SlideShare a Scribd company logo
1 of 16
Chapter Nine
Fraud Examination
Presented by Kirsty Peterson
5th August 2013
Conversion Investigation Methods
Learning Objectives
 Explain why it is important to find out how perpetrators
convert and spend their stolen funds
 Understand how public records can assist in following
the financial “tracks” of suspected perpetrators
 Access information from the internet to assist in an
investigation
 Perform net worth calculations on suspected
perpetrators and understand how they are effective in
court and in obtaining confessions
Spending Stolen Funds
 “With few exceptions, perpetrators spend what they
steal. Because of this, looking at spending patterns is a
primary investigation technique”
(Albrecht, Albrecht, Albrecht, & Zimbelman, 2012)
 “Whether driving his Lamborghini, cruising on his luxury
boat in Fiji, or relaxing in his antique-furnished historic
homestead, Michael Swann made no secret of his high-
flying lifestyle”
(“How Mr Money Bags got rich”, 2008)
Fraud Motivation
Conversion Searches
Conversion searches are performed for two reasons:
1. To determine the extent of the embezzlement, and
2. To gather evidence that can be used in interrogations
to obtain a confession
 The most common technique used to investigate and
resolve fraud is by interviewing. By providing evidence of
lifestyle and expenditures that cannot be supported by
earned income, cornered suspects may breakdown and
confess.
Conversion Searches
Information can be gathered from:
1. Government, council and other public organisations
2. Private sources of information
3. Online sources of information
4. Using the net worth method of analysing information
Conversion Searches
Public Records
Government
Central
Local
Private Sources
Acquaintances
Trash cover
Credit agencies
Online Database
Subscription
Per-search fee
Free
Internet Searches
Google
Yahoo! etc
Government and Public Sources
 Electoral Roll Post Office or Library
 Companies Office www.business.govt.nz/companies
 Local Councils e.g. www.rdc.govt.nz
 Land Info NZ www.linz.govt.nz
 Min. Economic Dev. www.insolvency.govt.nz
 Personal Property www.ppsr.govt.nz
Securities Register
While some information can be obtained by anyone who requests it, other
information is covered by privacy laws (such as the Privacy Act 1993) and
requires authorisation
Online Sources
Examples:
 www.veda.co.nz
 www.dnb.co.nz
 www.carjam.co.nz
 www.terranet.co.nz
 www.lexisnexis.com
Private Sources
 Private acquaintances
 “Trashing”
 Shredded documents
 Original files on computers
Be sure you have the legal rights to gather and use the information
Internet Searches
 Google
 Search by phrase
 Minus search terms
 Domain restrictions
 Google Groups
 Cached Results
 Google Images
 Google Earth
 Yahoo!
Net Worth Calculations
1. Assets – Liabilities
= Net Worth
2. Net Worth
– Prior Years Net Worth
= Net Worth Increase
3. Net Worth Increase
+ Living Expenses
= Income
4. Income
– Funds from Known Sources
= Funds from Unknown Sources
Net Worth Example
Financial Data for Joe Blogs 2012 2013 Financial Data for Joe Blogs 2011 2012 2013
Income Assets
Salary 39,000 41,000 Dwelling 250,000 250,000 250,000
Vehicle 20,000 20,000 60,000
Expenses Cash at bank 1,000 5,000 15,000
Mortgage repayments 10,000 10,000 Total Assets 271,000 275,000 325,000
Vehicle loan repayments 3,000 3,000
Living expenses 15,000 16,000 Liabilities
28,000 29,000 Mortgage 200,000 195,000 141,000
Vehicle loan 10,000 8,000 -
Total Liabilities 210,000 203,000 141,000
Net Worth 61,000 72,000 184,000
Change in net worth 11,000 112,000
Plus living expenses 28,000 29,000
Total income 39,000 141,000
Less known Income 39,000 41,000
Income from unknown sources - 100,000
Summary
 Discovering how perpetrators convert and spend their
funds is an important investigation technique
 Government and other public records are important
sources of information about the financial “tracks” of
suspected perpetrators
 Private and online sources of information are important
sources of information during an investigation
 Net worth calculations are effective in court and in
obtaining confessions from suspected perpetrators
Questions
References
1. Albrecht, W.S., Albrecht, C.O., Albrecht, C.C., & Zimbelman, M.F. (2012).
Fraud Examination (4th Ed.). Mason, OH: South-Western.
2. Akuhatawhare, W. (2011, October 6). Te Puia ticket seller was stealing
more than $1000 a day. The New Zealand Herald. Retrieved from
http://www.nzherald.co.nz.
3. Granny avoids jail term for Te Puia theft. (2012, June 22). 3 News.
Retrieved from http://www.3news.co.nz.
4. Hartevelt, A. (2011, November 11). Jail term for theft at Te Puia.
Rotorua Daily Post. Retrieved from http://www.rotoruadailypost.co.nz.
5. How Mr Money Bags got rich by robbing the sick. (2008, December 13).
Otago Daily Times. Retrieved from http://www.nzherald.co.nz.
6. KPMG. (2013). A survey of fraud, bribery and corruption in Australia &
New Zealand 2012. Retrieved from http://www.kpmg.com/au.

More Related Content

Viewers also liked

[Ebook] edicions upc antenas - spanish español
[Ebook] edicions upc   antenas - spanish español[Ebook] edicions upc   antenas - spanish español
[Ebook] edicions upc antenas - spanish españolGODOFREDO SANCHEZ JANAMPA
 
Test slideshow
Test slideshowTest slideshow
Test slideshowmadamos0
 
Chapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by RachelChapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by RachelVidaB
 
Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen VidaB
 
Chapter 1 the nature of fraud
Chapter 1 the nature of fraudChapter 1 the nature of fraud
Chapter 1 the nature of fraudVidaB
 
Social styles 2013 sspdd april bu
Social styles 2013 sspdd april buSocial styles 2013 sspdd april bu
Social styles 2013 sspdd april bumadamos0
 
Brief history of Australian Shoes
Brief history of Australian ShoesBrief history of Australian Shoes
Brief history of Australian ShoesCameron Kippen
 

Viewers also liked (7)

[Ebook] edicions upc antenas - spanish español
[Ebook] edicions upc   antenas - spanish español[Ebook] edicions upc   antenas - spanish español
[Ebook] edicions upc antenas - spanish español
 
Test slideshow
Test slideshowTest slideshow
Test slideshow
 
Chapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by RachelChapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by Rachel
 
Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen
 
Chapter 1 the nature of fraud
Chapter 1 the nature of fraudChapter 1 the nature of fraud
Chapter 1 the nature of fraud
 
Social styles 2013 sspdd april bu
Social styles 2013 sspdd april buSocial styles 2013 sspdd april bu
Social styles 2013 sspdd april bu
 
Brief history of Australian Shoes
Brief history of Australian ShoesBrief history of Australian Shoes
Brief history of Australian Shoes
 

Similar to Conversion investigation methods

100 Successful College Application Essays By Ano
100 Successful College Application Essays By Ano100 Successful College Application Essays By Ano
100 Successful College Application Essays By AnoRuth Uithoven
 
5 How To Make A Payroll Check Stu. Online assignment writing service.
5 How To Make A Payroll Check Stu. Online assignment writing service.5 How To Make A Payroll Check Stu. Online assignment writing service.
5 How To Make A Payroll Check Stu. Online assignment writing service.Liz Brown
 
United States Secret Service: Protecting the Nation's Leaders and Financial I...
United States Secret Service: Protecting the Nation's Leaders and Financial I...United States Secret Service: Protecting the Nation's Leaders and Financial I...
United States Secret Service: Protecting the Nation's Leaders and Financial I...Trustwave
 
What is Money Laundering - An Introduction
What is Money Laundering - An Introduction What is Money Laundering - An Introduction
What is Money Laundering - An Introduction Peter Lilley
 
Abstract Examples For Research Papers. How To
Abstract Examples For Research Papers. How ToAbstract Examples For Research Papers. How To
Abstract Examples For Research Papers. How ToMandy Froemming
 
Writing Analysis Essay. Online assignment writing service.
Writing Analysis Essay. Online assignment writing service.Writing Analysis Essay. Online assignment writing service.
Writing Analysis Essay. Online assignment writing service.Connie Johnson
 
Armour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explainedArmour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explainedHelena Martin
 
Slavery In America Essay Thesis. Online assignment writing service.
Slavery In America Essay Thesis. Online assignment writing service.Slavery In America Essay Thesis. Online assignment writing service.
Slavery In America Essay Thesis. Online assignment writing service.Deb Reaser
 
IELTS Essay Writing Tips Mindmineglobal.Com S
IELTS Essay Writing Tips Mindmineglobal.Com SIELTS Essay Writing Tips Mindmineglobal.Com S
IELTS Essay Writing Tips Mindmineglobal.Com SMelissa Kula
 
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxouldparis
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
When I Look Back To My First Experi
When I Look Back To My First ExperiWhen I Look Back To My First Experi
When I Look Back To My First ExperiJenna Caldejon
 
Virtual currencies emerging regulatory, law enforcement, and consumer protect...
Virtual currencies emerging regulatory, law enforcement, and consumer protect...Virtual currencies emerging regulatory, law enforcement, and consumer protect...
Virtual currencies emerging regulatory, law enforcement, and consumer protect...Dmitry Tseitlin
 
Higher French Short Essay Questions. Online assignment writing service.
Higher French Short Essay Questions. Online assignment writing service.Higher French Short Essay Questions. Online assignment writing service.
Higher French Short Essay Questions. Online assignment writing service.Marissa Collazo
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
How To Teach Paragraph Writing P. Online assignment writing service.
How To Teach Paragraph Writing  P. Online assignment writing service.How To Teach Paragraph Writing  P. Online assignment writing service.
How To Teach Paragraph Writing P. Online assignment writing service.Angie Lee
 
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...Atmos
 
Hemisphere Database
Hemisphere DatabaseHemisphere Database
Hemisphere Databasecherazigzag
 
Eugenics Essay. Online assignment writing service.
Eugenics Essay. Online assignment writing service.Eugenics Essay. Online assignment writing service.
Eugenics Essay. Online assignment writing service.Cierra Leigh
 

Similar to Conversion investigation methods (20)

100 Successful College Application Essays By Ano
100 Successful College Application Essays By Ano100 Successful College Application Essays By Ano
100 Successful College Application Essays By Ano
 
5 How To Make A Payroll Check Stu. Online assignment writing service.
5 How To Make A Payroll Check Stu. Online assignment writing service.5 How To Make A Payroll Check Stu. Online assignment writing service.
5 How To Make A Payroll Check Stu. Online assignment writing service.
 
United States Secret Service: Protecting the Nation's Leaders and Financial I...
United States Secret Service: Protecting the Nation's Leaders and Financial I...United States Secret Service: Protecting the Nation's Leaders and Financial I...
United States Secret Service: Protecting the Nation's Leaders and Financial I...
 
What is Money Laundering - An Introduction
What is Money Laundering - An Introduction What is Money Laundering - An Introduction
What is Money Laundering - An Introduction
 
Abstract Examples For Research Papers. How To
Abstract Examples For Research Papers. How ToAbstract Examples For Research Papers. How To
Abstract Examples For Research Papers. How To
 
Writing Analysis Essay. Online assignment writing service.
Writing Analysis Essay. Online assignment writing service.Writing Analysis Essay. Online assignment writing service.
Writing Analysis Essay. Online assignment writing service.
 
Armour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explainedArmour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explained
 
Slavery In America Essay Thesis. Online assignment writing service.
Slavery In America Essay Thesis. Online assignment writing service.Slavery In America Essay Thesis. Online assignment writing service.
Slavery In America Essay Thesis. Online assignment writing service.
 
IELTS Essay Writing Tips Mindmineglobal.Com S
IELTS Essay Writing Tips Mindmineglobal.Com SIELTS Essay Writing Tips Mindmineglobal.Com S
IELTS Essay Writing Tips Mindmineglobal.Com S
 
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
When I Look Back To My First Experi
When I Look Back To My First ExperiWhen I Look Back To My First Experi
When I Look Back To My First Experi
 
Virtual currencies emerging regulatory, law enforcement, and consumer protect...
Virtual currencies emerging regulatory, law enforcement, and consumer protect...Virtual currencies emerging regulatory, law enforcement, and consumer protect...
Virtual currencies emerging regulatory, law enforcement, and consumer protect...
 
Essay Career Path
Essay Career PathEssay Career Path
Essay Career Path
 
Higher French Short Essay Questions. Online assignment writing service.
Higher French Short Essay Questions. Online assignment writing service.Higher French Short Essay Questions. Online assignment writing service.
Higher French Short Essay Questions. Online assignment writing service.
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
How To Teach Paragraph Writing P. Online assignment writing service.
How To Teach Paragraph Writing  P. Online assignment writing service.How To Teach Paragraph Writing  P. Online assignment writing service.
How To Teach Paragraph Writing P. Online assignment writing service.
 
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...
 
Hemisphere Database
Hemisphere DatabaseHemisphere Database
Hemisphere Database
 
Eugenics Essay. Online assignment writing service.
Eugenics Essay. Online assignment writing service.Eugenics Essay. Online assignment writing service.
Eugenics Essay. Online assignment writing service.
 

More from VidaB

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedVidaB
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce JenVidaB
 
Chapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by EmmaChapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by EmmaVidaB
 
Chapter 16 B Artika
Chapter 16 B ArtikaChapter 16 B Artika
Chapter 16 B ArtikaVidaB
 
Chapter 14 by Svetlana
Chapter 14 by SvetlanaChapter 14 by Svetlana
Chapter 14 by SvetlanaVidaB
 
Chapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosuresChapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosuresVidaB
 
Chapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory FraudChapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory FraudVidaB
 
Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet VidaB
 
Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud VidaB
 
Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud  Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud VidaB
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methodsVidaB
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudVidaB
 
Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud VidaB
 
Week 1 audit and assurance services
Week 1 audit  and assurance servicesWeek 1 audit  and assurance services
Week 1 audit and assurance servicesVidaB
 

More from VidaB (14)

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Chapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by EmmaChapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by Emma
 
Chapter 16 B Artika
Chapter 16 B ArtikaChapter 16 B Artika
Chapter 16 B Artika
 
Chapter 14 by Svetlana
Chapter 14 by SvetlanaChapter 14 by Svetlana
Chapter 14 by Svetlana
 
Chapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosuresChapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosures
 
Chapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory FraudChapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory Fraud
 
Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet
 
Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud
 
Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud  Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraud
 
Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud
 
Week 1 audit and assurance services
Week 1 audit  and assurance servicesWeek 1 audit  and assurance services
Week 1 audit and assurance services
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Conversion investigation methods

  • 1. Chapter Nine Fraud Examination Presented by Kirsty Peterson 5th August 2013 Conversion Investigation Methods
  • 2. Learning Objectives  Explain why it is important to find out how perpetrators convert and spend their stolen funds  Understand how public records can assist in following the financial “tracks” of suspected perpetrators  Access information from the internet to assist in an investigation  Perform net worth calculations on suspected perpetrators and understand how they are effective in court and in obtaining confessions
  • 3. Spending Stolen Funds  “With few exceptions, perpetrators spend what they steal. Because of this, looking at spending patterns is a primary investigation technique” (Albrecht, Albrecht, Albrecht, & Zimbelman, 2012)  “Whether driving his Lamborghini, cruising on his luxury boat in Fiji, or relaxing in his antique-furnished historic homestead, Michael Swann made no secret of his high- flying lifestyle” (“How Mr Money Bags got rich”, 2008)
  • 5. Conversion Searches Conversion searches are performed for two reasons: 1. To determine the extent of the embezzlement, and 2. To gather evidence that can be used in interrogations to obtain a confession  The most common technique used to investigate and resolve fraud is by interviewing. By providing evidence of lifestyle and expenditures that cannot be supported by earned income, cornered suspects may breakdown and confess.
  • 6. Conversion Searches Information can be gathered from: 1. Government, council and other public organisations 2. Private sources of information 3. Online sources of information 4. Using the net worth method of analysing information
  • 7. Conversion Searches Public Records Government Central Local Private Sources Acquaintances Trash cover Credit agencies Online Database Subscription Per-search fee Free Internet Searches Google Yahoo! etc
  • 8. Government and Public Sources  Electoral Roll Post Office or Library  Companies Office www.business.govt.nz/companies  Local Councils e.g. www.rdc.govt.nz  Land Info NZ www.linz.govt.nz  Min. Economic Dev. www.insolvency.govt.nz  Personal Property www.ppsr.govt.nz Securities Register While some information can be obtained by anyone who requests it, other information is covered by privacy laws (such as the Privacy Act 1993) and requires authorisation
  • 9. Online Sources Examples:  www.veda.co.nz  www.dnb.co.nz  www.carjam.co.nz  www.terranet.co.nz  www.lexisnexis.com
  • 10. Private Sources  Private acquaintances  “Trashing”  Shredded documents  Original files on computers Be sure you have the legal rights to gather and use the information
  • 11. Internet Searches  Google  Search by phrase  Minus search terms  Domain restrictions  Google Groups  Cached Results  Google Images  Google Earth  Yahoo!
  • 12. Net Worth Calculations 1. Assets – Liabilities = Net Worth 2. Net Worth – Prior Years Net Worth = Net Worth Increase 3. Net Worth Increase + Living Expenses = Income 4. Income – Funds from Known Sources = Funds from Unknown Sources
  • 13. Net Worth Example Financial Data for Joe Blogs 2012 2013 Financial Data for Joe Blogs 2011 2012 2013 Income Assets Salary 39,000 41,000 Dwelling 250,000 250,000 250,000 Vehicle 20,000 20,000 60,000 Expenses Cash at bank 1,000 5,000 15,000 Mortgage repayments 10,000 10,000 Total Assets 271,000 275,000 325,000 Vehicle loan repayments 3,000 3,000 Living expenses 15,000 16,000 Liabilities 28,000 29,000 Mortgage 200,000 195,000 141,000 Vehicle loan 10,000 8,000 - Total Liabilities 210,000 203,000 141,000 Net Worth 61,000 72,000 184,000 Change in net worth 11,000 112,000 Plus living expenses 28,000 29,000 Total income 39,000 141,000 Less known Income 39,000 41,000 Income from unknown sources - 100,000
  • 14. Summary  Discovering how perpetrators convert and spend their funds is an important investigation technique  Government and other public records are important sources of information about the financial “tracks” of suspected perpetrators  Private and online sources of information are important sources of information during an investigation  Net worth calculations are effective in court and in obtaining confessions from suspected perpetrators
  • 16. References 1. Albrecht, W.S., Albrecht, C.O., Albrecht, C.C., & Zimbelman, M.F. (2012). Fraud Examination (4th Ed.). Mason, OH: South-Western. 2. Akuhatawhare, W. (2011, October 6). Te Puia ticket seller was stealing more than $1000 a day. The New Zealand Herald. Retrieved from http://www.nzherald.co.nz. 3. Granny avoids jail term for Te Puia theft. (2012, June 22). 3 News. Retrieved from http://www.3news.co.nz. 4. Hartevelt, A. (2011, November 11). Jail term for theft at Te Puia. Rotorua Daily Post. Retrieved from http://www.rotoruadailypost.co.nz. 5. How Mr Money Bags got rich by robbing the sick. (2008, December 13). Otago Daily Times. Retrieved from http://www.nzherald.co.nz. 6. KPMG. (2013). A survey of fraud, bribery and corruption in Australia & New Zealand 2012. Retrieved from http://www.kpmg.com/au.