Exam 2 final deck Flashcards
Data Analysis Techniques:
- outlier investigation
- time trend analysis
- fuzzy matching
- digital analysis
- time trend analysis
- real time analysis
- analyzing financial statements
Investigative Methods:
- Theft Investigative Methods
- Concealment Investigative Methods
- Conversion Investigative Methods
- Inquiry Investigative Methods
Theft Investigative Methods
- Surveillance and Covert Ops
- Invigilation
- Seizing and searching computers
- Physical evidence
Concealment Investigative Methods
- Document Examination
- Audits
- Electronic searches
- Physical asset counts
Conversion Investigative Methods
- Searching public records
- Online resources
- The net worth method
Inquiry Investigative Methods
- Interviews and interrogation
- Honesty testing
Four steps to seizing and searching computers:
- Seize and perform intake
- Clone and generate CRC Checksum
- Check manually
- Check using automation
Methods for obtaining documentary evidence:
- best way to obtain documentary evidence is through computer-based queries of accounting and other databases. *
- database search
- audit (using discovery sampling)
- by chance or tip
Rules to follow regarding documentary evidence:
- proper chain of evidence
- marking of evidence
- organization of evidence
- coordination of evidence
- photocopies
What type of information do credit reporting agencies maintain?
- consumer information
- account information
- marketing information
- information on current and former employers
vulnerability chart:
a tool that explicitly considers all aspects of the fraud.
theft act investigation:
activities that directly investigate the fraud act
surveillance:
watching or recording the physical facts, acts, and movements, which are part of the theft act of a fraud
invigilation:
a theft act investigative technique that involves close supervision of suspects during an examination period.
computer forensics:
gathering of electronic evidence