SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
Chapter Nine
Fraud Examination
Presented by Kirsty Peterson
5th August 2013
Conversion Investigation Methods
Learning Objectives
 Explain why it is important to find out how perpetrators
convert and spend their stolen funds
 Understand how public records can assist in following
the financial “tracks” of suspected perpetrators
 Access information from the internet to assist in an
investigation
 Perform net worth calculations on suspected
perpetrators and understand how they are effective in
court and in obtaining confessions
Spending Stolen Funds
 “With few exceptions, perpetrators spend what they
steal. Because of this, looking at spending patterns is a
primary investigation technique”
(Albrecht, Albrecht, Albrecht, & Zimbelman, 2012)
 “Whether driving his Lamborghini, cruising on his luxury
boat in Fiji, or relaxing in his antique-furnished historic
homestead, Michael Swann made no secret of his high-
flying lifestyle”
(“How Mr Money Bags got rich”, 2008)
Fraud Motivation
Conversion Searches
Conversion searches are performed for two reasons:
1. To determine the extent of the embezzlement, and
2. To gather evidence that can be used in interrogations
to obtain a confession
 The most common technique used to investigate and
resolve fraud is by interviewing. By providing evidence of
lifestyle and expenditures that cannot be supported by
earned income, cornered suspects may breakdown and
confess.
Conversion Searches
Information can be gathered from:
1. Government, council and other public organisations
2. Private sources of information
3. Online sources of information
4. Using the net worth method of analysing information
Conversion Searches
Public Records
Government
Central
Local
Private Sources
Acquaintances
Trash cover
Credit agencies
Online Database
Subscription
Per-search fee
Free
Internet Searches
Google
Yahoo! etc
Government and Public Sources
 Electoral Roll Post Office or Library
 Companies Office www.business.govt.nz/companies
 Local Councils e.g. www.rdc.govt.nz
 Land Info NZ www.linz.govt.nz
 Min. Economic Dev. www.insolvency.govt.nz
 Personal Property www.ppsr.govt.nz
Securities Register
While some information can be obtained by anyone who requests it, other
information is covered by privacy laws (such as the Privacy Act 1993) and
requires authorisation
Online Sources
Examples:
 www.veda.co.nz
 www.dnb.co.nz
 www.carjam.co.nz
 www.terranet.co.nz
 www.lexisnexis.com
Private Sources
 Private acquaintances
 “Trashing”
 Shredded documents
 Original files on computers
Be sure you have the legal rights to gather and use the information
Internet Searches
 Google
 Search by phrase
 Minus search terms
 Domain restrictions
 Google Groups
 Cached Results
 Google Images
 Google Earth
 Yahoo!
Net Worth Calculations
1. Assets – Liabilities
= Net Worth
2. Net Worth
– Prior Years Net Worth
= Net Worth Increase
3. Net Worth Increase
+ Living Expenses
= Income
4. Income
– Funds from Known Sources
= Funds from Unknown Sources
Net Worth Example
Financial Data for Joe Blogs 2012 2013 Financial Data for Joe Blogs 2011 2012 2013
Income Assets
Salary 39,000 41,000 Dwelling 250,000 250,000 250,000
Vehicle 20,000 20,000 60,000
Expenses Cash at bank 1,000 5,000 15,000
Mortgage repayments 10,000 10,000 Total Assets 271,000 275,000 325,000
Vehicle loan repayments 3,000 3,000
Living expenses 15,000 16,000 Liabilities
28,000 29,000 Mortgage 200,000 195,000 141,000
Vehicle loan 10,000 8,000 -
Total Liabilities 210,000 203,000 141,000
Net Worth 61,000 72,000 184,000
Change in net worth 11,000 112,000
Plus living expenses 28,000 29,000
Total income 39,000 141,000
Less known Income 39,000 41,000
Income from unknown sources - 100,000
Summary
 Discovering how perpetrators convert and spend their
funds is an important investigation technique
 Government and other public records are important
sources of information about the financial “tracks” of
suspected perpetrators
 Private and online sources of information are important
sources of information during an investigation
 Net worth calculations are effective in court and in
obtaining confessions from suspected perpetrators
Questions
References
1. Albrecht, W.S., Albrecht, C.O., Albrecht, C.C., & Zimbelman, M.F. (2012).
Fraud Examination (4th Ed.). Mason, OH: South-Western.
2. Akuhatawhare, W. (2011, October 6). Te Puia ticket seller was stealing
more than $1000 a day. The New Zealand Herald. Retrieved from
http://www.nzherald.co.nz.
3. Granny avoids jail term for Te Puia theft. (2012, June 22). 3 News.
Retrieved from http://www.3news.co.nz.
4. Hartevelt, A. (2011, November 11). Jail term for theft at Te Puia.
Rotorua Daily Post. Retrieved from http://www.rotoruadailypost.co.nz.
5. How Mr Money Bags got rich by robbing the sick. (2008, December 13).
Otago Daily Times. Retrieved from http://www.nzherald.co.nz.
6. KPMG. (2013). A survey of fraud, bribery and corruption in Australia &
New Zealand 2012. Retrieved from http://www.kpmg.com/au.

Weitere ähnliche Inhalte

Was ist angesagt?

Document Examination
Document ExaminationDocument Examination
Document Examination
annperry09
 
FORENSIC AUDIT
FORENSIC  AUDITFORENSIC  AUDIT
FORENSIC AUDIT
ABC
 

Was ist angesagt? (20)

Economic Crimes
Economic CrimesEconomic Crimes
Economic Crimes
 
Forensic Accounting
Forensic AccountingForensic Accounting
Forensic Accounting
 
Forensic accounting
Forensic accountingForensic accounting
Forensic accounting
 
9. audit evidence
9. audit evidence9. audit evidence
9. audit evidence
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud Investigation
 
Counterfeit Presentation
Counterfeit PresentationCounterfeit Presentation
Counterfeit Presentation
 
forensic questioned document examination
forensic questioned document examinationforensic questioned document examination
forensic questioned document examination
 
Forensic Auditing Show
Forensic Auditing ShowForensic Auditing Show
Forensic Auditing Show
 
Counterfeiting Currency Notes
Counterfeiting Currency Notes Counterfeiting Currency Notes
Counterfeiting Currency Notes
 
A Brief History of Secret Writing
A Brief History of Secret WritingA Brief History of Secret Writing
A Brief History of Secret Writing
 
Organized crime
Organized crimeOrganized crime
Organized crime
 
A Brief About Forensic Accounting
A Brief About Forensic AccountingA Brief About Forensic Accounting
A Brief About Forensic Accounting
 
Forensic accounting
Forensic accountingForensic accounting
Forensic accounting
 
Document Examination
Document ExaminationDocument Examination
Document Examination
 
Unit II.pptx
Unit II.pptxUnit II.pptx
Unit II.pptx
 
Audit procedures
Audit proceduresAudit procedures
Audit procedures
 
Red flags fraud
Red flags fraudRed flags fraud
Red flags fraud
 
FORENSIC AUDIT
FORENSIC  AUDITFORENSIC  AUDIT
FORENSIC AUDIT
 
Metode Investigasi Konversi - Akuntansi Forensik
Metode Investigasi Konversi - Akuntansi ForensikMetode Investigasi Konversi - Akuntansi Forensik
Metode Investigasi Konversi - Akuntansi Forensik
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2,
 

Andere mochten auch (9)

Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen
 
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDITFRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
 
Managing the fraud if fraud investigation from investigation room to court room
Managing the fraud if fraud investigation from investigation room to court roomManaging the fraud if fraud investigation from investigation room to court room
Managing the fraud if fraud investigation from investigation room to court room
 
Fraud Detection Techniques
Fraud Detection TechniquesFraud Detection Techniques
Fraud Detection Techniques
 
Understanding Financial Statement fraud- Forensic Accounting Perspective
Understanding Financial Statement fraud- Forensic Accounting PerspectiveUnderstanding Financial Statement fraud- Forensic Accounting Perspective
Understanding Financial Statement fraud- Forensic Accounting Perspective
 
10 Reasons to Become a Police Officer
10 Reasons to Become a Police Officer10 Reasons to Become a Police Officer
10 Reasons to Become a Police Officer
 
Police ppt
Police pptPolice ppt
Police ppt
 
Police officer powerpoint
Police officer powerpointPolice officer powerpoint
Police officer powerpoint
 
Forensic Accounting – How To Uncover Fraud Jan 2012
Forensic Accounting – How To Uncover Fraud Jan 2012Forensic Accounting – How To Uncover Fraud Jan 2012
Forensic Accounting – How To Uncover Fraud Jan 2012
 

Ähnlich wie Conversion investigation methods

Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
ouldparis
 
Virtual currencies emerging regulatory, law enforcement, and consumer protect...
Virtual currencies emerging regulatory, law enforcement, and consumer protect...Virtual currencies emerging regulatory, law enforcement, and consumer protect...
Virtual currencies emerging regulatory, law enforcement, and consumer protect...
Dmitry Tseitlin
 
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...
Atmos
 

Ähnlich wie Conversion investigation methods (20)

100 Successful College Application Essays By Ano
100 Successful College Application Essays By Ano100 Successful College Application Essays By Ano
100 Successful College Application Essays By Ano
 
5 How To Make A Payroll Check Stu. Online assignment writing service.
5 How To Make A Payroll Check Stu. Online assignment writing service.5 How To Make A Payroll Check Stu. Online assignment writing service.
5 How To Make A Payroll Check Stu. Online assignment writing service.
 
United States Secret Service: Protecting the Nation's Leaders and Financial I...
United States Secret Service: Protecting the Nation's Leaders and Financial I...United States Secret Service: Protecting the Nation's Leaders and Financial I...
United States Secret Service: Protecting the Nation's Leaders and Financial I...
 
What is Money Laundering - An Introduction
What is Money Laundering - An Introduction What is Money Laundering - An Introduction
What is Money Laundering - An Introduction
 
Abstract Examples For Research Papers. How To
Abstract Examples For Research Papers. How ToAbstract Examples For Research Papers. How To
Abstract Examples For Research Papers. How To
 
Writing Analysis Essay. Online assignment writing service.
Writing Analysis Essay. Online assignment writing service.Writing Analysis Essay. Online assignment writing service.
Writing Analysis Essay. Online assignment writing service.
 
Armour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explainedArmour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explained
 
Slavery In America Essay Thesis. Online assignment writing service.
Slavery In America Essay Thesis. Online assignment writing service.Slavery In America Essay Thesis. Online assignment writing service.
Slavery In America Essay Thesis. Online assignment writing service.
 
IELTS Essay Writing Tips Mindmineglobal.Com S
IELTS Essay Writing Tips Mindmineglobal.Com SIELTS Essay Writing Tips Mindmineglobal.Com S
IELTS Essay Writing Tips Mindmineglobal.Com S
 
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
When I Look Back To My First Experi
When I Look Back To My First ExperiWhen I Look Back To My First Experi
When I Look Back To My First Experi
 
Virtual currencies emerging regulatory, law enforcement, and consumer protect...
Virtual currencies emerging regulatory, law enforcement, and consumer protect...Virtual currencies emerging regulatory, law enforcement, and consumer protect...
Virtual currencies emerging regulatory, law enforcement, and consumer protect...
 
Essay Career Path
Essay Career PathEssay Career Path
Essay Career Path
 
Higher French Short Essay Questions. Online assignment writing service.
Higher French Short Essay Questions. Online assignment writing service.Higher French Short Essay Questions. Online assignment writing service.
Higher French Short Essay Questions. Online assignment writing service.
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
How To Teach Paragraph Writing P. Online assignment writing service.
How To Teach Paragraph Writing  P. Online assignment writing service.How To Teach Paragraph Writing  P. Online assignment writing service.
How To Teach Paragraph Writing P. Online assignment writing service.
 
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...
 
Hemisphere Database
Hemisphere DatabaseHemisphere Database
Hemisphere Database
 
Eugenics Essay. Online assignment writing service.
Eugenics Essay. Online assignment writing service.Eugenics Essay. Online assignment writing service.
Eugenics Essay. Online assignment writing service.
 

Mehr von VidaB

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
VidaB
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
VidaB
 
Chapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by EmmaChapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by Emma
VidaB
 
Chapter 16 B Artika
Chapter 16 B ArtikaChapter 16 B Artika
Chapter 16 B Artika
VidaB
 
Chapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by RachelChapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by Rachel
VidaB
 
Chapter 14 by Svetlana
Chapter 14 by SvetlanaChapter 14 by Svetlana
Chapter 14 by Svetlana
VidaB
 
Chapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosuresChapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosures
VidaB
 
Chapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory FraudChapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory Fraud
VidaB
 
Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet
VidaB
 
Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud
VidaB
 
Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud  Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud
VidaB
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
VidaB
 
Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud
VidaB
 
Chapter 1 the nature of fraud
Chapter 1 the nature of fraudChapter 1 the nature of fraud
Chapter 1 the nature of fraud
VidaB
 
Week 1 audit and assurance services
Week 1 audit  and assurance servicesWeek 1 audit  and assurance services
Week 1 audit and assurance services
VidaB
 

Mehr von VidaB (15)

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Chapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by EmmaChapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by Emma
 
Chapter 16 B Artika
Chapter 16 B ArtikaChapter 16 B Artika
Chapter 16 B Artika
 
Chapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by RachelChapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by Rachel
 
Chapter 14 by Svetlana
Chapter 14 by SvetlanaChapter 14 by Svetlana
Chapter 14 by Svetlana
 
Chapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosuresChapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosures
 
Chapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory FraudChapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory Fraud
 
Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet
 
Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud
 
Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud  Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
 
Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud
 
Chapter 1 the nature of fraud
Chapter 1 the nature of fraudChapter 1 the nature of fraud
Chapter 1 the nature of fraud
 
Week 1 audit and assurance services
Week 1 audit  and assurance servicesWeek 1 audit  and assurance services
Week 1 audit and assurance services
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 

Conversion investigation methods

  • 1. Chapter Nine Fraud Examination Presented by Kirsty Peterson 5th August 2013 Conversion Investigation Methods
  • 2. Learning Objectives  Explain why it is important to find out how perpetrators convert and spend their stolen funds  Understand how public records can assist in following the financial “tracks” of suspected perpetrators  Access information from the internet to assist in an investigation  Perform net worth calculations on suspected perpetrators and understand how they are effective in court and in obtaining confessions
  • 3. Spending Stolen Funds  “With few exceptions, perpetrators spend what they steal. Because of this, looking at spending patterns is a primary investigation technique” (Albrecht, Albrecht, Albrecht, & Zimbelman, 2012)  “Whether driving his Lamborghini, cruising on his luxury boat in Fiji, or relaxing in his antique-furnished historic homestead, Michael Swann made no secret of his high- flying lifestyle” (“How Mr Money Bags got rich”, 2008)
  • 5. Conversion Searches Conversion searches are performed for two reasons: 1. To determine the extent of the embezzlement, and 2. To gather evidence that can be used in interrogations to obtain a confession  The most common technique used to investigate and resolve fraud is by interviewing. By providing evidence of lifestyle and expenditures that cannot be supported by earned income, cornered suspects may breakdown and confess.
  • 6. Conversion Searches Information can be gathered from: 1. Government, council and other public organisations 2. Private sources of information 3. Online sources of information 4. Using the net worth method of analysing information
  • 7. Conversion Searches Public Records Government Central Local Private Sources Acquaintances Trash cover Credit agencies Online Database Subscription Per-search fee Free Internet Searches Google Yahoo! etc
  • 8. Government and Public Sources  Electoral Roll Post Office or Library  Companies Office www.business.govt.nz/companies  Local Councils e.g. www.rdc.govt.nz  Land Info NZ www.linz.govt.nz  Min. Economic Dev. www.insolvency.govt.nz  Personal Property www.ppsr.govt.nz Securities Register While some information can be obtained by anyone who requests it, other information is covered by privacy laws (such as the Privacy Act 1993) and requires authorisation
  • 9. Online Sources Examples:  www.veda.co.nz  www.dnb.co.nz  www.carjam.co.nz  www.terranet.co.nz  www.lexisnexis.com
  • 10. Private Sources  Private acquaintances  “Trashing”  Shredded documents  Original files on computers Be sure you have the legal rights to gather and use the information
  • 11. Internet Searches  Google  Search by phrase  Minus search terms  Domain restrictions  Google Groups  Cached Results  Google Images  Google Earth  Yahoo!
  • 12. Net Worth Calculations 1. Assets – Liabilities = Net Worth 2. Net Worth – Prior Years Net Worth = Net Worth Increase 3. Net Worth Increase + Living Expenses = Income 4. Income – Funds from Known Sources = Funds from Unknown Sources
  • 13. Net Worth Example Financial Data for Joe Blogs 2012 2013 Financial Data for Joe Blogs 2011 2012 2013 Income Assets Salary 39,000 41,000 Dwelling 250,000 250,000 250,000 Vehicle 20,000 20,000 60,000 Expenses Cash at bank 1,000 5,000 15,000 Mortgage repayments 10,000 10,000 Total Assets 271,000 275,000 325,000 Vehicle loan repayments 3,000 3,000 Living expenses 15,000 16,000 Liabilities 28,000 29,000 Mortgage 200,000 195,000 141,000 Vehicle loan 10,000 8,000 - Total Liabilities 210,000 203,000 141,000 Net Worth 61,000 72,000 184,000 Change in net worth 11,000 112,000 Plus living expenses 28,000 29,000 Total income 39,000 141,000 Less known Income 39,000 41,000 Income from unknown sources - 100,000
  • 14. Summary  Discovering how perpetrators convert and spend their funds is an important investigation technique  Government and other public records are important sources of information about the financial “tracks” of suspected perpetrators  Private and online sources of information are important sources of information during an investigation  Net worth calculations are effective in court and in obtaining confessions from suspected perpetrators
  • 16. References 1. Albrecht, W.S., Albrecht, C.O., Albrecht, C.C., & Zimbelman, M.F. (2012). Fraud Examination (4th Ed.). Mason, OH: South-Western. 2. Akuhatawhare, W. (2011, October 6). Te Puia ticket seller was stealing more than $1000 a day. The New Zealand Herald. Retrieved from http://www.nzherald.co.nz. 3. Granny avoids jail term for Te Puia theft. (2012, June 22). 3 News. Retrieved from http://www.3news.co.nz. 4. Hartevelt, A. (2011, November 11). Jail term for theft at Te Puia. Rotorua Daily Post. Retrieved from http://www.rotoruadailypost.co.nz. 5. How Mr Money Bags got rich by robbing the sick. (2008, December 13). Otago Daily Times. Retrieved from http://www.nzherald.co.nz. 6. KPMG. (2013). A survey of fraud, bribery and corruption in Australia & New Zealand 2012. Retrieved from http://www.kpmg.com/au.