Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
1 FORENSIC ACCOUNTING AND DIGITAL FORENSICS CA. Charanjot Singh Nanda Central Council Member, ICAI Chairman, Internal Audit Standards Board & Chairman, Committee for Members in Industry The Institute of Chartered Accountants of India FORENSIC ACCOUNTING Use of accounting for legal purposes. Use of intelligence-gathering techniques & accounting to develop information & opinion for use in civil litigation. Identifying, recording, settling, extracting, sorting, reporting, and verifying past financial data or other accounting activities for settling prospective legal disputes or using such past financial data for projecting future financial data to settle legal disputes. AREAS OF SPECIALITY Bribery and Corruption Fraud and Misconduct Breach of Company Procedures Ponzi and other Investment Schemes Conflict of Interest Money Laundering Embezzlement and Misappropriation Financial Reporting Fraud Procurement Fraud PROCESS MAP Assignment Development Identify parties to the case, Co-relate matters of law, Confirm technical capabilities Ensure matching of expectations Prepare and secure engagement letter Establish concrete timelines, e.g., discovery cut off, report submission, etc., Establish communication protocol 6 Scoping of Engagement Continually define/ refine universe of data, primary and secondary Initiate data collection processes Prepare Document Request(s) as necessary Establish protocol to manage data requested and obtained Interviews and Interrogations Gain confidence of parties & obtain information from parties Background investigation on identified parties Use interpersonal communication techniques to analyse responses for further investigation Prepare interview matrix Check for Hidden agenda of parties Blind leads Communication inhibitors 8 Background Research Combine first-hand knowledge (e.g., Interviews and Depositions) with second-hand knowledge (e.g., Background Research data) See “Online Databases – Sources of Information” See “Government Sources of Information” Identify disparities for additional investigation Data Collection & Analysis Missing information Privacy laws Unreliable informant / Inconclusive information Entrapment Engagement/personal risks Data Collection & Analysis Perform any additional indirect or direct analytical forensic techniques as needed Validate / correlate prior data obtained through alternate techniques Genogram/Entity / Party Chart Deposition Matrix/Interview Matrix Search Log/Background Investigation Lifestyles Analysis Net Worth Method Analysis of Transactions Summarize and analyze the findings of all deliverables and observations Obtain sufficient relevant data to provide credible evidence Identify any missing information or “gaps” DRAFT the Forensic Accountant’s Report METHODS OF PROOF DIRECT METHODS SPECIFIC ITEM METHOD FINANCIAL RELATIONSHIPS FINANCIAL STATEMENT ANALYSIS HORIZONTAL VERTICAL TREND RATIO CASH FLOW 13 METHODS OF PROOF INDIRECT METHODS NET WORTH METHOD EXPENDITURES METHOD (ASSET METHOD) (LIFESTYLES METHOD) (SOURCES AND APPLICATION OF FUNDS METHOD) BANK DEPOSIT METHOD 14 METHODS OF PROOF Information for specific industries Learn distinct , detailed practices in a particular industry Examination techniques Common & unique industry issues Business practices Terminology Example of market segments: Construction or entertainment industry Professions: lawyers or real estate agents 15 METHODS OF PROOF Direct-Specific item method Most common method Relies on specific transactions Uncovers specific financial transactions which relate to illegal activity, and to the suspect Review books, records, bank accounts - directly traces a transaction Direct (vs circumstantial) proof 16 METHODS OF PROOF Easiest to present @ trial Most difficult for the suspect to refute Example: Ghost employee on the payroll FINANCIAL RELATIONSHIPS SALES VERSUS COST OF GOOD SOLD SALES VERSUS ACCOUNTS RECEIVABLE SALES VERSUS INVENTORY ASSETS VERSUS LIABILITIES FINANCIAL STATEMENT FRAUD FICTITIOUS REVENUES TIMING DIFFERENCES CONCEALED LIABILITIES AND EXPENSES IMPROPER DISCLOSURES IMPROPER ASSET VALUATION FINANCIAL STATEMENT ANALYSIS PERCENTAGE ANALYSIS HORTIZONAL PERIOD TO PERIOD INDUSTRY STANDARDS COMPETITORS VERTICAL COMMON SIZE STATEMENTS TREND ANALYSIS FINANCIAL STATEMENT ANALYSIS RATIO ANALYSIS LIQUIDITY ASSET MANAGEMENT DEBT MANAGEMENT PROFITABILITY FINANCIAL STATEMENT ANALYSIS CASH FLOW ANALYSIS OPERATING INVESTING FINANCING INDIRECT METHODS OF PROOF CIRCUMSTANTIAL PROOF Inadequate books/records Suspected: books do not reflect all income Significant increase in net worth Gross profit % changes significantly Expenses exceed reported income without cause Suspected income from unidentified sources is large 23 INDIRECT METHODS OF PROOF SOURCES OF INFORMATION Deeds of ownership, titles, liens, filings The target Informants/associates Real estate records Bankruptcy records State motor vehicle records Surveillance Credit card applications/statements Tax returns Insurance records Employment records Cancelled checks Deposit slips Loan Applications INDIRECT METHODS OF PROOF NET WORTH METHOD Used to prove illicit income Person’s assets or expenditures exceed known sources of income 4 ways to dispose income: Save it Buy assets Pay off debt Spend it 25 INDIRECT METHODS OF PROOF NET WORTH METHOD FORMULA Assets -Liabilities =Net worth -Prior year’s net worth =Increase in net worth +Living expenses =Income (or expenditures) -Funds from known sources =Funds from unknown sources 26 INDIRECT METHODS OF PROOF EXPENDITURE METHOD CLUES Lavish residence Expensive cars/boats Vacation home Exotic vacations WHEN TO USE...WHEN TARGET Operates mostly on a cash basis Little or no net worth but large expenditures Little or no change in assets or liabilities 27 INDIRECT METHODS OF PROOF BANK DEPOSIT METHOD WHEN TO USE Assets & liabilities are fairly constant No indications of extravagant lifestyle Target’s known income is being deposited into financial institutions HOW Analyze bank deposits, cancelled checks, currency transactions 28 INDIRECT METHODS OF PROOF BANK DEPOSIT METHOD FORMULA Total deposits to all accounts -Transfer and redeposits =Net deposits to all accounts +Cash expenditures =Total receipts from all sources -Funds from known sources =Funds from unknown or illegal sources 29 DIGITAL ANALYSIS TECHNIQUES SOFTWARE PROGRAMS PERFORM DATA MINING Extracting information from databases Comb DB for obscure patterns Sort data to detect potential fraud same address for two employees DATA ANALYTICS Statistical process used to analyze data Identify red flags, transaction trends, patterns, anomalies 30 DIGITAL ANALYSIS TECHNIQUES FUNCTIONS Sorting Record selection Joining files Multi-file processing Correlation analysis Date functions Graphing Verifying multiples of a number Compliance verification Duplicate searches Vertical ratio analysis Horizontal ratio analysis DIGITAL ANALYSIS TECHNIQUES FUNCTIONS Data file inquiry Random unit sampling Calculate totals Calculate averages Specific criteria searches Unusual item inquiries Link analysis graphics Identify gaps in sequence Identify duplicates Differentiate normal patterns from suspect patterns Benford’s Law analysis Stratification DIGITAL ANALYSIS TECHNIQUES EXAMPLES Identify invoices w/o PO Look for invoices from vendors not “approved” Analyze claims paid by insurance providers Look for high volume purchases from one vendor Match names, addresses, phone numbers, numbers between employee and vendor files Identify dormant accounts with activity Search for large, rounded transaction values DIGITAL ANALYSIS TECHNIQUES COMMERCIAL SOFTWARE Excel ACL IDEA Active Data for Excel Auto Audit SNAP! Reporter Data Watch’s Monarch for Windows Oversight Systems