Sources of Information * Flashcards
Which of the following is a limitation of conducting a public database search online?
A. Online public records searches are limited in the area they cover, often requiring fraud examiners to search multiple jurisdictions
B. Information from online databases must be checked for accuracy and currency
C. Online coverage of public records varies widely from state to state
D. All of the above
D. All of the above
The main limitations of online public database searches include:
• Online coverage of public records varies widely from state to state, and therefore, there are many degrees of accessibility to public records between jurisdictions.
• Online public records searches are limited in the area they cover. Therefore, when looking for information on a subject, fraud examiners often must search for public records in multiple jurisdictions.
• Often, online public records are brief abstracts of the original public record.
• The source of the information compiled in an online database must be reliable.
• Fraud examiners must check information from online databases to determine if it is accurate and current.
• The records or publications compiled in an electronic format might cover only a limited period.
• Online searches can be erratic in the information they return.
Baker, a government fraud examiner, is attempting to obtain information about a fraud suspect from a local bank. The bank’s records are covered by which federal law?
A. Fair and Accurate Credit Transactions Act
B. Financial Institutions Records Act
C. Freedom of Information Act
D. Right to Financial Privacy Act
D. Right to Financial Privacy Act
The Right to Financial Privacy Act prohibits financial institutions from disclosing financial information about individual customers to governmental agencies without the customer’s consent, a court order, a subpoena, a search warrant, or other formal demand. There are, however, limited exceptions to this rule.
To protect privacy interests, contractual audit clauses with business partners are generally found to be void and threats to terminate a business relationship over another party’s refusal to turn over nonpublic information are prohibited. T/F
False
There are several ways to obtain nonpublic information. An organization may demand that a supplier, vendor, or agent turn over relevant documents as a condition of continued business. Taking this action is legal, in appropriate circumstances. Of course, management and counsel should be consulted before such demands are made, particularly if the other party has a contractual relationship with the company.
An audit clause allows the parties to access another party’s books. Often, audit clauses are too narrow to provide useful information. However, if properly constructed, an audit clause can be a powerful method by which on-book information can be obtained.
If a fraud examiner needs information on registration and disciplinary information regarding firms and individuals in the futures industry, he should contact the Financial Industry Regulatory Association (FINRA). T/F
False
The National Futures Association is an industry-wide, self-regulatory organization authorized by the Commodity Exchange Act; it operates under the supervision of the Commodity Futures Trading Commission (CFTC). The NFA oversees the commodities markets, and it is a one-stop information source for all types of registration and disciplinary information regarding firms and individuals in the futures industry. This information includes registration status and employment history; disciplinary actions filed by the NFA, the CFTC, and the commodity exchanges; and customer complaints filed under the CFTC’s Reparations Program.
If a fraud examiner was gathering information about a fraud suspect, which of the following types of information would likely require access to nonpublic sources of information to obtain?
A. Where the subject currently resides
B. The subject’s habits and lifestyle
C. The subject’s home phone records
D. All of the above
C. The subject’s home phone records
Nonpublic records—financial or otherwise—might be needed to prove fraud or to provide leads in a fraud examination. Nonpublic records include information about a person or business considered to be private and confidential. But unlike public records, nonpublic records are not available to the public, and because fraud examiners do not have an absolute right to see these personal records, such information might be difficult or impossible to obtain.
Some of the most valuable types of personal records include: • Banking records • Tax returns and related documents • Credit records of individuals • Private phone records • Credit card account records • Personal health care records
Bill wants to search the Internet for articles about check fraud using a search engine. Which of the following search strings will yield the best results?
A. intitle:check fraud
B. filetype:“check fraud”
C. site:check fraud
D. ~check fraud
A. intitle:check fraud
Users can employ advanced search operators (or Boolean operators) to gain more control over the search results. Search operators are symbols that help search engines better understand exactly what the user is looking for, and they improve a search and return relevant links faster.
The intitle:term search operator restricts results to those containing all the search terms specified in the title. So, entering [intitle: check fraud] in a search engine will return only documents that contain the words check and fraud in the title. Since Bill is searching specifically for articles on check fraud, this would be his best choice.
Placing quotation marks around a phrase will indicate to the search engine that it is to search only for pages that have the exact phrase. Thus, performing a search for “check fraud” will yield pages containing that exact phrase. In Bill’s case, this search would also yield good results.
The site:URL search operator will return pages in which the URL contains any specified keyword(s).
In some search engines, placing (~) before a word will return pages containing the keyword and words similar to the keyword.
In some search engines, the filetype: search operator will return items of a particular filetype that match the keyword.
Which of the following is a type of information that can be obtained from the deep Web?
A. Web content indexed by standard search engines
B. Websites without any links pointing to them
C. An old version of a Web page that has since been updated
D. An archived version of a Web page that is no longer online
B. Websites without any links pointing to them
The deep Web (also known as the invisible Web) refers to Web content that is not indexed by standard search engines. There are a number of reasons why the deep Web exists. For instance, there are sites where Web crawlers (search engine robots or spiders) cannot enter. Web crawlers are scripts that create a copy of a visited Web page which are later indexed by a search engine to provide faster searches. These deep Web resources include websites without any links pointing to them, certain file formats that search engines cannot handle, sites that have been blocked from crawler access, password-protected sites, and information stored in databases. Also, search engines limit the depth of their crawl on a website. Moreover, Web crawlers cannot crawl as quickly as pages are added or updated.
Alternatively, the term Internet archives refers to archived versions of Web pages that have since been updated or are no longer available online. The most popular tool for searching the Internet archives is the Wayback Machine, located at www.archive.org. The Wayback Machine allows users to see archived versions of Web pages throughout time. Fraud examiners can use the Wayback Machine to find historical information, such as:
• A photo posted on a website that has been removed
• Content, views, writing, and opinions rescinded by an author
• A company’s old job ads, statements, affiliations, or product lines
Which of the following laws governs the dissemination of an individual’s credit information to third parties by consumer reporting agencies?
A. The Federal Credit Control Act
B. The Fair Credit Reporting Act
C. The Credit Information Act
D. None of the above
B. The Fair Credit Reporting Act
One of the primary statutes limiting access to information is the federal Fair Credit Reporting Act (FCRA). This statute regulates the dissemination of consumer information to third parties by consumer reporting agencies. Historically, the FCRA only applied to consumer credit reports, but due to amendments in 1997, the FCRA now applies to the gathering of many types of information about an individual that is collected through third parties.
Which of the following types of searches is best suited for locating people using online records?
A. Medical facility commitment records
B. Media database searches
C. Credit bureau header searches
D. On-site court records searches
C. Credit bureau header searches
Fraud examiners can use credit header data to locate individuals. A credit header is the information in a credit report that gives basic information about the person to whom the credit report applies, and it includes identifying information such as name, name variations, current and former addresses, telephone number, date of birth, and Social Security number.
Nearly all individuals have been involved in some credit activity, either under their true names or an assumed (“also known as”) name, and if there are no credit records for an individual, it might be because he is very young or very old.
The credit bureau headers offer two search mechanisms. First, the fraud examiner can discover a current address, an address history, and Social Security number(s) associated with the target by using a past address up to seven years old. Second, once the fraud examiner has the subject’s Social Security number, he can search the credit bureau headers for matches because the Social Security number is a national identity number. Although Social Security numbers are protected from disclosure, they sometimes end up disclosed on public records.
Morris, a CFE, is investigating Crump, who is active on Facebook. Morris wants to search and extract information from Crump’s Facebook page. Which of the following is the most accurate statement about the privacy of information shared through Crump’s Facebook page?
A. It is illegal for Morris to search for information that is posted and made available to the public without providing notice to Crump beforehand.
B. To access any information posted on Crump’s Facebook page, Morris must obtain a subpoena or other legal order.
C. Morris could be liable for violating Crump’s privacy rights if he hacks or breaks into areas of the social networking site Crump has designated as private.
D. The Privacy of Social Networks Act is a federal law that makes it illegal for Morris to seek the login credentials from Crump’s Facebook account.
C. Morris could be liable for violating Crump’s privacy rights if he hacks or breaks into areas of the social networking site Crump has designated as private.
Social media sites might contain valuable information. Fraud examiners are free to search and extract information from a subject’s page if it is open to the public, but there are limitations to the information fraud examiners can access on a social networking site due to privacy settings and anonymity.
Many users set their privacy settings in a way that prevents anyone besides their friends from seeing their profile information, and this creates several issues of legal access and privacy rights. Accessing information set to private could result in claims under state privacy laws, the Electronic Communications Privacy Act, or the Stored Communications Act. Thus, accessing information on social media sites that is restricted by privacy settings could result in liability for fraud examiners due to violation of users’ privacy rights.
Which of the following best describes the primary purpose of the Right to Financial Privacy Act?
A. To prohibit financial institutions from disclosing financial information about individual customers to governmental agencies without consent or a judicial order
B. To make it a crime for financial institutions to release customers’ financial information to private parties without permission
C. To protect consumers against individuals who attempt to obtain confidential financial information through pretexting
D. To establish which personal financial records are available to the public and which ones must be obtained through a subpoena, search warrant, or court order
A. To prohibit financial institutions from disclosing financial information about individual customers to governmental agencies without consent or a judicial order
The Right to Financial Privacy Act prohibits financial institutions from disclosing financial information about individual customers to governmental agencies without the customers’ consent, a court order, a subpoena, a search warrant, or other formal demand. There are, however, limited exceptions to this rule.
Although the Act applies only to demands by governmental agencies, most banks and other financial institutions also will not release such information to private parties absent legal process, such as a subpoena issued in a civil lawsuit. The Act does not, however, make it a crime for them to do so.
Which of the following types of records is/are available from local governments?
A. Utility company records
B. Voter registration records
C. Health and fire department records
D. All of the above
D. All of the above
The following items are basic types of public records that can be accessed at the local level of government: • Building inspector records • Building permit records • Health and fire department records • Death records • County coroner’s register • Voter registration records • County fire marshal records • Utility company records • Marriage records
Which of the following is a common use of public records in fraud examinations?
A. Tracing and recovering assets
B. Accessing an individual’s income tax filings
C. Obtaining a person’s credit score
D. All of the above
A. Tracing and recovering assets
Public records are documents that a governmental agency is required to keep by law or that are necessary to discharge the duties imposed by law. Public records, which can be accessed by the public and are thus available to anyone who wishes to use them, can be helpful to fraud examiners for a number of reasons. They can supply invaluable background information on employees, suspects, and witnesses. They can also be used to corroborate or refute witness statements, help investigators track the flow of stolen cash or other assets, and aid efforts to recover losses.
Individual tax records and consumer credit records are typically nonpublic information.
Symbols and words—such as the plus sign, the minus sign, and the words “and” and “not”—that help search engines better understand exactly what the user is looking for are known as which of the following?
A. Boolean operators
B. Expansion numerals
C. Limiting factors
D. Search fields
A. Boolean operators
Boolean operators (or search operators) are symbols that help search engines better understand exactly what the user is looking for, and they improve a search and return relevant links faster. Thus, users can employ search operators to conduct more effective searches.
A fraud examiner can always request a business’s bank records even if the business is not legally obligated to comply. T/F
True
The simplest way to obtain relevant documents is to request them. This usually works for fraud examiners representing large organizations that are important customers to the party with the information. Vendors and other customers of the company conducting the investigation might cooperate voluntarily if they have nothing to hide (or think that incriminating evidence cannot be found) and are anxious to maintain good relations with the company. A subject can consent to produce the records or execute a written consent for the fraud examiner to obtain such records from banks, credit agencies, or the IRS.
If the business does not voluntarily provide the records, fraud examiners may pursue them through subpoenas and other legal processes.