chapter 10 using information technology for fraud examination and financial forensics

32
Chapter 10 Using Information Technology for Fraud Examination and Financial Forensics

Upload: derick-taylor

Post on 24-Dec-2015

285 views

Category:

Documents


11 download

TRANSCRIPT

Chapter 10

Using Information Technology

for Fraud Examination and

Financial Forensics

Critical Thinking Exercise

A married couple goes to a movie. During the movie the husband strangles the wife. He is able to get her body home without attracting attention. How is this possible?

The Digital Environment

• “Garbage-in, garbage-out”

• Maintain data integrity

• Be able to prove origins and credibility of the data

Overview of Information Technology Controls

• IT audit– Planning– Tests of controls– Substantive tests

• Computer-Aided Audit Tools and Techniques (CAATT)• Application controls– Source documents– Data coding controls– Batch controls– Validation controls– Record validation– Examination of application input system

Overview of Information Technology Controls

• Processing controls– Ensure processed data maintains its integrity as it

moves within the system

• Output controls– Spooling– Print programs and bursting– Monitor waste– Identify responsibility

Overview of Information Technology Controls

• General framework for viewing IT risks and controls– IT operations– Data management systems– New systems development and integration– Systems maintenance– Systems back-up and contingency planning– Electronic commerce– Control over computer operations

IT Audits and Assurance Activities• Black box approach– Develop understanding of the system– Test integrity of data and system

• White box approach– System walk-throughs (tracing)– Authenticity– Accuracy– Completeness– Redundancy– Access audit trail– Rounding error test

IT Audits and Assurance Activities

• IT systems personnel may be colluding to conceal fraud

• Few understand information technology

• IT professional may substitute inappropriate version of software to alter data

• IT auditor must ensure entire control environment is examined

Digital Evidence• Digital evidence analysis helps sift through,

organize and analyze large amounts of evidence– Must be examined with speed and accuracy

• Electronic Imaging• Computer forensics• Warrant or subpoena required to obtain digital

evidence– Probable cause

• Initial acquisition• Maintain good work papers

Tools Used to Gather Digital Evidence• Road MASSter– Portable computer forensic lab– Acquire and analyze electronic data– Preview and image hard drives– Completely remove and erase stored files and

programs from hard drives• EnCase– Investigate and analyze data in multiple platforms– Identify information despite efforts to hide, cloak

or delete data– Manage large volumes of computer evidence

Recovering Deleted Files• Deleted files aren’t removed from hard drive• Until computer reuses space where file

resides, the data in the file will remain intact• Defrag command– Reorganize hard drive for more efficient data

storage

• Undelete software– Searches for clues as to the locations of the disk

space where the deleted file resides– Examine unallocated disk space

Recovering Deleted Email• Emails are stored in mail folders• Each folder is considered a separate file• Prior to compaction, deleted emails may be

recovered using software• E-discovery rules require organizations to

provide electronic files going back in time– Probability of deleted email recovery is greatly

enhanced

Restoring Data• More sophisticated approach• Restore lost files under more challenging

circumstances• Stop writing to drive to increase probability of

recovering data• High security or privacy software make the

chance of restoring files non-existent• Manual restoration is sometimes needed– Cost-benefit analysis

Detection and Investigation in a Digital Environment

• Must have understanding of what could go wrong

• Targeted approach required• “Flat file”– Sequential, indexed, hashing and pointer file

structures

• “Hierarchical and network database”– Relational

• “Rifle shot approach”

Data Extraction and Analysis Software Functions

• Sorting• Record selection and extraction• Joining files• Multi-file processing• Correlation analysis• Verifying multiples of a number• Compliance verification• Duplicate searches• Vertical ratio analysis• Horizontal ration analysis• Date functions• Recalculations• Transactions and balances exceeding expectations

Data Extraction and Analysis Software

• Choose based on individual case• Which is most appropriate for current

investigation?• Two categories of data mining and knowledge

discovery software– Public domain/shareware/freeware– Commercial applications

IDEA data Analysis Software• Interactive Data Extraction & Analysis• Generalized audit software• Imports data in differing file formats• Examine file statistics and observe raw data

values underlying those statistics• Bender’s Law analyses• Compare and recalculate invoices• Helps organize work

ACL• Audit Control Language• Audit analytics and continuous monitoring software• Ensure internal controls compliance• Investigate and detect fraudulent activity• Continuous auditing• Independent verification of transactional data• ACL uses in digital environment– Audit analytics– Continuous auditing and monitoring– Fraud detection and investigation– Regulatory compliance– Secure data access

Picalo• Data extraction and analysis tools• Used to analyze– Financial information– Employee records– Purchasing systems– Accounts receivable and payables– Sales– Inventory systems

• Can be programmed to– analyze network activities– web server logs– system login records – import email into relational or text-based databases

Graphics and Graphics Software• Most people are overwhelmed by a page of

numbers• Three roles in an investigation– Investigative tool– Identify holes– Communicate investigative findings, conclusions and

results• Types of graphics software– The association matrix– Link charts– Flow Diagrams– Time Lines

The Association Matrix• Identifies major players who are central to an

investigation• Identify linkages between those players• Starting point for reflecting important data in

a simplified format• Helps investigator visually see important links

The Association Matrix

Link Charts• More complex than association matrices• Graphically represent important relationships– Linkages between people, businesses and

“organizations”

• Create graphic representation of known and suspected associations that are involved in criminal activity

Link Charts

Flow Diagrams• Analyze movement of events, activities and

commodities• Discover meaning of activities and their

importance to the investigation

Flow Diagram

Timeline

• Chronologically organize information about events or activities

• Help determine what has or may have occurred and the impact those actions had

Timeline

Other Graphical Formats

Case Management Software• Manage cases and case data• Organize case data in meaningful ways• Present information for use in reports or

during testimony• Used to initiate investigations• Case management software tools– Analyst’s Notebook i2– Lexis-Nexis CaseMap

Analyst’s Notebook i2

• Visualize complex schemes• Organize and analyze large volumes of

seemingly unrelated data• Bring clarity to complex investigations,

schemes and scenarios• Increase evidence management efficiency

Lexis-Nexis CaseMap• Central repository for case knowledge• Organize information, facts, evidence,

documents, people, case issues and applicable law

• Evaluates relationships between different attributes of the case information

• TimeMap• TextMap• NoteMap• DepMap