entrepreneur s Guide

WHAT YOU SHOULD KNOW ABOUT YOUR CHAPTER 13 CASE

AMERICAN BUILDERS SUPPLY Employment Application

Transcription:

Investigation Techniques Sources of Information 2016 Association of Certified Fraud Examiners, Inc.

Internal vs. External Internal sources may be all that s available (accounting and business tax records, copies of canceled checks, employee personnel files) External sources crucial for locating assets; locating people; determining ownership of assets and businesses 2016 Association of Certified Fraud Examiners, Inc. 2 of 27

Public vs. Nonpublic Public records can be accessed by the public. They are documents a governmental agency is required to keep by law. Nonpublic records include information about a person or business considered to be private and confidential. Must obtain by: Consent Legal process Search warrant 2016 Association of Certified Fraud Examiners, Inc. 3 of 27

Freedom of Information Act (FOIA) The FOIA is the primary Act that governs the availability of governmental records to the general public. The FOIA provides for public access to the following information: Tax rolls Voter registration (with some restrictions) Assumed names Real property records Divorce/probate suits 2016 Association of Certified Fraud Examiners, Inc. 4 of 27

Fair Credit Reporting Act (FCRA) Regulates dissemination of consumer information to third parties by consumer reporting agencies An employer who uses a third party to conduct a workplace investigation no longer has to obtain the prior consent of an employee if the investigation involves suspected: Misconduct Violation of law or regulations Violation of any preexisting policy of the employer 2016 Association of Certified Fraud Examiners, Inc. 5 of 27

Gramm-Leach-Bliley Act Other Laws Criminalizes pretexting to obtain financial information Privacy Act of 1974 Regulates information maintained by federal agencies Right to Financial Privacy Act Prohibits financial institutions from disclosing financial information about individual customers to government agencies without consent or legal order HIPAA Protects health information 2016 Association of Certified Fraud Examiners, Inc. 6 of 27

Local Records Building Inspector Records Building Permits Health and Fire Department Voter Registration Utility Records 2016 Association of Certified Fraud Examiners, Inc. 7 of 27

Court Records State, local, federal Criminal conviction records are generally available to the public Court clerks maintain files 2016 Association of Certified Fraud Examiners, Inc. 8 of 27

Court Records Civil court records Personal injury suits Financial suits Divorce records Criminal court records Probate court records (debts, dispersal of assets) Federal court records Civil and criminal Bankruptcy 2016 Association of Certified Fraud Examiners, Inc. 9 of 27

Property Records Real property records Sale price(s) Residences and addresses of the buyer and seller Party financing the property (if applicable) Property tax records Tax assessor/collector records Estimated value Names of former owners 2016 Association of Certified Fraud Examiners, Inc. 10 of 27

Corporate Records Articles of Incorporation Corporate name Ownership information Nominal stock value Names of initial shareholders Directors and officers Registered agent Principal office location Date of incorporation Standing/status 2016 Association of Certified Fraud Examiners, Inc. 11 of 27

Foreign corporations Fictitious Business Names Corporate Records DBA (Doing Business As) Uniform Commercial Code (UCC) Debtor name/address Financial lender Collateral pledged 2016 Association of Certified Fraud Examiners, Inc. 12 of 27

Federal (National-Level) Records Inspectors General National Futures Association Securities and Exchange Commission (SEC) Financial statements Identification of officers and directors Identification of owners of more than 10% of stock Annual Report (Form 10-K) 2016 Association of Certified Fraud Examiners, Inc. 13 of 27

Types of records: Nonpublic Records Banking records Tax records Credit records Phone records Credit card account records Personal health care records 2016 Association of Certified Fraud Examiners, Inc. 14 of 27

Request the records Vendors Customers Subject Nonpublic Records Subpoena or legal process Typically available only if civil or criminal action has been filed Only available to government in criminal case Condition of business Right to audit clause 2016 Association of Certified Fraud Examiners, Inc. 15 of 27

Search Engines Boolean operators are symbols that help the search engine understand what the user is looking for. Google operators AND between two words returns pages containing both terms: check AND fraud Placing quotes around a word or set of words will return pages containing the exact word or words: insider trading Using intitle:term(s): [intitle:mortgage fraud] will return documents with only mortgage and fraud in the title Use more than one Use unique, specific keywords; no articles Use filters to focus searches 2016 Association of Certified Fraud Examiners, Inc. 16 of 27

Limitations of Public Database Searches Information must be checked for accuracy Varies widely from jurisdiction to jurisdiction Searches are limited in the area they cover Brief abstracts of original record Information compiled in a vendor s database must be reliable 2016 Association of Certified Fraud Examiners, Inc. 17 of 27

Other Web Tools Deep Web: aka Invisible Web Content not indexed by standard search engines Internet archives Archived versions of pages no longer online Social media Be aware of privacy concerns Must be authenticated so it is usable in court 2016 Association of Certified Fraud Examiners, Inc. 18 of 27

Locating People Three principles to adhere to when locating people using online records: 1. Obtain a past address of the suspect. 2. Keep in mind the cost effectiveness of the search activity. 3. Know the most powerful and useful types of searches. 2016 Association of Certified Fraud Examiners, Inc. 19 of 27

Common Types of Searches Credit bureau header searches (Note: These are among the most powerful people-locator tools, if available) Current occupant/new address Last name Bankruptcy, tax liens, and judgments Voter registration Business filings 2016 Association of Certified Fraud Examiners, Inc. 20 of 27

Sample Prep Question 1. Under the U.S. Fair Credit Reporting Act, consumer reports cannot be obtained on anyone under any circumstances without their consent. A. True B. False 2016 Association of Certified Fraud Examiners, Inc. 21 of 27

Correct Answer: B The Fair and Accurate Credit Transactions Act of 2003 amended the Fair Credit Reporting Act (FCRA) to exempt certain reports involving employee misconduct investigations. As a result of these amendments, an employer who uses a third party to conduct a workplace investigation no longer has to obtain the prior consent of an employee if the investigation involves suspected: Misconduct Violation of law or regulations Violation of any preexisting policy of the employer 2016 Association of Certified Fraud Examiners, Inc. 22 of 27

Sample Prep Question 2. If a fraud examiner was gathering information about a fraud suspect, which of the following types of information would likely require access to nonpublic sources of information to obtain? A. The subject s habits and lifestyle B. Where the subject currently resides C. The subject s home phone records D. All of the above 2016 Association of Certified Fraud Examiners, Inc. 23 of 27

Correct Answer: C Nonpublic records include information about a person or business considered to be private and confidential. Unlike public records, nonpublic records are not available to the public. Thus, obtaining access to them might be difficult or impossible. Some of the most valuable types of nonpublic records include: Banking records Tax records Credit records of individuals Phone records Credit card account records Personal health care records 2016 Association of Certified Fraud Examiners, Inc. 24 of 27

Sample Prep Question 3. Which of the following pieces of information about financed personal property can be obtained through a Uniform Commercial Code (UCC) filings search? A. The name of the debtor or joint debtors B. The name of the financial lender C. The type of collateral pledged as security D. All of the above 2016 Association of Certified Fraud Examiners, Inc. 25 of 27

Correct Answer: D A search of Uniform Commercial Code (UCC) filings can help fraud examiners identify personal property that an individual or business has financed. These filings identify: Name of the debtor or joint debtors Current address of the debtor Name of the financial lender Type of collateral pledged as security Date of filing and continuations 2016 Association of Certified Fraud Examiners, Inc. 26 of 27

Sample Prep Question 4. Freddie calls Alex s bank, claiming to be Alex. Freddie tells the bank representative that he needs to make sure the bank has the correct government identification number on his account because he had noticed an error on his statement. The bank representative refuses to give the number, and Freddie hangs up. Assuming Freddie resides in the United States, which of the following crimes did he commit? A. False statements to a phone operator B. Pretexting with a financial institution C. Defalcation D. Fraud in the inducement 2016 Association of Certified Fraud Examiners, Inc. 27 of 27

Correct Answer: B Broadly defined, pretexting is the act of impersonating someone else or making false or misleading statements to obtain, sell, or buy information about a person or organization. Under the broad definition, pretexting for nonfraudulent purposes is not always illegal, but it should be used with caution. However, in the United States, the Gramm-Leach-Bliley Act made it a criminal offense to engage in pretexting with financial institutions. In this context, pretexting is the act of obtaining customer information from financial institutions through the use of deceptive tactics. 2016 Association of Certified Fraud Examiners, Inc. 28 of 27

Investigation Techniques Covert Examinations 2016 Association of Certified Fraud Examiners, Inc.

Covert Examinations A covert examination or operation is designed to obtain evidence by use of agents whose true role is undisclosed to the target. Two forms: 1. Undercover 2. Surveillance Basis for the operation should be in writing: Information upon which the operation is based Information that is expected to be gained Identities of suspects, if known Operatives under the fraud examiner s care, custody, or control 2016 Association of Certified Fraud Examiners, Inc. 30 of 27

Costly and risky Problems Laws govern recording of conversations reasonable expectation of privacy Generally not a crime to record video in a public place Entrapment occurs when law enforcement officers or government agents induce a person to commit a crime that he is not previously disposed to commit Must be properly predicated; must not be used for fishing expeditions 2016 Association of Certified Fraud Examiners, Inc. 31 of 27

Legal Considerations If you pay an informant or source, must get a receipt Reporting contacts (code name or number only) Promises of confidentiality (qualified or conditional only), no guarantees 2016 Association of Certified Fraud Examiners, Inc. 32 of 27

Sample Prep Question 1. In preparing a memorandum of information furnished by a confidential source, how should the source usually be identified on paper? A. By name B. By a code name or symbol C. Confidential source information should never be included in a report D. None of the above 2016 Association of Certified Fraud Examiners, Inc. 33 of 27

Correct Answer: B In preparing a memorandum of information furnished by a confidential source, it is necessary to use a code name, number, or symbol when referring to the source in order to protect the source s identity. 2016 Association of Certified Fraud Examiners, Inc. 34 of 27

Sample Prep Question 2. Chris, a private investigator in the United States, is conducting a covert investigation and wants to secretly record a suspect s activities on a particular street corner. Which of the following would most likely be an improper method of doing so? 2016 Association of Certified Fraud Examiners, Inc. 35 of 27

Sample Prep Question A. Taking photographs of the suspect s activities from a vehicle parked across from the corner B. Placing a hidden microphone to record the suspect s conversations C. Hiding a camera that records video of the suspect but not his conversations D. Using a camera phone to take pictures of the suspect s activities while walking by 2016 Association of Certified Fraud Examiners, Inc. 36 of 27

Correct Answer: B In most U.S. states, making an audio recording of private conversations to which one is not a party is illegal unless the recording party has obtained the consent of those involved in the conversation. Whether a conversation is private depends on whether the parties have a reasonable expectation of privacy in the given circumstances. Photographing or recording video of someone in a public place is legal, provided that the person being photographed or recorded does not have a reasonable expectation of privacy in such a place. However, such a recording is subject to all of the laws and rules regarding recording audio conversations if the video records any part of a conversation. 2016 Association of Certified Fraud Examiners, Inc. 37 of 27

Investigation Techniques Analyzing Documents 2016 Association of Certified Fraud Examiners, Inc.

Analyzing Documents Obtain original documents where feasible. Make working copies for review, and keep the originals segregated. Do not touch originals any more than necessary; they might later have to undergo forensic analysis. Maintain a good filing system for the documents. 2016 Association of Certified Fraud Examiners, Inc. 39 of 27

Obtaining Documentary Evidence Consent Subpoena or court order Bank records require written consent or subpoena Organization Segregate Key document file Establish a database 2016 Association of Certified Fraud Examiners, Inc. 40 of 27

Chain of Custody What items were received When they were received From whom they were received Where they are maintained 2016 Association of Certified Fraud Examiners, Inc. 41 of 27

Handling Documents as Physical Evidence Be alert for anachronisms. Preserve for fingerprint examinations. Never attempt to develop indented writings by shading or scratching on the surface of the sheet of paper with a pencil. View indented writings using oblique-lighting method. 2016 Association of Certified Fraud Examiners, Inc. 42 of 27

Sample Prep Question 1. Which of the following is NOT recommended when collecting physical documents? A. Take the original document if it is available. B. Try to handle the original as little as possible. C. Maintain a dependable filing system for the documents. D. Sign your name at the bottom of each page. 2016 Association of Certified Fraud Examiners, Inc. 43 of 27

Correct Answer: D The following are general rules regarding the collection of documents: Obtain original documents where feasible. Do not touch originals any more than necessary. Maintain a dependable filing system for the documents. 2016 Association of Certified Fraud Examiners, Inc. 44 of 27

Sample Prep Question 2. An indented writing can best be developed by shading or scratching with a pencil. A. True B. False 2016 Association of Certified Fraud Examiners, Inc. 45 of 27

Correct Answer: B Fraud examiners should never attempt to develop indented writings by shading or scratching on the surface of a sheet of paper with a pencil. Although this method will reveal deep indentations, it will not reveal faint indentations and will prevent expert examinations from analyzing them. Moreover, shading or scratching with a pencil might prevent other types of technical examinations. 2016 Association of Certified Fraud Examiners, Inc. 46 of 27

Sample Prep Question 3. Black, a Certified Fraud Examiner, has obtained an oral confession from Green, a fraud suspect. Black wants to examine Green s bank accounts. Which of the following would be the LEAST effective way to obtain permission to examine Green s bank records? 2016 Association of Certified Fraud Examiners, Inc. 47 of 27

Sample Prep Question A. Obtain a subpoena. B. Obtain Green s written consent. C. Obtain Green s oral consent. D. Obtain a court order. 2016 Association of Certified Fraud Examiners, Inc. 48 of 27

Correct Answer: C Certain types of records can be obtained by consent only if the subject of the records consents in writing. Accessing a subject s bank records from financial institutions, for instance, generally requires written consent. If no consent is given and evidence is held by other parties or in uncontrolled locations, specific legal action might be required. Most often, the legal process used takes the form of a subpoena or other court order to produce the documents and records (including electronic records). 2016 Association of Certified Fraud Examiners, Inc. 49 of 27