1 / 29

Chapter 14

Chapter 14. Conducting Investigations and Report Writing. Learning Objectives. Understand the circumstances that may necessitate an internal investigation. Identify who should be part of a fraud examination team. Define evidence. Be familiar with several evidence gathering techniques.

herb
Download Presentation

Chapter 14

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 14 Conducting Investigations and Report Writing

  2. Learning Objectives • Understand the circumstances that may necessitate an internal investigation. • Identify who should be part of a fraud examination team. • Define evidence. • Be familiar with several evidence gathering techniques.

  3. Learning Objectives • Understand the considerations and concerns related to preserving documentary evidence. • Understand the importance of and methods for organizing documentary evidence. • Identify several sources of evidence and the types of information each can provide. • Be familiar with the standard format and requirements for a professional investigation report.

  4. Reasons to Investigate • To determine source of losses • To identify the perpetrator(s) • To gather evidence • To recoup losses • To identify control weaknesses • To comply with laws and regulations • Federal statutes • SEC regulations

  5. Reasons to Investigate • To avoid violating required duties of officers and directors • Loyalty • Reasonable care • To avoid discrimination charges from employee dismissal • To mitigate company liability for employee misconduct and reduce fines under Corporate Sentencing Guidelines

  6. Planning the Investigation • Who will be involved in the investigation? • What will be the investigation strategy?

  7. The Investigation Team • Include only those individuals who: • Can legitimately assist in the investigation • Have a genuine interest in the outcome of the investigation • Primary goal is to resolve fraud allegations as thoroughly and efficiently as possible

  8. The Investigation Team • Certified Fraud Examiners • Legal counsel • Auditors • Security personnel • IT and computer forensics experts • Human resources personnel • A management representative • Outside consultants

  9. Evidence • Anything perceivable by the five senses • Any proof that is legally presented at trial to prove a contention and induce a belief in the minds of a jury • Testimony of witnesses • Records and documents • Facts and data • Tangible objects

  10. Obtaining Evidence • Covert operations • Surveillance • Using informants • “Dumpster diving” • Subpoenas • Search warrants • Voluntary consent

  11. Covert Operations • Investigator assumes a fictitious identity • Requires high degree of planning and skill • Objectives • Time frames • Approvals • Legal if there is sufficient probable cause that a crime has been committed

  12. Pretexting • Obtaining information through falsehood or deception • Example: Calling suspect’s relative and pretending to be old friend looking for contact information • Not always legal

  13. Surveillance • Secretive and continuous observance of a suspect’s activities to: • Obtain probable cause for search warrants • Develop investigative leads • Identify co-conspirators • Gather intelligence • Locate persons and things relevant to the investigation

  14. “Dumpster Diving” • Sifting through suspect’s trash to obtain evidence • Can be done without search warrant, provided trash has left suspect’s possession • No reasonable expectation of privacy

  15. Handling Evidence • To be admissible in court, evidence must be preserved and handled correctly. • Properly identified • Chain of custody maintained • Proven relevant and material to case • Obtain original documents when feasible. • Do not touch originals any more than necessary. • Maintain a good filing system.

  16. Chain of Custody • Record of when item is received or when it leaves the care, custody, or control of the fraud examiner • Best recorded in memorandum stating: • What items were received • When they were received • From whom they were received • Where they are maintained

  17. Preserving Evidence • Documents should be marked for later identification; however, never mark on original documents other than unobtrusive initials or tick mark made for identification. • Do not fold, staple, paper clip, or otherwise change original document. • Use gloves when handling documentary evidence to avoid leaving fingerprints.

  18. Organizing Evidence • Segregate documents either by witness or by transaction. • Make a “key document” file. • Establish a database early on in the investigation. • Create chronology of events. • Utilize and frequently update to-do lists. • Use computer software to organize documents and data.

  19. Sources of Information • Fraud examiners may need to search for specific information to help in: • Locating individuals or verifying their identities • Researching assets or financial positions • Documenting lifestyles and background information • Discovering banking/creditor relationships • Identifying business affiliations/associates • Uncovering litigation history

  20. In-house Sources • Investigators can learn a great deal from internal documents and information at the suspect’s organization. • Personnel files • Internal phone records and voice mail • Computer files and records • Physical files and records • Timesheets • Financial records • Prior audit or investigative files • Corporate policies and procedures • Company communications to employees • Access codes and user identification codes • Security videos

  21. Public Information • Records that a governmental unit is required by law to keep or those which are necessary for a governmental unit to keep in order to discharge its duties imposed by law • Different information is kept by different government levels and agencies

  22. Local/County Records • Voter registration records • Marriage license records • Real property records • Property tax records • Health and fire departments • Sheriff/county prosecutor • County fire marshal • Utility company records • Permits

  23. State Records • Business filings • Corporate registration • Fictitious names/DBA • Uniform commercial code filings • Employee/labor records • Workers’ compensation information • State tax filings • Professional associations/licensing boards

  24. Court Records • Litigation history • Divorces • Personal injury suits • Financial suits • Bankruptcy records • Probate records

  25. Online Searches • Commercial online services provide convenient access to a wide range of data in a single place. • Accessing information online is never a full substitute for an actual examination of public records. • Fraud examiners should not rely on information from public websites without verifying its authenticity and accuracy.

  26. Report Writing • Fraud examinations conclude with a report of the investigation results. • Usually a formal written report • Normally used for internal purposes, but may be sent to police or insurance companies • Other than technical matters, no opinions of any kind—particularly those regarding guilt or innocence—should be included in report.

  27. Investigation Report • Report must be accurate and understandable, and must “speak for itself” • A good report: • Conveys evidence • Adds credibility • Accomplishes objectives of the case • Is written with the expected reader(s) of the report in mind

  28. Investigation Report • Report should be written as though it will be used in civil or criminal trial. • State only the facts. • Do not make errors. • Include a follow-up section.

  29. Format of Report • Author/Date • Summary • Introduction/Purpose • Body • Results • Follow-up/Recommendations

More Related