1 / 8

Effective Methods for Theft Investigation in Forensic Accounting

Explore the various methods for investigating fraud and theft in forensic accounting, including surveillance, invigilation, and analyzing physical evidence. Learn how to coordinate investigations by using vulnerability charts, identifying red flags, and determining possible motives and sources of rationalization. Discover the importance of testimonial, documentary, and physical evidence, as well as conducting personal observations and inquiries to uncover theft and concealment. Enhance your investigative skills by understanding the bull’s-eye approach, checking records, interviewing suspects, and former employees or vendors. Delve into surveillance and covert operations, invigilation, and the significance of maintaining legal compliance and avoiding fishing expeditions.

gblackburn
Download Presentation

Effective Methods for Theft Investigation in Forensic Accounting

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Today’s Topics • Methods for Investigating Fraud • Theft Investigation Methods FORENSIC ACCOUNTING - BA124 - Spring 2015 Slide 11-1

  2. Fraud Investigation • Evidence Square Approach • Testimonial evidence • Documentary evidence • Physical evidence • Personal observation • Fraud Elements Plus Inquiry Approach • Theft investigation • Concealment investigation • Conversion investigation • Inquiry investigation FORENSIC ACCOUNTING - BA124 - Spring 2015 Slide 11-1

  3. Theft Investigation • Surveillance and covert operations • Invigilation • Physical evidence • Generally costly and time-consuming FORENSIC ACCOUNTING - BA124 - Spring 2015 Slide 11-1

  4. Theft Investigation Bull’s-Eye • Check records • Interview former employees, vendors • Search public records • Interview employees, buyers etc. • Interview suspect FORENSIC ACCOUNTING - BA124 - Spring 2015 Slide 11-1

  5. Coordinating the Investigation • Vulnerability Chart (spread sheet) • What was taken? • Who had the opportunity? • How were assets moved? • How was it concealed? • How were the assets converted? • What were the red-flags? • What were the possible motives? • What were the sources of rationalization? • What internal controls were lacking? FORENSIC ACCOUNTING - BA124 - Spring 2015 Slide 11-1

  6. Surveillance and Covert Operations • Fixed, tailing or electronic • Legal, but subject to the 4th Amendment protection against unreasonable searches • Avoid fishing expeditions FORENSIC ACCOUNTING - BA124 - Spring 2015 Slide 11-1

  7. Invigilation • Observation that takes away virtually all opportunities for fraud • Before and after comparisons • Use only with management approval • Costly FORENSIC ACCOUNTING - BA124 - Spring 2015 Slide 11-1

  8. Physical Evidence • WTC example • Northern Exposure example FORENSIC ACCOUNTING - BA124 - Spring 2015 Slide 11-1

More Related