360 likes | 467 Views
Explore the areas of specialty and methods of proof in forensic accounting. Learn about the process map and scoping of engagements for legal purposes, including fraud, money laundering, and financial reporting fraud. Discover the methods of direct and indirect proof with financial statement analysis and cash flow methods.
E N D
Forensic Accounting and Digital Forensics CA. Charanjot Singh Nanda Central Council Member, ICAI Chairman, Internal Audit Standards Board & Chairman, Committee for Members in IndustryThe Institute of Chartered Accountants of India
FORENSIC ACCOUNTING • Use of accounting for legal purposes. • Use of intelligence-gathering techniques & accounting to develop information & opinion for use in civil litigation. • Identifying, recording, settling, extracting, sorting, reporting, and verifying past financial data or other accounting activities for settling prospective legal disputes or using such past financial data for projecting future financial data to settle legal disputes.
AREAS OF SPECIALITY • Bribery and Corruption • Fraud and Misconduct • Breach of Company Procedures • Ponzi and other Investment Schemes • Conflict of Interest • Money Laundering • Embezzlement and Misappropriation • Financial Reporting Fraud • Procurement Fraud
Assignment Development • Identify parties to the case, Co-relate matters of law, Confirm technical capabilities • Ensure matching of expectations • Prepare and secure engagement letter • Establish concrete timelines, e.g., discovery cut off, report submission, etc., • Establish communication protocol
Scoping of Engagement • Continually define/ refine universe of data, primary and secondary • Initiate data collection processes • Prepare Document Request(s) as necessary • Establish protocol to manage data requested and obtained
Interviews and Interrogations • Gain confidence of parties & obtain information from parties • Background investigation on identified parties • Use interpersonal communication techniques to analyse responses for further investigation • Prepare interview matrix • Check for • Hidden agenda of parties • Blind leads • Communication inhibitors
Background Research • Combine first-hand knowledge (e.g., Interviews and Depositions) with second-hand knowledge (e.g., Background Research data) • See “Online Databases – Sources of Information” • See “Government Sources of Information” • Identify disparities for additional investigation
Data Collection & Analysis • Missing information • Privacy laws • Unreliable informant / Inconclusive information • Entrapment • Engagement/personal risks
Data Collection & Analysis • Perform any additional indirect or direct analytical forensic techniques as needed • Validate / correlate prior data obtained through alternate techniques • Genogram/Entity / Party Chart • Deposition Matrix/Interview Matrix • Search Log/Background Investigation • Lifestyles Analysis • Net Worth Method
Analysis of Transactions • Summarize and analyze the findings of all deliverables and observations • Obtain sufficient relevant data to provide credible evidence • Identify any missing information or “gaps” • DRAFT the Forensic Accountant’s Report
METHODS OF PROOF • DIRECT METHODS • SPECIFIC ITEM METHOD • FINANCIAL RELATIONSHIPS • FINANCIAL STATEMENT ANALYSIS • HORIZONTAL • VERTICAL • TREND • RATIO • CASH FLOW
METHODS OF PROOF • INDIRECT METHODS • NET WORTH METHOD • (ASSET METHOD) • EXPENDITURES METHOD • (LIFESTYLES METHOD) • (SOURCES AND APPLICATION OF FUNDS METHOD) • BANK DEPOSIT METHOD
METHODS OF PROOF • Information for specific industries • Learn distinct , detailed practices in a particular industry • Examination techniques • Common & unique industry issues • Business practices • Terminology • Example of market segments: • Construction or entertainment industry • Professions: lawyers or real estate agents
METHODS OF PROOF Direct-Specific item method • Most common method • Relies on specific transactions • Uncovers specific financial transactions which relate to illegal activity, and to the suspect • Review books, records, bank accounts - directly traces a transaction • Direct (vs circumstantial) proof
METHODS OF PROOF • Easiest to present @ trial • Most difficult for the suspect to refute • Example: Ghost employee on the payroll
FINANCIAL RELATIONSHIPS • SALES VERSUS COST OF GOOD SOLD • SALES VERSUS ACCOUNTS RECEIVABLE • SALES VERSUS INVENTORY • ASSETS VERSUS LIABILITIES
FINANCIAL STATEMENT FRAUD • FICTITIOUS REVENUES • TIMING DIFFERENCES • CONCEALED LIABILITIES AND EXPENSES • IMPROPER DISCLOSURES • IMPROPER ASSET VALUATION
FINANCIAL STATEMENT ANALYSIS • PERCENTAGE ANALYSIS • HORTIZONAL • PERIOD TO PERIOD • INDUSTRY STANDARDS • COMPETITORS • VERTICAL • COMMON SIZE STATEMENTS • TREND ANALYSIS
FINANCIAL STATEMENT ANALYSIS • RATIO ANALYSIS • LIQUIDITY • ASSET MANAGEMENT • DEBT MANAGEMENT • PROFITABILITY
FINANCIAL STATEMENT ANALYSIS • CASH FLOW ANALYSIS • OPERATING • INVESTING • FINANCING
INDIRECT METHODS OF PROOF • CIRCUMSTANTIAL PROOF • Inadequate books/records • Suspected: books do not reflect all income • Significant increase in net worth • Gross profit % changes significantly • Expenses exceed reported income without cause • Suspected income from unidentified sources is large
INDIRECT METHODS OF PROOF SOURCES OF INFORMATION • Deeds of ownership, titles, liens, filings • The target • Informants/associates • Real estate records • Bankruptcy records • State motor vehicle records • Surveillance • Credit card applications/statements • Tax returns • Insurance records • Employment records • Cancelled checks • Deposit slips • Loan Applications
INDIRECT METHODS OF PROOF • NET WORTH METHOD • Used to prove illicit income • Person’s assets or expenditures exceed known sources of income • 4 ways to dispose income: • Save it • Buy assets • Pay off debt • Spend it Used extensively in drug & money laundering cases
INDIRECT METHODS OF PROOF • NET WORTH METHOD FORMULA Assets -Liabilities =Net worth -Prior year’s net worth =Increase in net worth +Living expenses =Income (or expenditures) -Funds from known sources =Funds from unknown sources
INDIRECT METHODS OF PROOF • EXPENDITURE METHOD • CLUES • Lavish residence • Expensive cars/boats • Vacation home • Exotic vacations • WHEN TO USE...WHEN TARGET • Operates mostly on a cash basis • Little or no net worth but large expenditures • Little or no change in assets or liabilities
INDIRECT METHODS OF PROOF • BANK DEPOSIT METHOD • WHEN TO USE • Assets & liabilities are fairly constant • No indications of extravagant lifestyle • Target’s known income is being deposited into financial institutions • HOW • Analyze bank deposits, cancelled checks, currency transactions
INDIRECT METHODS OF PROOF • BANK DEPOSIT METHOD FORMULA Total deposits to all accounts -Transfer and redeposits =Net deposits to all accounts +Cash expenditures =Total receipts from all sources -Funds from known sources =Funds from unknown or illegal sources
DIGITAL ANALYSIS TECHNIQUES • SOFTWARE PROGRAMS PERFORM • DATA MINING • Extracting information from databases • Comb DB for obscure patterns • Sort data to detect potential fraud • same address for two employees • DATA ANALYTICS • Statistical process used to analyze data • Identify red flags, transaction trends, patterns, anomalies
DIGITAL ANALYSIS TECHNIQUES FUNCTIONS • Sorting • Record selection • Joining files • Multi-file processing • Correlation analysis • Date functions • Graphing • Verifying multiples of a number • Compliance verification • Duplicate searches • Vertical ratio analysis • Horizontal ratio analysis
DIGITAL ANALYSIS TECHNIQUES FUNCTIONS • Data file inquiry • Random unit sampling • Calculate totals • Calculate averages • Specific criteria searches • Unusual item inquiries • Link analysis graphics • Identify gaps in sequence • Identify duplicates • Differentiate normal patterns from suspect patterns • Benford’s Law analysis • Stratification
DIGITAL ANALYSIS TECHNIQUES EXAMPLES • Identify invoices w/o PO • Look for invoices from vendors not “approved” • Analyze claims paid by insurance providers • Look for high volume purchases from one vendor • Match names, addresses, phone numbers, numbers between employee and vendor files • Identify dormant accounts with activity • Search for large, rounded transaction values
DIGITAL ANALYSIS TECHNIQUES COMMERCIAL SOFTWARE • Excel • ACL • IDEA • Active Data for Excel • Auto Audit • SNAP! Reporter • Data Watch’s Monarch for Windows • Oversight Systems