320 likes | 446 Views
Chapter 10. Using Information Technology for Fraud Examination and Financial Forensics. Critical Thinking Exercise. A married couple goes to a movie. During the movie the husband strangles the wife. He is able to get her body home without attracting attention. How is this possible?.
E N D
Chapter 10 Using Information Technology for Fraud Examination and Financial Forensics
Critical Thinking Exercise A married couple goes to a movie. During the movie the husband strangles the wife. He is able to get her body home without attracting attention. How is this possible?
The Digital Environment • “Garbage-in, garbage-out” • Maintain data integrity • Be able to prove origins and credibility of the data
Overview of Information Technology Controls • IT audit • Planning • Tests of controls • Substantive tests • Computer-Aided Audit Tools and Techniques (CAATT) • Application controls • Source documents • Data coding controls • Batch controls • Validation controls • Record validation • Examination of application input system
Overview of Information Technology Controls • Processing controls • Ensure processed data maintains its integrity as it moves within the system • Output controls • Spooling • Print programs and bursting • Monitor waste • Identify responsibility
Overview of Information Technology Controls • General framework for viewing IT risks and controls • IT operations • Data management systems • New systems development and integration • Systems maintenance • Systems back-up and contingency planning • Electronic commerce • Control over computer operations
IT Audits and Assurance Activities • Black box approach • Develop understanding of the system • Test integrity of data and system • White box approach • System walk-throughs (tracing) • Authenticity • Accuracy • Completeness • Redundancy • Access audit trail • Rounding error test
IT Audits and Assurance Activities • IT systems personnel may be colluding to conceal fraud • Few understand information technology • IT professional may substitute inappropriate version of software to alter data • IT auditor must ensure entire control environment is examined
Digital Evidence • Digital evidence analysis helps sift through, organize and analyze large amounts of evidence • Must be examined with speed and accuracy • Electronic Imaging • Computer forensics • Warrant or subpoena required to obtain digital evidence • Probable cause • Initial acquisition • Maintain good work papers
Tools Used to Gather Digital Evidence • Road MASSter • Portable computer forensic lab • Acquire and analyze electronic data • Preview and image hard drives • Completely remove and erase stored files and programs from hard drives • EnCase • Investigate and analyze data in multiple platforms • Identify information despite efforts to hide, cloak or delete data • Manage large volumes of computer evidence
Recovering Deleted Files • Deleted files aren’t removed from hard drive • Until computer reuses space where file resides, the data in the file will remain intact • Defrag command • Reorganize hard drive for more efficient data storage • Undelete software • Searches for clues as to the locations of the disk space where the deleted file resides • Examine unallocated disk space
Recovering Deleted Email • Emails are stored in mail folders • Each folder is considered a separate file • Prior to compaction, deleted emails may be recovered using software • E-discovery rules require organizations to provide electronic files going back in time • Probability of deleted email recovery is greatly enhanced
Restoring Data • More sophisticated approach • Restore lost files under more challenging circumstances • Stop writing to drive to increase probability of recovering data • High security or privacy software make the chance of restoring files non-existent • Manual restoration is sometimes needed • Cost-benefit analysis
Detection and Investigation in a Digital Environment • Must have understanding of what could go wrong • Targeted approach required • “Flat file” • Sequential, indexed, hashing and pointer file structures • “Hierarchical and network database” • Relational • “Rifle shot approach”
Data Extraction and Analysis Software Functions • Sorting • Record selection and extraction • Joining files • Multi-file processing • Correlation analysis • Verifying multiples of a number • Compliance verification • Duplicate searches • Vertical ratio analysis • Horizontal ration analysis • Date functions • Recalculations • Transactions and balances exceeding expectations
Data Extraction and Analysis Software • Choose based on individual case • Which is most appropriate for current investigation? • Two categories of data mining and knowledge discovery software • Public domain/shareware/freeware • Commercial applications
IDEA data Analysis Software • Interactive Data Extraction & Analysis • Generalized audit software • Imports data in differing file formats • Examine file statistics and observe raw data values underlying those statistics • Bender’s Law analyses • Compare and recalculate invoices • Helps organize work
ACL • Audit Control Language • Audit analytics and continuous monitoring software • Ensure internal controls compliance • Investigate and detect fraudulent activity • Continuous auditing • Independent verification of transactional data • ACL uses in digital environment • Audit analytics • Continuous auditing and monitoring • Fraud detection and investigation • Regulatory compliance • Secure data access
Picalo • Data extraction and analysis tools • Used to analyze • Financial information • Employee records • Purchasing systems • Accounts receivable and payables • Sales • Inventory systems • Can be programmed to • analyze network activities • web server logs • system login records • import email into relational or text-based databases
Graphics and Graphics Software • Most people are overwhelmed by a page of numbers • Three roles in an investigation • Investigative tool • Identify holes • Communicate investigative findings, conclusions and results • Types of graphics software • The association matrix • Link charts • Flow Diagrams • Time Lines
The Association Matrix • Identifies major players who are central to an investigation • Identify linkages between those players • Starting point for reflecting important data in a simplified format • Helps investigator visually see important links
Link Charts • More complex than association matrices • Graphically represent important relationships • Linkages between people, businesses and “organizations” • Create graphic representation of known and suspected associations that are involved in criminal activity
Flow Diagrams • Analyze movement of events, activities and commodities • Discover meaning of activities and their importance to the investigation
Timeline • Chronologically organize information about events or activities • Help determine what has or may have occurred and the impact those actions had
Case Management Software • Manage cases and case data • Organize case data in meaningful ways • Present information for use in reports or during testimony • Used to initiate investigations • Case management software tools • Analyst’s Notebook i2 • Lexis-Nexis CaseMap
Analyst’s Notebook i2 • Visualize complex schemes • Organize and analyze large volumes of seemingly unrelated data • Bring clarity to complex investigations, schemes and scenarios • Increase evidence management efficiency
Lexis-Nexis CaseMap • Central repository for case knowledge • Organize information, facts, evidence, documents, people, case issues and applicable law • Evaluates relationships between different attributes of the case information • TimeMap • TextMap • NoteMap • DepMap