SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Downloaden Sie, um offline zu lesen
UNDERSTANDING FORENSIC INVESTIGATION
PROCESS (UFIP)
Compiled and Presented
By:
Godwin Emmanuel, Oyedokun
ND (Fin), HND (Acct.), BSc. (Acct. Ed), MBA (Acct. & Fin.), MSc. (Acct.), MSc. (Econs & Fin.), MTP (SA), ACA, FCTI,
ACIB, AMNIM, CNA, FCFIP, FCE, CICA, CFA, CFE, CPFA, ABR, CertIFR, FILEX
Chief Technical Consultant/Managing Partner
OGE Professional Services
godwinoye@yahoo.com +2348033737184, +2348055863944
Being a lecture delivered at Fraud Examination and Forensic Investigation
Workshop
Held at the International Court of Arbitration (ICAA), Victoria Island, Lagos
On July 19, 2016. Organized by Commercial Law Development Services
2
This presentation will cover the following major sub topics :
‱ Concept of Investigations
‱ Forensic Investigations
‱ Forensic Audit Investigation Methodology
‱ Forensic Audit and the Internal Auditor
‱ Forensic in Computerized Work Environment
‱ Forensic Investigation & Audit Reporting
‱ Conclusion
Contents
Oyedokun Godwin Emmanuel
Introduction
 It is not a gaining saying that forensic accounting/audit has taken an important
role in both private and public companies since the birth of the 21st century.
 One can but always remember the avoidable failure of some formerly prominent
public companies like Enron and Tyco in the late 1990s, so also terrorist attacks of
September 11, 2001, contributed immensely to the high demand for forensic
accounting expert that can bring about a new, important and lucrative specialty.
 Forensic accounting procedures target financial and operational fraud, discovery
of hidden assets, and adherence to federal regulations (Pirraglia, nd).
 Forensic Investigation and Forensic Audit are better forensic strategies in
resolving the allegations of fraudulent activities as signs of financial crime can be
initially detected in a variety of ways; by accident, by whistle-blowing, by
auditors, by data mining, by controls and testing, or by the organization's top
management requesting an inspection on the basis of mere suspicion.
 This paper will help the readers in understanding the concept of Investigations,
forensic investigations, forensic audit investigation methodology, forensic audit
and the internal auditor, forensics in computerized work environment, and
forensic investigation & audit reporting.

Concept of Investigations
 Investigation is the act or process of investigating or the condition of being investigated.
 A searching inquiry for ascertaining facts; detailed or careful examination
(dictionary.reference.com).
 Investigation is a vital part of forensic accounting and auditing process but only applied
when the event or transaction is beclouded. It is carried out when lapse has been
established to ascertain who is responsible, the reason for the action including the extent of
damage if any.
 It could be referred to as a detailed verification and clarification of doubt about a
transaction or event.
 It is the search and examination of the particulars of an event to determine the hidden,
unique, or complex facts surrounding the event.
 A deliberate search and review of records in accordance with the laid down and agreed
policies in order to ascertain if and why the keeping of the records resulted in a gap and the
responsible person.
 Investigation is a structured gathering of documentary evidence and testimony to resolve
an allegation of improper activity.
 In most cases, fraud investigations are investigations of white collar crime, which involves
surveillance and careful consideration of complicated financial records.
Types of Investigations
 Fraud Investigation
 A fraud investigation tries to determine whether fraud has taken place and tries
to detect evidence of fraud has occurred.
 Fraud is considered to involve misrepresentation with intent to deceive.
 Most fraud investigations begin with a meeting between the investigator and the
client.
 A good fraud investigator will use this initial information to find more evidence
and more facts.
 A fraud investigator may use surveillance, asset searches, background checks,
employee investigations, business investigations, and other types of methods to
get to the bottom of a case.
 In most cases, fraud investigations are investigations of white collar crime, which
involves surveillance and careful consideration of complicated financial records.
7
Types of Investigations
 Corruption
There are three types of corruption fraud:
1. conflicts of interest,
2. bribery, and
3. extortion.
 In a conflict of interest fraud, the fraudster exerts their influence to
achieve a personal gain which detrimentally affects the company.
 The fraudster may not benefit financially, but rather receives an
undisclosed personal benefit as a result of the situation.
 For example, a manager may approve the expenses of an employee who is
also a personal friend in order to maintain that friendship, even if the
expenses are inaccurate.
 Bribery is when money (or something else of value) is offered in order to
influence a situation.
 Extortion is the opposite of bribery, and happens when money is
demanded (rather than offered) in order to secure a particular outcome.
9
Types of Investigations
 Asset misappropriation
 The common feature is the theft of cash or other assets from the
company, for example:
1. Cash theft – the stealing of physical cash, for example petty cash, from
the premises of a company.
2. Fraudulent disbursements – company funds being used to make
fraudulent payments. Common examples include billing schemes,
where payments are made to a fictitious supplier, and payroll schemes,
where payments are made to fictitious employees (often known as ‘ghost
employees’).
3. Inventory frauds – the theft of inventory from the company.
4. Misuse of assets – employees using company assets for their own
personal interest.
Types of Investigations
 Financial statement fraud
 This is also known as fraudulent financial reporting, and is a
type of fraud that causes a material misstatement in the
financial statements.
 It can include deliberate falsification of accounting records;
omission of transactions, balances or disclosures from the
financial statements; or the misapplication of financial
reporting standards.
 This is often carried out with the intention of presenting the
financial statements with a particular bias, for example
concealing liabilities in order to improve any analysis of
liquidity and gearing.
Wednesday, July 20, 2016 12
Fraud Investigations & Govt. Agencies
Interview and Interrogation
 They are two major techniques in investigation.
 Used to elicit responses from the suspect or accused.
 The investigator (interviewer or interrogator) cannot usurp
the power of the court of competent jurisdiction by
pronouncing the suspect or accused guilty.
 An interview is non-accusatory (Fred, John, Joseph, Brian,
2004)
 Interrogation is an art. You can master it through your study
and experience.
 A good investigator is not necessarily a good interrogator.
 To be a good interrogator you need to be a good actor and
must have an insight of human psychology.
Interview and Interrogation
 Interview is conducted in a cordial atmosphere
where a witness is more comfortable physically and
psychologically.
 On the other hand, whenever a person is questioned
in an uncomfortable atmosphere (interrogation
room) where he is under the psychological pressure,
it is an interrogation.
 Only when an interrogator overpowers a suspect
psychologically, he gets a confession or the fact of a
case which is not possible otherwise (Becca and Jay,
2004).
15
Forensic Audit Investigation Methodology
 Forensic investigation is the utilization of specialized
investigative skills in carrying out an inquiry
conducted in such a manner that the outcome will
have application to a court of law.
 Forensic Investigators are to be grounded in
accounting, medicine, engineering or some other
discipline.
 Forensic investigation is the examination of evidence
regarding an assertion to determine its
correspondence to established criteria carried out in a
manner suitable to the court.
Forensic Audit Investigation Methodology
 Fraud/forensic auditors/investigators could approach
their examinations/investigations from both the
angels of whether the fraud could have occurred and
whether it could not have occurred (Umeraziz, 2014)
viz:
1. Analyzing data which is available
2. Creating a hypothesis based on such data
3. Testing the hypothesis
4. Refining and altering the hypothesis
5. Communicating Results
Fraud Auditors’ Skills
 An effective fraud auditor should know, with some degree of
depth, what fraud is from the following perspectives:
1. Human and individual
2. Organizational, cultural, and motivational
3. Economic/Competitive
4. Social
5. Regulatory, legal, and evidential (how to discern, detect, and
document such frauds)
6. Accounting, audit, and internal control (when, where, and
how fraud is most likely to occur in books of account and in
financial statements)
Fraud Auditors’ Skills
7. Review such documents for peculiarities such as raised
amounts; forgery; counterfeiting; fake billings;
invoicing of claims; destruction of data; improper account
classification; irregularities in serial sequences, quantity,
pricing, extensions, and footings; and substitution of copies
for original documents.
8. Gather and preserve evidence to corroborate asset losses,
fraudulent transactions, and financial statements.
9. Follow the flow of documents that support transactions.
10.Follow the flow of funds into and out of an organization’s
account.
11. Search for underlying support documents for questionable
transactions.
Fraud Auditors’ Skills
12. Be aware of management, administrative, and organizational policies,
procedures, and practices.
13. Test the organization’s motivational and ethical climate.
14. The skills of a criminal investigator are in some respects similar to those of
an auditor. An auditor and a detective both seek the truth of or with
respect to the proper accounting of business transactions and the
detective/investigator with respect to the proper (legal) behavior of
citizens. Both should have inquisitive minds and challenge things that
appear out of order and out of sequence, such as odd times, odd places,
and odd places – in a word, things that are the opposite of what one would
logically expect.
Principles of Fraud Auditing
1. Fraud auditing is unlike financial auditing. It is more a mind-
set than a methodology.
2. Fraud auditors are unlike financial auditors. Fraud auditors
focus on exceptions, oddities, accounting irregularities,
and patterns of conduct, not on errors and omissions.
3. Fraud auditing is learned primarily from experience, not from
audit text books or last year’s work papers. Learning to be a
fraud auditor means learning to think like a thief— “ Where
are the weakest links in this chain of internal controls?”
4. From an audit perspective, fraud is intentionally
misrepresenting financial facts of a material nature. From
fraud-audit perspective, fraud is an international
misrepresentation of finance facts.
Principles of Fraud Auditing
5. Frauds are committed for economic, egocentric, ideological,
and psychotic reasons. Of the four, the economic motive is
the most.
6. Fraud tend to encompass the theory structure around the
motive, opportunity, and benefit
7. Fraud is a computerized accounting environment can be
committed at any state of processing---input, throughout, or
output. Input frauds (entering false and fraudulent data) are
the most common
8. Fraud auditing is unlike financial auditing. It is more a mind-
set than a methodology.
Principles of Fraud Auditing
9. Fraud auditors are unlike financial auditors. Fraud auditors focus on exceptions,
oddities, accounting irregularities, and patterns of conduct, not on errors and
omissions.
10. Fraud auditing is learned primarily from experience, not from audit text books or
last year’s work papers. Learning to be a fraud auditor means learning to think
like a thief— “ Where are the weakest links in this chain of internal controls?”
11. From an audit perspective, fraud is intentionally misrepresenting financial facts of
a material nature. From fraud-audit perspective, fraud is an international
misrepresentation of finance facts.
12. Frauds are committed for economic, egocentric, ideological, and psychotic
reasons. Of the four, the economic motive is the most.
13. Fraud tend to encompass the theory structure around the motive, opportunity,
and benefit
14. Fraud is a computerized accounting environment can be committed at any state of
processing---input, throughout, or output. Input frauds (entering false and
fraudulent data) are the most common
Principles of Fraud Auditing
15. The most common fraudulent schemes by lower-level employees involve
disbursement (payable, payroll, and benefit and expense claims).
16. The most common fraudulent schemes by higher-level managers involve
“profit smoothing” (deferring expenses, booking sales too early,
overstating inventory).
17. Accounting-type frauds are caused more often by absence of controls
than by loose controls.
18. Fraud incidents are not growing exponentially, but lose are.
19. Accounting frauds are discovered more often by accident than by
financial audit purposes or design. Over 90 percent of financial frauds are
discovered.
20.Fraud prevention is a matter of adequate controls and work environment
that places a high value on personal honesty and fair dealing.
Forensic Audit and the Internal Auditor
 Internal Control
 It is the methods put in place by a company to ensure the
integrity of financial and accounting information, meet
operational and profitability targets and transmit
management policies throughout the organization.
 Internal controls work best when they are applied to multiple
divisions and deal with the interactions between the various
business departments.
 No two systems of internal controls are identical, but many
core philosophies regarding financial integrity and accounting
practices have become standard management practices.
Forensic Audit and the Internal Auditor
 Internal Control
 Internal Control according to Business dictionary is
Systematic measures (such as reviews, checks and balances,
methods and procedures) instituted by an organization to:
 (1) conduct its business in an orderly and efficient manner,
 (2) safeguard its assets and resources,
 (3) deter and detect errors, fraud, and theft,
 (4) ensure accuracy and completeness of its accounting data,
(5) produce reliable and timely financial and management
information, and
 (6) ensure adherence to its policies and plans.
Forensic Audit and the Internal Auditor
 Internal Control
 Internal control and risk management are fundamental
components of good corporate governance.
 Good corporate governance means that the board must
identify and manage all risks for a company. In terms of risk
management, internal control systems span finance,
operations, compliance and other areas, i.e. all the activities of
the company.
 Controls attempt to ensure that risks, those factors which
stop the achievement of company objectives, are minimized
(Kaplan 2012).
Forensic Audit and the Internal Auditor
 An internal control system (ICS) comprises the whole
network of systems established in an organisation to provide
reasonable assurance that organisational objectives will be
achieved.
 The Internal Control System (ICS) consists of a set of rules,
procedures and organizational structures which aim to ensure
that corporate strategy is implemented, achieve effective and
efficient corporate processes, safeguard the value of corporate
assets, ensure the reliability and integrity of accounting and
management data and ensure that operations comply with all
existing rules and regulations.
Forensic Audit and the Internal Auditor
 Internal management control refers to the procedures and
policies in place to ensure that company objectives are
achieved.
 It is the control procedures and policies provide the detailed
controls implemented within the company (Kaplan 2012,
Unicreditgroup 2012).
Forensic Audit and the Internal Auditor
 Internal Auditing
 Internal Auditing is an independent, objective assurance and consulting
activities designed to add value and improve an organisation’s operation.
It help an organization accomplish its objectives by bringing a systematic,
disciplined approach to evaluate and improve the effectiveness of risk
management, control and governance process (IIA, Millichamp and
Taylor, 2008), .
 Internal auditors are different from external auditors because they do not
focus solely on financial statements or financial risks, much of their work
is looking at operational or strategic risks (Millichamp and Taylor, 2008, p
262).
Forensic Audit and the Internal Auditor
 Internal Auditing
 Internal audits are conducted by employees of a business or
by external auditors acting as subcontractors.
 They are becoming increasingly important because of the
development of Corporate Governance.
 These differ from statutory audits because the priorities are
set by the management who, to some extent, control the work
of internal auditors (Millichamp and Taylor, 2008).
32
Forensic in Computerized Work Environment
 Computer forensics is the practice of collecting, analysing and
reporting on digital data in a way that is legally admissible.
 It can be used in the detection and prevention of crime and in
any dispute where evidence is stored digitally.
 Computer forensics follows a similar process to other forensic
disciplines, and faces similar issues.
 There are few areas of crime or dispute where computer
forensics cannot be applied.
 Law enforcement agencies have been among the earliest and
heaviest users of computer forensics and consequently have
often been at the forefront of developments in the field.
Forensic in Computerized Work Environment
 Computers may constitute a ‘scene of a crime’,
 for example with hacking or denial of service attacks or they
may hold evidence in the form of emails, internet history,
documents or other files relevant to crimes such as murder,
kidnap, fraud and drug trafficking.
 It is not just the content of emails, documents and other files
which may be of interest to investigators but also the
‘metadata’ associated with those files.
 A computer forensic examination may reveal when a
document first appeared on a computer, when it was last
edited, when it was last saved or printed and which user
carried out these actions.
Stages of computer forensic examination
 Computer forensic examination process could be
divided into six stages, presented in their usual
chronological order.
 Readiness
 Evaluation
 Collection
 Analysis
 Presentation
 Review
Issues facing computer forensics
 The issues facing computer forensics examiners can be broken down into
three broad categories: technical, legal and administrative.

 Technical issues
 Encryption
 Increasing storage space
 New technologies
 Anti-forensics
 Legal issues
 Administrative issues
 Accepted standards
 Fit to practice
Forensic Investigation & Audit Reporting
 Forensic accountants/auditors should be familiar with the
issues of attorney work product while preparing their reports,
analyses, and notes.
 Forensic accountants must bear in mind that almost
everything involved in the process, including their drafts and
notes, may be subject to discovery by the opposing party.
 Scrupulous caution is advised whenever forensic accountants
undertake an engagement (Renick, 2007).
Conclusion
 Increasingly, as various parties perceive the value of evidence, grounded as it is in
"accounting facts," forensic accountants are called upon to play important
preemptive roles (as of right, without cause), offering independent assurance in
such diverse areas as audit committee advisory services, merger and underwriting
due diligence, investment analyst research, and enterprise risk management.
 Forensic accounting techniques are useful in prevention, detection, and deterrence
in the area of fraud, money laundering, investigations, crime and terrorist
financing.
 These techniques includes, investigative skills, audit skills, legal skill etc.
 It is now clear that audit, investigation and forensic accounting are much related
but they cannot be used interchangeably.
Conclusion
 It is hereby recommended that all would be forensic accountants/investigators,
fraud/forensic auditors, statutory auditors, and investigative accountants, should
be well equipped with forensic accounting techniques in obtaining admissible
evidence suitable for litigation purposes.
 Forensic accountants are currently in great demand, with the public need for
honesty, fairness and transparency in reporting increasing exponentially.
 These forensic accountants need accounting, finance, law, investigative and
research skills to identify, interpret, communicate and prevent fraud.
 As more and more companies look for forensic accountants and professional
organizations offer certifications in the area, it is becoming evident that the
forensic accountant has a skill set that is very different from an auditor or a
financial accountant.
Thank you
 See the complete paper for the references
References & Further Reading

Weitere Àhnliche Inhalte

Was ist angesagt?

Crime scene management
Crime scene managementCrime scene management
Crime scene managementHafeez Bhutta
 
IMPORTANCE OF CRIME SCENE: COLLECTION & PRESERVATION OF EVIDENCE
IMPORTANCE OF CRIME SCENE: COLLECTION & PRESERVATION OF EVIDENCEIMPORTANCE OF CRIME SCENE: COLLECTION & PRESERVATION OF EVIDENCE
IMPORTANCE OF CRIME SCENE: COLLECTION & PRESERVATION OF EVIDENCESifs India
 
crime scene.pptx
crime scene.pptxcrime scene.pptx
crime scene.pptxkiran yadav
 
An intro to phy evi
An intro to phy eviAn intro to phy evi
An intro to phy eviTejasvi Bhatia
 
A complete review of Forensic Science and its various branches.
A complete review of Forensic Science and its various branches.A complete review of Forensic Science and its various branches.
A complete review of Forensic Science and its various branches.Hamza Mohammad
 
Forensic science investigators
Forensic science investigatorsForensic science investigators
Forensic science investigatorsNeha Agarwal
 
Non Financial Evidences (Behavorial Aspects) in a Fraud Examination
Non Financial Evidences (Behavorial Aspects) in a Fraud ExaminationNon Financial Evidences (Behavorial Aspects) in a Fraud Examination
Non Financial Evidences (Behavorial Aspects) in a Fraud ExaminationPallavi Vyas
 
Criminalistics Unit 3
Criminalistics Unit 3Criminalistics Unit 3
Criminalistics Unit 3Don Caeiro
 
CSI and Evidence Collection
CSI and Evidence CollectionCSI and Evidence Collection
CSI and Evidence Collectionmpattani
 
Central FingerPrint Bureau & its main functions (1).pdf
Central FingerPrint Bureau & its main functions (1).pdfCentral FingerPrint Bureau & its main functions (1).pdf
Central FingerPrint Bureau & its main functions (1).pdfVAISHNAVI BHEDODKAR
 
forensic report.pptx
forensic report.pptxforensic report.pptx
forensic report.pptxAARTI534988
 
CRIME SCENE MANAGEMENT COMPILED
CRIME SCENE MANAGEMENT COMPILEDCRIME SCENE MANAGEMENT COMPILED
CRIME SCENE MANAGEMENT COMPILEDAmb Steve Mbugua
 
Introduction to Forensic science labs in India
Introduction to Forensic science labs in IndiaIntroduction to Forensic science labs in India
Introduction to Forensic science labs in IndiaSaurabh Bhargava
 
Introduction to Forensic Accounting
Introduction to Forensic AccountingIntroduction to Forensic Accounting
Introduction to Forensic AccountingTreasury Consulting LLP
 

Was ist angesagt? (20)

Forensic audit
Forensic auditForensic audit
Forensic audit
 
Crime scene management
Crime scene managementCrime scene management
Crime scene management
 
IMPORTANCE OF CRIME SCENE: COLLECTION & PRESERVATION OF EVIDENCE
IMPORTANCE OF CRIME SCENE: COLLECTION & PRESERVATION OF EVIDENCEIMPORTANCE OF CRIME SCENE: COLLECTION & PRESERVATION OF EVIDENCE
IMPORTANCE OF CRIME SCENE: COLLECTION & PRESERVATION OF EVIDENCE
 
crime scene.pptx
crime scene.pptxcrime scene.pptx
crime scene.pptx
 
An intro to phy evi
An intro to phy eviAn intro to phy evi
An intro to phy evi
 
A complete review of Forensic Science and its various branches.
A complete review of Forensic Science and its various branches.A complete review of Forensic Science and its various branches.
A complete review of Forensic Science and its various branches.
 
Forensic science investigators
Forensic science investigatorsForensic science investigators
Forensic science investigators
 
Non Financial Evidences (Behavorial Aspects) in a Fraud Examination
Non Financial Evidences (Behavorial Aspects) in a Fraud ExaminationNon Financial Evidences (Behavorial Aspects) in a Fraud Examination
Non Financial Evidences (Behavorial Aspects) in a Fraud Examination
 
Modus operandi
Modus operandiModus operandi
Modus operandi
 
Forensic audit
Forensic auditForensic audit
Forensic audit
 
Criminalistics Unit 3
Criminalistics Unit 3Criminalistics Unit 3
Criminalistics Unit 3
 
CSI and Evidence Collection
CSI and Evidence CollectionCSI and Evidence Collection
CSI and Evidence Collection
 
Central FingerPrint Bureau & its main functions (1).pdf
Central FingerPrint Bureau & its main functions (1).pdfCentral FingerPrint Bureau & its main functions (1).pdf
Central FingerPrint Bureau & its main functions (1).pdf
 
forensic report.pptx
forensic report.pptxforensic report.pptx
forensic report.pptx
 
CRIME SCENE MANAGEMENT COMPILED
CRIME SCENE MANAGEMENT COMPILEDCRIME SCENE MANAGEMENT COMPILED
CRIME SCENE MANAGEMENT COMPILED
 
GEQD Kolkata
GEQD KolkataGEQD Kolkata
GEQD Kolkata
 
Introduction to Forensic science labs in India
Introduction to Forensic science labs in IndiaIntroduction to Forensic science labs in India
Introduction to Forensic science labs in India
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Introduction to Forensic Accounting
Introduction to Forensic AccountingIntroduction to Forensic Accounting
Introduction to Forensic Accounting
 
Crime scene investigation
Crime scene investigation  Crime scene investigation
Crime scene investigation
 

Andere mochten auch

Forensic auditingandaccounting jun_2012
Forensic auditingandaccounting jun_2012Forensic auditingandaccounting jun_2012
Forensic auditingandaccounting jun_2012Henry Hardoon
 
Computer forensic investigation
Computer forensic investigationComputer forensic investigation
Computer forensic investigationICFECI
 
Annexe 2 Une Nouvelle tentation de dérive du secret des affaires Aar96 01
Annexe 2 Une Nouvelle tentation de dérive du secret des affaires Aar96 01Annexe 2 Une Nouvelle tentation de dérive du secret des affaires Aar96 01
Annexe 2 Une Nouvelle tentation de dérive du secret des affaires Aar96 01Freelance
 
E discovery2
E discovery2E discovery2
E discovery2elijaht
 
ClaudiaPosterPresentation
ClaudiaPosterPresentationClaudiaPosterPresentation
ClaudiaPosterPresentationClaudia Bonilla
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...Security B-Sides
 
Presentation on POCA Jamaica
Presentation on POCA JamaicaPresentation on POCA Jamaica
Presentation on POCA JamaicaLeadAdvocate
 
Culture and creativity in APULIA - Francesco Palumbo
Culture and creativity in APULIA - Francesco PalumboCulture and creativity in APULIA - Francesco Palumbo
Culture and creativity in APULIA - Francesco PalumboApulian ICT Living Labs
 
The secret to professional investigations
The secret to professional investigationsThe secret to professional investigations
The secret to professional investigations3Sixty Systems Ltd
 
A forensic view to structural failure analysis article
A forensic view to structural failure analysis   articleA forensic view to structural failure analysis   article
A forensic view to structural failure analysis articleSayyad Wajed Ali
 
Digital technology investigation
Digital technology investigationDigital technology investigation
Digital technology investigationrachel17lloyd
 
Digital investigation
Digital investigationDigital investigation
Digital investigationlaurencowey
 

Andere mochten auch (18)

Best practices in conducting Financial Investigations
Best practices in conducting Financial InvestigationsBest practices in conducting Financial Investigations
Best practices in conducting Financial Investigations
 
General Overview of forensic accounting and forensic audit
General Overview of forensic accounting and forensic auditGeneral Overview of forensic accounting and forensic audit
General Overview of forensic accounting and forensic audit
 
Understanding Financial Statement fraud- Forensic Accounting Perspective
Understanding Financial Statement fraud- Forensic Accounting PerspectiveUnderstanding Financial Statement fraud- Forensic Accounting Perspective
Understanding Financial Statement fraud- Forensic Accounting Perspective
 
Poca
Poca Poca
Poca
 
Forensic auditingandaccounting jun_2012
Forensic auditingandaccounting jun_2012Forensic auditingandaccounting jun_2012
Forensic auditingandaccounting jun_2012
 
Computer forensic investigation
Computer forensic investigationComputer forensic investigation
Computer forensic investigation
 
Annexe 2 Une Nouvelle tentation de dérive du secret des affaires Aar96 01
Annexe 2 Une Nouvelle tentation de dérive du secret des affaires Aar96 01Annexe 2 Une Nouvelle tentation de dérive du secret des affaires Aar96 01
Annexe 2 Une Nouvelle tentation de dérive du secret des affaires Aar96 01
 
E discovery2
E discovery2E discovery2
E discovery2
 
ClaudiaPosterPresentation
ClaudiaPosterPresentationClaudiaPosterPresentation
ClaudiaPosterPresentation
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...
 
Presentation on POCA Jamaica
Presentation on POCA JamaicaPresentation on POCA Jamaica
Presentation on POCA Jamaica
 
Culture and creativity in APULIA - Francesco Palumbo
Culture and creativity in APULIA - Francesco PalumboCulture and creativity in APULIA - Francesco Palumbo
Culture and creativity in APULIA - Francesco Palumbo
 
The secret to professional investigations
The secret to professional investigationsThe secret to professional investigations
The secret to professional investigations
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
A forensic view to structural failure analysis article
A forensic view to structural failure analysis   articleA forensic view to structural failure analysis   article
A forensic view to structural failure analysis article
 
Digital technology investigation
Digital technology investigationDigital technology investigation
Digital technology investigation
 
Audit, investigation & forensic accounting: Exploring the nexus
Audit, investigation & forensic accounting: Exploring the nexusAudit, investigation & forensic accounting: Exploring the nexus
Audit, investigation & forensic accounting: Exploring the nexus
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 

Ähnlich wie Understanding forensic investigation process by G. E. Oyedokun

Forensic Accounting in Brief
Forensic Accounting in BriefForensic Accounting in Brief
Forensic Accounting in BriefRaghavendraGowdaKarb
 
Forensic Audit Procedures
Forensic Audit ProceduresForensic Audit Procedures
Forensic Audit Proceduresinfantemiliya
 
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdf
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdfARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdf
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdfShwethaAcharya20
 
Subject Forensic AccountngAs we move forward, and computer te.pdf
Subject  Forensic AccountngAs we move forward, and computer te.pdfSubject  Forensic AccountngAs we move forward, and computer te.pdf
Subject Forensic AccountngAs we move forward, and computer te.pdfakilastationarrymdu
 
Legal private investigator near me.pptx
Legal private investigator near me.pptxLegal private investigator near me.pptx
Legal private investigator near me.pptxPrivateInvestigatoro
 
Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud VidaB
 
Michael Milken· Background· Drexel Burnham· The most highl.docx
Michael Milken· Background· Drexel Burnham· The most highl.docxMichael Milken· Background· Drexel Burnham· The most highl.docx
Michael Milken· Background· Drexel Burnham· The most highl.docxARIV4
 
Discussion #1Based on authoritative sources (including peer revi.docx
Discussion #1Based on authoritative sources (including peer revi.docxDiscussion #1Based on authoritative sources (including peer revi.docx
Discussion #1Based on authoritative sources (including peer revi.docxcuddietheresa
 
Impact of Provision of Litigation Supports through Forensic Investigations on...
Impact of Provision of Litigation Supports through Forensic Investigations on...Impact of Provision of Litigation Supports through Forensic Investigations on...
Impact of Provision of Litigation Supports through Forensic Investigations on...Premier Publishers
 
Part 1- FRAUD AWARENESS -LESSONS-PART-1
Part 1- FRAUD AWARENESS -LESSONS-PART-1Part 1- FRAUD AWARENESS -LESSONS-PART-1
Part 1- FRAUD AWARENESS -LESSONS-PART-1CA.Kolluru Narayanarao
 
Record of Module Forensic photography in
Record of Module Forensic photography inRecord of Module Forensic photography in
Record of Module Forensic photography inalexademileighpacal
 

Ähnlich wie Understanding forensic investigation process by G. E. Oyedokun (20)

Investigation and forensic audit in a computerized work environment
Investigation and forensic audit in a computerized work environmentInvestigation and forensic audit in a computerized work environment
Investigation and forensic audit in a computerized work environment
 
Forensic Accounting in Brief
Forensic Accounting in BriefForensic Accounting in Brief
Forensic Accounting in Brief
 
Case study on forensic audit
Case study on forensic auditCase study on forensic audit
Case study on forensic audit
 
Forensic Audit Procedures
Forensic Audit ProceduresForensic Audit Procedures
Forensic Audit Procedures
 
Managing the Risk of Fraud Investigation
Managing the Risk of Fraud InvestigationManaging the Risk of Fraud Investigation
Managing the Risk of Fraud Investigation
 
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdf
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdfARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdf
ARTICLE ON FORENSIC ACCOUNTING AND AUDITING, Anitha.pdf
 
Managing the fraud if fraud investigation from investigation room to court room
Managing the fraud if fraud investigation from investigation room to court roomManaging the fraud if fraud investigation from investigation room to court room
Managing the fraud if fraud investigation from investigation room to court room
 
Kenya AMC Presentation 1
Kenya AMC Presentation 1Kenya AMC Presentation 1
Kenya AMC Presentation 1
 
Subject Forensic AccountngAs we move forward, and computer te.pdf
Subject  Forensic AccountngAs we move forward, and computer te.pdfSubject  Forensic AccountngAs we move forward, and computer te.pdf
Subject Forensic AccountngAs we move forward, and computer te.pdf
 
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
 
Kenya AMC Presentation 2
Kenya AMC Presentation 2Kenya AMC Presentation 2
Kenya AMC Presentation 2
 
Legal private investigator near me.pptx
Legal private investigator near me.pptxLegal private investigator near me.pptx
Legal private investigator near me.pptx
 
Forensic Audit.pptx
Forensic Audit.pptxForensic Audit.pptx
Forensic Audit.pptx
 
Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud
 
Michael Milken· Background· Drexel Burnham· The most highl.docx
Michael Milken· Background· Drexel Burnham· The most highl.docxMichael Milken· Background· Drexel Burnham· The most highl.docx
Michael Milken· Background· Drexel Burnham· The most highl.docx
 
Discussion #1Based on authoritative sources (including peer revi.docx
Discussion #1Based on authoritative sources (including peer revi.docxDiscussion #1Based on authoritative sources (including peer revi.docx
Discussion #1Based on authoritative sources (including peer revi.docx
 
Impact of Provision of Litigation Supports through Forensic Investigations on...
Impact of Provision of Litigation Supports through Forensic Investigations on...Impact of Provision of Litigation Supports through Forensic Investigations on...
Impact of Provision of Litigation Supports through Forensic Investigations on...
 
Part 1-frauds
Part 1-fraudsPart 1-frauds
Part 1-frauds
 
Part 1- FRAUD AWARENESS -LESSONS-PART-1
Part 1- FRAUD AWARENESS -LESSONS-PART-1Part 1- FRAUD AWARENESS -LESSONS-PART-1
Part 1- FRAUD AWARENESS -LESSONS-PART-1
 
Record of Module Forensic photography in
Record of Module Forensic photography inRecord of Module Forensic photography in
Record of Module Forensic photography in
 

Mehr von Godwin Emmanuel Oyedokun MBA MSc ACA ACIB FCTI FCFIP CFE

Mehr von Godwin Emmanuel Oyedokun MBA MSc ACA ACIB FCTI FCFIP CFE (20)

eNAIRA: BENEFITS AND CHALLENGES
eNAIRA: BENEFITS AND CHALLENGESeNAIRA: BENEFITS AND CHALLENGES
eNAIRA: BENEFITS AND CHALLENGES
 
Growing Our Digital World In Nigeria: Forensic and Tax Accounting Perspective
Growing Our Digital World In Nigeria: Forensic and Tax Accounting PerspectiveGrowing Our Digital World In Nigeria: Forensic and Tax Accounting Perspective
Growing Our Digital World In Nigeria: Forensic and Tax Accounting Perspective
 
FRAUD IDENTIFICATION IN FORENSIC TAX INVESTIGATION AND RULE OF EVIDENCE
FRAUD IDENTIFICATION IN FORENSIC TAX INVESTIGATION AND RULE OF EVIDENCEFRAUD IDENTIFICATION IN FORENSIC TAX INVESTIGATION AND RULE OF EVIDENCE
FRAUD IDENTIFICATION IN FORENSIC TAX INVESTIGATION AND RULE OF EVIDENCE
 
GENERAL OVERVIEW OF ACCOUNTING AND FINANCIAL REPORTING BEST PRACTICES AND STR...
GENERAL OVERVIEW OF ACCOUNTING AND FINANCIAL REPORTING BEST PRACTICES AND STR...GENERAL OVERVIEW OF ACCOUNTING AND FINANCIAL REPORTING BEST PRACTICES AND STR...
GENERAL OVERVIEW OF ACCOUNTING AND FINANCIAL REPORTING BEST PRACTICES AND STR...
 
YES I DO: HOW SACRED IS YOUR MARRIAGE VOW?
YES I DO:  HOW SACRED IS YOUR MARRIAGE VOW?YES I DO:  HOW SACRED IS YOUR MARRIAGE VOW?
YES I DO: HOW SACRED IS YOUR MARRIAGE VOW?
 
PROSPECT AND CHALLENGES OF DIGITAL TAXES IN THE 21ST CENTURY
PROSPECT AND CHALLENGES OF DIGITAL TAXES IN THE 21ST CENTURYPROSPECT AND CHALLENGES OF DIGITAL TAXES IN THE 21ST CENTURY
PROSPECT AND CHALLENGES OF DIGITAL TAXES IN THE 21ST CENTURY
 
ANALYTICAL REVIEW AND PROCEDURE: RESEARCH AND ACCEPTABLE PAPER FOR INDEXED JO...
ANALYTICAL REVIEW AND PROCEDURE: RESEARCH AND ACCEPTABLE PAPER FOR INDEXED JO...ANALYTICAL REVIEW AND PROCEDURE: RESEARCH AND ACCEPTABLE PAPER FOR INDEXED JO...
ANALYTICAL REVIEW AND PROCEDURE: RESEARCH AND ACCEPTABLE PAPER FOR INDEXED JO...
 
MANAGEMENT, SUSTAINABLE DEVELOPMENT, SECURITY AND SUPPLY CHAIN TRANSFORMATION...
MANAGEMENT, SUSTAINABLE DEVELOPMENT, SECURITY AND SUPPLY CHAIN TRANSFORMATION...MANAGEMENT, SUSTAINABLE DEVELOPMENT, SECURITY AND SUPPLY CHAIN TRANSFORMATION...
MANAGEMENT, SUSTAINABLE DEVELOPMENT, SECURITY AND SUPPLY CHAIN TRANSFORMATION...
 
CAMA 2020 THE IMPORTANCE AND THE REVIEW
CAMA 2020 THE IMPORTANCE AND THE REVIEWCAMA 2020 THE IMPORTANCE AND THE REVIEW
CAMA 2020 THE IMPORTANCE AND THE REVIEW
 
Tax incentives and the reality of revenue generation in nigeria prof oyedokun...
Tax incentives and the reality of revenue generation in nigeria prof oyedokun...Tax incentives and the reality of revenue generation in nigeria prof oyedokun...
Tax incentives and the reality of revenue generation in nigeria prof oyedokun...
 
Presentation skills preparation and sourcing of materials using microsoft po...
Presentation skills  preparation and sourcing of materials using microsoft po...Presentation skills  preparation and sourcing of materials using microsoft po...
Presentation skills preparation and sourcing of materials using microsoft po...
 
Building trust in a connected cfe world prof. godwin oyedokun 2020
Building trust in a connected cfe world prof. godwin oyedokun 2020Building trust in a connected cfe world prof. godwin oyedokun 2020
Building trust in a connected cfe world prof. godwin oyedokun 2020
 
Bribery and corruption alm cft by prof oyedokun
Bribery and corruption alm cft by prof oyedokunBribery and corruption alm cft by prof oyedokun
Bribery and corruption alm cft by prof oyedokun
 
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
 
BUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSION
BUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSIONBUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSION
BUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSION
 
Creative accounting, tax, and financial fraud. 3rd acfe conference
Creative accounting, tax, and financial fraud. 3rd acfe conferenceCreative accounting, tax, and financial fraud. 3rd acfe conference
Creative accounting, tax, and financial fraud. 3rd acfe conference
 
Financial intelligence; emerging perspective to productive entrepreneurial
Financial intelligence; emerging perspective to productive entrepreneurialFinancial intelligence; emerging perspective to productive entrepreneurial
Financial intelligence; emerging perspective to productive entrepreneurial
 
Impact of taxation on gov revenue generation in nigeria
Impact of taxation on gov revenue generation in nigeriaImpact of taxation on gov revenue generation in nigeria
Impact of taxation on gov revenue generation in nigeria
 
Taxation as a tool for Stimulating Revenue Generation in public sector organi...
Taxation as a tool for Stimulating Revenue Generation in public sector organi...Taxation as a tool for Stimulating Revenue Generation in public sector organi...
Taxation as a tool for Stimulating Revenue Generation in public sector organi...
 
FORENSIC ACCOUNTING AND THE WAR AGAINST CORRUPTION IN NIGERIA: A NEXUS
FORENSIC ACCOUNTING AND THE WAR AGAINST CORRUPTION IN NIGERIA: A NEXUSFORENSIC ACCOUNTING AND THE WAR AGAINST CORRUPTION IN NIGERIA: A NEXUS
FORENSIC ACCOUNTING AND THE WAR AGAINST CORRUPTION IN NIGERIA: A NEXUS
 

KĂŒrzlich hochgeladen

WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure serviceWhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure servicePooja Nehwal
 
Top Rated Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated  Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...Top Rated  Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...Call Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Call Girls in Nagpur High Profile
 
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Business Principles, Tools, and Techniques in Participating in Various Types...
Business Principles, Tools, and Techniques  in Participating in Various Types...Business Principles, Tools, and Techniques  in Participating in Various Types...
Business Principles, Tools, and Techniques in Participating in Various Types...jeffreytingson
 
Indore Real Estate Market Trends Report.pdf
Indore Real Estate Market Trends Report.pdfIndore Real Estate Market Trends Report.pdf
Indore Real Estate Market Trends Report.pdfSaviRakhecha1
 
VIP Call Girl in Thane 💧 9920725232 ( Call Me ) Get A New Crush Everyday With...
VIP Call Girl in Thane 💧 9920725232 ( Call Me ) Get A New Crush Everyday With...VIP Call Girl in Thane 💧 9920725232 ( Call Me ) Get A New Crush Everyday With...
VIP Call Girl in Thane 💧 9920725232 ( Call Me ) Get A New Crush Everyday With...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumFinTech Belgium
 
Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...
Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...
Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...priyasharma62062
 
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...amitlee9823
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Availabledollysharma2066
 
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...priyasharma62062
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Pooja Nehwal
 
Call Girls in New Friends Colony Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escort...
Call Girls in New Friends Colony Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escort...Call Girls in New Friends Colony Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escort...
Call Girls in New Friends Colony Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escort...Delhi Call girls
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...ssifa0344
 
Enjoy Night⚡Call Girls Patel Nagar Delhi >àŒ’8448380779 Escort Service
Enjoy Night⚡Call Girls Patel Nagar Delhi >àŒ’8448380779 Escort ServiceEnjoy Night⚡Call Girls Patel Nagar Delhi >àŒ’8448380779 Escort Service
Enjoy Night⚡Call Girls Patel Nagar Delhi >àŒ’8448380779 Escort ServiceDelhi Call girls
 
VIP Independent Call Girls in Taloja đŸŒč 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja đŸŒč 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Taloja đŸŒč 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja đŸŒč 9920725232 ( Call Me ) Mumbai Escorts ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
falcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunitiesfalcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunitiesFalcon Invoice Discounting
 

KĂŒrzlich hochgeladen (20)

WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure serviceWhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
 
Top Rated Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated  Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...Top Rated  Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
 
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
 
Business Principles, Tools, and Techniques in Participating in Various Types...
Business Principles, Tools, and Techniques  in Participating in Various Types...Business Principles, Tools, and Techniques  in Participating in Various Types...
Business Principles, Tools, and Techniques in Participating in Various Types...
 
Indore Real Estate Market Trends Report.pdf
Indore Real Estate Market Trends Report.pdfIndore Real Estate Market Trends Report.pdf
Indore Real Estate Market Trends Report.pdf
 
VIP Call Girl in Thane 💧 9920725232 ( Call Me ) Get A New Crush Everyday With...
VIP Call Girl in Thane 💧 9920725232 ( Call Me ) Get A New Crush Everyday With...VIP Call Girl in Thane 💧 9920725232 ( Call Me ) Get A New Crush Everyday With...
VIP Call Girl in Thane 💧 9920725232 ( Call Me ) Get A New Crush Everyday With...
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
 
Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...
Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...
Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...
 
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
 
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
 
Call Girls in New Friends Colony Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escort...
Call Girls in New Friends Colony Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escort...Call Girls in New Friends Colony Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escort...
Call Girls in New Friends Colony Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escort...
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
 
Enjoy Night⚡Call Girls Patel Nagar Delhi >àŒ’8448380779 Escort Service
Enjoy Night⚡Call Girls Patel Nagar Delhi >àŒ’8448380779 Escort ServiceEnjoy Night⚡Call Girls Patel Nagar Delhi >àŒ’8448380779 Escort Service
Enjoy Night⚡Call Girls Patel Nagar Delhi >àŒ’8448380779 Escort Service
 
VIP Independent Call Girls in Taloja đŸŒč 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja đŸŒč 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Taloja đŸŒč 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja đŸŒč 9920725232 ( Call Me ) Mumbai Escorts ...
 
falcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunitiesfalcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunities
 

Understanding forensic investigation process by G. E. Oyedokun

  • 1. UNDERSTANDING FORENSIC INVESTIGATION PROCESS (UFIP) Compiled and Presented By: Godwin Emmanuel, Oyedokun ND (Fin), HND (Acct.), BSc. (Acct. Ed), MBA (Acct. & Fin.), MSc. (Acct.), MSc. (Econs & Fin.), MTP (SA), ACA, FCTI, ACIB, AMNIM, CNA, FCFIP, FCE, CICA, CFA, CFE, CPFA, ABR, CertIFR, FILEX Chief Technical Consultant/Managing Partner OGE Professional Services godwinoye@yahoo.com +2348033737184, +2348055863944 Being a lecture delivered at Fraud Examination and Forensic Investigation Workshop Held at the International Court of Arbitration (ICAA), Victoria Island, Lagos On July 19, 2016. Organized by Commercial Law Development Services
  • 2. 2
  • 3. This presentation will cover the following major sub topics : ‱ Concept of Investigations ‱ Forensic Investigations ‱ Forensic Audit Investigation Methodology ‱ Forensic Audit and the Internal Auditor ‱ Forensic in Computerized Work Environment ‱ Forensic Investigation & Audit Reporting ‱ Conclusion Contents Oyedokun Godwin Emmanuel
  • 4. Introduction  It is not a gaining saying that forensic accounting/audit has taken an important role in both private and public companies since the birth of the 21st century.  One can but always remember the avoidable failure of some formerly prominent public companies like Enron and Tyco in the late 1990s, so also terrorist attacks of September 11, 2001, contributed immensely to the high demand for forensic accounting expert that can bring about a new, important and lucrative specialty.  Forensic accounting procedures target financial and operational fraud, discovery of hidden assets, and adherence to federal regulations (Pirraglia, nd).  Forensic Investigation and Forensic Audit are better forensic strategies in resolving the allegations of fraudulent activities as signs of financial crime can be initially detected in a variety of ways; by accident, by whistle-blowing, by auditors, by data mining, by controls and testing, or by the organization's top management requesting an inspection on the basis of mere suspicion.  This paper will help the readers in understanding the concept of Investigations, forensic investigations, forensic audit investigation methodology, forensic audit and the internal auditor, forensics in computerized work environment, and forensic investigation & audit reporting. 
  • 5. Concept of Investigations  Investigation is the act or process of investigating or the condition of being investigated.  A searching inquiry for ascertaining facts; detailed or careful examination (dictionary.reference.com).  Investigation is a vital part of forensic accounting and auditing process but only applied when the event or transaction is beclouded. It is carried out when lapse has been established to ascertain who is responsible, the reason for the action including the extent of damage if any.  It could be referred to as a detailed verification and clarification of doubt about a transaction or event.  It is the search and examination of the particulars of an event to determine the hidden, unique, or complex facts surrounding the event.  A deliberate search and review of records in accordance with the laid down and agreed policies in order to ascertain if and why the keeping of the records resulted in a gap and the responsible person.  Investigation is a structured gathering of documentary evidence and testimony to resolve an allegation of improper activity.  In most cases, fraud investigations are investigations of white collar crime, which involves surveillance and careful consideration of complicated financial records.
  • 6. Types of Investigations  Fraud Investigation  A fraud investigation tries to determine whether fraud has taken place and tries to detect evidence of fraud has occurred.  Fraud is considered to involve misrepresentation with intent to deceive.  Most fraud investigations begin with a meeting between the investigator and the client.  A good fraud investigator will use this initial information to find more evidence and more facts.  A fraud investigator may use surveillance, asset searches, background checks, employee investigations, business investigations, and other types of methods to get to the bottom of a case.  In most cases, fraud investigations are investigations of white collar crime, which involves surveillance and careful consideration of complicated financial records.
  • 7. 7
  • 8. Types of Investigations  Corruption There are three types of corruption fraud: 1. conflicts of interest, 2. bribery, and 3. extortion.  In a conflict of interest fraud, the fraudster exerts their influence to achieve a personal gain which detrimentally affects the company.  The fraudster may not benefit financially, but rather receives an undisclosed personal benefit as a result of the situation.  For example, a manager may approve the expenses of an employee who is also a personal friend in order to maintain that friendship, even if the expenses are inaccurate.  Bribery is when money (or something else of value) is offered in order to influence a situation.  Extortion is the opposite of bribery, and happens when money is demanded (rather than offered) in order to secure a particular outcome.
  • 9. 9
  • 10. Types of Investigations  Asset misappropriation  The common feature is the theft of cash or other assets from the company, for example: 1. Cash theft – the stealing of physical cash, for example petty cash, from the premises of a company. 2. Fraudulent disbursements – company funds being used to make fraudulent payments. Common examples include billing schemes, where payments are made to a fictitious supplier, and payroll schemes, where payments are made to fictitious employees (often known as ‘ghost employees’). 3. Inventory frauds – the theft of inventory from the company. 4. Misuse of assets – employees using company assets for their own personal interest.
  • 11. Types of Investigations  Financial statement fraud  This is also known as fraudulent financial reporting, and is a type of fraud that causes a material misstatement in the financial statements.  It can include deliberate falsification of accounting records; omission of transactions, balances or disclosures from the financial statements; or the misapplication of financial reporting standards.  This is often carried out with the intention of presenting the financial statements with a particular bias, for example concealing liabilities in order to improve any analysis of liquidity and gearing.
  • 12. Wednesday, July 20, 2016 12 Fraud Investigations & Govt. Agencies
  • 13. Interview and Interrogation  They are two major techniques in investigation.  Used to elicit responses from the suspect or accused.  The investigator (interviewer or interrogator) cannot usurp the power of the court of competent jurisdiction by pronouncing the suspect or accused guilty.  An interview is non-accusatory (Fred, John, Joseph, Brian, 2004)  Interrogation is an art. You can master it through your study and experience.  A good investigator is not necessarily a good interrogator.  To be a good interrogator you need to be a good actor and must have an insight of human psychology.
  • 14. Interview and Interrogation  Interview is conducted in a cordial atmosphere where a witness is more comfortable physically and psychologically.  On the other hand, whenever a person is questioned in an uncomfortable atmosphere (interrogation room) where he is under the psychological pressure, it is an interrogation.  Only when an interrogator overpowers a suspect psychologically, he gets a confession or the fact of a case which is not possible otherwise (Becca and Jay, 2004).
  • 15. 15
  • 16. Forensic Audit Investigation Methodology  Forensic investigation is the utilization of specialized investigative skills in carrying out an inquiry conducted in such a manner that the outcome will have application to a court of law.  Forensic Investigators are to be grounded in accounting, medicine, engineering or some other discipline.  Forensic investigation is the examination of evidence regarding an assertion to determine its correspondence to established criteria carried out in a manner suitable to the court.
  • 17. Forensic Audit Investigation Methodology  Fraud/forensic auditors/investigators could approach their examinations/investigations from both the angels of whether the fraud could have occurred and whether it could not have occurred (Umeraziz, 2014) viz: 1. Analyzing data which is available 2. Creating a hypothesis based on such data 3. Testing the hypothesis 4. Refining and altering the hypothesis 5. Communicating Results
  • 18. Fraud Auditors’ Skills  An effective fraud auditor should know, with some degree of depth, what fraud is from the following perspectives: 1. Human and individual 2. Organizational, cultural, and motivational 3. Economic/Competitive 4. Social 5. Regulatory, legal, and evidential (how to discern, detect, and document such frauds) 6. Accounting, audit, and internal control (when, where, and how fraud is most likely to occur in books of account and in financial statements)
  • 19. Fraud Auditors’ Skills 7. Review such documents for peculiarities such as raised amounts; forgery; counterfeiting; fake billings; invoicing of claims; destruction of data; improper account classification; irregularities in serial sequences, quantity, pricing, extensions, and footings; and substitution of copies for original documents. 8. Gather and preserve evidence to corroborate asset losses, fraudulent transactions, and financial statements. 9. Follow the flow of documents that support transactions. 10.Follow the flow of funds into and out of an organization’s account. 11. Search for underlying support documents for questionable transactions.
  • 20. Fraud Auditors’ Skills 12. Be aware of management, administrative, and organizational policies, procedures, and practices. 13. Test the organization’s motivational and ethical climate. 14. The skills of a criminal investigator are in some respects similar to those of an auditor. An auditor and a detective both seek the truth of or with respect to the proper accounting of business transactions and the detective/investigator with respect to the proper (legal) behavior of citizens. Both should have inquisitive minds and challenge things that appear out of order and out of sequence, such as odd times, odd places, and odd places – in a word, things that are the opposite of what one would logically expect.
  • 21. Principles of Fraud Auditing 1. Fraud auditing is unlike financial auditing. It is more a mind- set than a methodology. 2. Fraud auditors are unlike financial auditors. Fraud auditors focus on exceptions, oddities, accounting irregularities, and patterns of conduct, not on errors and omissions. 3. Fraud auditing is learned primarily from experience, not from audit text books or last year’s work papers. Learning to be a fraud auditor means learning to think like a thief— “ Where are the weakest links in this chain of internal controls?” 4. From an audit perspective, fraud is intentionally misrepresenting financial facts of a material nature. From fraud-audit perspective, fraud is an international misrepresentation of finance facts.
  • 22. Principles of Fraud Auditing 5. Frauds are committed for economic, egocentric, ideological, and psychotic reasons. Of the four, the economic motive is the most. 6. Fraud tend to encompass the theory structure around the motive, opportunity, and benefit 7. Fraud is a computerized accounting environment can be committed at any state of processing---input, throughout, or output. Input frauds (entering false and fraudulent data) are the most common 8. Fraud auditing is unlike financial auditing. It is more a mind- set than a methodology.
  • 23. Principles of Fraud Auditing 9. Fraud auditors are unlike financial auditors. Fraud auditors focus on exceptions, oddities, accounting irregularities, and patterns of conduct, not on errors and omissions. 10. Fraud auditing is learned primarily from experience, not from audit text books or last year’s work papers. Learning to be a fraud auditor means learning to think like a thief— “ Where are the weakest links in this chain of internal controls?” 11. From an audit perspective, fraud is intentionally misrepresenting financial facts of a material nature. From fraud-audit perspective, fraud is an international misrepresentation of finance facts. 12. Frauds are committed for economic, egocentric, ideological, and psychotic reasons. Of the four, the economic motive is the most. 13. Fraud tend to encompass the theory structure around the motive, opportunity, and benefit 14. Fraud is a computerized accounting environment can be committed at any state of processing---input, throughout, or output. Input frauds (entering false and fraudulent data) are the most common
  • 24. Principles of Fraud Auditing 15. The most common fraudulent schemes by lower-level employees involve disbursement (payable, payroll, and benefit and expense claims). 16. The most common fraudulent schemes by higher-level managers involve “profit smoothing” (deferring expenses, booking sales too early, overstating inventory). 17. Accounting-type frauds are caused more often by absence of controls than by loose controls. 18. Fraud incidents are not growing exponentially, but lose are. 19. Accounting frauds are discovered more often by accident than by financial audit purposes or design. Over 90 percent of financial frauds are discovered. 20.Fraud prevention is a matter of adequate controls and work environment that places a high value on personal honesty and fair dealing.
  • 25. Forensic Audit and the Internal Auditor  Internal Control  It is the methods put in place by a company to ensure the integrity of financial and accounting information, meet operational and profitability targets and transmit management policies throughout the organization.  Internal controls work best when they are applied to multiple divisions and deal with the interactions between the various business departments.  No two systems of internal controls are identical, but many core philosophies regarding financial integrity and accounting practices have become standard management practices.
  • 26. Forensic Audit and the Internal Auditor  Internal Control  Internal Control according to Business dictionary is Systematic measures (such as reviews, checks and balances, methods and procedures) instituted by an organization to:  (1) conduct its business in an orderly and efficient manner,  (2) safeguard its assets and resources,  (3) deter and detect errors, fraud, and theft,  (4) ensure accuracy and completeness of its accounting data, (5) produce reliable and timely financial and management information, and  (6) ensure adherence to its policies and plans.
  • 27. Forensic Audit and the Internal Auditor  Internal Control  Internal control and risk management are fundamental components of good corporate governance.  Good corporate governance means that the board must identify and manage all risks for a company. In terms of risk management, internal control systems span finance, operations, compliance and other areas, i.e. all the activities of the company.  Controls attempt to ensure that risks, those factors which stop the achievement of company objectives, are minimized (Kaplan 2012).
  • 28. Forensic Audit and the Internal Auditor  An internal control system (ICS) comprises the whole network of systems established in an organisation to provide reasonable assurance that organisational objectives will be achieved.  The Internal Control System (ICS) consists of a set of rules, procedures and organizational structures which aim to ensure that corporate strategy is implemented, achieve effective and efficient corporate processes, safeguard the value of corporate assets, ensure the reliability and integrity of accounting and management data and ensure that operations comply with all existing rules and regulations.
  • 29. Forensic Audit and the Internal Auditor  Internal management control refers to the procedures and policies in place to ensure that company objectives are achieved.  It is the control procedures and policies provide the detailed controls implemented within the company (Kaplan 2012, Unicreditgroup 2012).
  • 30. Forensic Audit and the Internal Auditor  Internal Auditing  Internal Auditing is an independent, objective assurance and consulting activities designed to add value and improve an organisation’s operation. It help an organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk management, control and governance process (IIA, Millichamp and Taylor, 2008), .  Internal auditors are different from external auditors because they do not focus solely on financial statements or financial risks, much of their work is looking at operational or strategic risks (Millichamp and Taylor, 2008, p 262).
  • 31. Forensic Audit and the Internal Auditor  Internal Auditing  Internal audits are conducted by employees of a business or by external auditors acting as subcontractors.  They are becoming increasingly important because of the development of Corporate Governance.  These differ from statutory audits because the priorities are set by the management who, to some extent, control the work of internal auditors (Millichamp and Taylor, 2008).
  • 32. 32
  • 33. Forensic in Computerized Work Environment  Computer forensics is the practice of collecting, analysing and reporting on digital data in a way that is legally admissible.  It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally.  Computer forensics follows a similar process to other forensic disciplines, and faces similar issues.  There are few areas of crime or dispute where computer forensics cannot be applied.  Law enforcement agencies have been among the earliest and heaviest users of computer forensics and consequently have often been at the forefront of developments in the field.
  • 34. Forensic in Computerized Work Environment  Computers may constitute a ‘scene of a crime’,  for example with hacking or denial of service attacks or they may hold evidence in the form of emails, internet history, documents or other files relevant to crimes such as murder, kidnap, fraud and drug trafficking.  It is not just the content of emails, documents and other files which may be of interest to investigators but also the ‘metadata’ associated with those files.  A computer forensic examination may reveal when a document first appeared on a computer, when it was last edited, when it was last saved or printed and which user carried out these actions.
  • 35. Stages of computer forensic examination  Computer forensic examination process could be divided into six stages, presented in their usual chronological order.  Readiness  Evaluation  Collection  Analysis  Presentation  Review
  • 36. Issues facing computer forensics  The issues facing computer forensics examiners can be broken down into three broad categories: technical, legal and administrative.   Technical issues  Encryption  Increasing storage space  New technologies  Anti-forensics  Legal issues  Administrative issues  Accepted standards  Fit to practice
  • 37. Forensic Investigation & Audit Reporting  Forensic accountants/auditors should be familiar with the issues of attorney work product while preparing their reports, analyses, and notes.  Forensic accountants must bear in mind that almost everything involved in the process, including their drafts and notes, may be subject to discovery by the opposing party.  Scrupulous caution is advised whenever forensic accountants undertake an engagement (Renick, 2007).
  • 38. Conclusion  Increasingly, as various parties perceive the value of evidence, grounded as it is in "accounting facts," forensic accountants are called upon to play important preemptive roles (as of right, without cause), offering independent assurance in such diverse areas as audit committee advisory services, merger and underwriting due diligence, investment analyst research, and enterprise risk management.  Forensic accounting techniques are useful in prevention, detection, and deterrence in the area of fraud, money laundering, investigations, crime and terrorist financing.  These techniques includes, investigative skills, audit skills, legal skill etc.  It is now clear that audit, investigation and forensic accounting are much related but they cannot be used interchangeably.
  • 39. Conclusion  It is hereby recommended that all would be forensic accountants/investigators, fraud/forensic auditors, statutory auditors, and investigative accountants, should be well equipped with forensic accounting techniques in obtaining admissible evidence suitable for litigation purposes.  Forensic accountants are currently in great demand, with the public need for honesty, fairness and transparency in reporting increasing exponentially.  These forensic accountants need accounting, finance, law, investigative and research skills to identify, interpret, communicate and prevent fraud.  As more and more companies look for forensic accountants and professional organizations offer certifications in the area, it is becoming evident that the forensic accountant has a skill set that is very different from an auditor or a financial accountant.
  • 41.  See the complete paper for the references References & Further Reading