Gathering Information Flashcards

1
Q

The records of a wire transfer identify the amount of the wire, where it was sent, and the date it was sent, but they do NOT identify who sent the wire.

A. True
B. False

A

B. False

See pages 3.925 in the Fraud Examiner’s Manual

The records of a wire transfer identify who sent the wire, where it was sent, the date it was sent, and its amount.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Fraudsters might take advantage of foreign correspondent relationships to move illicit funds abroad using which of the following types of transactions or financial products?

A. International fund transfers
B. Letters of credit and loans
C. Foreign exchange services
D. All of the above

A

D. All of the above

See pages 3.926 in the Fraud Examiner’s Manual

Fraudsters might take advantage of foreign correspondent relationships to move illicit funds abroad and can use them to orchestrate transfers designed to conceal the funds’ movement. For example, fraudsters might utilize a correspondent financial institution in a jurisdiction with more lax anti-money laundering (AML) or know-your-customer (KYC) requirements to serve as a pass-through to make the origin of the funds more difficult to determine. This can potentially be accomplished by using financial services such as international fund transfers, letters of credit and loans, foreign exchange services, or lines of credit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is something that might be revealed by analyzing a subject’s electronic payment records?

A. Assets the subject has purchased
B. Assets effectively held by the subject
C. Direct deposit payments made to nonexistent employees
D. All of the above

A

D. All of the above

See pages 3.926-3.927 in the Fraud Examiner’s Manual

The term electronic payments (or e-payments) refers to any type of noncash payment that does not involve a paper check. Electronic payment records can reveal:

  • Assets the subject has purchased
  • The locations of the subject’s assets (e.g., through the payment of real estate taxes, broker’s fees, or utility payments)
  • The locations of the subject’s residences and businesses (e.g., through analyzing the payments of utility bills)
  • Loans the subject has obtained (e.g., through analyzing loan payments)
  • Payments made to nonexistent employees with direct deposit
  • The cities and countries in which the subject conducts business (e.g., through analyzing the payments for carrier services to deliver packages)
  • Transfers of funds between individuals without an established business relationship
  • Assets ostensibly owned by family members or close associates but effectively controlled, held, or gifted by the subject
  • Hotel payments
  • The true owner of a property (e.g., through analyzing the mortgage payments and payments for homeowner’s insurance)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A fraud examiner is based in Canada, a non-European Union (EU) country, and is collecting personal information from their company’s human resources (HR) files about an employee based in Brazil, a non-EU country. Based on these facts, the fraud examiner would need to comply with the EU’s General Data Protection Regulation (GDPR) when conducting their internal investigation.

A. True
B. False

A

B. False

See pages 3.606 in the Fraud Examiner’s Manual

The General Data Protection Regulation (GDPR) would not apply to this scenario because the fraud examiner is not based in a European Union (EU) country or collecting personal information about anyone located in an EU country. The GDPR applies to organizations that are based in the EU that collect or process the personal data of any person, regardless of where the person is located. The GDPR also applies to organizations that are not based in the EU if they collect or process the personal data of any person located in the EU for the purpose of:

Offering goods or services to the person, regardless of whether payment is required
Monitoring the person’s behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Most cryptocurrencies rely on public blockchains that provide visibility into every transaction that takes place.

A. True
B. False

A

A. True

See pages 3.962-3.963 in the Fraud Examiner’s Manual

A cryptocurrency is a type of digital currency that uses public or private key encryption in the currency’s creation and transfer. While cryptocurrency transactions can be difficult and complicated to trace, most cryptocurrencies rely on public blockchains that provide visibility into every transaction that takes place. A blockchain is a digital ledger, or database, of transactions that allows data to be distributed and stored on multiple computer systems at once. Although blockchain entries do not include direct identifying information, they do contain senders’ and recipients’ cryptographic addresses for each transaction. Therefore, by carefully examining blockchain data, fraud examiners can identify patterns that link certain users to criminal activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When using a confidential informant who demands payment in exchange for their information, a fraud examiner should only agree to provide compensation after the informant has delivered the information.

A. True
B. False

A

A. True

See pages 3.520 in the Fraud Examiner’s Manual

If the fraud examiner decides to pay an informant or source, then they should make the payment in cash and obtain a receipt for documentation purposes. If the source will not sign a receipt, then the fraud examiner should not pay them. There have been numerous instances where a receipt was not obtained, so the informant subsequently denied receiving funds or challenged the amount paid. If this happens, the fraud examiner will have to defend themselves without proof; indeed, some investigators have been accused of embezzling the payments. Payments should only be made after the informant has delivered the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Green believes that Blue, a fraud suspect, has purchased hidden personal property through suspicious financing. Which of the following sources, if available, would MOST LIKELY contain information that Green could use to locate Blue’s possible hidden assets?

A. Commercial filings
B. Health department records
C. Surveyor office records
D. Registrar of voters

A

A. Commercial filings

See pages 3.620 in the Fraud Examiner’s Manual

Commercial filings are records that can help fraud examiners identify personal property that an individual or business has financed. These filings and supporting documents can help fraud examiners uncover hidden ownership or relationships between parties by viewing the names of all listed debtors and their addresses. The fraud examiner might find information linking individuals to the companies they own or discover information about a company’s subsidiaries, branch offices, or parent company. Additionally, discovering financed assets can reveal information about a person or an organization’s financial condition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following types of records are commonly available from local governments?

A. Voter registration records
B. Health and fire department records
C. Utility records
D. All of the above

A

D. All of the above

See pages 3.607-3.609 in the Fraud Examiner’s Manual

The following items are basic types of public records that can commonly be accessed at the local level of government:

  • Building inspector records
  • Building permit records
  • Health and fire department records
  • Birth and death records
  • Public school records
  • Coroner’s register
  • Voter registration records
  • Utility records
  • Marriage records
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is a reason why a subject’s credit card records and statements can be useful in asset tracing investigations?

A. Credit card records are available online for public inspection.
B. Credit card statements show the source of the funds used to pay a credit card bill.
C. Credit card records can reveal assets that a subject has acquired.
D. Credit card statements provide information about the division of the subject’s assets.

A

C. Credit card records can reveal assets that a subject has acquired.

See pages 3.935 in the Fraud Examiner’s Manual

Credit card records are important in tracing assets because they reveal a great deal of personal and business information about the account holder. Credit card records show card purchasing limits, previous payment history, account balance, when and where the subject has traveled, restaurants frequented by the subject, and assets the subject has acquired. In short, these records show the movements and habits of the person to whom the records pertain.

Credit card statements also contain a great deal of important information. Generally, these statements contain the name of the credit card issuer, the cardholder’s account number, a summary of the transactions on the account, payment information, and a list of all the transactions that occurred during that month’s billing cycle (i.e., purchases, payments, credits, cash advances, and balance transfers).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Records obtained from financial institutions are perhaps the single MOST IMPORTANT financial source available to fraud examiners for purposes of tracing assets.

A. True
B. False

A

A. True

See pages 3.912 in the Fraud Examiner’s Manual

Records obtained from financial institutions are perhaps the single most important financial source available to fraud examiners for asset-tracing purposes. They can be used as evidence for fraud, as well as to:

  • Identify witnesses and other evidence.
  • Uncover criminal profits.
  • Identify criminal assets.
  • Locate assets that can be used to satisfy a judgment.
  • Identify locations where assets are stored.
  • Determine the lifestyle of an account holder.
  • Determine the financial health of an organization.
  • Determine the source of funds placed into an account.
  • Determine the use of the funds from an account.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following documents is MOST LIKELY to be included with the account-opening documents for a corporation’s business account?

A. A list of all shareholders
B. Copies of corporate resolutions of the board of directors authorizing the opening of the account
C. A copy of the corporation’s board-authorized personnel policies
D. A copy of all shareholders’ meeting minutes

A

B. Copies of corporate resolutions of the board of directors authorizing the opening of the account

See pages 3.920 in the Fraud Examiner’s Manual

To open a business account for a corporation, the opening party must provide a signature card, or similar document, and copies of corporate resolutions of the board of directors authorizing the opening of the bank account and naming the person who may authorize payments on the account. Also, the bank might require a copy of the company’s organizational or business filings (such as articles of incorporation). These documents should indicate who the company’s corporate officers are and the company’s date of incorporation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In most jurisdictions, a fraud examiner can easily and legally obtain an individual’s personal credit information from any third-party information vendor if the fraud examiner suspects the individual of fraud.

A. True
B. False

A

B. False

See pages 3.626-3.627 in the Fraud Examiner’s Manual

In the case of consumer (individual) credit records and personal data, a growing number of jurisdictions regulate how such information is collected and stored, as well as who may access this information and for what purpose. In many cases, the consumer must be notified and must consent to the use of the report.

In jurisdictions that regulate credit information and personal data, a fraud examiner will generally need a legally acceptable reason for accessing such information from third parties. However, simply suspecting an individual of fraud is generally insufficient grounds for obtaining credit and personal data regarding the person from a reporting agency or data controller. The specific exceptions for allowing the processing and dissemination of credit and personal data vary, but some common circumstances include when:

  • The individual has given consent.
  • It is necessary for the extension of credit or to enter into a contract with the subject.
  • It is necessary to protect the subject’s vital interest.
  • It is necessary to comply with other legal requirements.
  • An employer is conducting a background check for hiring or other employment purposes. (Consent is still required in many jurisdictions.)
  • It is necessary to serve the public interest.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A fraud examiner is conducting an investigation involving ABC Company, a multinational, publicly traded company, and wants to obtain regulatory securities records regarding the company. Which of the following BEST describes where the fraud examiner should check to find these records?

A. Only the securities exchanges in the jurisdiction where the company does most of its business
B. Only domestic securities exchanges and exchanges in jurisdictions where the corporation has a substantial business presence
C. Only domestic securities exchanges located in the jurisdiction where the company is incorporated
D. Both domestic and foreign securities exchanges, including those in jurisdictions where the company has minimal business presence

A

D. Both domestic and foreign securities exchanges, including those in jurisdictions where the company has minimal business presence

See pages 3.622 in the Fraud Examiner’s Manual

While jurisdictions treat the concept of securities differently, governments or self-regulatory bodies generally set rules for the issuing and trading of certain types of securities. Among the most common and important rules are disclosure requirements for companies with publicly traded securities. These rules are designed to make sure that investors are reasonably informed about stock that they purchase. Fraud examiners should keep in mind that if a public company does not report to its domestic securities regulator, it might be registered with regulators of foreign securities exchanges. Even if the company has minimal or no presence in the foreign jurisdiction, it might be registered there to benefit from foreign investment. Therefore, searching multiple securities exchanges might be necessary for conducting a thorough securities records search.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A company’s organizational filing with the government generally includes information about the company’s ownership, directors and officers, initial shareholders, and the location of its principal office.

A. True
B. False

A

A. True

See pages 3.618 in the Fraud Examiner’s Manual

Companies are formed by submitting some type of organizational filing to the government of the jurisdiction in which the entity is incorporated. These filings might be referred to in various ways in different jurisdictions (e.g., articles of incorporation, corporate constitution, or corporate charter). Organizational filings are generally public records and usually include:

  • Corporate name
  • Ownership information
  • Nominal stock value
  • Names of initial shareholders
  • Names of the directors and officers
  • Registered agent(s)
  • Location of the principal office
  • Date of incorporation
  • Standing/status
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Lance wants to search the internet for sites with information on mortgage fraud. Which of the following search strings will yield the BEST result using a basic search engine?

A. “Mortgage fraud”
B. Mortgage OR fraud
C. Mortgage -fraud
D. *Mortgage fraud

A

A. “Mortgage fraud”

See pages 3.636-3.638 in the Fraud Examiner’s Manual

Users can employ advanced search operators (or Boolean operators) to gain more control over the search results. Advanced search operators are query words or symbols used to instruct search engines to perform special actions when executing a search. They help search engines better understand exactly what the user is looking for, and they improve searches and return relevant results faster.

Placing quotation marks around a phrase will indicate to the search engine that it is to search only for pages that have the exact phrase. Thus, performing a search for “mortgage fraud” will yield pages containing that exact phrase. In Lance’s case, this search would yield the best results.

In some search engines, adding the minus sign before unwanted terms will produce results that do not contain the word following the “-.” So, a search for “mortgage -fraud” will return pages in which the word mortgage appears but will exclude pages that reference the word fraud.

In some search engines, adding the word OR between two terms will yield sites in which either word appears.

In some search engines, a user can insert an asterisk (*) as a placeholder for any unknown terms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When gathering information for a fraud investigation, virtually all helpful documentary evidence will come from internal sources.

A. True
B. False

A

B. False

See pages 3.601 in the Fraud Examiner’s Manual

Internal sources—those generated and kept within the subject organization—are often the only resource for certain types of documents, such as private business tax records or employee personnel files, unless the fraud examiner secures the subject’s consent or a legal order to obtain those documents from other parties. Even so, a large amount of information and documentary evidence can also be gathered from external sources. External sources can be particularly crucial in helping investigators locate missing assets; locate witnesses and suspects; determine ownership in vendors, competitors, and other related parties; research the suspects’ assets and financial condition; and document the suspects’ lifestyle and background information. All this information will help an investigator build a case and will provide the basis for conducting interviews and obtaining confessions later in the investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Under which of the following circumstances would a fraud examiner need to comply with the European Union’s (EU) General Data Protection Regulation (GDPR)?

A. The fraud examiner is based in Spain (an EU country) and is collecting personal information about an individual who lives in the United States (a non-EU country)
B. The fraud examiner is based in the United States (a non-EU country) and is collecting personal information about an individual who lives in Denmark (an EU country)
C. The fraud examiner is based in France (an EU country) and is collecting personal information about an individual who lives in Luxembourg (an EU country)
D. All of the above

A

D. All of the above

See pages 3.606 in the Fraud Examiner’s Manual

The General Data Protection Regulation (GDPR) applies to organizations that are based in the European Union (EU) that collect or process the personal data of any person, regardless of where the person is located. The GDPR also applies to organizations that are not based in the EU if they collect or process the personal data of any person located in the EU for the purpose of:

  • Offering goods or services to the person, regardless of whether payment is required
  • Monitoring the person’s behavior

Therefore, the GDPR applies to most companies that have customers in the EU even if the companies have no physical presence in the EU.

The GDPR could limit the availability of personal information for fraud examiners whether they or their organization is collecting that information or attempting to access personal information collected and disclosed by other organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following pieces of information is usually contained on the signature card of a personal bank account?

A. The name of the person opening the account
B. The identification number of the person opening the account
C. The address of the person opening the account
D. All of the above

A

D. All of the above

See pages 3.918-3.919 in the Fraud Examiner’s Manual

To open a personal account, an individual must provide a signature card, or similar document, evidencing a contract between the customer and bank. The signature card is a source of valuable information. Although its form varies, the card usually contains the person’s name, address, telephone number, identification number, amount of the opening deposit (and possibly the source of the opening deposit), and security data (e.g., mother’s maiden name). The person’s identification information might be significant, especially if the depositor used an alias. Also, a fraud examiner might be able to trace the opening deposit through the bank’s records to disclose a source of income.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Net worth can be defined as the difference between assets and liabilities at a particular point in time.

A. True
B. False

A

A. True

See pages 3.950 in the Fraud Examiner’s Manual

Net worth can be defined as the difference between assets and liabilities at a particular point in time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Gamma, a Certified Fraud Examiner (CFE), is attempting to locate the exact birthplace of Theta, a fraud suspect. Where is Gamma MOST LIKELY to find such a record if it exists?

A. The jurisdiction’s tax assessor
B. The local commercial filing agency
C. The local property records agency
D. The jurisdiction’s health records agency

A

D. The jurisdiction’s health records agency

See pages 3.608 in the Fraud Examiner’s Manual

Some local health records agencies maintain birth and death records. The content and availability of these records varies widely, but they might include the name of the individual, address, sex, age, race, birthplace, birth date, death place, date and time of death, government identification number, close family members, occupational information, medical certificate, and coroner’s certificate. If such records are not available locally, there might be a state/provincial or national health office that maintains them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Giada, a fraud examiner, is investigating a suspected embezzlement by one of XYZ Corporation’s employees. As part of the investigation, she is assembling a financial profile of the suspect. Among other things, Giada wants to see if the suspect has made any significant real estate purchases since the embezzlement scheme began. Information on real estate transactions, such as deeds, grants, transfers, and mortgages, is usually located:

A. With the jurisdiction’s commercial filing registrar
B. With the local court clerk or judicial records agency
C. With the jurisdiction’s organizational filing agency
D. With the jurisdiction’s land registry office

A

D. With the jurisdiction’s land registry office

See pages 3.615-3.616 in the Fraud Examiner’s Manual

Most jurisdictions have a land registry office that maintains various information on real property and its owner(s). Both the level of government where these records are found and the information they contain will vary by jurisdiction, but the following information is often present:

  • Documents pertaining to real estate transactions—including deeds, grants, real estate transfers and mortgages, releases of mortgages, powers of attorney, and leases that have been acknowledged or approved
  • Mortgages on real property
  • Security interests or liens on property
  • Wills admitted to probate
  • Official bonds
  • Notices of mechanic’s liens
  • Transcripts of judgments that are made liens on real estate
  • Notices of attachment on real estate
  • Land cadastre (i.e., a registry of land surveys that specifically details each plot of real estate in an area and contains information about value, ownership rights, and other details)
  • Papers in connection with bankruptcy
  • Certified copies of decrees and judgments of courts of record
  • Other documents permitted by law to be recorded
  • Historical sale prices
  • Residences and addresses of the buyer and seller
  • Identity of the party financing the property if applicable
  • Improvements to a property
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is a common use of public records in fraud examinations?

A. Obtaining a person’s credit records
B. Accessing an individual’s income tax filings
C. Tracing and recovering assets
D. All of the above

A

C. Tracing and recovering assets

See pages 3.602, 3.624 in the Fraud Examiner’s Manual

Public records are documents that a governmental agency is required to keep by law or that are necessary to discharge the duties imposed by law. Public records, which can generally be accessed by the public and are thus available to anyone who wishes to use them, can be useful to fraud examiners for numerous reasons. They can supply invaluable background information on entities, employees, suspects, and witnesses. They can also be used to corroborate or refute witness statements, help investigators track the flow of stolen money or other assets, and aid efforts to recover losses.

Individual tax records and consumer credit records are typically nonpublic information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is LEAST LIKELY to be revealed by analyzing a subject’s electronic payment records?

A. The locations of the subject’s assets
B. The cities and countries in which the subject conducts business
C. If the subject is skimming employer funds
D. The true owner of a property

A

C. If the subject is skimming employer funds

See pages 3.926-3.927 in the Fraud Examiner’s Manual

The term electronic payments (or e-payments) refers to any type of noncash payment that does not involve a paper check. Electronic payment records can reveal:

  • Assets the subject has purchased
  • The locations of the subject’s assets (e.g., through the payment of real estate taxes, broker’s fees, or utility payments)
  • The locations of the subject’s residences and businesses (e.g., through analyzing the payments of utility bills)
  • Loans the subject has obtained (e.g., through analyzing loan payments)
  • Payments made to nonexistent employees with direct deposit
  • The cities and countries in which the subject conducts business (e.g., through analyzing the payments for carrier services to deliver packages)
  • Transfers of funds between individuals without an established business relationship
  • Assets ostensibly owned by family members or close associates but effectively controlled, held, or gifted by the subject
  • Hotel payments
  • The true owner of a property (e.g., through analyzing the mortgage payments and payments for homeowner’s insurance)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Freddie calls Alex’s bank and claims to be Alex with the intention of stealing Alex’s identity. Freddie tells the bank representative that he needs to make sure the bank has the correct government identification number on his account because he noticed an error on his statement. The bank representative refuses to give the number, so Freddie hangs up. Assuming that each of the following is illegal in the relevant jurisdiction, which of the following crimes did Freddie commit?

A. Fraud in the inducement
B. Embezzlement
C. Pretexting with a financial institution
D. Defalcation

A

C. Pretexting with a financial institution

See pages 3.630-3.631 in the Fraud Examiner’s Manual

Broadly defined, pretexting is the act of impersonating someone else or making false or misleading statements to obtain, sell, or buy information about a person or organization.

Under the broad definition, pretexting for nonfraudulent purposes is not always illegal, but it should be used with caution. For example, if a fraud examiner is trying to find a witness or a suspect, they might call the person’s relative and pretend to be an old friend who is requesting the individual’s phone number. This type of pretexting might be permissible. However, it is more often illegal to use pretexting to obtain certain types of information, such as financial records and phone history records.

Several jurisdictions have prohibited pretexting against financial institutions even if no fraudulent intent is present. In the context of financial institutions, pretexting is the act of obtaining or attempting to obtain customer information from financial institutions using deceptive tactics. Some individuals use pretexting to gather financial information about a subject. Pretexters contact a financial institution and pretend to be the customer, or another individual authorized to obtain financial information, and trick the financial institution into providing information about the subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following statements concerning court records is MOST ACCURATE?

A. In most countries, court records are not public records and require judicial authorization to access.
B. In most countries, reliable court records are best obtained from the court in which the case was heard or tried.
C. There are multiple databases that contain a comprehensive database of court documents from all court cases in every country.
D. When searching for records for a particular court case, a fraud examiner needs only to search the central/federal court records, as they serve as a repository for all cases heard at all court levels.

A

B. In most countries, reliable court records are best obtained from the court in which the case was heard or tried.

See pages 3.609-3.611 in the Fraud Examiner’s Manual

A great deal of litigation occurs each year, and many people might be subject to judicial action, voluntarily or not. Court records are a common direct or indirect source of information for fraud examinations. Many jurisdictions allow fraud examiners to search court records, and there are also a variety of services that compile and search such records.

To perform court records searches, fraud examiners need to be familiar with the structure of the jurisdiction’s court system. Many jurisdictions implement a tiered court structure in which minor offenses and causes of action (e.g., small claims) are held in one set of courts while more serious offenses or issues are held in another set. Similarly, a jurisdiction might have courts that are divided based on local/municipal, state/provincial, and central/federal levels of government. Court records are typically maintained by a clerk or administrative office of the court that heard the case. However, there might be an agency that maintains records from multiple court levels. Therefore, to conduct a thorough search of court records, fraud examiners might need to search at multiple court levels.

It is rare for there to be a central public database that maintains all court records at every level of a jurisdiction, and there are no parties that maintain a comprehensive database of court records on a global basis (despite what some records merchants might claim).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Spencer, a fraud examiner, plans to use a confidential informant. The informant agrees to aid Spencer in exchange for cash. Spencer prepares a receipt for the transfer of cash to the informant and asks the informant to sign it, but the informant refuses. What should Spencer do?

A. Have a witness observe the transfer of cash and sign a statement attesting to the transaction
B. Give the informant the cash, but do not make any record of the transaction
C. Refuse to pay the cash without a receipt, even if it means the informant will not aid Spencer
D. None of the above

A

C. Refuse to pay the cash without a receipt, even if it means the informant will not aid Spencer

See pages 3.520 in the Fraud Examiner’s Manual

If the fraud examiner decides to pay an informant or source, then they should make the payment in cash and obtain a receipt for documentation purposes. If the source will not sign a receipt, then the fraud examiner should not pay them. There have been numerous instances where a receipt was not obtained, so the informant subsequently denied receiving funds or challenged the amount paid. If this happens, the fraud examiner will have to defend themselves without proof; indeed, some investigators have been accused of embezzling the payments. Payments should only be made after the informant has delivered the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following documents is typically included with the account-opening documents for a corporation’s business account?

A. A signature card
B. Copies of corporate resolutions of the board of directors authorizing the opening of the account
C. Copies of corporate resolutions of the board of directors naming the person who may authorize payments on the account
D. All of the above

A

D. All of the above

See pages 3.920 in the Fraud Examiner’s Manual

To open a business account for a corporation, the opening party must provide a signature card, or similar document, and copies of corporate resolutions of the board of directors authorizing the opening of the bank account and naming the person who may authorize payments on the account. Also, the bank might require a copy of the company’s organizational or business filings (such as articles of incorporation). These documents should indicate who the company’s corporate officers are and the company’s date of incorporation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A fraud examiner in an organized crime investigation believes a particular commercial restaurant is being used as a place of operation by the suspects. Which of the following types of records would be the LEAST LIKELY to help the fraud examiner discover who owns or occupies the building in which the restaurant operates?

A. Voter registration records
B. Building permit records
C. Health department records
D. Fire department records

A

A. Voter registration records

See pages 3.607-3.609 in the Fraud Examiner’s Manual

There are many public records often found at the local level that can help fraud examiners gather various types of information. To determine who owns a particular property, there might be direct information or leads found in the records of several agencies, including health and fire departments. Many local health or fire departments conduct routine inspections of businesses for health and safety code or fire code violations. These inspection records might contain valuable information about the business and its occupants, including its operations, employees, and owners.

If a business or an individual constructs a new building or makes improvements to an existing building, there should be a building permit on file with the local building authority. In addition, before most businesses may begin conducting business, local agencies might require that they possess certain permits. In many cases, the person applying for permits will be the owner or someone traceable to the owner.

Voter registration records are not public in all jurisdictions, but if they are available, they might contain useful information. Usually, much of the information contained in such records is withheld from the public for privacy purposes, but voter registration records might contain a person’s date of birth, mailing address, and political affiliation. However, this information is less likely than the other sources listed to identify the owner of a commercial building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following is an accurate statement about tracing the disposition of loan proceeds?

A. Tracing loan proceeds can determine whether a subject has taken out a loan for someone else
B. Tracing loan proceeds can uncover hidden assets or unknown witnesses
C. Tracing loan proceeds can determine if hidden accounts were used for loan payments
D. All of the above

A

D. All of the above

See pages 3.933 in the Fraud Examiner’s Manual

If a fraud examination involves a loan with proceeds that have been disposed, the fraud examiner should trace the disposition of the loan’s proceeds. A fraud examiner can trace loan proceeds to determine if hidden accounts were used for loan payments or if the proceeds were deposited into hidden accounts. Also, because loans might be secured by hidden assets or co-signed by previously unknown cohorts, tracing loan proceeds can uncover hidden assets or unknown witnesses. Moreover, if the subject has taken out a loan for someone else, tracing the disposition of the loan proceeds will uncover those leads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In jurisdictions that regulate the processing and dissemination of personal credit information and personal data, such information regarding an individual cannot be obtained under any circumstances without the person’s consent.

A. True
B. False

A

B. False

See pages 3.626 in the Fraud Examiner’s Manual

In the case of consumer (individual) credit records and personal data, a growing number of jurisdictions regulate how such information is collected and stored, as well as who may access this information and for what purpose. In many cases, the consumer must be notified and must consent to the use of the report.

In jurisdictions that regulate credit information and personal data, a fraud examiner will generally need a legally acceptable reason for accessing such information from third parties. However, simply suspecting an individual of fraud is generally insufficient grounds for obtaining credit and personal data regarding the person from a reporting agency or data controller. The specific exceptions for allowing the processing and dissemination of credit and personal data vary, but some common circumstances include when:

  • The individual has given consent.
  • It is necessary for the extension of credit or to enter into a contract with the subject.
  • It is necessary to protect the subject’s vital interest.
  • It is necessary to comply with other legal requirements.
  • An employer is conducting a background check for hiring or other employment purposes. (Consent is still required in many jurisdictions.)
  • It is necessary to serve the public interest.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Bianca, a fraud examiner for the Levine Corporation, suspects that an employee of another company has committed a fraud scheme against Levine Corporation. The relevant jurisdiction regulates the distribution of credit information and personal data. Although Bianca has not obtained the suspect’s consent, she will likely be allowed to access their credit report from a third party.

A. True
B. False

A

B. False

See pages 3.626 in the Fraud Examiner’s Manual

In the case of consumer (individual) credit records and personal data, a growing number of jurisdictions regulate how such information is collected and stored, as well as who may access this information and for what purpose. In many cases, the consumer must be notified and must consent to the use of the report. In jurisdictions that regulate credit information and personal data, a fraud examiner will generally need a legally acceptable reason for accessing such information from third parties. However, simply suspecting an individual of fraud is generally insufficient grounds for obtaining credit and personal data regarding the person from a reporting agency or data controller.

Some jurisdictions provide an exception to this rule when a party is conducting a background check for employment purposes, but because the suspect in this case is not an employee of the investigating party, the exception would not apply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

___________ refers to an instance when law enforcement officers or government agents induce a person to commit a crime that they are not previously disposed to commit.

A. False imprisonment
B. Collusion
C. Entrapment
D. Covert operation

A

C. Entrapment

See pages 3.505 in the Fraud Examiner’s Manual

Many jurisdictions recognize the legal defense of entrapment. Entrapment occurs when law enforcement officers or government agents induce a person to commit a crime that they are not previously disposed to commit. Entrapment also poses a legal problem in covert operations, particularly in undercover operations, because the defendant might not be found liable if it appears that they were improperly induced to commit the crime. Therefore, it is imperative that proper predication exists before the operation is commenced. The law enforcement officer or government agent must act based on more than mere suspicion. For example, if the officer received a reliable tip that a suspect committed fraud, then that could serve as proper predication. Covert operations must not be used for aimless searches for information performed without notions of what might be uncovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is a common method that fraudsters use to hide their ill-gotten gains?

A. Prepaying a home mortgage
B. Transferring assets into foreign trusts
C. Purchasing a life insurance policy
D. All of the above

A

D. All of the above

See pages 3.958-3.959 in the Fraud Examiner’s Manual

Any type of asset can be hidden (e.g., real property, jewelry, stocks, bonds, vehicles, cash), and there are many techniques that a fraudster might use to hide ill-gotten gains. Some common techniques for hiding assets include transferring assets into foreign trusts, overpaying taxes, prepaying on a home mortgage, obtaining a life insurance policy, and transferring assets into someone else’s name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following is a limitation of conducting a search for public records using online databases?

A. Online availability of public records varies widely across jurisdictions
B. Online public records are usually brief abstracts of the original public record
C. Information from online databases must be validated for accuracy and timeliness
D. All of the above

A

D. All of the above

See pages 3.643-3.644 in the Fraud Examiner’s Manual

The main limitations of conducting searches for public records using online databases include:

  • Online availability of public records varies widely across jurisdictions, and therefore, there are many degrees of accessibility to public records between jurisdictions.
  • Online public records searches are limited in the area they cover. Therefore, when looking for information on a subject, fraud examiners often must search for public records in multiple jurisdictions.
  • Often, online public records are brief abstracts of the original public record.
  • The source of the information compiled in an online database must be reliable.
  • Fraud examiners must validate information retrieved from online databases to determine if it is accurate and up to date.
  • The public records compiled in an electronic format might cover only a limited period.
  • Online searches can be erratic in the information they return.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

It is best practice for fraud examiners to conduct covert operations at the same time that they are employing conventional methods of gathering evidence.

A. True
B. False

A

B. False

See pages 3.501 in the Fraud Examiner’s Manual

A covert operation is an investigation technique designed to obtain evidence by use of agents whose true intentions are not communicated to the target. Covert operations must be undertaken carefully.

When considering a covert operation, fraud examiners must consider privacy laws, the potential cost of human and technological resources, any source or informant’s motivations and expectations regarding their participation, and the potential to alert suspects to the existence of an investigation. Therefore, fraud examiners should only resort to covert operations after conventional methods of gathering evidence have been exhausted and proven unsuccessful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following is a good practice when searching the internet for information?

A. Use filters to focus searches
B. Use specific nouns instead of pronouns
C. Use more than one search engine
D. All of the above

A

D. All of the above

See pages 3.640 in the Fraud Examiner’s Manual

The following is a list of tips and guidelines for searching the internet for information:

  • Use more than one search engine. Everyone has a favorite search engine, but relying on one search engine is insufficient because every search engine collects and catalogs information differently.
  • Be clear about what is being searched for. Define the search topic as clearly and succinctly as possible.
  • Use unique, specific keywords. Be specific when entering search terms.
  • Use nouns for keywords.
  • Use format terms (e.g., transcript, document, report, statistics, pdf, policy, dictionary) in addition to subject words.
  • Exclude articles (e.g., a, an, the) and pronouns (e.g., he, she, it, they) from search terms unless they are part of a key phrase.
  • Use correct spelling and include alternative spellings (e.g., colour OR color).
  • Use filters to focus searches. Filters tell search engines to screen out specified types of pages or files.
  • Check all the tips and features of any search engine to be used and utilize them.
  • Increase the number of results displayed per page.
  • Customize searches using advanced search operators, such as the minus (-) operator and quotation marks, to narrow the search results.
  • Search for phrases. Search for a sequence of words in a specific order, using quotation marks around the phrase.
  • Search for base words (do not include suffixes) to avoid excluding relevant pages.
  • Use metasearch engines if early searches are unsuccessful.
  • Set a time limit for searching, and when the set amount of time has elapsed, stop and try another method.
  • Use a browser’s find feature to find a word or phrase on a web page and help navigate search results.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following is a type of information that can be obtained from the deep web?

A. An archived version of a web page that is no longer online
B. An old version of a web page that has since been updated
C. Websites without any links pointing to them
D. Web content indexed by standard search engines

A

C. Websites without any links pointing to them

See pages 3.647-3.649 in the Fraud Examiner’s Manual

The deep web (also known as the invisible web) refers to web content that is not indexed by standard search engines. There are numerous reasons why the deep web exists. For instance, there are websites where web crawling programs cannot enter. Web crawlers are scripts that create copies of visited web pages that are indexed by a search engine to provide faster searches. These deep web resources include websites without any links pointing to them, certain file formats that search engines cannot handle, websites that have been blocked from web crawler access, password-protected websites, and information stored in databases. Also, search engines limit the depth of their crawl on a website. Moreover, web crawlers cannot crawl as quickly as pages are added or updated.

Alternatively, the term internet archives refers to archived versions of web pages that have since been updated or are no longer available online. The most popular tool for searching the internet archives is the Wayback Machine, located at https://archive.org. The Wayback Machine allows users to see archived versions of web pages throughout time. Fraud examiners can use the Wayback Machine to find historical information, such as:

  • A photo posted on a website that has been removed
  • Content, views, writing, and opinions rescinded by an author
  • A company’s old job ads, statements, affiliations, or product lines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

In many jurisdictions, when an individual purchases real estate, they usually become a registrant in which of the following records?

A. Real property records
B. Property tax records
C. Tax assessor records
D. All of the above

A

D. All of the above

See pages 3.615 in the Fraud Examiner’s Manual

Real property records are extremely important, and in many jurisdictions, they are relatively easy to access and contain a vast amount of information. It is common for real property records to be found at the local level of government, but some jurisdictions might keep them at the national level of government or a centralized location. When an individual purchases real estate, they become a registrant in real property records, property tax records, and tax assessor records (if applicable).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which of the following is LEAST LIKELY to be revealed by analyzing a subject’s electronic payment records?

A. Fund transfers between individuals who do not have a business relationship
B. The locations of the subject’s residences and businesses
C. Loans the subject has obtained
D. The market value of any real property owned

A

D. The market value of any real property owned

See pages 3.926-3.927 in the Fraud Examiner’s Manual

The term electronic payments (or e-payments) refers to any type of noncash payment that does not involve a paper check. Electronic payment records can reveal:

  • Assets the subject has purchased
  • The locations of the subject’s assets (e.g., through the payment of real estate taxes, broker’s fees, or utility payments)
  • The locations of the subject’s residences and businesses (e.g., through analyzing the payments of utility bills)
  • Loans the subject has obtained (e.g., through analyzing loan payments)
  • Payments made to nonexistent employees with direct deposit
  • The cities and countries in which the subject conducts business (e.g., through analyzing the payments for carrier services to deliver packages)
  • Transfers of funds between individuals without an established business relationship
  • Assets ostensibly owned by family members or close associates but effectively controlled, held, or gifted by the subject
  • Hotel payments
  • The true owner of a property (e.g., through analyzing the mortgage payments and payments for homeowner’s insurance)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

In most jurisdictions, which of the following statements about bankruptcy court records is CORRECT?

A. Bankruptcy documents are usually located in the jurisdiction where the most debt was incurred
B. A bankruptcy file typically contains the bankruptcy petition or filing document
C. Only the party filing for bankruptcy and the creditors may access bankruptcy records
D. All of the above

A

B. A bankruptcy file typically contains the bankruptcy petition or filing document

See pages 3.614 in the Fraud Examiner’s Manual

Many jurisdictions provide bankruptcy records to the authorized parties or the general public. Bankruptcy proceedings generally occur in the jurisdiction in which the debtor resides. It is common for countries to have separate bankruptcy courts that handle most or all such cases. The information available in bankruptcy records varies, but common items include:

  • The bankruptcy petition or other type of filing document, which might include the subject’s government identification number; street address and primary place of business; location of principal assets of business; type of business; name of legal representative; estimated amount of assets; estimated number of creditors, liabilities, and employees; financial data; and a list of corporate shareholders
  • Claim documents by creditors listing the amounts that the debtor allegedly owes
  • A final accounting that shows which claims were paid
  • A descriptive list of the debtor’s property at the time of filing (real estate, personal property, investments, accounts receivables, etc.)
  • Filings that describe the debtor’s income and expenditures
  • The bankruptcy plan (Some jurisdictions allow bankrupt parties to reorganize businesses or participate in a debt reduction plan, as opposed to liquidating all assets.)
  • Details from a fraud examination if the bankrupt party was suspected of bankruptcy fraud
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of the following pieces of information is NOT usually contained on the signature card of a personal bank account?

A. The thumbprint of the person opening the account
B. The identification number of the person opening the account
C. The address of the person opening the account
D. The telephone number of the person opening the account

A

A. The thumbprint of the person opening the account

See pages 3.918-3.919 in the Fraud Examiner’s Manual

To open a personal account, an individual must provide a signature card, or similar document, evidencing a contract between the customer and bank. The signature card is a source of valuable information. Although its form varies, the card usually contains the person’s name, address, telephone number, identification number, amount of the opening deposit (and possibly the source of the opening deposit), and security data (e.g., mother’s maiden name). The person’s identification information might be significant, especially if the depositor used an alias. Also, a fraud examiner might be able to trace the opening deposit through the bank’s records to disclose a source of income.

While a bank signature card evidencing a contract between the customer and bank contains several important pieces of identifying information, it typically does not contain the fingerprints of the account holder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Suppose that a fraud examiner needs to prove a suspect’s illicit income circumstantially. Which of the following methods of tracing assets would yield the BEST result when the suspect is using their illicit funds to accumulate wealth and acquire assets or pay down debts, thus causing their net worth to increase?

A. The expenditures method
B. The bank deposit analysis method
C. The asset method
D. The income correlation method

A

C. The asset method

See pages 3.943, 3.950, 3.953, 3.955 in the Fraud Examiner’s Manual

The asset method, the expenditures method, and the bank deposit analysis method can all be used to establish a subject’s sources of income using circumstantial proof.

The asset method allows the fraud examiner to prove income circumstantially by showing that the subject’s assets for a given period exceed those that can be accounted for from known or admitted sources of income. Fraud examiners should use the asset method when it is suspected that the subject has accumulated wealth and acquired assets or paid down debts with illicit proceeds, which causes the subject’s net worth—the difference between a person’s assets and liabilities at a particular point in time—to increase from year to year.

The expenditures method (also known as the sources and application of funds method) compares the suspect’s known expenditures and known sources of funds during a given period of time. That is, this analysis seeks to quantify the cost of the subject’s lifestyle and determine whether the subject’s reported income is sufficient to support their lifestyle. The expenditures method is best used when the subject spends illicit income on consumables (e.g., travel and entertainment) that would not cause an increase in net worth.

The bank deposit analysis method of tracing illicit funds is recommended as a primary method of proof when most of the subject’s income is deposited and the accounting and business records of their company or employer are unavailable, withheld, incomplete, or maintained on a cash basis.

The income correlation method is not a method of tracing illicit funds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A fraud examiner can request a business’s bank records even if the business is not legally obligated to comply.

A. True
B. False

A

A. True

See pages 3.629 in the Fraud Examiner’s Manual

The simplest way to obtain relevant documents, such as bank records, is to request them. This usually works for fraud examiners representing large organizations that are important customers to the party with the information. Vendors and other customers of the company conducting the investigation might cooperate voluntarily if they have nothing to hide (or think that incriminating evidence cannot be found) and are anxious to maintain good relations with the company. A subject can consent to produce the records or execute a written consent for the fraud examiner to obtain such records from banks, credit agencies, or the taxing authority.

If the business does not voluntarily provide the records, fraud examiners may pursue them through subpoenas and other legal processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which of the following is NOT a piece of information contained on most wire transfers?

A. The routing number of the recipient bank
B. The recipient’s government identification number
C. The name of the sender or originator
D. The date of the transfer

A

B. The recipient’s government identification number

See pages 3.924 in the Fraud Examiner’s Manual

The information contained on a wire transfer will generally include the following items:

  • The amount of the transfer
  • The date of the transfer
  • The purpose of the transfer
  • The name of the sender or originator
  • The routing number of the originating bank or financial institution
  • The identity of the designated beneficiary or receiver of the funds
  • The routing number of the recipient bank

However, the government identification number for the recipient is not typically included in most wire transfer records.

44
Q

Which of the following is a reason why a fraud examiner might be tasked with tracing illicit transactions?

A. To facilitate the recovery of criminal proceeds
B. To identify a judgment debtor’s assets
C. To determine if a potential defendant can pay if a judgment is ordered
D. All of the above

A

D. All of the above

See pages 3.901 in the Fraud Examiner’s Manual

Often, Certified Fraud Examiners (CFEs) are tasked with tracing illicit transactions to assist:

  • A victim of fraud who wants a tracing search to facilitate the recovery of criminal proceeds
  • A potential plaintiff who wants a tracing search to determine if the potential defendant can pay a court-ordered sum if a judgment is ordered
  • A judgment creditor who needs to identify the judgment debtor’s assets
45
Q

What is mutual legal assistance (MLA)?

A. A formal request by the government of a country seeking information from a defendant residing in another country
B. A process by which countries request and provide assistance in law enforcement matters
C. A letter whereby a criminal defendant requests that the government release exculpatory information
D. A formal request by the courts of one country seeking judicial assistance from the courts of another country

A

B. A process by which countries request and provide assistance in law enforcement matters

See pages 3.974-3.975 in the Fraud Examiner’s Manual

Mutual legal assistance (MLA) is a process by which countries request and provide assistance in law enforcement matters, such as gathering information, obtaining provisional remedies, and enforcing foreign orders and judgments. To obtain assistance from a foreign government, the government seeking assistance makes an MLA request. An MLA request is a written request to the government of a foreign country that is used to obtain assistance in law enforcement matters. Generally, MLA can be used to obtain assistance in matters such as conducting searches, gathering evidence, compelling sworn testimony and the production of documents, issuing search warrants, issuing subpoenas, serving process, exchanging affidavits, obtaining provisional remedies, and providing assistance in forfeiture proceedings.

46
Q

Which of the following information CANNOT be obtained from a subject’s safe deposit box record(s)?

A. The identity of people who have access to the safe deposit box
B. The record of contents contained in the safe deposit box
C. The signatures of people entering the safe deposit box
D. The time and date of people entering the safe deposit box

A

B. The record of contents contained in the safe deposit box

See pages 3.937 in the Fraud Examiner’s Manual

Banks keep no record of safe deposit box contents and rarely know what the boxes contain, but generally, banks maintain the following related records:

  • Rental contract records
  • Access records and entry logs

A safe deposit box’s rental contract records identify the renters, the person or people who have access to the box, their signatures, and the dates of the original agreements and later renewals. They also might contain other identifying information, including the name of the initiating bank officer. The officer’s name could be significant if the subject (who might have used an alias in renting the box) must be identified.

Records showing access to the boxes vary from bank to bank, but they generally contain the signatures of the people entering the boxes and usually the dates and times of entry. The entry records are filed in box-number order. The frequency of entry and the times and dates of entries might be significant and correspond to the times and dates of deposits, withdrawals from other accounts, and the purchases and sales of securities or property. Of course, proper authorization must be obtained before the bank will turn over any such records.

47
Q

Which of the following is a type of information that can often be obtained from external sources without a subject’s consent or a legal order?

A. Assets registered in the subject’s name
B. Information about the subject’s lifestyle
C. Information about the subject’s work history
D. All of the above

A

D. All of the above

See pages 3.601 in the Fraud Examiner’s Manual

A large amount of information and documentary evidence can be gathered from external sources. External sources can be particularly crucial in helping investigators locate missing assets; locate witnesses and suspects; determine ownership in vendors, competitors, and other related parties; research the suspects’ assets and financial condition; and document the suspects’ lifestyle and background information. All this information will help an investigator build a case and will provide the basis for conducting interviews and obtaining confessions later in the investigation.

48
Q

If a fraud examiner thinks that information from a social media website will be used in court as evidence, the fraud examiner must take steps to capture the information as soon as it is discovered so that it can be established as authentic.

A. True
B. False

A

A. True

See pages 3.653 in the Fraud Examiner’s Manual

Generally, documentary evidence, including digital evidence, will not be admitted in a legal proceeding or not be given much weight unless it is established as authentic (i.e., the evidence is what it purports to be and is in the same condition as when it was seized).

There are numerous techniques to authenticate information from social media. Often, authenticity can be established through the testimony of a witness who verifies that the exhibit at issue accurately reflects what they observed on the site, and typically, the witness is the party who collected the evidence. Consequently, fraud examiners who collect evidence from social media often become a form of eyewitness, and for this reason, fraud examiners must capture, download, and preserve any useful information as soon as they discover it. They must memorialize each step of the collection process, creating a record of what they see at any point in the investigation.

49
Q

Covert operations are beneficial to investigations because they pose little risk to investigators and the investigation itself.

A. True
B. False

A

B. False

See pages 3.501 in the Fraud Examiner’s Manual

A covert operation is an investigation technique designed to obtain evidence by use of agents whose true intentions are not communicated to the target. Covert operations must be undertaken carefully. With proper planning and precautions, such operations can prove very beneficial to an investigation. However, mistakes made during a covert operation can cause irreparable damage to an investigation and result in physical harm to the investigator. Moreover, the investigator might incur reputational, financial, and legal consequences.

50
Q

Which of the following types of records for a personal bank account would MOST LIKELY contain the account holder’s name, address, telephone number, and government identification number?

A. ATM withdrawal slip
B. Canceled check
C. Signature card
D. Deposit slip

A

C. Signature card

See pages 3.918-3.919 in the Fraud Examiner’s Manual

To open a personal account, an individual must provide a signature card, or similar document, evidencing a contract between the customer and bank. The signature card is a source of valuable information. Although its form varies, the card usually contains the person’s name, address, telephone number, identification number, amount of the opening deposit (and possibly the source of the opening deposit), and security data (e.g., mother’s maiden name). The person’s identification information might be significant, especially if the depositor used an alias. Also, a fraud examiner might be able to trace the opening deposit through the bank’s records to disclose a source of income.

51
Q

In many jurisdictions, all the following information can usually be obtained from real property records EXCEPT:

A. The identity of the party who financed the property if applicable
B. The addresses of a property’s buyer and seller
C. A property’s historical sales price
D. A property owner’s credit report

A

D. A property owner’s credit report

See pages 3.615-3.616 in the Fraud Examiner’s Manual

Real property records are extremely important, and in many jurisdictions, they are relatively easy to access and contain a vast amount of information. It is common for real property records to be found at the local level of government, but some jurisdictions might keep them at the national level of government or a centralized location. When an individual purchases real estate, they become a registrant in real property records, property tax records, and tax assessor records (if applicable).

Most jurisdictions have a land registry office that maintains various information on real property and its owner(s). Both the level of government where these records are found and the information they contain will vary by jurisdiction, but the following information is often present:

  • Documents pertaining to real estate transactions—including deeds, grants, real estate transfers and mortgages, releases of mortgages, powers of attorney, and leases that have been acknowledged or approved
  • Mortgages on real property
  • Security interests or liens on property
  • Wills admitted to probate
  • Official bonds
  • Notices of mechanic’s liens
  • Transcripts of judgments that are made liens on real estate
  • Notices of attachment on real estate
  • Land cadastre (i.e., a registry of land surveys that specifically details each plot of real estate in an area and contains information about value, ownership rights, and other details)
  • Papers in connection with bankruptcy
  • Certified copies of decrees and judgments of courts of record
  • Other documents permitted by law to be recorded
  • Historical sale prices
  • Residences and addresses of the buyer and seller
  • Identity of the party financing the property if applicable
  • Improvements to a property

A credit report involves a third party’s assessment of a person’s credit history and capacity to take out and repay debt; this information is not found in public property records.

52
Q

Which of the following statements concerning public records is MOST ACCURATE?

A. Public records are valuable for obtaining background information on individuals.
B. Public records are useful for searching banking records.
C. Public records are the primary source of individual health information.
D. Public records are those maintained by public companies.

A

A. Public records are valuable for obtaining background information on individuals.

See pages 3.602, 3.624 in the Fraud Examiner’s Manual

Public records are documents that a governmental agency is required to keep by law or that are necessary to discharge the duties imposed by law. Public records, which can generally be accessed by the public and are thus available to anyone who wishes to use them, can be useful to fraud examiners for numerous reasons. They can supply invaluable background information on entities, employees, suspects, and witnesses. They can also be used to corroborate or refute witness statements, help investigators track the flow of stolen money or other assets, and aid efforts to recover losses.

Banking and health records are typically nonpublic information.

53
Q

Which of the following facts would BEST support the defense of a law enforcement officer against an allegation of entrapment?

A. The officer acted based on their suspicion of fraud
B. The officer acted based on a tip from a reliable source
C. The officer acted without malice
D. All of the above

A

B. The officer acted based on a tip from a reliable source

See pages 3.505 in the Fraud Examiner’s Manual

Many jurisdictions recognize the legal defense of entrapment. Entrapment occurs when law enforcement officers or government agents induce a person to commit a crime that they are not previously disposed to commit. Entrapment also poses a legal problem in covert operations, particularly in undercover operations, because the defendant might not be found liable if it appears that they were improperly induced to commit the crime. Therefore, it is imperative that the operation be properly predicated. The law enforcement officer or government agent must act based on more than mere suspicion. For example, if the officer received a reliable tip that a suspect committed fraud, then that could serve as proper predication. Covert operations must not be used for aimless searches for information performed without notions of what might be uncovered.

54
Q

When a fraud examiner prepares a memorandum reflecting the information furnished by a confidential source, how should the fraud examiner identify the source?

A. The fraud examiner should identify the source using the source’s initials.
B. The fraud examiner should use symbols to denote the source’s identity.
C. The fraud examiner should identify the source by the source’s full name.
D. The fraud examiner should not write confidential source information in a memorandum.

A

B. The fraud examiner should use symbols to denote the source’s identity.

See pages 3.520 in the Fraud Examiner’s Manual

It is recommended that all contact with informants and sources be reported on a memorandum, but the confidential source or informant’s identity should not be included in the report. Instead of including the source or informant’s identity, the fraud examiner should use symbols to denote the source’s identity. It is further recommended that sources be preceded with an S, followed by a unique identifier. For example, source #1 would be “S-1,” and source #2 would be “S-2.” The symbols for informants would then be “I-1” and “I-2.”

55
Q

When searching regulatory securities records for information on a publicly traded company, which of the following information is LEAST LIKELY to be found?

A. Identity of major owners of the company
B. Identity of the company’s officers and directors
C. The complete books and records of the company
D. Major events that are of interest to investors

A

C. The complete books and records of the company

See pages 3.622 in the Fraud Examiner’s Manual

While jurisdictions treat the concept of securities differently, governments or self-regulatory bodies generally set rules for the issuing and trading of certain types of securities. Among the most common and important rules are disclosure requirements for companies with publicly traded securities. These rules are designed to make sure that investors are reasonably informed about stock that they purchase. Beyond helping investors, these disclosures are typically made public, and they can provide a wealth of information about the filing company, including its type of business, history, organizational structure, auditor, balance sheets, and income statements.

Different securities regulators have varying disclosure requirements, but regulatory securities records might include the following information:

  • Corporate financial statements
  • Identification of officers and directors
  • Identification of significant owners (e.g., those with more than 10% of a business’s stock)
  • A description of the registrant’s properties and businesses
  • A description of the significant provisions of the security to be offered for sale and its relationship to the registrant’s other capital securities
  • Identification of events of interest to investors
  • Identification of accountants and attorneys
  • A history of the business

The complete books and records of a company, however, are not available in securities records searches.

56
Q

Which of the following factors should a fraud examiner consider when determining the legality of electronic recordings?

A. Whether the interaction to be recorded will take place in a public or private setting
B. Whether the jurisdiction allows a combination of audio and/or video to be recorded
C. Whether the parties involved in the conversation have consented to being recorded
D. All of the above

A

D. All of the above

See pages 3.504-3.505 in the Fraud Examiner’s Manual

Many jurisdictions have laws that impose restrictions on electronic audio or video recording that are generally based on individuals’ right to privacy. The factors determining the legality of electronic audio or video recordings might include one or more of the following:

  • The consenting party—For a recording of a private conversation to be permissible, most jurisdictions require consent from at least one of the parties involved in the conversation. Jurisdictions with higher standards of privacy might require the consent of multiple or, in some cases, all parties. Fraud examiners operating in jurisdictions that allow recordings in which there is only one consenting party will generally have more options available to them in terms of electronic recordings of video and/or audio in private or in public.
  • The setting—Restrictions on recording might depend on whether the conversation or interaction to be recorded occurs in public or in private. For example, a fraud examiner might be allowed to record a conversation between two unsuspecting individuals on a busy street corner but not a conversation between two unsuspecting individuals in one of their residences. Alternatively, a conversation between two people in one of their residences might be permissible if one party consented to the recording. Additionally, the legality of electronically recording the interaction might depend on whether it occurs in person, over the phone, or on the internet.
  • A combination of audio and video—In some jurisdictions, including the United States, fraud examiners might only be allowed to record audio or video of a public interaction between two or more unsuspecting parties but not audio and video.
57
Q

If a fraud examiner was gathering information about a fraud suspect, which of the following types of information would likely require access to nonpublic sources of information to be obtained?

A. The subject’s phone records
B. Where the subject currently resides
C. The subject’s habits and lifestyle
D. All of the above

A

A. The subject’s phone records

See pages 3.605, 3.624 in the Fraud Examiner’s Manual

Nonpublic records—financial or otherwise—might be needed to prove fraud or to provide leads in a fraud examination. Nonpublic records include information about a person or business considered to be private and confidential. Nonpublic records are not available to everyone, and because fraud examiners do not have an absolute right to see these personal records, obtaining access might be difficult or impossible.

Some of the most valuable types of personal records include:

  • Banking records
  • Tax records
  • Credit records of individuals
  • Phone records
  • Credit card account records
  • Personal health care records
  • Internet service provider records
58
Q

Which of the following is the type of covert operation in which a fraud examiner observes situations and interactions to gather information about individuals’ activity?

A. An undercover operation
B. An entrapment operation
C. A surveillance operation
D. A source operation

A

C. A surveillance operation

See pages 3.501 in the Fraud Examiner’s Manual

The two main forms of covert operations are undercover operations and surveillance operations. Undercover operations often use deception and disguise to obtain evidence directly from those involved in the illicit activity. Agents engaged in undercover operations actively attempt to elicit the desired information. In contrast, surveillance operations use observation to gather information about individuals suspected of misconduct.

For example, a surveillance operation might involve observing a suspect from afar while they meet with a potential co-conspirator. Alternatively, the investigator might pose as the co-conspirator’s agent and engage the suspect in conversation to gather information; this would be an example of an undercover operation.

59
Q

To protect the security of a covert investigation, reports or memoranda of the covert operation should NOT be committed to paper.

A. True
B. False

A

B. False

See pages 3.502 in the Fraud Examiner’s Manual

Before conducting a covert operation, it is essential that the basis for the operation be committed to writing, preferably in a memorandum. The memorandum should clearly state:

  • The information upon which the covert operation will be based
  • The information that is expected to be gained from the operation
  • The identities of suspects, if known
  • Operatives under the fraud examiner’s care, custody, or control (confidential sources’ identities should not be disclosed, but such sources should be referred to with a symbol)
60
Q

Mario wants to locate Juliette, a fraud suspect. Mario calls Juliette’s parents posing as an old friend and asks for Juliette’s address, which they give him. This act would be considered illegal pretexting in all jurisdictions.

A. True
B. False

A

B. False

See pages 3.630 in the Fraud Examiner’s Manual

Broadly defined, pretexting is the act of impersonating someone else or making false or misleading statements to obtain, sell, or buy information about a person or organization. Under the broad definition, pretexting for nonfraudulent purposes is not always illegal, but it should be used with caution. For example, if a fraud examiner is trying to find a witness or a suspect, they might call the person’s relative and pretend to be an old friend who is requesting the individual’s phone number. This type of pretexting might be permissible. However, it is more often illegal to use pretexting to obtain certain types of information, such as financial records and phone history records.

61
Q

For a recording of a private conversation to be permissible, most jurisdictions require consent from at least one of the parties involved in the conversation.

A. True
B. False

A

A. True

See pages 3.504 in the Fraud Examiner’s Manual

For a recording of a private conversation to be permissible, most jurisdictions require consent from at least one of the parties involved in the conversation. Jurisdictions with higher standards of privacy might require the consent of multiple or, in some cases, all parties. Fraud examiners operating in jurisdictions that allow recordings in which there is only one consenting party will generally have more options available to them in terms of electronic recordings of video and/or audio in private or in public.

62
Q

Where permitted by law, searches of all the following sources of information can be useful in developing background information for pre-employment purposes EXCEPT:

A. Criminal court records searches
B. Income tax records
C. Civil court records searches
D. Bankruptcy records searches

A

B. Income tax records

See pages 3.624, 3.656 in the Fraud Examiner’s Manual

Some of the searches useful in developing background information for employment purposes are listed below (where permitted by law):

  • Credit header searches are useful in confirming address and national identification number information.
  • Civil court records can be searched to determine if candidates are or have been involved in legal actions.
  • Criminal court records may be used to uncover past criminal problems.
  • Tax court liens can be searched to determine if candidates have been sued by tax authorities.
  • Aircraft mechanics, airmen, medical licenses, and other licenses are available to ensure that basic job requirements are met in the appropriate circumstance.
  • Consumer credit reports may be used for employee selection, retention, and promotion.
  • Bankruptcy filings, tax liens, and judgments may be used to identify adverse financial matters that can serve as potential motivators for fraud, defamation, and embezzlement.
  • Where a prospective or current employee’s position requires them to drive a personally owned vehicle or an employer-owned vehicle, such activity might expose the employer to liability for damages; therefore, driving records must be checked in such circumstances.
  • A candidate’s prior education and employment can be verified by conducting education and employment verification searches.

In most jurisdictions, income tax records are not public records and cannot be accessed for pre-employment purposes.

63
Q

Covert operations are designed to obtain legal and admissible evidence through the use of agents whose true intentions are NOT communicated to the target.

A. True
B. False

A

A. True

See pages 3.501 in the Fraud Examiner’s Manual

A covert operation is an investigation technique designed to obtain evidence by use of agents whose true intentions are not communicated to the target.

64
Q

A fraud victim hires Kennedy, a Certified Fraud Examiner (CFE), to trace a fraudster’s assets to facilitate the recovery of the illicit proceeds obtained by the fraudster. Which of the following will typically be the MOST USEFUL source of information for Kennedy in his efforts to trace the fraudster’s assets?

A. Surveillance footage
B. The fraudster’s paystubs
C. The fraudster’s bank records
D. Third-party witnesses

A

C. The fraudster’s bank records

See pages 3.912 in the Fraud Examiner’s Manual

Records obtained from financial institutions are perhaps the single most important financial source available to a fraud examiner for asset-tracing purposes. They can be used as evidence for fraud, as well as to:

  • Identify witnesses and other evidence.
  • Uncover criminal profits.
  • Identify criminal assets.
  • Locate assets that can be used to satisfy a judgment.
  • Identify locations where assets are stored.
  • Determine the lifestyle of an account holder.
  • Determine the financial health of an organization.
  • Determine the source of funds placed into an account.
  • Determine the use of the funds from an account.
65
Q

Which of the following is the MOST ACCURATE statement regarding what fraud examiners should do when collecting information from social media sites?

A. The information from social media sites should be preserved so that it can be established as authentic if used in court.
B. Conducting a forensic shutdown of the computer while a social media site is open will preserve the website’s metadata for authentication purposes.
C. Saving a social media web page as a bookmark in a web browser is sufficient to preserve the information on the site for authentication purposes.
D. Fraud examiners can use the contents of each social media site to authenticate the websites themselves.

A

A. The information from social media sites should be preserved so that it can be established as authentic if used in court.

See pages 3.653 in the Fraud Examiner’s Manual

Generally, documentary evidence, including digital evidence, will not be admitted in a legal proceeding or not be given much weight unless it is established as authentic (i.e., the evidence is what it purports to be and is in the same condition as when it was seized).

There are numerous techniques to authenticate information from social media. Often, authenticity can be established through the testimony of a witness who verifies that the exhibit at issue accurately reflects what they observed on the site, and typically, the witness is the party who collected the evidence. Consequently, fraud examiners who collect evidence from social media often become a form of eyewitness, and for this reason, fraud examiners must capture, download, and preserve any useful information as soon as they discover it. They must memorialize each step of the collection process, creating a record of what they see at any point in the investigation.

66
Q

Blockchain entries contain cryptocurrency senders’ and recipients’ _______, which can help fraud examiners identify patterns that link certain users to criminal activity.

A. Cryptographic addresses
B. Full legal names
C. Dates of birth
D. Bank account information

A

A. Cryptographic addresses

See pages 3.962-3.963 in the Fraud Examiner’s Manual

A cryptocurrency is a type of digital currency that uses public or private key encryption in the currency’s creation and transfer. While cryptocurrency transactions can be difficult and complicated to trace, most cryptocurrencies rely on public blockchains that provide visibility into every transaction that takes place. A blockchain is a digital ledger, or database, of transactions that allows data to be distributed and stored on multiple computer systems at once. Although blockchain entries do not include direct identifying information, they do contain senders’ and recipients’ cryptographic addresses for each transaction. Therefore, by carefully examining blockchain data, fraud examiners can identify patterns that link certain users to criminal activity.

67
Q

Which of the following is the type of covert operation in which a fraud examiner uses disguise and deceit to actively seek evidence from people involved in the offense?

A. An entrapment operation
B. An informant operation
C. An undercover operation
D. A surveillance operation

A

C. An undercover operation

See pages 3.501 in the Fraud Examiner’s Manual

The two main forms of covert operations are undercover operations and surveillance operations. Undercover operations often use deception and disguise to obtain evidence directly from those involved in the illicit activity. Agents engaged in undercover operations actively attempt to elicit the desired information. In contrast, surveillance operations use observation to gather information about individuals suspected of misconduct.

For example, a surveillance operation might involve observing a suspect from afar while they meet with a potential co-conspirator. Alternatively, the investigator might pose as the co-conspirator’s agent and engage the suspect in conversation to gather information; this would be an example of an undercover operation.

68
Q

Asset hiders look for financial products that offer clear links between the initial receipt of an asset and its final disposition to ensure the traceability of the asset.

A. True
B. False

A

B. False

See pages 3.958 in the Fraud Examiner’s Manual

Generally, asset hiders look to conceal their assets with financial products that have certain characteristics. Asset hiders want products that are difficult to trace or are untraceable. With such instruments, asset hiders can break or obscure links between the initial receipt of the assets and their final disposition. Also, asset hiders want products that are secure, accessible, and liquid.

69
Q

Which of the following is a valid legal defense to allegations of entrapment against a fraud examiner who is a federal law enforcement officer?

A. The fraud examiner acted with proper predication.
B. There is proof of the suspect’s modus operandi.
C. The fraud examiner had suspicion of foul play.
D. The suspect made exculpatory statements.

A

A. The fraud examiner acted with proper predication.

See pages 3.505 in the Fraud Examiner’s Manual

Many jurisdictions recognize the legal defense of entrapment. Entrapment occurs when law enforcement officers or government agents induce a person to commit a crime that they are not previously disposed to commit. Entrapment also poses a legal problem in covert operations, particularly in undercover operations, because the defendant might not be found liable if it appears that they were improperly induced to commit the crime. Therefore, it is imperative that proper predication exists before the operation is commenced. The law enforcement officer or government agent must act based on more than mere suspicion. For example, if the officer received a reliable tip that a suspect committed fraud, then that could serve as proper predication. Covert operations must not be used for aimless searches for information performed without notions of what might be uncovered.

70
Q

When determining a subject’s net worth for asset-tracing purposes, all assets should be valued at current market value to eliminate any question about estimates.

A. True
B. False

A

B. False

See pages 3.951 in the Fraud Examiner’s Manual

When computing a subject’s net worth, these issues should be considered:

  • All assets should be valued at their historical cost, not fair market value. Subsequent appreciation or depreciation of assets should be ignored.
  • The amount of funds available to the subject from legitimate sources should be estimated or computed generously.
  • The subject should be interviewed to identify all alleged sources of funds and to negate defenses that they might raise later.
71
Q

Which of the following is considered a red flag indicating that a subject is seeking to conceal ill-gotten assets through a loan repayment?

A. Payments in odd amounts
B. Large paydowns
C. Accelerated payments
D. All of the above

A

D. All of the above

See pages 3.932-3.933 in the Fraud Examiner’s Manual

Generally, fraud examiners should look for loans with unusual repayments and trace them. Lump-sum payments, payments in odd amounts, accelerated payments, and large paydowns are unusual. These are all considered red flags indicating that an individual is seeking to conceal ill-gotten assets through a loan repayment, and loans with any such red flag should be investigated further.

72
Q

Alex, a fraud examiner, receives an anonymous call from someone who claims to have information regarding a fraud at Alex’s company. The whistleblower says he will only provide the information if he is given unqualified confidentiality. Alex says he cannot make that promise. Was Alex’s statement prudent under the circumstances?

A. Yes, because Alex must report all details concerning the whistleblower to his client.
B. No, because Alex will likely lose the whistleblower as a source, resulting in harm to his client.
C. Yes, because Alex may attempt to protect the whistleblower’s confidentiality but cannot guarantee it.
D. No, because whistleblowers are allowed unqualified confidentiality.

A

C. Yes, because Alex may attempt to protect the whistleblower’s confidentiality but cannot guarantee it.

See pages 3.521 in the Fraud Examiner’s Manual

When dealing with a confidential informant, the fraud examiner cannot offer unqualified confidentiality. Therefore, any promises made to the informant should be qualified with the caveat that no absolute assurances of confidentiality can be given. The fraud examiner should explain to the informant that all possible steps will be taken to ensure complete confidentiality.

73
Q

In most countries, the entire history of court records is accessible through a single location or website.

A. True
B. False

A

B. False

See pages 3.610-3.611 in the Fraud Examiner’s Manual

To perform court records searches, fraud examiners need to be familiar with the structure of a jurisdiction’s court system. Most jurisdictions implement a tiered court structure in which minor offenses and causes of action (e.g., small claims) are held in one set of courts while more serious offenses or issues are held in another set. Similarly, a jurisdiction might have courts that are divided based on local/municipal, state/provincial, and central/federal levels of government. Court records are typically maintained by a clerk or administrative office of the court that heard the case. However, there might be an agency that maintains records from multiple court levels. Therefore, to conduct a thorough search of court records, fraud examiners might need to search at multiple court levels.

It is rare for there to be a central public database that maintains all court records at every level of a jurisdiction, and there are no parties that maintain a comprehensive database of court records on a global basis (despite what some records merchants might claim).

74
Q

To protect privacy interests, courts generally find that audit clauses within business partner contracts are void, and most jurisdictions have laws that prohibit businesses from making threats to terminate a business relationship over a contracting party’s refusal to turn over nonpublic information.

A. True
B. False

A

B. False

See pages 3.630 in the Fraud Examiner’s Manual

There are several ways to obtain nonpublic information. An organization may demand that a supplier, vendor, or agent turn over relevant documents as a condition of continued business. Taking this action is legal in appropriate circumstances. Of course, management and counsel should be consulted before such demands are made, particularly if the other party has a contractual relationship with the demanding organization.

An audit clause allows parties that are engaged in a contract the right to access another party’s books. Often, audit clauses are too narrow to provide useful information. However, if properly constructed, an audit clause can be a powerful method by which on-book information can be obtained.

75
Q

Which of the following is a step in the general process for tracing illicit transactions?

A. Establishing reporting protocols
B. Building a financial profile
C. Selecting a response team
D. Implementing litigation hold procedures

A

B. Building a financial profile

See pages 3.901 in the Fraud Examiner’s Manual

Although the procedures performed during a tracing investigation vary depending on the circumstances, an actual investigation to trace transactions should generally involve the following elements:

  • Collect information.
  • Profile the subject (i.e., assemble the personal—financial and behavioral—profile).
  • Review information for leads and prioritize leads.
  • Trace the illicit transactions.
  • Evaluate recovery options.
76
Q

Which of the following is required to access websites on the dark web that end with a .onion address?

A. The onion router (Tor)
B. The internet archives
C. The Invisible Internet Project (I2P)
D. The Silk Road

A

A. The onion router (Tor)

See pages 3.647-3.648 in the Fraud Examiner’s Manual

Websites that are only accessible through specialized web browsers meant to anonymize the origins of user traffic make up the dark web. The most popular of these programs is Tor, although the Invisible Internet Project (I2P) has gained popularity in recent years. Tor is an acronym derived from “the onion router,” which is software that layers encrypted communications (like the layers of an onion) and offers increased anonymity to users. Tor hides where internet traffic originates, but it does not necessarily anonymize a user’s identity. Users’ communications are transmitted through various nodes in a distributed network of computers around the world, making it exceedingly difficult to determine who is requesting particular data from a website. It prevents someone who is monitoring the user’s internet traffic from knowing what sites the person visits and prevents the visited sites from learning the user’s location. Sites with a .onion address are designed to only be accessible by people using a Tor web browser.

77
Q

Which of the following principles should a fraud examiner adhere to when using online records to locate people?

A. A fraud examiner should consider the cost and usefulness of information when ordering online searches
B. A fraud examiner should first try to obtain a person’s past address when searching for that person online
C. A fraud examiner should know the most powerful and useful types of searches
D. All of the above

A

D. All of the above

See pages 3.657 in the Fraud Examiner’s Manual

To locate people using online records, fraud examiners should adhere to three principles. First, when searching for an individual, the fraud examiner should obtain a past address of the subject, and search activities should begin with that information. Second, the fraud examiner should consider the cost effectiveness of the search activity and avoid ordering online searches that yield unnecessary or impractical information. Third, the fraud examiner should know the most powerful and useful types of searches.

78
Q

To reduce risks of illicit transactions, most jurisdictions require financial institutions to obtain all the following information from an institution with which they have a foreign correspondent relationship EXCEPT:

A. The institution’s ownership details
B. The institution’s licenses or certifications
C. The institution’s tax statements
D. The institution’s anti-money laundering processes

A

C. The institution’s tax statements

See pages 3.926 in the Fraud Examiner’s Manual

Due to risks of illicit transactions, such as money laundering, most jurisdictions require financial institutions to obtain information from other financial institutions with which they maintain a foreign correspondent relationship. The information to be obtained might include the institution’s ownership details, the identities of agents authorized to conduct business on the institution’s behalf, the institution’s anti-money laundering (AML) and know-your-customer (KYC) processes, and the institution’s licenses or certifications. Fraud examiners might be able to obtain this information through court orders although some jurisdictions only require financial institutions to make foreign correspondent relationship records available to law enforcement agencies.

79
Q

Which of the following is a common method that fraudsters use to conceal illegally acquired assets?

A. Transferring assets into another person’s name
B. Purchasing a used vehicle
C. Creating a will to allocate assets at death
D. Making tax-deductible donations

A

A. Transferring assets into another person’s name

See pages 3.958-3.959 in the Fraud Examiner’s Manual

Any type of asset can be hidden (e.g., real property, jewelry, stocks, bonds, vehicles, cash), and there are many techniques that a fraudster might use to hide ill-gotten gains. Some common techniques for hiding assets include transferring assets into foreign trusts, overpaying taxes, prepaying on a home mortgage, obtaining a life insurance policy, and transferring assets into someone else’s name.

80
Q

Most jurisdictions do not require cryptocurrency exchanges, digital wallet providers, or cryptocurrency automated teller machine (ATM) operators to record personal identifying information about their clients.

A. True
B. False

A

B. False

See pages 3.962-3.963 in the Fraud Examiner’s Manual

Cryptocurrencies are stored and transmitted through digital wallets, which act as financial accounts that securely hold and organize a user’s payment information, passwords, and transaction history. Digital wallets are used to make and receive cryptocurrency payments. Many digital wallet providers now record identifying information about their clients that can be useful in tracing efforts. Due to money laundering risks associated with cryptocurrencies, most jurisdictions require cryptocurrency exchanges, digital wallet providers, and cryptocurrency automated teller machine (ATM) operators to comply with customer due diligence (CDD) or know-your-customer (KYC) regulations. These requirements generally involve recording personal information about clientele, such as name, date of birth, or address. If a subject’s digital wallet can be identified, the blockchain’s public ledger can usually be used to uncover associated transactions and trace the funds. However, fraud examiners must go through appropriate legal channels to obtain access to such information.

81
Q

Websites that are only accessible through specialized browsers intended to anonymize the origins of user traffic are collectively known as which of the following?

A. The internet archives
B. The dark web
C. The invisible archives
D. The Silk Road

A

B. The dark web

See pages 3.647-3.648 in the Fraud Examiner’s Manual

Websites that are only accessible through specialized web browsers meant to anonymize the origins of user traffic make up the dark web. The most popular of these programs is Tor, although the Invisible Internet Project (I2P) has gained popularity in recent years. Tor is an acronym derived from “the onion router,” which is software that layers encrypted communications (like the layers of an onion) and offers increased anonymity to users. Tor hides where internet traffic originates, but it does not necessarily anonymize a user’s identity. Users’ communications are transmitted through various nodes in a distributed network of computers around the world, making it exceedingly difficult to determine who is requesting particular data from a website. It prevents someone who is monitoring the user’s internet traffic from knowing what sites the person visits and prevents the visited sites from learning the user’s location. Sites with a .onion address are designed to only be accessible by people using a Tor web browser.

82
Q

In jurisdictions that protect the processing and dissemination of credit information and personal data, businesses are generally NOT subject to the same protections that individuals have.

A. True
B. False

A

A. True

See pages 3.626-3.627 in the Fraud Examiner’s Manual

In the case of consumer (individual) credit records and personal data, a growing number of jurisdictions regulate how such information is collected and stored, as well as who may access this information and for what purpose. In many cases, the consumer must be notified and must consent to the use of the report. Agencies that process and disseminate such information are called credit reporting agencies, data controllers, and similar names, depending on the jurisdiction.

Information on a business organization’s creditworthiness may also be obtained from credit reporting agencies. The responses for such searches might include payment trends from creditors, public records, banking information, and key facts as to the type of business and ownership. But unlike consumer credit information, business credit information is generally not subject to the same legal protections that individuals have.

83
Q

Acme Services, a new business, has just been registered as a corporation in a particular country. Acme’s management wants to expand business outside of the country. Which of the following is MOST ACCURATE?

A. Acme may now conduct business anywhere in the world.
B. Acme can only be incorporated in one jurisdiction.
C. Being incorporated in one country allows Acme to conduct business in most countries.
D. Acme should register as a business entity in any foreign jurisdiction in which it wishes to conduct business.

A

D. Acme should register as a business entity in any foreign jurisdiction in which it wishes to conduct business.

See pages 3.618 in the Fraud Examiner’s Manual

Many jurisdictions, but not all, require corporations to register as foreign corporations if they wish to transact business in a jurisdiction that is different from the one in which they initially incorporated. A corporation would register as a foreign corporation in the foreign jurisdiction (i.e., not in the initial jurisdiction in which it was incorporated). For example, if a corporation that was chartered in Country A wishes to transact business in Country B, then it must create a business organization filing in Country B.

84
Q

The expenditures method (also known as the sources and application of funds method) for proving illicit income involves identifying all assets held by the subject that were acquired earlier, identifying the amount of the subject’s current liabilities, and taking the difference between the two values.

A. True
B. False

A

B. False

See pages 3.950, 3.953 in the Fraud Examiner’s Manual

The expenditures method (also known as the sources and application of funds method) compares the suspect’s known expenditures and known sources of funds during a given period of time. That is, this analysis seeks to quantify the cost of the subject’s lifestyle and determine whether the subject’s reported income is sufficient to support their lifestyle. The expenditures method is best used when the subject spends illicit income on consumables (e.g., travel and entertainment) that would not cause an increase in net worth.

Identifying assets previously acquired, identifying current liabilities, and taking the difference between the two is the process involved in the asset method, not the expenditures method.

85
Q

Which of the following types of information on corporations whose stocks and securities are sold to the public might be available from regulatory securities records?

A. Identities of accountants and attorneys
B. Financial statements
C. Identities of officers and directors
D. All of the above

A

D. All of the above

See pages 3.622 in the Fraud Examiner’s Manual

While jurisdictions treat the concept of securities differently, governments or self-regulatory bodies generally set rules for the issuing and trading of certain types of securities. Among the most common and important rules are disclosure requirements for companies with publicly traded securities. These rules are designed to make sure that investors are reasonably informed about stock that they purchase. Beyond helping investors, these disclosures are typically made public, and they can provide a wealth of information about the filing company, including its type of business, history, organizational structure, auditor, balance sheets, and income statements.

Different securities regulators have varying disclosure requirements, but regulatory securities records might include the following information:

  • Corporate financial statements
  • Identification of officers and directors
  • Identification of significant owners (e.g., those with more than 10% of a business’s stock)
  • A description of the registrant’s properties and businesses
  • A description of the significant provisions of the security to be offered for sale and its relationship to the registrant’s other capital securities
  • Identification of events of interest to investors
  • Identification of accountants and attorneys
  • A history of the business
86
Q

Credit card records and statements pertaining to a subject can provide insight into the subject’s movements and habits, including restaurants they frequent and locations where they have traveled.

A. True
B. False

A

A. True

See pages 3.935 in the Fraud Examiner’s Manual

Credit card records are important in tracing assets because they reveal a great deal of personal and business information about the account holder or cardholder. Credit card records show card purchasing limits, previous payment history, account balance, when and where the subject has traveled, restaurants frequented by the subject, and assets the subject has acquired. In short, these records show the movements and habits of the person to whom the records pertain.

87
Q

A memorandum that outlines the basis for a covert investigation should state which of the following?

A. The information expected to be gained
B. The identities of any known suspects
C. The operatives under the fraud examiner’s care or control
D. All of the above

A

D. All of the above

See pages 3.502 in the Fraud Examiner’s Manual

Before conducting a covert operation, it is essential that the basis for the operation be committed to writing, preferably in a memorandum. The memorandum should clearly state:

  • The information upon which the covert operation will be based
  • The information that is expected to be gained from the operation
  • The identities of suspects, if known
  • Operatives under the fraud examiner’s care, custody, or control (confidential sources’ identities should not be disclosed, but such sources should be referred to with a symbol)
88
Q

Which of the following is NOT one of the most important questions for a fraud examiner to consider before commencing a legal action to recover assets?

A. “Are there nonlegal recovery methods or remedies available?”
B. “Is the suspect guilty of the fraudulent act that they are being charged for?”
C. “Will the case be referred for criminal prosecution?”
D. “Does the defendant have sufficient property or money to satisfy a money judgment?”

A

B. “Is the suspect guilty of the fraudulent act that they are being charged for?”

See pages 3.979 in the Fraud Examiner’s Manual

As an investigator or other nonlegal professional concerned with fraud detection and recovery, a fraud examiner must often be able to evaluate the potential for recovery. It is common for fraudsters to spend most, if not all, of their ill-gotten gains, leaving little to recover. Accordingly, the following questions should be considered before commencing a legal action:

  • Are there nonlegal recovery methods or remedies available?
  • Will the case be referred for criminal prosecution?
  • Do one or more defendants have sufficient property or money to satisfy a money judgment?
  • Can property be recovered from one or more defendants who are the subjects of a rescission, restitution, or forfeiture judgment?
  • Are pretrial attachment procedures available, and should they be invoked to protect and ensure the plaintiff’s ability to satisfy a money judgment at a later time?
  • Could the assets be protected against enforcement of a judgment?
89
Q

A bank credit department generally maintains which of the following types of basic loan records?

A. The cash record
B. The master appropriation file
C. The accounting journal
D. The credit or loan file

A

D. The credit or loan file

See pages 3.932 in the Fraud Examiner’s Manual

Loan records can provide important information regarding a subject. When a bank makes a commercial loan to an individual, it requires detailed statements of assets and liabilities from the borrower, and these records will be contained in the loan records. The loan file also might include the results of credit inquiries regarding paying habits, loan amounts, and present unpaid balances.

A bank credit department generally maintains the following basic records:

  • The credit or loan file—This file includes the customer’s loan application, financial statements, and general economic history.
  • The liability ledger—This contains the customer’s past and present liability to the bank. These sheets also contain information such as the loan date, note number, amount of the loan, interest rate, due date, and payments.
  • The collateral file—This contains a complete description of the items pledged as security for loans. Records of such collateral can provide valuable information about a subject’s assets.
90
Q

Which of the following types of information are NOT typically open to the public for inspection?

A. Personal telephone records
B. Divorce and probate court records
C. Death records
D. Real property records

A

A. Personal telephone records

See pages 3.628 in the Fraud Examiner’s Manual

Generally, a person’s private phone lines, such as home phone and personal mobile devices, will be considered private. Therefore, to access the records for these lines, investigators will need consent from subjects, a warrant or subpoena, or another legal order.

91
Q

Carlos is conducting a background investigation of a corporation and its management. Which of the following can Carlos obtain without a legal order or subpoena?

A. The company’s banking records
B. The history of medical expenses of the company’s employees
C. The company’s business filings
D. The tax records of the company’s owner

A

C. The company’s business filings

See pages 3.605, 3.617, 3.624 in the Fraud Examiner’s Manual

Nonpublic records—financial or otherwise—might be needed to prove fraud or to provide leads in a fraud examination. Nonpublic records include information about a person or business considered to be private and confidential. Nonpublic records are not available to everyone, and because fraud examiners do not have an absolute right to see these personal records, obtaining access might be difficult or impossible. Generally, individuals do not willingly give their private records to a fraud examiner, and often, the authority of institutions to disclose nonpublic records is restricted by law.

Some of the most valuable types of personal records include:

  • Banking records
  • Tax records
  • Credit records of individuals
  • Phone records
  • Credit card account records
  • Personal health care records
  • Internet service provider records

Basic business organization—whether for businesses with a single owner or large corporations—is generally governed under the laws of the country in which the entity is organized. Most jurisdictions require business entities to file various types of records that contain information that might be useful in a fraud examination, and generally, such filings are available to the public.

92
Q

Even when a victim refers a fraud case for criminal prosecution, the government will usually NOT disclose the contents of nonpublic records with the victim during the investigation.

A. True
B. False

A

A. True

See pages 3.629 in the Fraud Examiner’s Manual

A wronged organization may make a criminal referral so that records can be subpoenaed by the government or obtained by a legal order (e.g., a search warrant). Records obtained while executing a search warrant or similar legal order are usually only available to the government during the underlying investigation and perhaps thereafter if they are not disclosed at trial. In addition, law enforcement agencies may also subpoena records but, depending on the jurisdiction, might not disclose the contents of such records with the victim or third parties.

93
Q

Which of the following types of content can be obtained from the internet archives?

A. Content posted on a website that has been removed
B. Content on websites not indexed by standard search engines
C. Content on a website that is protected by passwords
D. Content on websites without any links pointing to them

A

A. Content posted on a website that has been removed

See pages 3.647-3.649 in the Fraud Examiner’s Manual

The term internet archives refers to archived versions of web pages that have since been updated or are no longer available online. The most popular tool for searching the internet archives is the Wayback Machine, located at https://archive.org. The Wayback Machine allows users to see archived versions of web pages throughout time. Fraud examiners can use the Wayback Machine to find historical information, such as:

  • A photo posted on a website that has been removed
  • Content, views, writing, and opinions rescinded by an author
  • A company’s old job ads, statements, affiliations, or product lines

Alternatively, the deep web (also known as the invisible web) refers to web content that is not indexed by standard search engines. There are numerous reasons why the deep web exists. For instance, there are websites where web crawling programs cannot enter. Web crawlers are scripts that create copies of visited web pages that are indexed by a search engine to provide faster searches. These deep web resources include websites without any links pointing to them, certain file formats that search engines cannot handle, websites that have been blocked from web crawler access, password-protected websites, and information stored in databases. Also, search engines limit the depth of their crawl on a website. Moreover, web crawlers cannot crawl as quickly as pages are added or updated.

94
Q

If the fraud examiner is NOT a government employee, then promises of unqualified confidentiality for informants or sources are encouraged to get them to participate.

A. True
B. False

A

B. False

See pages 3.521-3.522 in the Fraud Examiner’s Manual

Whether working in private or government sectors, fraud examiners cannot offer unqualified confidentiality to informants. Therefore, any promises made to an informant or source should be qualified with the caveat that no absolute assurances of confidentiality can be given. For example, a fraud examiner might say that they cannot guarantee that the source’s identity will be kept secret but that they will do so if possible. In the case of a fraud examiner who is employed by a governmental agency, there might be an absolute duty not to hold sources and informants in confidence. In many law enforcement agencies, an investigator may not have informants or sources who are unknown to the agency. Investigative agencies also regularly share information on criminal investigations with prosecutors, including the identity of the source of information. The same regulations and considerations could govern business entities.

95
Q

The General Data Protection Regulation (GDPR) only applies to organizations that collect or process personal information if those organizations are based in the European Union (EU).

A. True
B. False

A

B. False

See pages 3.606 in the Fraud Examiner’s Manual

The General Data Protection Regulation (GDPR) applies to organizations that are based in the European Union (EU) that collect or process the personal data of any person, regardless of where the person is located. The GDPR also applies to organizations that are not based in the EU if they collect or process the personal data of any person located in the EU for the purpose of:

  • Offering goods or services to the person, regardless of whether payment is required
  • Monitoring the person’s behavior

Therefore, the GDPR applies to most companies that have customers in the EU even if the companies have no physical presence in the EU.

The GDPR could limit the availability of personal information for fraud examiners whether they or their organization is collecting that information or attempting to access personal information collected and disclosed by other organizations.

96
Q

Which of the following repercussions might an investigator incur if mistakes are made during a covert operation?

A. Reputational damage
B. Physical harm
C. Legal consequences
D. All of the above

A

D. All of the above

See pages 3.501 in the Fraud Examiner’s Manual

A covert operation is an investigation technique designed to obtain evidence by use of agents whose true intentions are not communicated to the target. Covert operations must be undertaken carefully. With proper planning and precautions, such operations can prove very beneficial to an investigation. However, mistakes made during a covert operation can cause irreparable damage to an investigation and result in physical harm to the investigator. Moreover, the investigator might incur reputational, financial, and legal consequences.

97
Q

A relationship between foreign and domestic financial institutions in which one institution has the authority to provide certain financial services on another institution’s behalf can BEST be described as a(n):

A. Joint services relationship
B. Foreign correspondent relationship
C. Information exchange agreement
D. SWIFT partnership

A

B. Foreign correspondent relationship

See pages 3.925-3.926 in the Fraud Examiner’s Manual

A correspondent banking relationship is generally defined as an arrangement in which one bank maintains a correspondent account at another bank for the purpose of settling transactions for itself or its customers. In other words, one financial institution has the authority to provide certain financial services on another institution’s behalf. A foreign correspondent relationship involves a correspondent banking relationship between foreign and domestic institutions.

98
Q

By examining the probate records of a deceased individual, a fraud examiner can discover:

A. The names of individuals with an interest in the deceased’s estate
B. An indication of the value of the property willed to the deceased’s heirs
C. The manner in which the deceased’s assets will be dispersed
D. All of the above

A

D. All of the above

See pages 3.613-3.614 in the Fraud Examiner’s Manual

Some jurisdictions have separate probate courts to determine the dispersal of assets after a subject’s death. The probate court investigates to verify any debts owed by an individual’s estate and sees to the dispersal of assets after all debts are paid. Probate court records include documents filed to show the dispersal of assets after a subject’s death.

The debts left in an individual’s estate will give the investigator information on the following:

  • Names of individuals with an interest in the deceased’s estate
  • The subject’s financial position at the time of death

The dispersal of assets will reveal:

  • The names and addresses of heirs to the deceased
  • Some indication of the value of the property willed to them
99
Q

Which of the following is the BEST definition of the indirect method of tracing financial transactions?

A. Using bank records and financial statements to identify and analyze information about the target’s personal characteristics to identify sources of hidden wealth or assets
B. Using circumstantial evidence to analyze the relationship between a suspect’s receipt and subsequent disposition of funds or assets
C. Using financial analysis to discover all significant expenses the target incurred during the relevant period to develop the financial profile
D. Using the subject’s books and records to analyze the relationship between the subject’s receipt and subsequent disposition of funds or assets

A

B. Using circumstantial evidence to analyze the relationship between a suspect’s receipt and subsequent disposition of funds or assets

See pages 3.910 in the Fraud Examiner’s Manual

Generally, fraud examiners can trace illicit transactions using a direct method or an indirect method. An indirect method employs circumstantial evidence to analyze the relationship between a suspect’s receipt and subsequent disposition of funds or assets. In contrast, a direct method uses the subject’s books and records (or financial transaction records belonging to third parties) to analyze the relationship between a suspect’s receipt and subsequent disposition of funds or assets.

100
Q

Which of the following is a means through which a fraud examiner can potentially determine that a subject owns cryptocurrency assets?

A. An interview with one of the subject’s close friends
B. An analysis of the subject’s bank statements
C. The subject’s digital wallet provider via a court order
D. All of the above

A

D. All of the above

See pages 3.963 in the Fraud Examiner’s Manual

Fraud examiners who believe a suspect might be hiding illicit proceeds through cryptocurrency ownership can potentially identify cryptocurrency assets held by subjects through analysis of bank statements that feature transactions involving cryptocurrency exchanges. Alternatively, statements made by investigation subjects on social media or in casual conversation with friends, family members, or colleagues could reveal ownership of cryptocurrency assets. Such statements can be discovered through open-source intelligence gathering or interviews. Fraud examiners might also be able to obtain information about cryptocurrency ownership or transactions through court orders targeting cryptocurrency exchanges, digital wallet providers, and cryptocurrency automated teller machine (ATM) operators.

101
Q

Which of the following is NOT a characteristic that asset hiders generally look for in the financial products they use to conceal assets?

A. Security
B. Accessibility
C. Liquidity
D. Transparency

A

D. Transparency

See pages 3.958 in the Fraud Examiner’s Manual

Generally, asset hiders look to conceal their assets with financial products that have certain characteristics. Asset hiders want products that are difficult to trace or are untraceable. With such instruments, asset hiders can break or obscure links between the initial receipt of the assets and their final disposition. Also, asset hiders want products that are secure, accessible, and liquid.

102
Q

Asset hiders generally prefer the financial products they use to conceal assets to be traceable, inaccessible, illiquid, and exclusive.

A. True
B. False

A

B. False

See pages 3.958 in the Fraud Examiner’s Manual

Generally, asset hiders look to conceal their assets with financial products that have certain characteristics. Asset hiders want products that are difficult to trace or are untraceable. With such instruments, asset hiders can break or obscure links between the initial receipt of the assets and their final disposition. Also, asset hiders want products that are secure, accessible, and liquid.

103
Q

Madelyn, a Certified Fraud Examiner (CFE), is investigating Chloe, who is active on an online social media site in which she voluntarily shares information about herself. Madelyn wants to search for and extract information from Chloe’s social media profile. Which of the following is the MOST ACCURATE statement about the privacy of information Chloe shared through her social media profile?

A. The Privacy of Social Networks Treaty is an international law that makes it illegal for Madelyn to seek the log-in credentials from Chloe’s social media account.
B. To access any information posted on Chloe’s social media profile, Madelyn must obtain some type of legal order from the jurisdiction in which Chloe resides.
C. To search for information that Chloe posted and made available to the public through her social media profile, Madelyn must provide Chloe notice beforehand.
D. Madelyn could be liable for violating Chloe’s privacy rights if she hacks or breaks into areas of the social media site Chloe has designated as private.

A

D. Madelyn could be liable for violating Chloe’s privacy rights if she hacks or breaks into areas of the social media site Chloe has designated as private.

See pages 3.651 in the Fraud Examiner’s Manual

Social media sites might contain valuable information. Fraud examiners are free to search and extract information from a subject’s page if it is open to the public, but there are limitations to the information fraud examiners can access on a social media site due to privacy settings and anonymity.

Many users set their privacy settings in a way that prevents anyone besides their friends, or users with whom they have connected on the site, from seeing their profile information, and this creates several issues of legal access and privacy rights. Accessing information that is set to private could result in claims under privacy laws. Thus, accessing information on social media sites that is restricted by privacy settings could result in liability for fraud examiners due to violation of users’ privacy rights.

Privacy rights, however, vary between countries.

104
Q

In general, which of the following types of information is commonly available through a municipal or regional building inspector’s office?

A. Building inspectors’ reports
B. Blueprints and plans submitted with applications
C. Building permits
D. All of the above

A

D. All of the above

See pages 3.607 in the Fraud Examiner’s Manual

The following information is generally available through a municipal or regional building inspector’s office:

  • Building permits showing the names of the applicants, the address of construction, the estimated costs, and the name of the builder or contractor
  • Blueprints and plans showing construction details that are often submitted with applications for building permits
  • Building inspectors’ reports containing information regarding compliance with construction specifications
105
Q

Audrey wants to obtain bank account statements from her client’s employee, who she has reason to believe is accepting bribes in exchange for contract awards. Audrey asks the employee to turn over the account statements, but the employee refuses her request. Which of the following methods of obtaining the account statements would be IMPROPER?

A. Filing a civil action and obtaining a subpoena or legal order for the records
B. Requesting the records from the bank and threatening to sue the bank president for impeding justice if the bank does not turn over the records
C. Referring the case for criminal prosecution and working with law enforcement to obtain a search warrant
D. Filing an administrative action and obtaining a subpoena or legal order for the records

A

B. Requesting the records from the bank and threatening to sue the bank president for impeding justice if the bank does not turn over the records

See pages 3.629-3.630 in the Fraud Examiner’s Manual

Fraud examiners might be able to obtain nonpublic records even if the subject does not volunteer the records. Subpoenas and other legal processes, such as depositions and document requests, are available if a civil or criminal action is filed. For example, a wronged organization may file a civil or administrative action or make a criminal referral so that records can be subpoenaed or obtained by a legal order (e.g., a search warrant). In a civil case, both private and public parties may obtain nonpublic records such as bank account, brokerage account, travel, credit card, credit agency, and telephone toll records by subpoena or other legal order.

However, records obtained while executing a search warrant or similar legal order are usually only available to the government during the underlying investigation and perhaps thereafter if they are not disclosed at trial. In addition, law enforcement agencies may also subpoena records but, depending on the jurisdiction, might not disclose the contents of such records with the victim or third parties.

In most jurisdictions, third-party organizations that maintain nonpublic records, such as banks and hospitals, are usually prohibited from revealing such records without express authorization from the subject or a legal order.

106
Q

Suppose that a fraud examiner needs to prove a suspect’s illicit income circumstantially. Which of the following methods of tracing assets would yield the BEST result when the suspect is spending their illicit funds on items that would not cause an increase in net worth, such as travel and entertainment?

A. The expenditures method
B. The income correlation method
C. The bank deposit analysis method
D. The asset method

A

A. The expenditures method

See pages 3.953 in the Fraud Examiner’s Manual

The expenditures method (also known as the sources and application of funds method) compares the suspect’s known expenditures and known sources of funds during a given period of time. That is, this analysis seeks to quantify the cost of the subject’s lifestyle and determine whether the subject’s reported income is sufficient to support their lifestyle. The expenditures method is best used when the subject spends illicit income on consumables (e.g., travel and entertainment) that would not cause an increase in net worth.

107
Q

Analyzing a subject’s bank statements for transactions involving cryptocurrency exchanges can sometimes reveal information about cryptocurrency ownership.

A. True
B. False

A

A. True

See pages 3.963 in the Fraud Examiner’s Manual

Fraud examiners who believe a suspect might be hiding illicit proceeds through cryptocurrency ownership can potentially identify cryptocurrency assets held by subjects through analysis of bank statements that feature transactions involving cryptocurrency exchanges. Alternatively, statements made by investigation subjects on social media or in casual conversation with friends, family members, or colleagues could reveal ownership of cryptocurrency assets. Such statements can be discovered through open-source intelligence gathering or interviews. Fraud examiners might also be able to obtain information about cryptocurrency ownership or transactions through court orders targeting cryptocurrency exchanges, digital wallet providers, and cryptocurrency automated teller machine (ATM) operators.