Forensic Accounting Chapter 16

Slides:



Advertisements
Similar presentations
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Advertisements

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Chapter © 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
FORENSIC ACCOUNTING - BA124 – Spring 2010Slide 9-1 Today’s Topics n Why Studying Conversion is Important n Sources of Information n The Role of Net Worth.
Zimbelman, Albrecht, Albrecht, Albrecht © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
FORENSIC ACCOUNTING - BA124 – Fall 2011Slide 9-1 Today’s Topics n Why Studying Conversion is Important n Sources of Information n The Role of Net Worth.
© 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
© 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Investigative Techniques for the general Practitioner? Erik H. Lindquist, CFE Presenter National Society of Accountants Fall Webinar Series September 17,
Fraud Examination, 3E Chapter 9: Conversion Investigation Methods COPYRIGHT © 2009 South-Western, a part of Cengage Learning.
FORENSIC ACCOUNTING - BA124 – Spring 2015 Today’s Topics n Concealment Investigation Methods.
Zimbelman, Albrecht, Albrecht, Albrecht © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Prepared by: C. Douglas Cloud Professor Emeritus of Accounting Pepperdine University © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned,
World Trade Equilibrium CHAPTER 20 © 2016 CENGAGE LEARNING. ALL RIGHTS RESERVED. MAY NOT BE COPIED, SCANNED, OR DUPLICATED, IN WHOLE OR IN PART, EXCEPT.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Elasticity: Demand and Supply CHAPTER 6 © 2016 CENGAGE LEARNING. ALL RIGHTS RESERVED. MAY NOT BE COPIED, SCANNED, OR DUPLICATED, IN WHOLE OR IN PART, EXCEPT.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
The Wealth of Nations : Ownership and Economic Freedom CHAPTER 1 © 2016 CENGAGE LEARNING. ALL RIGHTS RESERVED. MAY NOT BE COPIED, SCANNED, OR DUPLICATED,
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Zimbelman, Albrecht, Albrecht, Albrecht © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Chapter 7: Investigating Theft Acts
Forensic Accounting Chapter 4
Fraud Examination Chapter 12
Chapter 3: Fighting Fraud: An Overview
Cornerstones of Managerial Accounting, 6e
Fraud Examination Chapter 8
Chapter 13: Liability, Asset, and Inadequate Disclosure Frauds
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT
CHAPTER 5 Inflation: Who Wins, and Who Loses?
ELC 200 Day 6 Exam Day © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part,
Chapter 2: Why People Commit Fraud
Introduction to Accounting and Business
CHAPTER 13 Fiscal Policy and Automatic Stabilizers: What Managers Need to Know © 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned,
CHAPTER 11 Interest Rates and Why They Change
CHAPTER 10 The Economics of Virtual Currencies
CHAPTER 18 Economic Shocks to Nations with Flexible Exchange Rates
Technological, Legal, and Ethical Considerations
CHAPTER 4 CHAPTER 4 Inflation, Real GDP, And Business Cycles
Chapter 20 Causes, Curses, and Consequences of the Great Recession
Economic Shocks to Nations with Fixed Exchange Rates
Putting it All Together
CHAPTER 8 The Power of Financial Institutions to Create Money
Critical Factors for New-Venture Development
CHAPTER 14 Basics of Foreign Exchange Markets
Balance of Payments Fundamentals
CHAPTER 2 Taking an Economic Pulse: Measuring National Output and Income © 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned,
CHAPTER 1 Introduction to International Macroeconomics
CHAPTER 12 Price and Output Fluctuations
CHAPTER 3 Understanding and Monitoring Labor Market Conditions
Monetary Aggregates: Measuring Money
CHAPTER 7 Financial Intermediation, Markets and Intermediaries
CHAPTER 9 Who Controls the Money Supply and How?
Shelly Cashman: Microsoft Access 2016
Presentation transcript:

Forensic Accounting Chapter 16 Conversion Investigation Methods © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

To the Student The Phar-Mor case at the beginning of this chapter is a classic fraud case. As you read this case and the rest of the chapter, consider ways in which fraudsters spend the money they embezzle. If you had a seemingly easy source of money, where would you spend it? Where would those you know spend it? How would you as an investigator discover these purchases? © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Learning Objectives Explain why finding out how perpetrators convert and spend their stolen funds is important. Understand how federal, state, and local public records can assist in following the financial “tracks” of suspected perpetrators. Access information via the Internet to assist in the investigation of a suspected fraud perpetrator. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Learning Objectives Perform net worth calculations on suspected fraud perpetrators and understand how net worth calculations are effective in court and in obtaining confessions. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Conversion Searches Performed for two reasons: to determine the extent of embezzlement to gather evidence that can be used in interrogations to obtain a confession © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Conversion Searches Information can be gleaned from: federal, state, and local agencies and other organizations private sources of information online sources of information using the net worth method of analyzing spending information © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Conversion Searches © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Private Sources of Information Utility records (gas, electric, water, garbage, and sewer Private Acquaintances “Trashing” Shredded documents Original files on computers Be sure you have the legal rights to gather and use the information © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Online Databases Accurint AutoTrackXP Black Book Online ChoicePoint EBSCO Publishing PublicData Public Record Finder SEC’s EDGAR Database Web Detective © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

The Net Worth Method Assets – Liabilities = Net Worth Net Worth – Prior Year’s Net Worth = Net Worth Increase Net Worth Increase + Living Expenses = Income Income – Funds from Known Sources = Funds from Unknown Sources © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

The Net Worth Asset Method © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.