Non-Financial Evidences (Behavorial aspects) are gaining importance in Fraud examination. One can detect lies by analyzing body language, eye language or other behavioral symptoms. Lot of research is being made in this field.
This document discusses corporate fraud, including defining it, the fraud triangle of opportunity, pressure, and rationalization, prevention methods, and detection. It notes that fraud is primarily a human/behavioral problem. The fraud triangle explains how fraud occurs when someone faces pressure and rationalizes their actions when an opportunity arises. Management can influence opportunity through controls and influence pressure through employee assistance programs. Prevention methods include creating an ethical culture, implementing controls, oversight, and discipline for violations. Detection typically occurs through internal audits, tips, or investigating red flags and anomalies.
The document discusses various principles of fraud including:
1) Definitions of fraud, corporate fraud, management fraud, and financial statement fraud.
2) The fraud triangle consisting of pressure/motivation, opportunity, and rationalization as the three elements common to every fraud.
3) Characteristics of typical fraudsters including that they are usually someone trusted and not initially suspected, and profiles of high-level and low-level thieves.
4) Taxonomies used to classify fraud including against customers/investors, criminal/civil, for/against the company, and internal/external fraud.
5) The "fraud tree" categorizing fraud into fraudulent statements, asset
The document provides an overview of fraud awareness and prevention. It discusses common fraud schemes like financial statement fraud, assets misappropriation, and corruption. It also outlines red flags for detecting occupational fraud, how fraud is committed, and profiles of typical fraud perpetrators. The document emphasizes the importance of strong antifraud controls, training programs, and fostering an ethical organizational culture to help prevent and detect fraud.
This document discusses fraud risk and prevention. It begins with defining fraud and identifying common fraud schemes such as asset misappropriation, corruption, and financial statement fraud. Examples of each scheme are provided. The document also discusses elements that contribute to fraud occurrence, like opportunity and incentives. Effective fraud prevention controls are then outlined, including segregating duties, competitive bidding processes, and fraud hotlines. The importance of fraud risk assessments and creating an organizational culture of integrity are also emphasized.
This document discusses different types of employee and management fraud and internal controls to prevent fraud. It defines employee fraud as theft of company assets by non-management employees who bypass internal controls. Management fraud is more dangerous as it often involves falsifying financial statements and can damage a company before being detected. The document also outlines guidelines for strong internal controls, including clear responsibilities, routine procedures, separating duties, and numbered documents. It describes the relationship between accounting systems and internal controls, with each relying on the other to ensure reliable accounting data and compliance.
The document discusses fraud prevention, detection, and control. It defines fraud and the fraud triangle, which identifies pressure, opportunity, and rationalization as factors that influence fraud. It also outlines four common types of fraud: corruption, asset misappropriation, financial statement fraud, and cash transaction fraud. Additionally, the document examines who typically commits fraud, behavioral warning signs, and provides recommendations for breaking the fraud triangle and establishing an effective anti-fraud culture to prevent fraud.
This document discusses corporate fraud, including defining it, the fraud triangle of opportunity, pressure, and rationalization, prevention methods, and detection. It notes that fraud is primarily a human/behavioral problem. The fraud triangle explains how fraud occurs when someone faces pressure and rationalizes their actions when an opportunity arises. Management can influence opportunity through controls and influence pressure through employee assistance programs. Prevention methods include creating an ethical culture, implementing controls, oversight, and discipline for violations. Detection typically occurs through internal audits, tips, or investigating red flags and anomalies.
The document discusses various principles of fraud including:
1) Definitions of fraud, corporate fraud, management fraud, and financial statement fraud.
2) The fraud triangle consisting of pressure/motivation, opportunity, and rationalization as the three elements common to every fraud.
3) Characteristics of typical fraudsters including that they are usually someone trusted and not initially suspected, and profiles of high-level and low-level thieves.
4) Taxonomies used to classify fraud including against customers/investors, criminal/civil, for/against the company, and internal/external fraud.
5) The "fraud tree" categorizing fraud into fraudulent statements, asset
The document provides an overview of fraud awareness and prevention. It discusses common fraud schemes like financial statement fraud, assets misappropriation, and corruption. It also outlines red flags for detecting occupational fraud, how fraud is committed, and profiles of typical fraud perpetrators. The document emphasizes the importance of strong antifraud controls, training programs, and fostering an ethical organizational culture to help prevent and detect fraud.
This document discusses fraud risk and prevention. It begins with defining fraud and identifying common fraud schemes such as asset misappropriation, corruption, and financial statement fraud. Examples of each scheme are provided. The document also discusses elements that contribute to fraud occurrence, like opportunity and incentives. Effective fraud prevention controls are then outlined, including segregating duties, competitive bidding processes, and fraud hotlines. The importance of fraud risk assessments and creating an organizational culture of integrity are also emphasized.
This document discusses different types of employee and management fraud and internal controls to prevent fraud. It defines employee fraud as theft of company assets by non-management employees who bypass internal controls. Management fraud is more dangerous as it often involves falsifying financial statements and can damage a company before being detected. The document also outlines guidelines for strong internal controls, including clear responsibilities, routine procedures, separating duties, and numbered documents. It describes the relationship between accounting systems and internal controls, with each relying on the other to ensure reliable accounting data and compliance.
The document discusses fraud prevention, detection, and control. It defines fraud and the fraud triangle, which identifies pressure, opportunity, and rationalization as factors that influence fraud. It also outlines four common types of fraud: corruption, asset misappropriation, financial statement fraud, and cash transaction fraud. Additionally, the document examines who typically commits fraud, behavioral warning signs, and provides recommendations for breaking the fraud triangle and establishing an effective anti-fraud culture to prevent fraud.
Essentials of a Highly Effective Employee Fraud Awareness ProgramFraudBusters
This document provides an overview of establishing and managing an effective employee fraud hotline. It recommends establishing an accessible hotline channel, publicizing the hotline to employees, providing multiple reporting options, staffing the hotline with independent personnel, training hotline staff, maintaining an anonymous claim log, and making the hotline available to all stakeholders to encourage fraud reporting. The document emphasizes the importance of properly establishing and promoting a hotline to detect fraud and support an ethical organizational culture.
Behavorial Aspects in Fraud ExaminationPallavi Vyas
Non-Financial Evidences (Behavorial aspects) are gaining importance in Fraud examination. One can detect lies by analyzing body language, eye language or other behavioral symptoms. Lot of research is being made in this field.
Tips for Preventing and Detecting Employee Theft in the WorkplaceCase IQ
Timothy Dimoff is a leading expert on workplace theft prevention. He discusses that 79% of employees have considered theft and costs businesses $60-120 billion annually. Theft is often overlooked due to lack of checks and balances. Senior employees usually cause greater damage than blue-collar workers. Employees steal most due to opportunity rather than need. Thorough investigations and reducing opportunities can help prevent theft. Removing thieves, recovering losses, and prosecution are key investigation objectives.
The document discusses fraud awareness for managers. It defines fraud and provides examples of regulatory definitions. It outlines factors that can contribute to fraud such as lack of controls and management oversight. The document emphasizes the importance of prevention through controls and establishes tone at the top. It lists behavioral and other red flags that could indicate fraud.
Modeling and Testing Security and Privacy Requirements: A Use Case-Driven App...Lionel Briand
The document discusses an approach for capturing security requirements in a structured manner using use case modeling techniques. The approach, called Restricted Misuse Case Modeling (RMCM), defines templates for specifying misuse cases, security use cases, and mitigation schemes. It aims to address challenges with existing approaches, such as precisely eliciting security threats, capturing control flows, and separating mitigation specifications. The approach was applied to model security requirements for a case study project. An empirical study evaluated how well the approach supported precise definition of security requirements.
The document discusses various types of fraud that occur on the internet, including fraudulent promotions on electronic bulletin boards, disguised advertising in discussion groups, e-mail scams involving worthless products and pyramid schemes, risky investment opportunities and stock manipulations. It provides tips for protecting yourself such as being wary of sites you are unfamiliar with, not revealing personal financial information online unless you are sure where it is going, and knowing the company you plan to do business with. Consumers should report any suspected fraudulent activity to organizations like the National Fraud Information Center.
The document discusses the fraud triangle theory developed by Cressey which describes three factors that can lead to fraud - perceived pressure, perceived opportunity, and rationalization. It also discusses the legal elements of fraud, common fraud schemes such as asset misappropriation and corruption, the role of fraud examination in corporate governance, occupational fraud, how an employee's position relates to theft levels, and challenges of collusion. Different types of banks are also identified such as commercial banks, savings banks, offshore banks, and central banks.
The slides provides fundamental understanding of concepts, principles and issues in fraud risk management. It is a comprehensive summary of general knowledge and understanding about the fraud risk management.
Fraud Risk Assessment- detection and prevention- Part- 2, Tahir Abbas
The document discusses various techniques for detecting and preventing fraud, including:
1) Establishing prevention techniques like controls, job rotation, and education to avoid fraud risks.
2) Implementing detection methods such as data analysis, forensic auditing, and link analysis to uncover fraud.
3) Asking vital questions within 24 hours of a fraud allegation to properly investigate and prevent future fraud.
An introduction to Forensic Audit is given with its examination with legalities. Time and Reasons which contributes to Forensic Audit, types of Frauds and Constituents of Forensic Audit are also included. We have also examined a distinction between Financial and Forensic Audit. To make it more user-friendly we have prescribed, the manner in which the frauds are detected and how a Forensic Audit is being concluded.
This document provides an overview of understanding forensic investigation processes. It discusses key topics such as concepts of investigations, forensic investigations, forensic audit investigation methodology, forensic audits and the role of internal auditors, forensics in computerized environments, and forensic investigation and audit reporting. The document aims to help readers understand these fundamental concepts in forensic accounting and investigations.
On December 5, 2013, Ron Steinkamp, principal, government advisory services at Brown Smith Wallace, presented at the 2013 MIS Training Institute Governance, Risk & Compliance Conference. Ron focused on the following keys to fraud prevention, detection and reporting:
1. Anti-fraud culture
2. Fraud policy
3. Fraud awareness/training
4. Hotline
5. Assess fraud risks
6. Review/investigation
7. Improved controls
PRESENTATION ON FINANCIAL STATEMENT FRAUDSRATAN AGARWALA
This document discusses financial statement fraud schemes. It defines financial statements and fraud, then outlines various schemes used to commit financial statement fraud such as time manipulations, early recognition of revenues, and postponing expenses. It also discusses perpetrators of fraud, reasons for fraud, and red flags that could indicate fraud. Methods for detecting and preventing financial statement fraud include analyzing unusual patterns in accounts receivables, cash flows, and asset/liability balances. The Beneish model is presented as a tool for detecting fraud using eight financial ratios.
Forensic accountants use many tools to fine tune their fraud investigation process, yielding useable results during any fraud investigation. Learn more here.
The document discusses fraud and corruption. It provides definitions of fraud from various legal and accounting perspectives. Fraud is described as deceitful or illegal acts that are intentional and seek to obtain money, property or services through misrepresentation. Common types of fraud discussed include financial statement fraud, asset misappropriation, and corruption. Theories for why fraud occurs and a brief history of financial fraud are also summarized.
This document provides an overview of forensic auditing. It defines a forensic audit as an examination of financial information to be used as evidence in court. The objectives of a forensic audit are to facilitate settlements, avoid fraud, restore confidence, and establish corporate governance policies. Forensic audit services typically include financial statement reviews, computer forensics, and calculating economic losses. The document outlines the methodology, procedures, fraudster profiles, fraud triangle, pressure/opportunity/rationalization factors, and types of fraud that may be investigated in a forensic audit.
Forensic accounting is a specialized area of accounting that investigates financial fraud and white collar crimes. It has been used for nearly 200 years to assist courts and investigate matters like employee theft, securities fraud, and insurance fraud. Forensic accountants use techniques like cash flow analysis and net worth calculations to detect anomalies and trace missing funds. Their work supports litigation, investigations, and helps protect businesses, banks, and the public from financial deception and crime.
This document discusses forensic accounting. It defines forensic accounting as integrating accounting, auditing, and investigative skills, especially for use in potential court cases. Forensic accountants conduct examinations of financial statements using investigative and auditing techniques. They may provide expert advice in court or help companies improve internal controls. The document outlines the techniques, skills, and stages of forensic accounting assignments, including planning, evidence collection, analysis, and reporting. It also discusses the ethical principles and types of cases forensic accountants may work on.
Have you ever wished that you could tell when someone is lying to you?
Most people have lied one way or another in their life. In fact, lying has become part of human nature. Sometimes we have to tell lies in order to avoid hurting somebody else. As the saying goes, what the person doesn\'t know won\'t hurt him. However, if discovering the truth is what you\'re after, then these tips on how to detect a lie will help you find out if you\'re being duped or not.
The document discusses how to detect lies through various signs and cues. It defines lies and discusses why people lie. It then explains how eye movements, body language, verbal statements, and microexpressions can indicate deception. Specifically, it notes that looking left may suggest fabricated memories or answers, while rightward eye movements often correlate with truthful, recalled information. The document also provides examples of microexpressions betraying concealed emotions and discusses how these cues can help identify lies.
Essentials of a Highly Effective Employee Fraud Awareness ProgramFraudBusters
This document provides an overview of establishing and managing an effective employee fraud hotline. It recommends establishing an accessible hotline channel, publicizing the hotline to employees, providing multiple reporting options, staffing the hotline with independent personnel, training hotline staff, maintaining an anonymous claim log, and making the hotline available to all stakeholders to encourage fraud reporting. The document emphasizes the importance of properly establishing and promoting a hotline to detect fraud and support an ethical organizational culture.
Behavorial Aspects in Fraud ExaminationPallavi Vyas
Non-Financial Evidences (Behavorial aspects) are gaining importance in Fraud examination. One can detect lies by analyzing body language, eye language or other behavioral symptoms. Lot of research is being made in this field.
Tips for Preventing and Detecting Employee Theft in the WorkplaceCase IQ
Timothy Dimoff is a leading expert on workplace theft prevention. He discusses that 79% of employees have considered theft and costs businesses $60-120 billion annually. Theft is often overlooked due to lack of checks and balances. Senior employees usually cause greater damage than blue-collar workers. Employees steal most due to opportunity rather than need. Thorough investigations and reducing opportunities can help prevent theft. Removing thieves, recovering losses, and prosecution are key investigation objectives.
The document discusses fraud awareness for managers. It defines fraud and provides examples of regulatory definitions. It outlines factors that can contribute to fraud such as lack of controls and management oversight. The document emphasizes the importance of prevention through controls and establishes tone at the top. It lists behavioral and other red flags that could indicate fraud.
Modeling and Testing Security and Privacy Requirements: A Use Case-Driven App...Lionel Briand
The document discusses an approach for capturing security requirements in a structured manner using use case modeling techniques. The approach, called Restricted Misuse Case Modeling (RMCM), defines templates for specifying misuse cases, security use cases, and mitigation schemes. It aims to address challenges with existing approaches, such as precisely eliciting security threats, capturing control flows, and separating mitigation specifications. The approach was applied to model security requirements for a case study project. An empirical study evaluated how well the approach supported precise definition of security requirements.
The document discusses various types of fraud that occur on the internet, including fraudulent promotions on electronic bulletin boards, disguised advertising in discussion groups, e-mail scams involving worthless products and pyramid schemes, risky investment opportunities and stock manipulations. It provides tips for protecting yourself such as being wary of sites you are unfamiliar with, not revealing personal financial information online unless you are sure where it is going, and knowing the company you plan to do business with. Consumers should report any suspected fraudulent activity to organizations like the National Fraud Information Center.
The document discusses the fraud triangle theory developed by Cressey which describes three factors that can lead to fraud - perceived pressure, perceived opportunity, and rationalization. It also discusses the legal elements of fraud, common fraud schemes such as asset misappropriation and corruption, the role of fraud examination in corporate governance, occupational fraud, how an employee's position relates to theft levels, and challenges of collusion. Different types of banks are also identified such as commercial banks, savings banks, offshore banks, and central banks.
The slides provides fundamental understanding of concepts, principles and issues in fraud risk management. It is a comprehensive summary of general knowledge and understanding about the fraud risk management.
Fraud Risk Assessment- detection and prevention- Part- 2, Tahir Abbas
The document discusses various techniques for detecting and preventing fraud, including:
1) Establishing prevention techniques like controls, job rotation, and education to avoid fraud risks.
2) Implementing detection methods such as data analysis, forensic auditing, and link analysis to uncover fraud.
3) Asking vital questions within 24 hours of a fraud allegation to properly investigate and prevent future fraud.
An introduction to Forensic Audit is given with its examination with legalities. Time and Reasons which contributes to Forensic Audit, types of Frauds and Constituents of Forensic Audit are also included. We have also examined a distinction between Financial and Forensic Audit. To make it more user-friendly we have prescribed, the manner in which the frauds are detected and how a Forensic Audit is being concluded.
This document provides an overview of understanding forensic investigation processes. It discusses key topics such as concepts of investigations, forensic investigations, forensic audit investigation methodology, forensic audits and the role of internal auditors, forensics in computerized environments, and forensic investigation and audit reporting. The document aims to help readers understand these fundamental concepts in forensic accounting and investigations.
On December 5, 2013, Ron Steinkamp, principal, government advisory services at Brown Smith Wallace, presented at the 2013 MIS Training Institute Governance, Risk & Compliance Conference. Ron focused on the following keys to fraud prevention, detection and reporting:
1. Anti-fraud culture
2. Fraud policy
3. Fraud awareness/training
4. Hotline
5. Assess fraud risks
6. Review/investigation
7. Improved controls
PRESENTATION ON FINANCIAL STATEMENT FRAUDSRATAN AGARWALA
This document discusses financial statement fraud schemes. It defines financial statements and fraud, then outlines various schemes used to commit financial statement fraud such as time manipulations, early recognition of revenues, and postponing expenses. It also discusses perpetrators of fraud, reasons for fraud, and red flags that could indicate fraud. Methods for detecting and preventing financial statement fraud include analyzing unusual patterns in accounts receivables, cash flows, and asset/liability balances. The Beneish model is presented as a tool for detecting fraud using eight financial ratios.
Forensic accountants use many tools to fine tune their fraud investigation process, yielding useable results during any fraud investigation. Learn more here.
The document discusses fraud and corruption. It provides definitions of fraud from various legal and accounting perspectives. Fraud is described as deceitful or illegal acts that are intentional and seek to obtain money, property or services through misrepresentation. Common types of fraud discussed include financial statement fraud, asset misappropriation, and corruption. Theories for why fraud occurs and a brief history of financial fraud are also summarized.
This document provides an overview of forensic auditing. It defines a forensic audit as an examination of financial information to be used as evidence in court. The objectives of a forensic audit are to facilitate settlements, avoid fraud, restore confidence, and establish corporate governance policies. Forensic audit services typically include financial statement reviews, computer forensics, and calculating economic losses. The document outlines the methodology, procedures, fraudster profiles, fraud triangle, pressure/opportunity/rationalization factors, and types of fraud that may be investigated in a forensic audit.
Forensic accounting is a specialized area of accounting that investigates financial fraud and white collar crimes. It has been used for nearly 200 years to assist courts and investigate matters like employee theft, securities fraud, and insurance fraud. Forensic accountants use techniques like cash flow analysis and net worth calculations to detect anomalies and trace missing funds. Their work supports litigation, investigations, and helps protect businesses, banks, and the public from financial deception and crime.
This document discusses forensic accounting. It defines forensic accounting as integrating accounting, auditing, and investigative skills, especially for use in potential court cases. Forensic accountants conduct examinations of financial statements using investigative and auditing techniques. They may provide expert advice in court or help companies improve internal controls. The document outlines the techniques, skills, and stages of forensic accounting assignments, including planning, evidence collection, analysis, and reporting. It also discusses the ethical principles and types of cases forensic accountants may work on.
Have you ever wished that you could tell when someone is lying to you?
Most people have lied one way or another in their life. In fact, lying has become part of human nature. Sometimes we have to tell lies in order to avoid hurting somebody else. As the saying goes, what the person doesn\'t know won\'t hurt him. However, if discovering the truth is what you\'re after, then these tips on how to detect a lie will help you find out if you\'re being duped or not.
The document discusses how to detect lies through various signs and cues. It defines lies and discusses why people lie. It then explains how eye movements, body language, verbal statements, and microexpressions can indicate deception. Specifically, it notes that looking left may suggest fabricated memories or answers, while rightward eye movements often correlate with truthful, recalled information. The document also provides examples of microexpressions betraying concealed emotions and discusses how these cues can help identify lies.
This document defines coma as an unarousable unresponsiveness state where patients cannot be aroused or respond appropriately to stimuli. Coma is caused by damage to the ascending reticular activating system in the brainstem or diffuse bilateral damage to the cerebral hemispheres. A thorough neurological exam is needed to assess coma, including tests of arousal, motor function, and cranial nerves like pupils and eye movements to localize lesions. Early intervention is important to preserve life and brain function for comatose patients.
SALESMANSHIP
Mental stages of a customer in sales effort
Selling Process
Who is a prospect ?
Creative Salesmanship Competitive Salesmanship
K A S H
Close of sale
This document provides guidance on how to be an effective salesperson. It discusses that salesmanship is an art of persuading others and helping customers achieve their goals by solving their problems. It then lists and describes 10 key qualities of top salespeople, which include being focused, outgoing, relationship-oriented, good listeners, ambitious, courageous, committed to continuous learning, prepared, and confident. Finally, it provides tips for being an effective salesperson, such as believing in your product, preparing a sales plan, targeting the right buyers, knowing your competitors, engaging customers where they are, paying attention to prospects, and using some humor in presentations.
1. Nonverbal communication conveys 65-93% of the meaning in a message through facial expressions, body language, proximity, touch, eye contact, voice, and other cues.
2. Proxemics is the study of how people use space and distance to communicate, with different zones for intimate, personal, social, and public interactions.
3. Kinesics looks at body movements like gestures, posture, and facial expressions which can reveal relationships, emotions, and other states.
4. Nonverbal communication plays an important role in business settings through handshakes, eye contact, seating arrangements, voice tone, and other behaviors.
This document provides information about salesmanship and personal selling. It defines salesmanship as the process of assisting and persuading prospective customers to purchase a product or service. Personal selling is described as an oral presentation to prospective customers to make a sale. The document discusses various concepts related to salesmanship including the AIDA model, types of sales executives, theories of personal selling, the selling process, and how to handle objections from customers. It emphasizes that salesmanship is an important skill that benefits producers, customers, salespeople, and society.
Non-Verbal Communication PowerPoint PPT Content Modern SampleAndrew Schwartz
163 slides include: what is non-verbal communication and what it includes, the categories within non-verbal communication, non-verbal behaviors, highlighting non-verbal statistics, tips to understand non-verbal communication, the 65 body areas displaying non-verbal communication behaviors, analyzing non-verbal communication, understanding eye access cues, how to detect lies, non-verbal communication trivia: time, space, voice, touch, objects, how to's and more.
Forensic psychology is defined as the application of psychological knowledge to legal contexts involving areas such as criminal behavior, legal proceedings, and victim services. Key aspects of forensic psychology include evaluating competency, assessing risk, aiding in legal decision-making, and providing therapeutic services related to the legal system. Forensic psychologists study topics like deception detection, eyewitness testimony, and the psychological effects of crime in order to inform legal cases and policy. Nonverbal cues and verbal content and structure may provide indications of deception, but most cues are not definitive and depend on individual factors and the context of the interaction.
Interviewers must remain vigilant against deceptive behavior through.docxBHANU281672
Interviewers must remain vigilant against deceptive behavior throughout the interview process and be aware of what drives witnesses and suspects to be forthcoming with accurate statements—the goal of all interviews and interrogations. Interviewees establish patterns of communications, and certain aspects of their behaviors indicate deceit and deception. The study of behavioral interviewing techniques helps investigators rely on the accurate flow of information and develop the ability to identify behaviors that are indicative of deceit. Indicators come in different forms, from subconscious behavior responses to verbal patterns to physical patterns.
There are several areas investigators should familiarize themselves with in order to explain the behaviors of interviewees when placed under pressure or asked direct and challenging questions. For example, an investigator should have knowledge of kinesics, neurolinguistic programming (NLP), facial coding, body language, eye movement, qualifiers, hedging, and manipulators. Vocal inflections, a sudden emotional outburst with a denial, or an uncontrollable twitch or increased heart rate can be subtle but may indicate deception.
There are many reasons someone may want to deceive the police. Uncovering these motivations may help you understand the perspectives from which each person is operating. In some situations, witnesses just cannot recall events, either because the events are traumatic or because the witnesses have forgotten important details. Forensic hypnosis and cognitive interviewing are two methods used to jog a person's memory in such cases. These skills can be learned and developed. True skill development in this area takes place while executing interviews or observing others during interviews or interrogations.
Submission Details:
By
Saturday, October 1, 2016
, in a minimum of 250 words, post to the
Discussion Area
your responses to the following:
Discuss the importance of developing skills in detecting deceit:
Explain how behavioral interviewing and interrogation techniques can help identify deception.
Discuss the accuracy and court admissibility of the following techniques:
Kinetics
Body posture
Eye movement
NLP
Facial coding
Qualifiers
Hedging
Manipulators
By
Wednesday, October 5, 2016
, read and respond to at least two of your classmates' posts. When responding, use contradictions and counterexamples supported by class readings. You can ask questions, disagree with opinions, redirect your thoughts, or ask your classmates to rethink what they have posted and wh
...
This document discusses investigation and forensic audit methodology in a computerized work environment. It begins by defining investigations and different types of investigations such as fraud, corruption, and asset misappropriation. It then discusses forensic audit investigation methodology, including analyzing available data, creating and testing hypotheses, and communicating results. Key skills for forensic auditors are outlined, such as reviewing internal controls and identifying questionable transactions and documents. Thirteen principles of fraud auditing are also presented. The document also discusses forensic audits and the role of the internal auditor in areas like internal controls, internal auditing, and ensuring organizations achieve their objectives.
This document provides guidance on conducting interviews and interrogations. It discusses establishing rapport with interviewees, reading body language for signs of deception, using alternative questioning techniques to obtain confessions, analyzing statements for truthfulness, and dealing with juveniles and requests for legal counsel. The goal is to objectively gather facts, discover new evidence and leads, and establish the truth through respectful but firm questioning.
1. The document provides an overview of conducting needs assessments for settlement services, outlining key aspects like actively listening, asking effective questions, and making appropriate referrals.
2. It emphasizes developing rapport, understanding the client's needs and limitations, and focusing on an outcome that satisfies the client.
3. Examples of effective communication techniques are presented, like reflecting feelings, summarizing to confirm understanding, and closing on a positive note.
Personal risk assessment training 1 day programme genericAndy Neal
The document outlines an agenda for a personal risk assessment training program over two days. Day 1 will cover introductions, legislation, risk assessments, observation skills, cultural diversity, responses to threats, and fight or flight responses. Exercises include assessing body language, listing triggers, and analyzing case studies. Day 2 focuses on positional tactics, communication skills, defusing aggression, reporting incidents, and the legal use of force. The goal is to help participants safely manage high-risk conflicts.
Part I Course TestimonyA suspect is captured at a shopping center.docxodiliagilby
Part I: Course Testimony
A suspect is captured at a shopping center's parking lot wearing a ski mask and matching the general description of the rapist given in the primary scenario. He now awaits trial on 6 counts of rape.* His defense attorney is arguing that his client (who is considered mentally challenged) is too intellectually deficient to be the culprit. The defense attorney argues that the absence of DNA, fingerprints, and other evidence shows that a much more intelligent perpetrator must have committed these crimes.
Instructions
Given your role as chief investigator for this case, answer the following questions in a PowerPoint presentation (4–6 slides) that you will deliver to the court in response to the defense attorney’s arguments:
What facts do you try to establish to link the offender to these crimes?
What evidence do you have linking the offender to the crimes?
What testimonies do you have linking the offender to the crimes?
Please note that the suspect will not confess to these crimes.
*Please note:
The criminal statutes that address rape or sexual assault often vary according to jurisdiction. These statutes may use different terms for the offense, such as ‘rape’ or ‘sexual assault’ and may even include different acts in their definitions of the crime than other jurisdictions. Please assume that this scenario takes place in a jurisdiction (such as Illinois, Nevada, or South Dakota, among others) in which the acts of the serial rapist could properly be charged as rape or sexual assault.
Part II: Child Molesters Presentation
You are to make a presentation for a parents' group meeting at the local school.
You will make a presentation on child molesters and give preventative strategy advice for the children to protect themselves against child molesters.
Create a PowerPoint presentation (4–5 slides) for this meeting with speaker notes (at least 150 words per slide).
Your presentation should include the following information:
Identification of Child Molesters
What is a child molester?
Who is likely to be a child molester? (M.O)
What are the types of molesters?
Expert Insight
Address misconceptions that parents have about child molesters.
Address the facts about child molesters.
Effects
What statistics have you found in molestation studies that would help educate parents/children?
Warnings
What signs can parents/children look for if child molestation is occurring in their community?
Prevention Strategies
How should parents talk to their children about child molesters?
What laws protect children from predators?
What types of campaigns might be out there to educate children/parents about child molesters?
.
Motivational research seeks to understand unconscious motives that influence consumer behavior. It examines cultural, economic, and social factors as well as conscious and unconscious motives. The key techniques are observation, focus groups, and depth interviews. During depth interviews, the researcher builds rapport, uses nondirective questioning, and projective techniques to gain insights. The researcher analyzes interviews for patterns, inconsistencies, and what is not said to understand underlying motives shaping consumer behavior within cultural contexts.
Forensic accounting is an emerging discipline which helps in fraud detection and prevention and used as proactive and reactive tool for frauds management
This document discusses managing negative behavior and responding to threats in the workplace. It covers topics like risk assessments, communication skills, de-escalation techniques, and reporting incidents. Key models discussed include STOP (stop, look, listen), assessing risks from a person's physical attributes and body language, and considering objects and environmental factors that could pose risks. The document provides guidance on identifying triggers and responses to threatening situations, as well as strategies for resolving conflicts and supporting those involved in traumatic incidents.
The document provides guidance on making business communication effective. It discusses the importance of selecting the appropriate medium for the message based on the needs of the sender, receiver, and communication goals. The document also covers types of business communication like reports, proposals, presentations; barriers to effective communication like emotions; and tips for writing reports, designing documents, and delivering presentations. The overall message is that business communication requires careful consideration of the audience, message, and medium to ensure the intended understanding, response, and relationship outcomes.
Most important thing to do when going to speak in a public event to mi.docxJason0x0Scottw
The document discusses various topics related to public speaking and presentations including minimizing anxiety when speaking publicly, cultural diversity, discrimination, presentation skills, and types of presentations. It also addresses issues around cultural awareness and stage fright.
This document outlines performance objectives for interpersonal communication training. It covers topics such as identifying effective communication styles, barriers to communication, dealing with difficult people, active listening techniques, and remaining professional under pressure. The primary goals are to understand communication, develop interpersonal skills, and maintain composure when facing challenging situations.
This document outlines performance objectives for interpersonal communication training. It covers topics such as identifying effective communication styles, barriers to communication, dealing with difficult people, active listening techniques, and remaining professional under pressure. The primary goals are to understand interpersonal communication, develop self-awareness of one's own communication style, and learn strategies for effectively managing conflicts and interactions with challenging individuals.
This document discusses several soft skills important for career success, including body language, analytical skills, and critical thinking. It provides details on each:
Body language conveys nonverbal cues like facial expressions and posture. The document lists 7 steps to understand meanings in body language, such as how different eye movements and head positions communicate different attitudes.
Analytical skills involve applying logic to gather and analyze information to make well-informed decisions. The document gives 5 tips to improve these skills, such as asking the right questions, making no assumptions, and turning information into real knowledge.
Critical thinking requires actively conceptualizing and evaluating information to reach valid conclusions. It outlines core skills like observation and interpretation, and the procedure of
This document outlines performance objectives for interpersonal communication training. It covers topics such as identifying effective communication styles, understanding barriers to communication, dealing with difficult people, active listening techniques, and remaining professional under pressure. The primary goals are to understand interpersonal communication, develop strategies for handling challenging situations, and maintain composure.
The document discusses using social stories to teach social skills to elementary students who lack vocabulary and may act aggressively. Social stories describe social situations and appropriate behaviors. Research shows social stories alone may not be effective at changing behavior, but are more successful when combined with other interventions like verbal prompting and a token economy system with rewards. The purpose is to help students improve social behaviors through modeling and emphasizing skills like taking turns.
Responding in Times of Crisis: Providing Psychological First AidBernie McCann
A professional development presentation for credit union/bank branch managers to assist them in responding to employees and other victims of bank robberies.
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk Case IQ
It’s long been clear that organizations with strong ethical cultures perform better than those without. In addition to the multitude of positive impacts a strong ethical culture provides, these organizations will also typically experience less fraud and misconduct. However, to achieve maximum results, a strong ethical culture must focus on accountability and include robust fraud prevention measures.
Ethical accountability takes time and effort to build, but the rewards of fostering the right culture in an organization are measurable. Fewer fraud incidents, for example, can be demonstrated by hard numbers. A strong code of conduct is a great start, but it’s critical to have a comprehensive ethics program that fosters accountability.
Join Joseph Agins, CFE, CCEP, adjunct professor and fraud expert, as he outlines strategies organizations can use to ensure every employee from the C-Suite down has the tools they need to help them make ethical decisions and prevent fraud.
The webinar will cover:
The importance of tone from the top
Identifying the pressures employees face and thus the ethics and fraud risks
Understanding the resources employees have (or not) to report wrongdoing
Whether the internal imagining of the culture matches the reality
Developing tools and strategies for fostering ethics in the workplace
Anti-fraud measures that should be incorporated into every ethics policy
Encouraging ethics and accountability
"From Insights to Action" by Andrew Vincent, a Revelation Great Research Thin...Revelation Next
The document summarizes a webinar on maximizing the impact of research insights. It discusses establishing credibility with clients, understanding their needs and communication styles, and focusing insights by understanding the client's culture and priorities. Effective communication requires both "push" skills like assertiveness and feedback, as well as "pull" skills like active listening, rapport building, and questioning assumptions.
Similar to Non Financial Evidences (Behavorial Aspects) in a Fraud Examination (20)
Business law for the students of undergraduate level. The presentation contains the summary of all the chapters under the syllabus of State University, Contract Act, Sale of Goods Act, Negotiable Instrument Act, Partnership Act, Limited Liability Act, Consumer Protection Act.
Genocide in International Criminal Law.pptxMasoudZamani13
Excited to share insights from my recent presentation on genocide! 💡 In light of ongoing debates, it's crucial to delve into the nuances of this grave crime.
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersHarpreetSaini48
Discover how Mississauga criminal defence lawyers defend clients facing weapon offence charges with expert legal guidance and courtroom representation.
To know more visit: https://www.saini-law.com/
Matthew Professional CV experienced Government LiaisonMattGardner52
As an experienced Government Liaison, I have demonstrated expertise in Corporate Governance. My skill set includes senior-level management in Contract Management, Legal Support, and Diplomatic Relations. I have also gained proficiency as a Corporate Liaison, utilizing my strong background in accounting, finance, and legal, with a Bachelor's degree (B.A.) from California State University. My Administrative Skills further strengthen my ability to contribute to the growth and success of any organization.
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee
Presentation slides for a session held on June 4, 2024, at Kyoto University. This presentation is based on the presenter’s recent paper, coauthored with Hwang Lee, Professor, Korea University, with the same title, published in the Journal of Business Administration & Law, Volume 34, No. 2 (April 2024). The paper, written in Korean, is available at <https://shorturl.at/GCWcI>.
This document briefly explains the June compliance calendar 2024 with income tax returns, PF, ESI, and important due dates, forms to be filled out, periods, and who should file them?.
Receivership and liquidation Accounts
Being a Paper Presented at Business Recovery and Insolvency Practitioners Association of Nigeria (BRIPAN) on Friday, August 18, 2023.
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordinary And Special Businesses And Ordinary And Special Resolutions with Companies (Postal Ballot) Regulations, 2018
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Massimo Talia
This guide aims to provide information on how lawyers will be able to use the opportunities provided by AI tools and how such tools could help the business processes of small firms. Its objective is to provide lawyers with some background to understand what they can and cannot realistically expect from these products. This guide aims to give a reference point for small law practices in the EU
against which they can evaluate those classes of AI applications that are probably the most relevant for them.
2. INTRODUCTION
Evidence in Fraud can potentially come from a
variety of sources both Financial & Non-Financial.
Generally speaking, the focus on Fraud
Investigation tends to be mostly, if not solely,
Financial.
Fraud Investigators and auditors should consider
the possibility of valuable evidence that is non-
financial.
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
3. Non-Financial sources include interviews,
document examination, handwriting analysis, and
physiological aspects of the fraudster.
The latter refers to something the fraudster
reveals in behaviours, physical expressions, or
communications that can be cues as to the
veracity of the fraudster’s statements about his or
her involvement in the fraud in question.
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
INTRODUCTION
4. 1. Interviews
2. Statement Analysis
3. SCAN (Scientific Content Analysis)
4. Body Language
5. Eye Language
6. Micro Expressions
Physiological Aspects
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
TECHNIQUES &
TOOLS
5. 1. Interviews
2. Statement Analysis
3. SCAN (Scientific Content Analysis)
4. Body Language
5. Eye Language
6. Micro Expressions
Physiological Aspects
The primary purpose of these techniques and tools is to
detect deception.
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
TECHNIQUES &
TOOLS
6. TECHNIQUES &
TOOLS
1. Interviews
2. Statement Analysis
3. SCAN (Scientific Content Analysis)
4. Body Language
5. Eye Language
6. Micro Expressions
Physiological Aspects
If a fraud is being perpetrated, the fraudster is certainly being as
clandestine as possible including using deception in appearance
and communications.
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
7. 1. Interviews
2. Statement Analysis
3. SCAN (Scientific Content Analysis)
4. Body Language
5. Eye Language
6. Micro Expressions
Physiological Aspects
Secondarily, these techniques also could be helpful in
gathering useful information.
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
TECHNIQUES & TOOLS
8. INTERVIEWS
Auditors ask questions in the course of most
audits, whether they are internal or external.
But there is a big difference in asking questions in
an audit and asking questions in a fraud
investigation.
To ask questions effectively in a fraud
investigation, one must employ best practices for
interviewing techniques in that context
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
TECHNIQUES & TOOLS
9. The Top 10 steps in a Top Notch Interview are
as follows:
1. Prepare
2. Think as you Go
3. Watch Non-verbal behavior
4. Set the tone
5. Pace your Questions
6. Do more listening than talking
7. Be straight forward
8. Take your Time
9. Double check the facts
10. Get it in writing
(American Institute of Certified Public Accountants, Inc., All rights Reserved, Copyright 2002)
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
INTERVIEWS
TECHNIQUES & TOOLS
10. One of the problems in Fraud investigation is
the possibility the investigator is not trained or
experienced in proper interview techniques or
unfamiliar with the legal protocol of interviews.
In the case of the latter, the case could be
frustrated from a successful conclusion or even
end in a counter lawsuit for some legal cause.
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
INTERVIEWS
TECHNIQUES & TOOLS
11. Fraud investigators do not necessarily require
legal authority to interview or enquire into
fraudulent matters.
If the interviewer represents herself as an
investigator, however some countries or states
do require a license for investigators
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
INTERVIEWS
TECHNIQUES & TOOLS
12. Sometimes you can actually use deception to
legally gain information from a suspect, as long
as the interviewer does not use deception that
will likely cause an innocent party to confess.
The interviewer should also avoid any
statement that could be taken as extortion.
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
INTERVIEWS
TECHNIQUES & TOOLS
13. TECHNIQUES & TOOLS
STATEMENT ANALYSIS
Statement analysis is a technique used to detect
deceit in statements that individuals make.
Statement Analysis uses a word by word
examination of statements.
It determines truthfulness by an analysis of the
words rather than focussing on whether the stated
facts are truthful.
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
14. Subconsciously, the deceitful person reveals the
conflict with which they are struggling in the way
they communicate.
Statement Analysis is the process of analyzing a
person’s words to determine if the subject is being
truthful or deceptive.
The reason these techniques work is because
people’s words will betray them.
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
TECHNIQUES & TOOLS
STATEMENT ANALYSIS
15. There are usually several ways you can phrase
a statement.
People will always word their statement based
on all their knowledge. Therefore, their
statement may include information they did not
intend to share.
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
TECHNIQUES & TOOLS
STATEMENT ANALYSIS
16. Common Red Flags:
1. Usage of Unique words (e.g. Never, Actually)
2. Noun Analysis, i.e. Change in usage of nouns
(e.g. “my computer” to “the computer”)
3. Pronoun analysis (I vs. Them)
4. Verb Analysis (changing tenses)
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
TECHNIQUES & TOOLS
STATEMENT ANALYSIS
17. TECHNIQUES & TOOLS
SCAN (Scientific Content Analysis)
SCAN is a technique similar to Statement
Analysis.
Like statement Analysis, SCAN does not try to
look for the truthfulness of the facts but rather
the reflection of deception in the way
statements are made.
Deceitful people tend to lie indirectly, and not
tell blatant lies.
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
18. Deceitful people are reluctant to commit themselves
to deceptions, and instead use “verbal trickeration”
to avoid making damaging statements.
In order for SCAN to be effective, the analyst needs
a clean truthful statement from the suspect.
The indirect lies involve hedging, omitting critical
facts, feigning forgetfulness, pretending ignorance.
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
TECHNIQUES & TOOLS
SCAN (Scientific Content Analysis)
19. TECHNIQUES & TOOLS
BODY LANGUAGE
A person’s body movements usually indicate
emotions he is expressing through adapters or
symptoms.
Generally, the person is not aware that he is
exhibiting body language at the time.
The body behaviour could be certain
movements; pitch of the voice, speed of talking,
crossing legs or arms etc.
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
20. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
Physical expression will be limited and stiff, with few arm
and hand movements.
Hand, arm and leg movement are toward their own body
the liar takes up less space.
A person who is lying to you will avoid making eye
contact.
Hands touching their face, throat & mouth. Touching or
scratching the nose or behind their ear. Not likely to touch
his chest/heart with an open hand.
Body Language of Lies
TECHNIQUES & TOOLS
BODY LANGUAGE
21. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
Timing and duration of emotional gestures and emotions
are off a normal pace.
The display of emotion is delayed, stays longer it would
naturally, and then stops suddenly.
Timing is off between emotions gestures/expressions and
words.
Example: Someone says "I love it!" when receiving a gift
and then smile after making that statement, rather than at
the same time the statement is made.
Emotional Gestures & Contradiction
TECHNIQUES & TOOLS
BODY LANGUAGE
22. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
Gestures/expressions don’t match the verbal
statement, such as frowning when saying “I love you.”
Expressions are limited to mouth movements when
someone is faking emotions (like happy, surprised, sad,
awe) instead of the whole face.
For example; when someone smiles naturally their
whole face is involved: jaw/cheek movement, eyes and
forehead push down, etc.
Emotional Gestures & Contradiction
TECHNIQUES & TOOLS
BODY LANGUAGE
23. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
A guilty person gets defensive. An innocent
person will often go on the offensive.
A liar is uncomfortable facing his
questioner/accuser and may turn his head or body
away.
A liar might unconsciously place objects (book,
coffee cup, etc.) between themselves and you.
Interactions and Reactions
TECHNIQUES & TOOLS
BODY LANGUAGE
24. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
A liar will use your words to make answer a
question.
When asked, “Did you write a cheque to
yourself?” The liar answers, “No, I didn’t write a
cheque to myself”
A statement with a contraction is more likely to be
truthful: “ I didn't do it” instead of “I did not do it”
Verbal Context and Content
TECHNIQUES & TOOLS
BODY LANGUAGE
25. TECHNIQUES & TOOLS
BODY LANGUAGE
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
A guilty person may speak more than natural,
adding unnecessary details to convince the
investigator.
They are not comfortable with silence or pauses in
the conversation.
If you believe someone is lying, then change
subject of a conversation quickly, a liar follows
along willingly and becomes more relaxed.
Other Signs of a Lie
26. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
The guilty wants the subject changed; an innocent
person may be confused by the sudden change in
topics and will want to back to the previous
subject.
Using humour or sarcasm to avoid the subject.
Therefore, body language is fraught with
circumstances that cause it to be unreliable as a
means to detect deception consistently, and it is
inadmissible in court.
TECHNIQUES & TOOLS
BODY LANGUAGE
Other Signs of a Lie
27. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
Besides observing gross body postures and
movements, the eyes can detect tiny changes in
the bodies of others.
A more reliable indicator of truthfulness is eye
language.
Experts believe the eyes are the most
communicative part of the human body.
EYE LANGUAGE
TECHNIQUES & TOOLS
BODY LANGUAGE
28. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
The first time "Visual Accessing Cues" were
discussed, was by Richard Bandler and John
Grinder in their book "Frogs into Princes:
Neuro Linguistic Programming (NLP) “.
EYE LANGUAGE-Visual Accessing
Cues - "Lying Eyes"
TECHNIQUES & TOOLS
BODY LANGUAGE
29. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
Richard Bandler and John Grinder found, when asked a
question a "normally organized" right-handed person
looks (from your viewpoint, looking at them):
Up and to the Left-Indicates: Visually Constructed
Images (Vc)
If you asked someone to "Imagine a purple buffalo",
this would be the direction their eyes moved in while
thinking about the question as they "Visually
Constructed" a purple buffalo in their mind.
EYE LANGUAGE-Visual Accessing
Cues - "Lying Eyes"
TECHNIQUES & TOOLS
BODY LANGUAGE
30. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
Richard Bandler and John Grinder found, when asked a
question a "normally organized" right-handed person
looks (from your viewpoint, looking at them):
Up and to the Right-Indicates: Visually Remembered
Images (Vr)
If you asked someone to "What color was the first house you
lived in?", this would be the direction their eyes moved in while
thinking about the question as they "Visually Remembered" the
color of their childhood home.
EYE LANGUAGE-Visual Accessing
Cues - "Lying Eyes"
TECHNIQUES & TOOLS
BODY LANGUAGE
31. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
Richard Bandler and John Grinder found, when asked a
question a "normally organized" right-handed person
looks (from your viewpoint, looking at them):
To the Left - Indicates : Auditory Constructed (Ac)
If you asked someone to "Try and create the highest the sound
of the pitch possible in your head", this would be the direction
their eyes moved in while thinking about the question as they
"Auditory Constructed" this sound that they have never heard of.
EYE LANGUAGE-Visual Accessing
Cues - "Lying Eyes"
TECHNIQUES & TOOLS
BODY LANGUAGE
32. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
Richard Bandler and John Grinder found, when asked a
question a "normally organized" right-handed person
looks (from your viewpoint, looking at them):
To the Right - Indicates : Auditory Remembered (Ar)
If you asked someone to "Remember what their mother's voice
sounds like ", this would be the direction their eyes moved in
while thinking about the question as they "Auditory
Remembered" this sound.
EYE LANGUAGE-Visual Accessing
Cues - "Lying Eyes"
TECHNIQUES & TOOLS
BODY LANGUAGE
33. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
Richard Bandler and John Grinder found, when asked a
question a "normally organized" right-handed person
looks (from your viewpoint, looking at them):
Down and to the Left - Indicates: Feeling/Kinesthetic
(F)
If you asked someone to "Can you remember the smell of a
campfire?”, this would be the direction their eyes moved in while
thinking about the question as they used recalled a smell,
feeling, or taste.
EYE LANGUAGE-Visual Accessing
Cues - "Lying Eyes"
TECHNIQUES & TOOLS
BODY LANGUAGE
34. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
Richard Bandler and John Grinder found, when asked a
question a "normally organized" right-handed person
looks (from your viewpoint, looking at them):
Down & To the Right - Indicates: Internal Dialog (Ai)
This is the direction of someone eyes as they "talk to
themselves".
EYE LANGUAGE-Visual Accessing
Cues - "Lying Eyes"
TECHNIQUES & TOOLS
BODY LANGUAGE
36. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
Eye language principles also include aspects of blinking.
Under normal circumstances, a person blinks about 20 times per
minute, each blink about a fourth of a second.
Under stress, a person usually blinks considerably more than
normal, and typically faster than normal.
Some benign circumstances lead to unusual blinking.
If being filmed, or on TV, a person would blink about twice as fast
as normal. But a sleep-deprived person also blinks more often.
EYE LANGUAGE-Visual Accessing
Cues - "Lying Eyes"
TECHNIQUES & TOOLS
BODY LANGUAGE
37. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
Other Eye Language Cues:
Gaze downward; equates to defeat, guilt, or submission.
Raising eyebrows; Uncertainty, disbelief, surprise, or
frustration.
Raising one eyebrow and head tilted back; Disdain, arrogance,
or pride
Dilation of pupils; Interest in the thing.
EYE LANGUAGE-Visual Accessing
Cues - "Lying Eyes"
TECHNIQUES & TOOLS
BODY LANGUAGE
38. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
A micro expression is a momentary involuntary facial
expression that people unconsciously display when they
are hiding an emotion.
They are quick & intense expressions of concealed
emotion.
Micro-expressions can appear then disappear off the face
in a fraction of a second.
MICRO EXPRESSIONS
TECHNIQUES & TOOLS
BODY LANGUAGE
39. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
In other words micro-expressions occur so quickly, that
most people don't even notice them.
A micro-expression is caused by involuntary movements in
facial muscles.
Most people cannot control these involuntary muscles
which are affected by their emotions.
MICRO EXPRESSIONS
TECHNIQUES & TOOLS
BODY LANGUAGE
40. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
Micro Expressions are generally grouped into seven
universal emotions: anger, disgust, fear, sadness,
happiness, surprise, and contempt.
Micro Expressions betray us when we lie. We can try to
cover our feelings with fake smiles, but involuntary face
muscles reveal these hidden emotions.
MICRO EXPRESSIONS
TECHNIQUES & TOOLS
BODY LANGUAGE
41. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
Trained investigators, customs agents, etc. use micro
expression recognition along with other body language &
speech cues to determine truthfulness.
While most people can be trained to recognize micro
expressions and other deceptive cues, some folks are
naturals.
MICRO EXPRESSIONS
TECHNIQUES & TOOLS
BODY LANGUAGE
42. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
Dr. Paul Ekman and Dr. David Matsumoto created METT,
an online micro expression training tool.
METT and METT2 are being discontinued, but both Ekman
and Matsumoto have developed their own micro expression
training software available on their respective sites.
www.humintell.com & www.paulekman.com
MICRO EXPRESSIONS
TECHNIQUES & TOOLS
BODY LANGUAGE
43. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
The most important thing to remember about micro-
expressions is that they only show what someone is feeling,
not whether they lying per-se, and not what they are thinking.
The micro-expression only tells you their knee-jerk emotional
state.
In other words, just because someone says "that's awesome!"
and flashes a brief micro-expression of contempt, doesn't
necessarily mean they are lying about their feelings.
MICRO EXPRESSIONS
TECHNIQUES & TOOLS
BODY LANGUAGE
44. CONCLUSION
Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
There are many non-financial sources of potential evidence in
a fraud investigation.
One of those key areas is people, interviews, casual
conversations, and physical cues of deception or guilt.
There has been a lot written about these physiological
aspects, or profile, of fraudsters.
Books have been written on discourse analysis, SCAN, and
other techniques used to determine the presence of deceptive
behavior.
45. Non-Financial Evidences
(Behavrial Aspects) In A Fraud Examination
Thus almost all fraud investigations can benefit from
understanding these principles of the physiological behaviors
of fraudsters.
The physiological arena of non-financial information is limited
in its ability to provide evidence that courts will allow.
Some of the methods are not even reliable enough for serious
use in a fraud investigation, and should be used with great
caution (e.g., body language and lies cues).
In fact, of the ones described above, the only one that would
be ‘‘forensic’’ enough for evidence is “Interview”.
CONCLUSION