Investigations Flashcards

1
Q

What Characteristics and common techniques are used to hide assests?

A

Must be
Liquid
Untraceable
Secure and accessable

Put in someone elses name
Pay down debt
Transfer to tax haven
Buy insurance products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a blockchain?

A

Contains users cryptographic address. Can be used to ID patterns of criminal activities. Does NOT have ID info

Digital wallet: companies do have personal ID information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Reports.

Follow up/ recommendations. What should i put in the report?

A

ID aspects that remain outstanding
What action is necessary or recommended.

Might include recommendations related to the organizational procedures and controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a fraud examination?

A

A process of resolving allegations of fraud from begining to end.

Obtain evidence
Reporting
Testifying to findings
Assisting in fraud detection and prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fraud Examination methodology.

A

Assume litigation will follow

ACT ONLY ON PREDICATION.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fraud theory approach for analysing data

A

Analyse available data
Create hypothesis
Test hypothesis
Redefine and amend the hypothesis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What should a fraud plan include?

A

GOALS of the investigation
Determine the SCOPE
TIME FRAME of investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Meta data definition.

A

Data about data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Challenges of cloud forensics?

A

Lack of information accessibility

Lack of data control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Conclusions in report writing should be?

A

Self-evident- if not onvious clerify in report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

GDPR meaning and what it does.

A

General Data Protection Regulation:

Protects personal info/data of banks doing buisness in the European Unions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Boolean operators

A

Advanced search operators
Put in quotes
Example “ money laundering”.
To get better results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Online public database: Where should a CFE start?

A

With a past address

Use internet archives/past page look ups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Electronic payments can help ID?

A

Assests suspect purchased
Locations of the suspects assets
Location of suspects residence and buisnesses.
Cities and countries suspect does buisness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Correspondent banking

A

Big bank does buisness with little bank in another country ans vise versa.

Can handle eachothers transactions.

Must have ownwrship details, known agents, must be licensed and have anti money laundering policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Direct method in tracing

A

Direct from books and records to analyze transactions.

Ie: credit cards, loans, bank records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the single most important resource available for tracing?

A

Bank records are the single most inportant financial source available for tracing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Tracing?

A

Search for evidence regarding the ID and disposition of property.

Fraud vic who wants tracing for recovery of criminal proceeds
Trace to see if suspect can pay back funds
Judgement creditor- to ID suspects assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Types of evidence

A

Testimonial: statements.
Digital: anything digital, pictures, videos
Documentary: records that prove or disprove. Records.
Fraud facts: consent in writing, court order, bank records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What to do to prepare for an interview

A

Consider legal or admin issues specific to all jurisdictions involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the five type of interview questions?

A

Introductory: get the suspect to commit to assist
Informational: questions should be closed or leading
Assesment: observe verbal and non verbal responses.
Admission: get a confession
Closing: confirm facts.

22
Q

Dealing with difficult situations. Im too busy. I dont remember

A

Too busy: interview will be short, already here, not hard, I need your help.

I don’t remember: remain silent while person deliberating or pose narrower questions.

23
Q

Rules on volital interviews

A

Always have two detectives and make the interview a surprise.

Hypothetical questions best bc leas threatening

24
Q

Calibrating/ norming

Assessment questions

A

The process of observing behavior before asking critical questions

Assessment: ask suspect to agree w/ matters that go against the principals of most honest people. Truthful answer one way, untruthful answer differently

25
Q

Verbal clues. Also known as?

A
Change is speech
Cough clear throat 
Repeat question
Complain about environment 
I swear to God 
Feeble attempts at humor
CLUSTERS
26
Q

Non verbal clues

A
Change in posture
Hand gestures increase or decrease 
Hands over mouth
Play with pencil or clothing 
Fleeing position
27
Q

Admission seeking objective and purpose

A

Designed to obtain a legal admission of wrong doing.

Purpose to distinguish innocent from potential guilty
Obtain valid confession
Get suspect to sign a written statement of acknowledging the facts.

28
Q

General rules for conducting admission seeking interviews. When to conduct

A

Only conduct when there is sufficient PRIVACY and when time is NOT a factor.

Do not express disgust or outrage

Project compassion, understanding and sympothy.

OFFER MORALLY ACCEPTABLE REASONS FOR BEHAVIOR.

29
Q

Steps in admission seeking interview…what to avoid. What to do when stating a denial.

A

Make direct accusation in form of a statement. Repeat the accusation. INTERUPT DENIALS

AVOID EMOTIVE WORDS SUCH AS STEAL, FRAUD OR CRIME

can show some evidence. Observe suspects reaction.

30
Q

Altruism?

A

The action was for the benefit of others.

For the kids? Help my family

31
Q

Diffuse alibis by?

A

Display physical evidence
Discuss witness statements
Prior deceptions
MAKE SUSPECT CHOOSE BETWEEN ONE OF TWO CHOICES, both imply guilt.
Get verbal confession. Confirm general details before pressing for specifics.

32
Q

What info to obtain during verbal confession

A
Intent
Motive
When/if crime was terminated
Others involved 
Physical evidence/ get suspect to provide it 
Is ANYTHING LEFT
33
Q

Natural vs non natural numbers.

A

Natural: not ordered in a particular numbering scheme. NOT HUMAN GENERATED.

NON-natural designed systematically: IE phone numbers. Bendords law cannot be applied.

Natural present some digits more than others.
1: 30.1%
2: 17.6%
3: 12.5 % and contines to lower.
ZERO: is most likely the second digit 18%

34
Q

Structured data va unstructured data

A

Structured: found in data bases, columns consisting of recognizable or predictable structers.

UNstructured: data not found in traditional spreadsheets IE: email or social media activity. Key words.

35
Q

What is textual analytics.

A

Extractinv usable info from unstructured data from social media text messages.

KEY WORDS FROM FRAUD TRIANGLE.

36
Q

Fraud Triangle

A

Pressure: deadline, quota, problem, concern

Opportunity: over ride, write off

Rationalization: reasonable, deserve

37
Q

Visual analytics

A

LINK analysis: charts with lines showing data from multi sources to track movement of Money.

Discover patterns, trends, relationships, communications. Direct or indirect relationships.

Effective when investigations are of money laundering ir ficticious vendors.

38
Q

Robotic process automation?

A

Technology that emulates a humen to execute buisness processes.

TAKES THE PLACE OF THE HUMAN

39
Q

Predictive analytics

A

Used to build a mathematical model to predict future events or outcomea.

40
Q

Artificial intelligence

A

Computer systems that can perform human like tasks.

Examine large amount of data using sophisticated tecniques go beyond traditional data analysis.

41
Q

Advanced data analytics. Surpervised vs non supervised. Deep learning

A

Supervised: humans identify patterns

Unsupervised: a program ID’s patterns on its own. Also Machine learning.

Deep learning: multi step learning in real time with multi programs at the same time.

42
Q

Benfords law

A

Numbers that follow a predictable pattern.

43
Q

Indirect approch to tracing: two methods.

A

Assest method: net worth, buy houses, toys, boats

Expenditures: sources of income: vacations, clothes.

CIRCUMSTANTIAL.

44
Q

Data analysis queries regarding accounts payables. What quieries can i run to verify $?

A

Summerize large invoices by amount, vender,

Review recurring monthly expenses and compare to posted/paid invoices.

Reconcile check registers
Verify vedor tax forms
Audit paid invoices for manual comparison.

45
Q

Planning phase. Build a profile of potential frauds… why? When?

A

When: no known suspects
Why: find where fraud could occur.
To maximize the potential success of detexting fraud through data analysis.
Understand existing fraud risks.

Build profile of potential frauds by ID’ing the risk areas, type of fraud.

Resulting in exposure to those frauds

46
Q

Data/ core analysis software capabilities.

A

Sorting: how want to view data. IE: receipt number, check number, etc.
Joining files: to see if same shows on all files
Correlation: one goes up, other goes up
Duplicate search:
Gap test: see if missing items in sequences.

47
Q

What to do in preparation phase at the beginning of an investigation.

A

ID relevant data
Obtain data
Verify data
Cleanse ans normalize data

48
Q

Data analysis process: three phases. For unknown suspects

A

Planning: build a profile of potential frauds
PREPERATION: cleanse and normalize data/ convert data IE: time zones, currency,
Correct known errors/ special characteristics
TESTING: run test. Address faulse positives.
LAST: Post analysis

49
Q

Internal vs external sources.

A

Internal may be all thats available (accounting and buisness records, copies of cancelled checks, employee personel files)

External sorcea: locating assets
Licating people
Ownership of assets
Lifestyle

50
Q

What is available in Regulatory Securities Records. As an investor what would i want to know about the company.

A
Corporate financial statements 
ID of officers or directors 
ID of significant owners
Registrant of properties and businesses
Descriptions of securities for sale 
Interest to investors 
History of the buisness
51
Q

What is pretexting

A

Impersonating someone else or making misleading statments to obtain info.