indice manual de certificación acfe

64
Fraud Examiners Manual Main Table of Contents Preface and Introduction Financial Transactions & Fraud Schemes Law Investigation Fraud Prevention & Deterrence Copyright and Bibliography ©2011 Association of Certified Fraud Examiners. ALL RIGHTS RESERVED. e ACFE logo is a trademark owned by the Association of Certified Fraud Examiners, Inc. 2011 International Edition Select a section below to view its chapters: SEARCH

Upload: andres-baytelman

Post on 20-Aug-2015

1.063 views

Category:

Business


1 download

TRANSCRIPT

Page 1: Indice manual de certificación ACFE

Fraud Examiners Manual

� Main Table of Contents

� Preface and Introduction

� Financial Transactions & Fraud Schemes

� Law

� Investigation

� Fraud Prevention & Deterrence

� Copyright and Bibliography

©2011 Association of Certified Fraud Examiners. All rIghTs rEsErvEd. The ACFE logo is a trademark owned by the Association of Certified Fraud Examiners, Inc.

2011 International Edition

Select a section below to view its chapters:

SEARCH

Page 2: Indice manual de certificación ACFE

Fraud Examiners Manual

©2011 Association of Certified Fraud Examiners. All rIghTs rEsErvEd. The ACFE logo is a trademark owned by the Association of Certified Fraud Examiners, Inc.

2011 International Edition

financial transactions & fraud schemes

� Table of Contents

� Accounting Concepts

� Management’s and Auditors’ responsibilities

� Financial statement Fraud

� Asset Misappropriation: Cash receipts

� Asset Misappropriation: Fraudulent disbursements

� Asset Misappropriation: Inventory and Other Assets

� Bribery and Corruption

� Theft of Intellectual Property

� Financial Institution Fraud

� Cheque and Credit Card Fraud

� Insurance Fraud

� health Care Fraud

� Consumer Fraud

� Computer and Internet Fraud

� Public sector Fraud

HOME | FINANCIAL TRANSACTIONS & FRAUD SCHEMES | LAW | INVESTIGATION | FRAUD PREVENTION & DETERRENCE | SEARCH

Page 3: Indice manual de certificación ACFE

Fraud Examiners Manual

©2011 Association of Certified Fraud Examiners. All rIghTs rEsErvEd. The ACFE logo is a trademark owned by the Association of Certified Fraud Examiners, Inc.

2011 International Edition

law

� Table of Contents

� Overview of the legal system

� The law related to Fraud

� Bankruptcy (Insolvency) Fraud

� securities Fraud

� Money laundering

� Individual rights

� The Civil Justice system

� The Criminal Justice system

� Evidence

� Testifying as a Witness

HOME | FINANCIAL TRANSACTIONS & FRAUD SCHEMES | LAW | INVESTIGATION | FRAUD PREVENTION & DETERRENCE | SEARCH

Page 4: Indice manual de certificación ACFE

Fraud Examiners Manual

©2011 Association of Certified Fraud Examiners. All rIghTs rEsErvEd. The ACFE logo is a trademark owned by the Association of Certified Fraud Examiners, Inc.

2011 International Edition

� Table of Contents

� Analysing documents

� Interview Theory and Application

� Covert Examinations

� sources of Information

� Accessing Information Online

� data Analysis and reporting Tools

� digital Forensics

� Tracing Illicit Transactions

� reporting standards

� Fraud Examination Checklist

� sample reports

� Engagement Contracts and Opinion letters

investigationHOME | FINANCIAL TRANSACTIONS & FRAUD SCHEMES | LAW | INVESTIGATION | FRAUD PREVENTION & DETERRENCE | SEARCH

Page 5: Indice manual de certificación ACFE

Fraud Examiners Manual

©2011 Association of Certified Fraud Examiners. All rIghTs rEsErvEd. The ACFE logo is a trademark owned by the Association of Certified Fraud Examiners, Inc.

2011 International Edition

� Table of Contents

� Understanding human Behaviour

� Theories of Crime Causation

� White-Collar Crime

� Organisational Crime

� Occupational Fraud

� Fraud Prevention Programs

� Fraud risk Assessment

� Ethics for Fraud Examiners

� ACFE Code of Professional Ethics

� CFE Code of Professional standards

fraud prevention & deterrenceHOME | FINANCIAL TRANSACTIONS & FRAUD SCHEMES | LAW | INVESTIGATION | FRAUD PREVENTION & DETERRENCE | SEARCH

Page 6: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

2011 Fraud Examiners Manual (International) 1.i

FRAUD EXAMINERS MANUAL INTERNATIONAL VERSION

TABLE OF CONTENTS

OCCUPATIONAL FRAUDS

ACCOUNTING CONCEPTS Accounting Basics ........................................................................................................................ 1.101

Accounts and the Accounting Cycle .................................................................................. 1.102 Journal Entries ....................................................................................................................... 1.104 Accounting Methods ............................................................................................................ 1.104

Financial Statements .................................................................................................................... 1.105 Balance Sheet ......................................................................................................................... 1.106 Income Statement ................................................................................................................. 1.108 Statement of Owners’ Equity .............................................................................................. 1.110 Statement of Cash Flows ..................................................................................................... 1.112

Cash Flows from Operations ....................................................................................... 1.113 Cash Flows from Investing Activities ......................................................................... 1.114 Cash Flows from Financing Activities ........................................................................ 1.114

Users of Financial Statements ............................................................................................. 1.114 MANAGEMENT'S AND AUDITORS' RESPONSIBILITIES Management .................................................................................................................................. 1.201

The Treadway Commission ................................................................................................. 1.201 Mandatory Independent Audit Committee ................................................................ 1.202 Written Charter ............................................................................................................... 1.202 Resources and Authority ............................................................................................... 1.202 Informed, Vigilant, and Effective Audit Committees ............................................... 1.202

The COSO Reports .............................................................................................................. 1.202 Internal Control—Integrated Framework .................................................................. 1.202 Enterprise Risk Management—Integrated Framework ............................................ 1.203 COSO Guidance for Smaller Public Companies ....................................................... 1.204

Document Retention Policies .............................................................................................. 1.205 What Documents Should Be Kept? ............................................................................ 1.206 Document Storage .......................................................................................................... 1.206 Document Destruction .................................................................................................. 1.207 DRP Managers ................................................................................................................ 1.207

Fraud Prevention Programs ................................................................................................. 1.207 Corporate Governance ................................................................................................................ 1.208

The Importance of Corporate Governance ...................................................................... 1.208 The Organisation for Economic Cooperation and Development ................................. 1.208

Propietario
Resaltado
Page 7: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

1.ii 2011 Fraud Examiners Manual (International)

MANAGEMENT'S AND AUDITORS' RESPONSIBILITIES (CONT.) The OECD Principles of Corporate Governance ..................................................... 1.209

External Auditors ......................................................................................................................... 1.220 International Standard on Auditing (ISA) 240, The Auditor’s Responsibility to Consider Fraud in the Audit of Financial Statements ........................................................ 1.220

Purpose of the Standard ................................................................................................ 1.220 Characteristics of Fraud ................................................................................................. 1.220 Responsibility for the Prevention and Detection of Fraud ...................................... 1.223 Responsibilities of the Auditor ..................................................................................... 1.223 Objectives ........................................................................................................................ 1.224 Definitions ....................................................................................................................... 1.224 Professional Scepticism ................................................................................................. 1.225 Discussion Among the Engagement Team ................................................................ 1.225 Risk Assessment Procedures and Related Activities ................................................. 1.225 Identification and Assessment of the Risks of Material Misstatement Due to Fraud ............................................................................................................... 1.228 Responses to the Assessed Risks of Material Misstatement Due to Fraud ........... 1.229 Evaluation of Audit Evidence ...................................................................................... 1.230 Auditor Unable to Continue the Engagement ........................................................... 1.231 Management Representations ....................................................................................... 1.232 Communications to Management and with Those Charged with Governance .... 1.232 Communications to Regulatory and Enforcement Authorities ............................... 1.233 Documentation ............................................................................................................... 1.233 Appendix ......................................................................................................................... 1.234

International Principles for Auditor Oversight ................................................................ 1.236 The International Organisation of Securities Commissions’ Principles for Auditor Oversight ............................................................................................... 1.237 The Public Interest Oversight Board ......................................................................... 1.244

International Standards for Government Auditing .......................................................... 1.245 The International Organisation of Supreme Audit Institutions ............................. 1.245 Professional Framework ................................................................................................ 1.245

Internal Auditors .......................................................................................................................... 1.254 Standard 1210—Proficiency ................................................................................................ 1.254

1210.A2 ............................................................................................................................ 1.254 Standard 1220—Due Professional Care ............................................................................ 1.254

1220.A1 ............................................................................................................................ 1.255 1220.A3 ............................................................................................................................ 1.255

Standard 2110—Governance .............................................................................................. 1.255 2110.A1 ............................................................................................................................ 1.255

Standard 2120—Risk Management .................................................................................... 1.256 2120.A1 ............................................................................................................................ 1.256 2120.A2 ............................................................................................................................ 1.256

Standard 2130—Control ...................................................................................................... 1.256

Page 8: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

2011 Fraud Examiners Manual (International) 1.iii

MANAGEMENT'S AND AUDITORS' RESPONSIBILITIES (CONT.) 2130.A1 ............................................................................................................................ 1.256

Standard 2210—Engagement Objectives .......................................................................... 1.256 2110.A1 ............................................................................................................................ 1.256 2110.A2 ............................................................................................................................ 1.257

IIA's IPPF—Practice Guide: Internal Auditing and Fraud ..................................................... 1.257 Internal Audit's Role in Fighting Fraud ...................................................................... 1.257 Other Roles and Responsibilities for Fraud Prevention and Detection................. 1.258

Certified Fraud Examiners .......................................................................................................... 1.259 Help Resolve Allegations of Fraud ..................................................................................... 1.259 Obtain Evidence .................................................................................................................... 1.259 Take Statements ..................................................................................................................... 1.260 Write Reports ......................................................................................................................... 1.260 Testify to Findings ................................................................................................................ 1.260 Assist in the Detection and Prevention of Fraud ............................................................. 1.260

FINANCIAL STATEMENT FRAUD What Is Financial Statement Fraud? ......................................................................................... 1.303 Why Financial Statement Fraud Is Committed ....................................................................... 1.303 Trends in Financial Statement Fraud ........................................................................................ 1.305 Financial Statement Fraud Schemes .......................................................................................... 1.305

Fictitious Revenues ............................................................................................................... 1.306 Sales with Conditions ..................................................................................................... 1.307 What Red Flags Are Associated with Fictitious Revenues? ..................................... 1.307

Timing Differences (Including Premature Revenue Recognition) ................................ 1.308 Premature Revenue Recognition .................................................................................. 1.308 Long-Term Contracts .................................................................................................... 1.310 Channel Stuffing ............................................................................................................. 1.310 Recording Expenses in the Wrong Period ................................................................. 1.311 What Red Flags Are Associated with Timing Differences (Including Premature Revenue Recognition)? ........................................................................... 1.311

Improper Asset Valuation .................................................................................................... 1.312 Inventory Valuation ....................................................................................................... 1.312 Accounts Receivable ...................................................................................................... 1.313 Business Combinations.................................................................................................. 1.314 Fixed Assets ..................................................................................................................... 1.314 Understating Assets ........................................................................................................ 1.316 Misclassifying Assets ...................................................................................................... 1.316 What Red Flags Are Associated with Improper Asset Valuation? .......................... 1.316

Concealed Liabilities and Expenses .................................................................................... 1.316 Liability/Expense Omissions ....................................................................................... 1.317 Capitalised Expenses ...................................................................................................... 1.319

Page 9: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

1.iv 2011 Fraud Examiners Manual (International)

FINANCIAL STATEMENT FRAUD (CONT.) What Red Flags Are Associated with Concealed Liabilities and Expenses? .......... 1.320

Improper Disclosures ........................................................................................................... 1.321 Liability Omissions ......................................................................................................... 1.321 Subsequent Events ......................................................................................................... 1.321 Related-Party Transactions ........................................................................................... 1.322 Accounting Changes ...................................................................................................... 1.323 What Red Flags Are Associated with Improper Disclosures? ................................. 1.323

What Red Flags Are Associated with Financial Statement Fraud Generally? ..................... 1.324 Detection of Fraudulent Financial Statement Schemes ......................................................... 1.325 Financial Statement Analysis ...................................................................................................... 1.327

Percentage Analysis—Horizontal and Vertical ................................................................. 1.328 Vertical Analysis Discussion ......................................................................................... 1.329 Horizontal Analysis Discussion .................................................................................... 1.330

Ratio Analysis ......................................................................................................................... 1.330 Common Financial Ratios ............................................................................................. 1.331

Tax Return Review ................................................................................................................ 1.334 Interviews in Fraudulent Financial Statement Cases .............................................................. 1.334

Interviewing Techniques ...................................................................................................... 1.335 The Interview .................................................................................................................. 1.337

Prevention of Financial Statement Fraud ................................................................................. 1.343 Internal Auditors ................................................................................................................... 1.343 Management ........................................................................................................................... 1.343

Reduce the Situational Pressures that Encourage Financial Statement Fraud ...... 1.343 Reduce the Opportunity to Commit Fraud ................................................................ 1.344 Reduce the Rationalisation of Fraud—Strengthen Employee Personal Integrity ........................................................................................................ 1.344

ASSET MISAPPROPRIATION: CASH RECEIPTS Skimming ....................................................................................................................................... 1.401

Sales Skimming ...................................................................................................................... 1.402 Register Manipulation .................................................................................................... 1.404 Skimming During Nonbusiness Hours ....................................................................... 1.405 Skimming of Off-Site Sales ........................................................................................... 1.405 Poor Collection Procedures .......................................................................................... 1.406 Understated Sales ........................................................................................................... 1.407 Theft of Cheques Received Through the Mail ........................................................... 1.409

Cheque for Currency Substitutions .................................................................................... 1.411 Skimming Receivables .......................................................................................................... 1.412

Forcing Account Balances or Destroying Transaction Records ............................. 1.412 Lapping ............................................................................................................................ 1.413 Stolen Statements ........................................................................................................... 1.414

Page 10: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

2011 Fraud Examiners Manual (International) 1.v

ASSET MISAPPROPRIATION: CASH RECEIPTS (CONT.) False Account Entries .................................................................................................... 1.415

Inventory Padding ................................................................................................................. 1.416 Detection of Skimming Schemes ........................................................................................ 1.417

Receipt or Sales Level Detection.................................................................................. 1.417 Journal Entry Review ..................................................................................................... 1.417 Detecting Lapping of Sales or Receivables ................................................................. 1.417

Prevention of Skimming Schemes ...................................................................................... 1.418 Receipt or Sales Level Control ..................................................................................... 1.418 General Controls ............................................................................................................ 1.418 Skimming Controls......................................................................................................... 1.418

Cash Larceny ................................................................................................................................. 1.419 Incoming Cash ....................................................................................................................... 1.420

Theft of Cash from the Register .................................................................................. 1.420 Other Larceny of Sales and Receivables ..................................................................... 1.423

Cash Larceny from the Deposit .......................................................................................... 1.424 Deposit Lapping ............................................................................................................. 1.428 Deposits in Transit ......................................................................................................... 1.428

Detection of Cash Larceny .................................................................................................. 1.428 Receipt Recording .......................................................................................................... 1.428 Control Objectives ......................................................................................................... 1.429 Analytical Review ........................................................................................................... 1.429 Detection at the Register ............................................................................................... 1.430 Cash Account Analysis .................................................................................................. 1.430

Prevention of Cash Larceny ................................................................................................ 1.430 Segregation of Duties ..................................................................................................... 1.430 Assignment Rotation and Mandatory Vacations ....................................................... 1.431 Surprise Cash Counts and Procedure Supervision .................................................... 1.431 Physical Security of Cash ............................................................................................... 1.431

ASSET MISAPPROPRIATION: FRAUDULENT DISBURSEMENTS Register Disbursement Schemes ................................................................................................ 1.501

False Refunds ......................................................................................................................... 1.501 Fictitious Refunds ........................................................................................................... 1.503 Overstated Refunds ........................................................................................................ 1.503 Credit Card Refunds ...................................................................................................... 1.503

False Voids ............................................................................................................................. 1.504 Concealing Register Disbursement Schemes .................................................................... 1.507

Small Disbursements ...................................................................................................... 1.508 Destroying Records ........................................................................................................ 1.508

Detection of Register Disbursement Schemes ................................................................. 1.508 Fictitious Refunds or Voided Sales .............................................................................. 1.508

Page 11: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

1.vi 2011 Fraud Examiners Manual (International)

ASSET MISAPPROPRIATION: FRAUDULENT DISBURSEMENTS (CONT.) Review and Analysis of Decreases in Gross Sales and/or Increases in Returns and Allowances ............................................................................................. 1.509 Register Disbursement Scheme Red Flags ................................................................. 1.509

Prevention of Register Disbursement Schemes ................................................................ 1.510 Cheque Tampering Schemes ...................................................................................................... 1.510

Forged Maker Schemes ........................................................................................................ 1.511 Obtaining the Cheque .................................................................................................... 1.511 To Whom Is the Cheque Made Payable? .................................................................... 1.512 Forging the Signature ..................................................................................................... 1.514 Converting the Cheque .................................................................................................. 1.516

Forged Endorsement Schemes ........................................................................................... 1.516 Intercepting Cheques Before Delivery ........................................................................ 1.516 Theft of Returned Cheques .......................................................................................... 1.518 Re-Routing the Delivery of Cheques ........................................................................... 1.519 Converting the Stolen Cheque ...................................................................................... 1.519

Altered Payee Schemes ......................................................................................................... 1.520 Altering Cheques Prepared by Others: Inserting a New Payee ............................... 1.520 Altering Cheques Prepared by Others: “Tacking On” ............................................. 1.522 Altering Cheques Prepared by the Fraudster: Erasable Ink ..................................... 1.522 Altering Cheques Prepared by the Fraudster: Blank Cheques ................................. 1.523 Converting Altered Cheques ......................................................................................... 1.523

Authorised Maker Schemes ................................................................................................. 1.523 Overriding Controls Through Intimidation ............................................................... 1.524 Poor Controls .................................................................................................................. 1.526

Concealing Cheque Tampering Schemes ........................................................................... 1.526 The Fraudster Reconciling the Bank Statement ........................................................ 1.527 Re-Alteration of Cheques .............................................................................................. 1.528 Miscoding Fraudulent Cheques .................................................................................... 1.528 Re-Issuing Intercepted Cheques .................................................................................. 1.529 Bogus Supporting Documents ..................................................................................... 1.530

Detection of Cheque Tampering Schemes ........................................................................ 1.530 Account Analysis Through Cut-Off Statements ....................................................... 1.530 Bank Reconciliations ...................................................................................................... 1.530 Bank Confirmation ......................................................................................................... 1.531 Cheque-Tampering Red Flags ...................................................................................... 1.531

Prevention of Cheque Tampering Schemes ...................................................................... 1.532 Cheque Disbursement Controls ................................................................................... 1.532 Bank-Assisted Controls ................................................................................................. 1.533 Physical Tampering Prevention .................................................................................... 1.533 Cheque Theft Control Procedures ............................................................................... 1.534

Billing Schemes ............................................................................................................................. 1.534 Invoicing Via Shell Companies ........................................................................................... 1.535

Page 12: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

2011 Fraud Examiners Manual (International) 1.vii

ASSET MISAPPROPRIATION: FRAUDULENT DISBURSEMENTS (CONT.) Forming a Shell Company ............................................................................................. 1.535 Submitting False Invoices ............................................................................................. 1.537 Self-Approval of Fraudulent Invoices ......................................................................... 1.538 “Rubber Stamp” Supervisors ........................................................................................ 1.538 Reliance on False Documents ...................................................................................... 1.539 Collusion .......................................................................................................................... 1.539 Purchases of Services Rather than Goods .................................................................. 1.539 Pass-Through Schemes .................................................................................................. 1.540

Invoicing Via Nonaccomplice Vendors ............................................................................. 1.540 Pay-and-Return Schemes ............................................................................................... 1.540 Overbilling with a Nonaccomplice Vendor’s Invoices ............................................. 1.542

Personal Purchases With Company Funds........................................................................ 1.542 Personal Purchases Through False Invoicing ............................................................ 1.542 Personal Purchases on Credit Cards or Other Company Accounts ....................... 1.545

Detection ................................................................................................................................ 1.549 Analytical Review ........................................................................................................... 1.549 Computer-Assisted Analytical Review ........................................................................ 1.549 Statistical Sampling ......................................................................................................... 1.550 Vendor or Outsider Complaints .................................................................................. 1.550 Site Visits—Observation ............................................................................................... 1.550 Sample Audit Program .................................................................................................. 1.550

Prevention of Billing Schemes ............................................................................................ 1.552 Education (Training) ...................................................................................................... 1.553 Compensation ................................................................................................................. 1.553 Proper Documentation .................................................................................................. 1.553 Proper Approvals ........................................................................................................... 1.553 Segregation of Duties ..................................................................................................... 1.553 Hotlines ............................................................................................................................ 1.553 Competitive Bidding ...................................................................................................... 1.553 Prevention Checklist ...................................................................................................... 1.554

Payroll Fraud Schemes ................................................................................................................ 1.554 Ghost Employees .................................................................................................................. 1.555

Adding the Ghost to the Payroll .................................................................................. 1.555 Collecting Timekeeping Information .......................................................................... 1.558 Issuing the Ghost’s Paycheque ..................................................................................... 1.559 Delivery of the Paycheque ............................................................................................ 1.559

Falsified Hours and Salary ................................................................................................... 1.560 Manually Prepared Timecards ...................................................................................... 1.561 Time Clocks and Other Automated Timekeeping Systems ..................................... 1.565 Rates of Pay ..................................................................................................................... 1.565

Commission Schemes ........................................................................................................... 1.565 Fictitious Sales ................................................................................................................. 1.565

Page 13: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

1.viii 2011 Fraud Examiners Manual (International)

ASSET MISAPPROPRIATION: FRAUDULENT DISBURSEMENTS (CONT.) Altered Sales .................................................................................................................... 1.567 Altering Commission Rates .......................................................................................... 1.568

Detection of Payroll Schemes ............................................................................................. 1.568 Independent Payroll Distribution ................................................................................ 1.568 Analysis of Payee Address or Accounts ...................................................................... 1.568 Duplicate Identification Numbers ............................................................................... 1.568 Overtime Authorisation ................................................................................................ 1.568 Commissions ................................................................................................................... 1.568 Analysis of Deductions from Payroll Cheques .......................................................... 1.569 Other Detection Methods ............................................................................................. 1.569

Prevention of Payroll Schemes ............................................................................................ 1.569 Segregation of Duties ..................................................................................................... 1.570 Periodic Review and Analysis of Payroll ..................................................................... 1.570 Indicators of Payroll Fraud ........................................................................................... 1.571

Expense Reimbursement Schemes ............................................................................................ 1.572 Mischaracterised Expense Reimbursements ..................................................................... 1.573 Overstated Expense Reimbursements ............................................................................... 1.576

Altered Receipts .............................................................................................................. 1.576 Overpurchasing ............................................................................................................... 1.578 Overstating Another Employee’s Expenses ............................................................... 1.578 Orders to Overstate Expenses ..................................................................................... 1.578

Fictitious Expense Reimbursements .................................................................................. 1.579 Producing Fictitious Receipts ....................................................................................... 1.579 Obtaining Blank Receipts from Vendors .................................................................... 1.579 Claiming the Expenses of Others ................................................................................ 1.581

Multiple Reimbursements .................................................................................................... 1.581 Detection of Expense Reimbursement Schemes ............................................................. 1.582

Review and Analysis of Expense Accounts ................................................................ 1.582 Detailed Review of Expense Reports .......................................................................... 1.582

Prevention of Expense Reimbursement Schemes ............................................................ 1.582 Detailed Expense Reports: Submission and Review ................................................. 1.582

ASSET MISAPPROPRIATION: INVENTORY AND OTHER ASSETS Misuse of Inventory and Other Assets ..................................................................................... 1.601

The Costs of Inventory Misuse ........................................................................................... 1.601 Theft of Inventory and Other Assets ........................................................................................ 1.602

Larceny Schemes ................................................................................................................... 1.602 The False Sale .................................................................................................................. 1.605

Asset Requisitions and Transfers ........................................................................................ 1.605 Purchasing and Receiving Schemes .................................................................................... 1.606

Falsifying Incoming Shipments .................................................................................... 1.607

Page 14: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

2011 Fraud Examiners Manual (International) 1.ix

ASSET MISAPPROPRIATION: INVENTORY AND OTHER ASSETS (CONT.) False Shipments of Inventory and Other Assets .............................................................. 1.607 Concealing Inventory Shrinkage ......................................................................................... 1.609

Altered Inventory Records ............................................................................................ 1.612 Fictitious Sales and Accounts Receivable ................................................................... 1.612 Write-Off of Inventory and Other Assets .................................................................. 1.613 Physical Padding ............................................................................................................. 1.613

Detection of Inventory Schemes ........................................................................................ 1.613 Statistical Sampling ......................................................................................................... 1.613 Perpetual Inventory Records ........................................................................................ 1.613 Shipping Documents ..................................................................................................... 1.614 Physical Inventory Counts ............................................................................................ 1.614 Analytical Review ........................................................................................................... 1.614 Computer-Generated Trend Analysis ......................................................................... 1.615 Detailed Audit Program ................................................................................................ 1.616

Prevention of Inventory Schemes ...................................................................................... 1.617 Proper Documentation .................................................................................................. 1.617 Segregation of Duties ..................................................................................................... 1.618 Independent Checks ...................................................................................................... 1.618 Physical Safeguards ........................................................................................................ 1.618

BRIBERY AND CORRUPTION Bribery ........................................................................................................................................... 1.701

Kickback Schemes................................................................................................................. 1.702 Diverting Business to Vendors ..................................................................................... 1.704 Overbilling Schemes ...................................................................................................... 1.704 Other Kickback Schemes .............................................................................................. 1.706 Kickback Payments ........................................................................................................ 1.706

Bid-Rigging Schemes ............................................................................................................ 1.707 The Presolicitation Phase .............................................................................................. 1.707 The Solicitation Phase .................................................................................................... 1.711 The Submission Phase ................................................................................................... 1.712

Economic Extortion ............................................................................................................. 1.713 Illegal Gratuities ..................................................................................................................... 1.713 Methods of Making Illegal Payments ................................................................................. 1.714

Gifts, Travel, and Entertainment ................................................................................. 1.714 Cash Payments ................................................................................................................ 1.714 Checks and Other Financial Instruments ................................................................... 1.715 Hidden Interests ............................................................................................................. 1.715 Loans ................................................................................................................................ 1.715 Payment of Credit Card Bills ........................................................................................ 1.715 Transfers at Other than Fair Market Value ................................................................ 1.715

Page 15: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

1.x 2011 Fraud Examiners Manual (International)

BRIBERY AND CORRUPTION (CONT.) Promises of Favourable Treatment ............................................................................. 1.715

Detection of Bribery Schemes ................................................................................................... 1.716 Red Flags of Bribery Schemes ............................................................................................. 1.716

The Corrupt Recipient ................................................................................................... 1.716 The Corrupt Payer .......................................................................................................... 1.717 General Purchasing ........................................................................................................ 1.717 Presolicitation .................................................................................................................. 1.717 Bid Solicitation ................................................................................................................ 1.718 Bid Submission or Contract Acceptance .................................................................... 1.719

Methods of Proving Corrupt Payments ............................................................................. 1.720 The Business Profile—Analysis ................................................................................... 1.720 Sources of Information for the Business Profile ....................................................... 1.722

Proving On-Book Payments ................................................................................................ 1.722 Fictitious Disbursement Schemes ................................................................................ 1.722 Ghost Employee Schemes ............................................................................................ 1.726 Overbilling Schemes ...................................................................................................... 1.726

Proving Off-Book Payments ............................................................................................... 1.727 Indirect Evidence of Unrecorded Sales on the Suspect Company’s Books and Records ..................................................................................................... 1.727 Unbalanced Ratios of Costs to Sales ........................................................................... 1.727 Investigation in the Marketplace .................................................................................. 1.728 Proving Payments in Cash ............................................................................................ 1.728

Conflicts of Interest ..................................................................................................................... 1.730 Purchase Schemes ................................................................................................................. 1.732

Unique Assets ................................................................................................................. 1.734 Turnaround Sales ............................................................................................................ 1.735

Sales Schemes......................................................................................................................... 1.735 Underbillings ................................................................................................................... 1.735 Writing Off Sales ............................................................................................................ 1.736

Other Schemes ....................................................................................................................... 1.736 Business Diversions ....................................................................................................... 1.736 Resource Diversions ...................................................................................................... 1.736 Financial Interest in Companies Under Perpetrator’s Supervision ......................... 1.737 Financial Disclosure ....................................................................................................... 1.737 Appearance of Conflict of Interest .............................................................................. 1.737

Detection of Conflicts of Interest ...................................................................................... 1.738 Tips and Complaints ...................................................................................................... 1.738 Comparison of Vendor Addresses with Employee Addresses ................................ 1.738 Review of Vendor Ownership Files ............................................................................ 1.738 Review of Exit Interviews and Comparisons of Vendor Addresses to Addresses of Subsequent Employers ....................................................................... 1.738

Page 16: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

2011 Fraud Examiners Manual (International) 1.xi

BRIBERY AND CORRUPTION (CONT.) Interviews of Purchasing Personnel for Favourable Treatment of One or More Vendors .............................................................................................................. 1.739 Policies Requiring Certain Employees to Provide the Names and Employers of Immediate Family Members ............................................................. 1.739

Prevention of Conflicts of Interest ..................................................................................... 1.739 THEFT OF INTELLECTUAL PROPERTY Competitive Intelligence (CI) Versus Espionage .................................................................... 1.802 Open Sources of Information .................................................................................................... 1.803

Why Do Companies Resort to Corporate Espionage? .................................................... 1.804 The Bootstrap Effect ............................................................................................................ 1.806

The Intelligence Pyramid ............................................................................................................ 1.807 Fundamental Intelligence Techniques ................................................................................ 1.807 Basic Sources .......................................................................................................................... 1.807

Industry Analyst Reports ............................................................................................... 1.808 Electronic Sources .......................................................................................................... 1.808

Creative Sources .................................................................................................................... 1.809 Classified Ads .................................................................................................................. 1.809 Environmental Impact Statements .............................................................................. 1.810 Proxies .............................................................................................................................. 1.810 Posing as a Customer ..................................................................................................... 1.810

Building Financial Statements .................................................................................................... 1.811 How Income Statements Are Calculated ........................................................................... 1.812

Revenue Estimates ......................................................................................................... 1.812 Costs of Goods Sold ...................................................................................................... 1.812 Overhead ......................................................................................................................... 1.813

How Balance Sheets Are Calculated ................................................................................... 1.813 Nontraditional Sources ................................................................................................................ 1.814 A Corporate Spy Uses Open Sources: What of It? ................................................................. 1.815 Favourite Targets ......................................................................................................................... 1.816

Research and Development ................................................................................................. 1.816 Marketing ................................................................................................................................ 1.817 Manufacturing and Production ........................................................................................... 1.817 Human Resources ................................................................................................................. 1.817

How Information Is Lost ........................................................................................................... 1.817 Accident .................................................................................................................................. 1.818 Poor Information Security Procedures .............................................................................. 1.818

On-site Materials That Are Targeted ........................................................................... 1.818 Guarding Manual Systems ............................................................................................. 1.820 Guarding Information Stored in Electronic Format ................................................. 1.821

Basic Principles of Spying ........................................................................................................... 1.823

Page 17: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

1.xii 2011 Fraud Examiners Manual (International)

THEFT OF INTELLECTUAL PROPERTY (CONT.) Recruited Spies ...................................................................................................................... 1.823

False Flag Recruitment .................................................................................................. 1.823 Recruiting by Justification ............................................................................................. 1.824 Trapping Recruits ........................................................................................................... 1.824

Counter-Recruitment Training ............................................................................................ 1.824 After Recruitment ................................................................................................................. 1.825

Targeted Information .................................................................................................... 1.825 Methods for Safely Collecting Data ............................................................................. 1.826 Communications Between the Employee and the Control ...................................... 1.826 Security Measures for the Recruit ................................................................................ 1.827 Planting Bugs .................................................................................................................. 1.827

Deception Techniques .......................................................................................................... 1.827 Employment Advertisements ....................................................................................... 1.828 Headhunter Scams.......................................................................................................... 1.828 Market Research Scams ................................................................................................. 1.828 Phoney Contract Bids .................................................................................................... 1.828

Infiltration Techniques ................................................................................................................ 1.829 Posing as an Employee or Contract Labourer .................................................................. 1.829 Stealing Badges ...................................................................................................................... 1.830 Moles and Sleepers ................................................................................................................ 1.831 Places Where Spies Snoop ................................................................................................... 1.831

Mailroom ......................................................................................................................... 1.832 Loading Docks ................................................................................................................ 1.832 Storage Areas ................................................................................................................... 1.832 Hotels ............................................................................................................................... 1.833

Warning Signs of Infiltrations ............................................................................................. 1.834 Countermeasures ................................................................................................................... 1.836

Transactional Intelligence ........................................................................................................... 1.837 Informants .............................................................................................................................. 1.837 Decoy Websites ..................................................................................................................... 1.838

Telling Good Lies ........................................................................................................................ 1.839 Visual Surveillance Against People ............................................................................................ 1.840

Pre-Recruitment Surveillance .............................................................................................. 1.840 Briefing Files on the Subject ................................................................................................ 1.841 Moving Surveillance .............................................................................................................. 1.841 Fixed Surveillance .................................................................................................................. 1.842

E-Mail ............................................................................................................................................ 1.842 Social Engineering ........................................................................................................................ 1.843

The Neophyte ........................................................................................................................ 1.843 The Power Broker ................................................................................................................. 1.843 The Systems Administrator ................................................................................................. 1.844 Fraudulent Surveys ................................................................................................................ 1.844

Page 18: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

2011 Fraud Examiners Manual (International) 1.xiii

THEFT OF INTELLECTUAL PROPERTY (CONT.) Fake Prizes ............................................................................................................................. 1.844 Reverse Social Engineering .................................................................................................. 1.844 Countering Social Engineering ............................................................................................ 1.845

Cloaking and Misdirection .......................................................................................................... 1.846 Intelligence Needs ................................................................................................................. 1.846

Print Media ...................................................................................................................... 1.846 Database Searches .......................................................................................................... 1.847 Existing Staffing ............................................................................................................. 1.847 Security Surveys .............................................................................................................. 1.848

Cloaking Operations ............................................................................................................. 1.849 Trash and Waste Disposal ............................................................................................. 1.850 Deliveries and Shipments .............................................................................................. 1.850 Hours of Operation and Power Consumption .......................................................... 1.850 Emissions ......................................................................................................................... 1.850 Food Deliveries ............................................................................................................... 1.851 Computer Emanations .................................................................................................. 1.851 Travel Plans ..................................................................................................................... 1.851

Misdirection ........................................................................................................................... 1.852 Spotting False Suitors .................................................................................................... 1.852 Vendors and Suppliers ................................................................................................... 1.854 Technical Articles and Publications ............................................................................. 1.854 Consultants ...................................................................................................................... 1.854 Dealing with Employees Who Are Leaving ............................................................... 1.855 Hackers ............................................................................................................................ 1.855

Technical Surveillance ................................................................................................................. 1.856 Aerial Photography ............................................................................................................... 1.858 Bugging and Wiretapping ..................................................................................................... 1.858

The Insertion Point ........................................................................................................ 1.858 The Technology .............................................................................................................. 1.859 Warning Signs of Bugging ............................................................................................. 1.861 Preliminary Search Procedures ..................................................................................... 1.864

Video Surveillance ................................................................................................................. 1.867 Photographic Cameras.......................................................................................................... 1.868

Minicameras .................................................................................................................... 1.868 Digital Cameras ............................................................................................................... 1.868 Infrared Film ................................................................................................................... 1.869 Digital Cameras ............................................................................................................... 1.869

Cellular Telephones ............................................................................................................... 1.870 Monitoring Computer Emanations .................................................................................... 1.870 Tape Recorders ...................................................................................................................... 1.871 Computer System Penetrations ........................................................................................... 1.871

Investigating an Information Theft Case ................................................................................. 1.871

Page 19: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

1.xiv 2011 Fraud Examiners Manual (International)

THEFT OF INTELLECTUAL PROPERTY (CONT.) Program for Safeguarding Proprietary Information (SPI) ..................................................... 1.873

Task Force .............................................................................................................................. 1.873 Employee Awareness ............................................................................................................ 1.874 Nondisclosure Agreements .................................................................................................. 1.874 Document Classification ...................................................................................................... 1.875 Visitors .................................................................................................................................... 1.875 Offices ..................................................................................................................................... 1.875 Maintenance Workers ........................................................................................................... 1.876 Meeting Rooms ...................................................................................................................... 1.876 Quiet Rooms .......................................................................................................................... 1.876 Communications Equipment .............................................................................................. 1.876 Electronic Mail and Voice Mail ........................................................................................... 1.876 Computer Systems ................................................................................................................ 1.877 Faxing Documents ................................................................................................................ 1.878 Video Encryption .................................................................................................................. 1.878 Corporate Telephone Exchanges ........................................................................................ 1.878 Trade Shows and Public Events ......................................................................................... 1.879 Foreign Travel ........................................................................................................................ 1.879

Technical Surveillance Countermeasures (TSCM) Survey ..................................................... 1.879 Preventing Employee Theft of Proprietary Information ....................................................... 1.881

Employee Awareness ............................................................................................................ 1.881 Nondisclosure and Noncompetition Agreements ............................................................ 1.882 Make Sure Employees Know When Not to Speak .......................................................... 1.883 Exit Interviews ....................................................................................................................... 1.883

Protecting the Trade Secrets of Others .................................................................................... 1.884 FINANCIAL INSTITUTION FRAUD Embezzlement Schemes ............................................................................................................. 1.901

Types of Embezzlement Schemes ...................................................................................... 1.901 False Accounting Entries .............................................................................................. 1.901 Unauthorised Withdrawals ............................................................................................ 1.901 Unauthorised Disbursement of Funds to Outsiders ................................................. 1.901 Paying Personal Expenses from Bank Funds ............................................................. 1.902 Theft of Physical Property ............................................................................................ 1.902 Moving Money from Customers’ Dormant or Inactive Accounts ......................... 1.902 Unauthorised, Unrecorded Cash Payments ................................................................ 1.902 Theft and Other Unauthorised Use of Collateral ...................................................... 1.902

Detection Methods ............................................................................................................... 1.902 Loan Fraud .................................................................................................................................... 1.903

Financial Institution Failures as a Result of Real Estate Loan Fraud ............................ 1.903 Common Loan Fraud Schemes .......................................................................................... 1.903

Page 20: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

2011 Fraud Examiners Manual (International) 1.xv

FINANCIAL INSTITUTION FRAUD (CONT.) Loans to Nonexistent Borrowers ................................................................................. 1.903 Sham Loans with Kickbacks and Diversion ............................................................... 1.903 Double-Pledging Collateral ........................................................................................... 1.904 Reciprocal Loan Arrangements .................................................................................... 1.904 Swapping Bad Loans—Daisy Chains .......................................................................... 1.904 Linked Financing ............................................................................................................ 1.904 False Applications with False Credit Information ..................................................... 1.904 Single-Family Housing Loan Fraud ............................................................................. 1.904 Construction Loans ........................................................................................................ 1.904

Red Flags of Loan Fraud ...................................................................................................... 1.908 Nonperforming Loans ................................................................................................... 1.908 High Turnover in Developer’s Personnel ................................................................... 1.909 High Turnover in Tenant Mix ...................................................................................... 1.909 Increased Change Orders .............................................................................................. 1.909 Missing Documentation ................................................................................................ 1.909 Loan Increases or Extensions, Replacement Loans .................................................. 1.911 Funds Transformation ................................................................................................... 1.912 Cash Flow Deficiencies ................................................................................................. 1.912 Change in Ownership Makeup ..................................................................................... 1.912

Disguised Transactions ......................................................................................................... 1.912 Real Estate Fraud ......................................................................................................................... 1.913

Appraisal Fraud ..................................................................................................................... 1.914 The Role of the Appraiser ............................................................................................. 1.914 Fundamentals of Real Estate Appraisals ..................................................................... 1.914 Determining “Value” ..................................................................................................... 1.914 Valuation Methods ......................................................................................................... 1.915 Fraudulent Appraisals .................................................................................................... 1.916 Uses for Fraudulent Appraisals .................................................................................... 1.916 Red Flags of “Made-as-Instructed” Appraisals .......................................................... 1.917 Detecting Fraudulent Appraisals .................................................................................. 1.917

Equity Skimming ................................................................................................................... 1.918 Property Flipping .................................................................................................................. 1.918 Nominee or Strawman Loans .............................................................................................. 1.919 Mortgage Pulling ................................................................................................................... 1.919

New Account Fraud Schemes .................................................................................................... 1.919 False Identification ................................................................................................................ 1.919 Business Accounts Using Stolen Cheques ......................................................................... 1.919 Personal Accounts Using Fraudulent Cheques ................................................................. 1.920 Prevention .............................................................................................................................. 1.920

Personal Accounts .......................................................................................................... 1.920 Business Accounts .......................................................................................................... 1.921

Detection ................................................................................................................................ 1.922

Page 21: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

1.xvi 2011 Fraud Examiners Manual (International)

FINANCIAL INSTITUTION FRAUD (CONT.) Money Transfer (Wire) Fraud Schemes .................................................................................... 1.922

Instantaneous Transfer ......................................................................................................... 1.922 Common Schemes ................................................................................................................ 1.923

Dishonest Bank Employees .......................................................................................... 1.923 Misrepresentation of Identity ....................................................................................... 1.923 System Password Security Compromised ................................................................... 1.923 Forged Authorisations ................................................................................................... 1.923 Unauthorised Entry and Interception ......................................................................... 1.923

Preventing and Detecting Wire Transfer Fraud ............................................................... 1.923 Business Audits and Other Controls ........................................................................... 1.923 Bank Audits ..................................................................................................................... 1.924

Automated Teller Machine (ATM) Fraud ................................................................................ 1.925 Detection ................................................................................................................................ 1.926

Advanced Fee Fraud .................................................................................................................... 1.926 Red Flags ................................................................................................................................ 1.926 Brokered Loans ..................................................................................................................... 1.927

Letter-of-Credit Fraud ................................................................................................................. 1.927 Inside/Outside Frauds ................................................................................................................ 1.927

Account Information Frauds ............................................................................................... 1.928 Trading Activities .................................................................................................................. 1.928

Prevention ..................................................................................................................................... 1.928 Loan Origination, Underwriting, Closing, Disbursement, and Servicing Segregation ......................................................................................................... 1.928 Committee Approval of All Large or Unusual Transactions .......................................... 1.928 Transfer Journal Entries and Orders Review .................................................................... 1.929 Independent Review of Loans ............................................................................................ 1.929 Management Review of Write-Offs ................................................................................... 1.929 Routine Examination of Officers’ Accounts .................................................................... 1.929 Proper Lending Policies ....................................................................................................... 1.929 Document Requirements for Standard Transactions ...................................................... 1.929 Information Verification (For Example, Loan Applications) ......................................... 1.930 Employee Training ................................................................................................................ 1.930 Standardised Procedures ...................................................................................................... 1.930

The Basel Committee on Banking Supervision ....................................................................... 1.931 The Basel Core Principles for Effective Banking Supervision ....................................... 1.932 The International Convergence of Capital Measurement and Capital Standards ........ 1.938 Capital Requirements ............................................................................................................ 1.938 The Basel II Framework ...................................................................................................... 1.939 Sound Practices for the Management and Supervision of Operational Risk ............... 1.941

Background ..................................................................................................................... 1.942 Industry Trends and Practices ...................................................................................... 1.943 Sound Practices ............................................................................................................... 1.944

Page 22: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

2011 Fraud Examiners Manual (International) 1.xvii

CHEQUE AND CREDIT CARD FRAUD Cheque Fraud ............................................................................................................................... 1.1001

Counterfeiting Cheques ........................................................................................................ 1.1001 Signs of Counterfeit and Forged Cheques .................................................................. 1.1002

Cheque Fraud Vulnerabilities .............................................................................................. 1.1002 Cheque Theft ......................................................................................................................... 1.1002 Cheque Fraud Schemes ........................................................................................................ 1.1003

Paperhangers ................................................................................................................... 1.1003 Stop Payment Orders ..................................................................................................... 1.1003 Cheque Kiting ................................................................................................................. 1.1004 Demand Drafts ............................................................................................................... 1.1004 Third-Party Bill Paying Services ................................................................................... 1.1004 Travellers’ Cheques ........................................................................................................ 1.1005 Payroll Cheque Fraud .................................................................................................... 1.1005 Dumpster Diving ............................................................................................................ 1.1006 Scanning ........................................................................................................................... 1.1006 System Password Security Compromised ................................................................... 1.1006

Cheque Fraud Rings .................................................................................................................... 1.1006 Cheque Fraud Detection ............................................................................................................. 1.1007

FBI Profile of Cheque Fraud Activity ................................................................................ 1.1007 Detection Techniques ........................................................................................................... 1.1008

Cheque Fraud Prevention and Investigation ........................................................................... 1.1009 Cheque Fraud Investigations ............................................................................................... 1.1010 Cheque Fraud Prevention Tools ......................................................................................... 1.1011

Check Writing Pens ........................................................................................................ 1.1011 Fingerprint Identifiers .................................................................................................... 1.1012 Forensic Document Examination ................................................................................ 1.1012 Signature .......................................................................................................................... 1.1012 Handwriting ..................................................................................................................... 1.1013 Video Spectral Comparator .......................................................................................... 1.1013 Electrostatic Detection Apparatus ............................................................................... 1.1013

Credit Card Fraud ........................................................................................................................ 1.1013 Credit Card Schemes ............................................................................................................. 1.1013

Unauthorised Use of a Lost or Stolen Card ............................................................... 1.1013 Organised Crime Rings .................................................................................................. 1.1014 Advance Payments ......................................................................................................... 1.1014 Stolen Card Numbers .................................................................................................... 1.1014 Shave and Paste .............................................................................................................. 1.1015 De-Emboss/Re-Emboss ............................................................................................... 1.1015 Counterfeit Cards ........................................................................................................... 1.1015 Telephone/Mail Order Fraud ....................................................................................... 1.1016 Mail Theft ........................................................................................................................ 1.1016

Page 23: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

1.xviii 2011 Fraud Examiners Manual (International)

CHEQUE AND CREDIT CARD FRAUD (CONT.) False Applications .......................................................................................................... 1.1016 Credit “Doctors” ............................................................................................................ 1.1016 True Name Fraud ........................................................................................................... 1.1016 Non-Receipt Fraud ........................................................................................................ 1.1017 Key-Enter Counterfeiting ............................................................................................. 1.1017 Creditmaster .................................................................................................................... 1.1017 Probing ............................................................................................................................. 1.1017 Skimming ......................................................................................................................... 1.1018 Pretext Calling ................................................................................................................. 1.1018 Account Takeover .......................................................................................................... 1.1018 Institutional Identity Theft and “Spoof” Sites ........................................................... 1.1018

Guidance for Cardholders ................................................................................................... 1.1019 Merchant Scams .................................................................................................................... 1.1020 Company Credit Cards ......................................................................................................... 1.1021

Prevention and Detection of Credit Card Fraud ..................................................................... 1.1021 Prevention .............................................................................................................................. 1.1023

Education Programs ...................................................................................................... 1.1023 Liaison with Law Enforcement .................................................................................... 1.1023

Technological Deterrents ..................................................................................................... 1.1023 Activation of Cards ........................................................................................................ 1.1024 CyberSource Advanced Fraud Screen ......................................................................... 1.1024 Computer Edits .............................................................................................................. 1.1024 Card Scrutiny at Point of Sale ....................................................................................... 1.1025 Smart Cards and Chip Cards ........................................................................................ 1.1025 Internet/Telephone Orders .......................................................................................... 1.1025

Electronic Bill Payment and Person-to-Person Payments ..................................................... 1.1027 Electronic Fund Transfer ..................................................................................................... 1.1027 Electronic Bill Presentment and Payment ......................................................................... 1.1028

Biller Direct Systems ...................................................................................................... 1.1028 Person to Person (P2P) Payment Systems ........................................................................ 1.1029

A Model of P2P: PayPal ................................................................................................ 1.1030 Types of Fraud ....................................................................................................................... 1.1030 Detection and Deterrence of Electronic Transfer Fraud ................................................ 1.1031

Issuance and Use of Access Devices ........................................................................... 1.1031 Operation of Payment Systems .................................................................................... 1.1032 Protection of Internet Addresses ................................................................................. 1.1033 Prevention of EFT Fraud in Other Companies ........................................................ 1.1033

INSURANCE FRAUD Types of Insurance Policies ........................................................................................................ 1.1101 Agent/Broker Fraud .................................................................................................................... 1.1102

Page 24: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

2011 Fraud Examiners Manual (International) 1.xix

INSURANCE FRAUD (CONT.) Cash, Loan, and Dividend Cheques ................................................................................... 1.1102 Settlement Cheques ............................................................................................................... 1.1102 Premium Fraud ...................................................................................................................... 1.1102 Fictitious Payees .................................................................................................................... 1.1103 Fictitious Death Claims ........................................................................................................ 1.1103 Underwriting Irregularities ................................................................................................... 1.1103

Misrepresentation ........................................................................................................... 1.1103 False Information ........................................................................................................... 1.1103 Fictitious Policies ............................................................................................................ 1.1104 Surety and Performance Bond Schemes ..................................................................... 1.1104 Sliding ............................................................................................................................... 1.1104 Twisting ............................................................................................................................ 1.1104 Churning .......................................................................................................................... 1.1104

Vehicle Insurance Schemes ........................................................................................................ 1.1104 Ditching .................................................................................................................................. 1.1104 Past Posting ............................................................................................................................ 1.1105 Vehicle Repair ........................................................................................................................ 1.1105 Vehicle Smuggling ................................................................................................................. 1.1105 Phantom Vehicles ................................................................................................................. 1.1105 Staged Accidents .................................................................................................................... 1.1105

Two Vehicle Accident.................................................................................................... 1.1105 Three or More Vehicle Accident .................................................................................. 1.1106 Other Staged Accidents ................................................................................................. 1.1106

Inflated Damages .................................................................................................................. 1.1106 Vehicle Identification Number (VIN) Switch ................................................................... 1.1106 Rental Car Fraud ................................................................................................................... 1.1106

Property Schemes ......................................................................................................................... 1.1106 Inflated Inventory ................................................................................................................. 1.1107 Phoney or Inflated Thefts .................................................................................................... 1.1107 Paper Boats ............................................................................................................................ 1.1107

Life Insurance Schemes ............................................................................................................... 1.1107 Fraudulent Death Claims ..................................................................................................... 1.1107 Murder for Profit ................................................................................................................... 1.1107

Liability Schemes .......................................................................................................................... 1.1107 “Red Flags” of Insurance Fraud ................................................................................................ 1.1108 General Insurance Fraud Indicators.......................................................................................... 1.1111 Computer-Generated Detection Reports ................................................................................. 1.1112

Address Similarity Report .................................................................................................... 1.1112 Electronic Confirmations ..................................................................................................... 1.1112 Exception or Manual Override Reports ............................................................................ 1.1112

Workers’ Compensation Fraud .................................................................................................. 1.1112 Common Schemes ................................................................................................................ 1.1112

Page 25: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

1.xx 2011 Fraud Examiners Manual (International)

INSURANCE FRAUD (CONT.) Premium Fraud ............................................................................................................... 1.1112 Agent Fraud ..................................................................................................................... 1.1114 Claimant Fraud ............................................................................................................... 1.1114 Organised Fraud ............................................................................................................. 1.1115

Red Flags ................................................................................................................................ 1.1116 Investigation Tips .................................................................................................................. 1.1119

Premium Fraud ............................................................................................................... 1.1119 Claimant Fraud ............................................................................................................... 1.1119

HEALTH CARE FRAUD Definition ...................................................................................................................................... 1.1201 Provider Fraud .............................................................................................................................. 1.1201

Provider Services Charged But Not Rendered ................................................................. 1.1201 Overutilisation ....................................................................................................................... 1.1201 Unnecessary Medical Testing .............................................................................................. 1.1202 Fictitious Providers – Bogus Doctors ................................................................................ 1.1202 Photocopied Claim Forms with Benefit Assignment Repeatedly Submitted by a Provider with New Date of Service ................................................................................ 1.1202 Double Billing ........................................................................................................................ 1.1202 Fictitious Diagnostic Codes ................................................................................................. 1.1202 Coding Fragmentation .......................................................................................................... 1.1203 Mutually Exclusive Procedures ........................................................................................... 1.1204 Upcoding ................................................................................................................................ 1.1204

Insured Fraud ............................................................................................................................... 1.1204 Fictitious Claims .................................................................................................................... 1.1204 Multiple Claims ...................................................................................................................... 1.1204 Alteration ................................................................................................................................ 1.1205 Ineligible Dependants ........................................................................................................... 1.1205 Doctor Shopping ................................................................................................................... 1.1205 Third-Party Fraud .................................................................................................................. 1.1205 Death of Insured ................................................................................................................... 1.1205 Red Flags ................................................................................................................................ 1.1206

Detection ......................................................................................................................... 1.1206 Employee Claims Fraud ....................................................................................................... 1.1206

Detection ......................................................................................................................... 1.1207 Prevention ....................................................................................................................... 1.1207

CONSUMER FRAUD Con Schemes ................................................................................................................................ 1.1301

Advance Fee Swindles and Debt Consolidation Schemes .............................................. 1.1302 Directory Advertising Schemes ........................................................................................... 1.1302

Page 26: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

2011 Fraud Examiners Manual (International) 1.xxi

CONSUMER FRAUD (CONT.) Merchandising Schemes ....................................................................................................... 1.1303 Personal Improvement Frauds ............................................................................................ 1.1303 Diploma Mills ........................................................................................................................ 1.1303 Modeling Schools .................................................................................................................. 1.1303 Direct Debit from Chequing Accounts ............................................................................. 1.1303 Equity-Skimming Schemes .................................................................................................. 1.1304 Fundraising, Nonprofits, and Religious Schemes ............................................................. 1.1304 Home-Based Businesses ....................................................................................................... 1.1304 Home Improvements ........................................................................................................... 1.1304 Money Manager or Financial Planner ................................................................................ 1.1304 Phone Card Schemes ............................................................................................................ 1.1304 Scavenger or Revenge Scheme ............................................................................................ 1.1304 Sweepstakes, Giveaways, and Prizes .................................................................................. 1.1305 College Scholarship Services ................................................................................................ 1.1305 Credit Repair .......................................................................................................................... 1.1305 Weight Loss Fraud ................................................................................................................ 1.1305 Other Con Schemes .............................................................................................................. 1.1305

Block Hustle .................................................................................................................... 1.1305 Pigeon Drop .................................................................................................................... 1.1305 Bank Examiner Swindle ................................................................................................ 1.1306 Jamaican Handkerchief or Envelope Switch .............................................................. 1.1306 The Obituary Hustle ...................................................................................................... 1.1306 Three-Card Monte .......................................................................................................... 1.1306 Poker Bunco .................................................................................................................... 1.1306 Missing-Heir Scheme ..................................................................................................... 1.1306 Gold Mine Swindle ......................................................................................................... 1.1307 Spanish Prisoner Game ................................................................................................. 1.1307 Murphy Game ................................................................................................................. 1.1307 Badger Game ................................................................................................................... 1.1307 Goat Pasture Scam ......................................................................................................... 1.1307

Telemarketing Fraud .................................................................................................................... 1.1307 Telemarketing Terminology ................................................................................................. 1.1308

Boiler Room Staff ........................................................................................................... 1.1308 Fronters ............................................................................................................................ 1.1308 Closers .............................................................................................................................. 1.1308 Verifiers ............................................................................................................................ 1.1308

Staff Exploitation .................................................................................................................. 1.1309 Telemarketing Suppliers ....................................................................................................... 1.1309

Turnkeys .......................................................................................................................... 1.1310 Independent Service Organisations ............................................................................. 1.1310 Factoring Companies ..................................................................................................... 1.1310 Cheque-Cashing Establishments .................................................................................. 1.1311

Page 27: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

1.xxii 2011 Fraud Examiners Manual (International)

CONSUMER FRAUD (CONT.) Common Telemarketing Scams .......................................................................................... 1.1311

Senior Scams ................................................................................................................... 1.1311 Targeting the Unemployed ........................................................................................... 1.1312 Affinity Fraud .................................................................................................................. 1.1312 Consolation ..................................................................................................................... 1.1312 Toll-Free Numbers ......................................................................................................... 1.1313 Automatic Debits ........................................................................................................... 1.1313 Business Opportunities (Biz Ops) and Work-at-Home Schemes ........................... 1.1314 Fly and Buy ...................................................................................................................... 1.1314 Vending Machine and Pay Phone Scams .................................................................... 1.1315 Entrepreneurial Enterprises .......................................................................................... 1.1315 Employment Services .................................................................................................... 1.1315 Credit Services................................................................................................................. 1.1316 Credit Repair Scams ....................................................................................................... 1.1316 Prime-Rate Credit Cards ................................................................................................ 1.1316 Gold Cards ...................................................................................................................... 1.1316 Real Estate ....................................................................................................................... 1.1317 Art/Rare Items ............................................................................................................... 1.1317 Collectibles and Memorabilia ........................................................................................ 1.1318 Precious Stones ............................................................................................................... 1.1318 Precious Metals ............................................................................................................... 1.1319 International Calls .......................................................................................................... 1.1319 Selling Free Information................................................................................................ 1.1319 Scholarship Services ....................................................................................................... 1.1319 Charity Fronts ................................................................................................................. 1.1320 Door-to-Door Promotions ........................................................................................... 1.1320 Prizes, Sweepstakes, Discount Services ...................................................................... 1.1320 Magazine Subscriptions ................................................................................................. 1.1321 Office and Household Supplies ................................................................................... 1.1321 Phishing ........................................................................................................................... 1.1321 SMiShing or Tishing ....................................................................................................... 1.1323 Voice Phishing or Vishing ............................................................................................. 1.1323 Pharming .......................................................................................................................... 1.1323 Recovery Rooms ............................................................................................................. 1.1324

Ponzi and Pyramid Schemes ...................................................................................................... 1.1324 Definition ............................................................................................................................... 1.1324 Illegal Pyramid or Ponzi Scheme? ....................................................................................... 1.1325

Pyramid Schemes, Legal and Illegal ............................................................................. 1.1325 What’s the Difference Between an Illegal Pyramid and a Ponzi Scheme? ................... 1.1326 Categories of Ponzi Schemes .............................................................................................. 1.1328

Pure Cash Schemes ........................................................................................................ 1.1328 Product Fronts ................................................................................................................ 1.1330

Page 28: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

2011 Fraud Examiners Manual (International) 1.xxiii

CONSUMER FRAUD (CONT.) Spotting Pyramid Schemes................................................................................................... 1.1332

Identity Theft ................................................................................................................................ 1.1334 The Profile .............................................................................................................................. 1.1334 Common Ways of Obtaining Information ........................................................................ 1.1335

Sorting Through Discarded Trash ............................................................................... 1.1335 Shoulder Surfing ............................................................................................................. 1.1336 Rifling Through CoWorkers’ Desk Drawers .............................................................. 1.1336 Theft of Mail—Incoming or Outgoing ....................................................................... 1.1336 Using an Accomplice Within the Organisation ......................................................... 1.1336 Soliciting Identifiers Through False Job Application Schemes ............................... 1.1337 Certifications, Diplomas, or Licences Placed On Workplace Walls ....................... 1.1337 Using Pretext, Ruse, or Gag Calls ................................................................................ 1.1337 Rental and Loan Applications ...................................................................................... 1.1337 Public Records ................................................................................................................ 1.1337 The Internet .................................................................................................................... 1.1338

Tracking Down the Thief .................................................................................................... 1.1338 Confronting the Fraudster ................................................................................................... 1.1339 Preventing False Identity Fraud .......................................................................................... 1.1339 What To Do If Your Identity Is Stolen ............................................................................. 1.1340

COMPUTER AND INTERNET FRAUD Computer Fraud ........................................................................................................................... 1.1401 Computer Hacking ....................................................................................................................... 1.1403

Definition ............................................................................................................................... 1.1403 Social Engineering ................................................................................................................. 1.1404 Hacker Computer Manipulation ......................................................................................... 1.1405

Trojan Horse ................................................................................................................... 1.1405 Trap Doors ...................................................................................................................... 1.1405 Salami Techniques .......................................................................................................... 1.1405 Logic Bombs ................................................................................................................... 1.1405 Data Diddling .................................................................................................................. 1.1406 Scavenging and Dumpster Diving ............................................................................... 1.1406 Data Leakage ................................................................................................................... 1.1406 Piggybacking/Impersonation ....................................................................................... 1.1406 Simulation and Modelling ............................................................................................. 1.1406 Wire Tapping .................................................................................................................. 1.1406 Network Weaving ........................................................................................................... 1.1406 Altering the Way a System Generates Passwords ...................................................... 1.1407 Buffer Overflow Exploits ............................................................................................. 1.1407 Privilege Escalation Exploits ........................................................................................ 1.1408 Backdoors ........................................................................................................................ 1.1408

Page 29: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

1.xxiv 2011 Fraud Examiners Manual (International)

COMPUTER AND INTERNET FRAUD (CONT.) HTTP Exploits ............................................................................................................... 1.1408

Anti-Hacker Measures .......................................................................................................... 1.1409 Hacker Detection Measures ................................................................................................. 1.1410 Hacking Insurance ................................................................................................................ 1.1411

Electronic Mail ............................................................................................................................. 1.1411 E-Mail Security Concerns .................................................................................................... 1.1412

E-mail Ownership .......................................................................................................... 1.1412 Organisational Liability .................................................................................................. 1.1413

Computer Viruses ........................................................................................................................ 1.1414 Hoaxes .................................................................................................................................... 1.1415 Types and Terminology of Computer Viruses ................................................................. 1.1415

Macro Virus ..................................................................................................................... 1.1415 Boot Sector Viruses ........................................................................................................ 1.1416 Parasitic Viruses .............................................................................................................. 1.1416 TSR Viruses ..................................................................................................................... 1.1417 Application Software Viruses ....................................................................................... 1.1417 Multi-Partite Viruses ...................................................................................................... 1.1417 Polymorphic Viruses ...................................................................................................... 1.1418 Stealth Viruses ................................................................................................................. 1.1418 Mutation Engine Viruses ............................................................................................... 1.1418 Network Viruses ............................................................................................................. 1.1419 Worms .............................................................................................................................. 1.1419

Virus Carriers ......................................................................................................................... 1.1420 Virus Indicators ..................................................................................................................... 1.1420 Virus Protection .................................................................................................................... 1.1421 Antivirus Software Operation ............................................................................................. 1.1421

Conventional Disk Scanners ......................................................................................... 1.1421 Heuristic Scanners .......................................................................................................... 1.1421 Behaviour-Based Detection Scanners ......................................................................... 1.1422 Change Detection Scanners .......................................................................................... 1.1422 Inoculation ....................................................................................................................... 1.1422

Investigating Virus Infections ............................................................................................. 1.1422 Internet Fraud ............................................................................................................................... 1.1423

Typical Internet Schemes ..................................................................................................... 1.1423 Modem Hijacking ........................................................................................................... 1.1423 Internet Commerce ........................................................................................................ 1.1424 Get Rich Quick ............................................................................................................... 1.1424 Pyramid Schemes ............................................................................................................ 1.1424 Foreign Trusts ................................................................................................................. 1.1424 Chain Letters ................................................................................................................... 1.1425 Investment and Securities Fraud .................................................................................. 1.1425 Spamming ........................................................................................................................ 1.1425

Page 30: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

2011 Fraud Examiners Manual (International) 1.xxv

COMPUTER AND INTERNET FRAUD (CONT.) Counterfeit Cheque Scams ............................................................................................ 1.1426 Phishing ........................................................................................................................... 1.1426 SMiShing or Tishing ....................................................................................................... 1.1429 Pharming .......................................................................................................................... 1.1430

Combating Internet Fraud ................................................................................................... 1.1430 Electronic Commerce .................................................................................................................. 1.1431

Applying Encryption to E-Commerce Security ................................................................ 1.1433 Smart Cards ..................................................................................................................... 1.1433

Insider Threats .............................................................................................................................. 1.1434 Characteristics ........................................................................................................................ 1.1435

Computer Security ....................................................................................................................... 1.1436 Effective Security .................................................................................................................. 1.1436

Securing the Communications Network ..................................................................... 1.1436 Passwords ........................................................................................................................ 1.1436 Other Network Security ................................................................................................ 1.1437

The Risk Assessment Process ............................................................................................. 1.1438 Internal Controls in the Data Centre ........................................................................................ 1.1438

Systems Maintenance ............................................................................................................ 1.1439 Implementation Controls ..................................................................................................... 1.1439 Computer Operations ........................................................................................................... 1.1440 System Software .................................................................................................................... 1.1440 Data Files ................................................................................................................................ 1.1440 Access and Telecommunication Controls ......................................................................... 1.1440 Segregation of Duties ........................................................................................................... 1.1441 Logs and History Files .......................................................................................................... 1.1441 Security Software ................................................................................................................... 1.1442

Internal Controls in Computer Applications ........................................................................... 1.1443 Control Techniques .............................................................................................................. 1.1443 Control Objectives ................................................................................................................ 1.1444 Evaluating Application Controls ......................................................................................... 1.1444 End-User Computing Internal Control ............................................................................. 1.1445

Conducting an Investigation Regarding Computer Crimes ................................................... 1.1445 PUBLIC SECTOR FRAUD False Claims and Statements ...................................................................................................... 1.1501

Examples of False Claims .................................................................................................... 1.1501 Detection ................................................................................................................................ 1.1501

Failure to Produce Documents in a Timely Manner ................................................. 1.1502 Failure to Respond to Inquiries in a Timely Manner ................................................ 1.1502 Inadequacies in Reporting Requirements ................................................................... 1.1502 Failure to Have Adequate Information Gathering and Retrieval Systems ............ 1.1502

Page 31: Indice manual de certificación ACFE

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

1.xxvi 2011 Fraud Examiners Manual (International)

PUBLIC SECTOR FRAUD (CONT.) Altered or Missing Documents .................................................................................... 1.1502 Photocopied or Duplicate Documents ....................................................................... 1.1503 Failure to Have Adequate Supporting Documentation for Reports and Summary Data ............................................................................................................. 1.1503

Beneficiary Fraud ......................................................................................................................... 1.1503 Detection ................................................................................................................................ 1.1503

Contract and Procurement Fraud .............................................................................................. 1.1504 Elements of a Contract......................................................................................................... 1.1504 Contract and Procurement Fraud Schemes ...................................................................... 1.1505

Presolicitation Phase ...................................................................................................... 1.1505 Solicitation and Negotiation Phase .............................................................................. 1.1507 Contract Performance and Administration Phase ..................................................... 1.1510

Computer Programs.............................................................................................................. 1.1513 The Government Employee’s Role ........................................................................................... 1.1513

Common Problems of Investigators .................................................................................. 1.1513 Lack of Familiarity with Terminology ......................................................................... 1.1513 Wide Variety of Case Assignments .............................................................................. 1.1513 Case Loads ....................................................................................................................... 1.1514

Key Issues Facing Investigators .......................................................................................... 1.1514 Overcoming the Reluctance to Investigate ....................................................................... 1.1514

Interviewing Government Officials .......................................................................................... 1.1515 Assigning the Interview ........................................................................................................ 1.1515 Obstructing the Investigation .............................................................................................. 1.1516 Rules of Procedure ................................................................................................................ 1.1516

Page 32: Indice manual de certificación ACFE

LAW

2011 Fraud Examiners Manual (International) 2.i

FRAUD EXAMINERS MANUAL INTERNATIONAL VERSION

TABLE OF CONTENTS

OVERVIEW OF THE LEGAL SYSTEM Basic Concepts of the Law ......................................................................................................... 2.101 Substantive and Procedural Law ................................................................................................ 2.101 Types of Legal Systems ............................................................................................................... 2.101 Sources of Law ............................................................................................................................. 2.102 Court Systems ............................................................................................................................... 2.103 THE LAW RELATED TO FRAUD Definition of Fraud ...................................................................................................................... 2.201 Principal Types of Fraud ............................................................................................................. 2.201

Misrepresentation of Material Facts ................................................................................... 2.201 Concealment of Material Facts ............................................................................................ 2.203 Bribery ..................................................................................................................................... 2.204

Types of Bribery Schemes .............................................................................................. 2.204 Methods of Making Corrupt Payments ........................................................................ 2.205 Corrupt Influence ............................................................................................................ 2.205 Illegal Gratuity ................................................................................................................. 2.206

Extortion ................................................................................................................................ 2.206 Conflict of Interest ................................................................................................................ 2.206 Forgery .................................................................................................................................... 2.208 Theft ........................................................................................................................................ 2.208

Embezzlement ................................................................................................................. 2.208 Larceny .............................................................................................................................. 2.208 Misappropriation of Trade Secrets ............................................................................... 2.209

Breach of Fiduciary Duty ..................................................................................................... 2.210 Duty of Loyalty ................................................................................................................ 2.210 Duty of Care ..................................................................................................................... 2.210

International Initiatives Against Fraud and Corruption ......................................................... 2.211 Introduction ........................................................................................................................... 2.211 The Organisation for Economic Co-operation and Development ............................... 2.211

The Recommendation on Combating Bribery in International Business ............... 2.212 The Tax Recommendation and Revised Recommendation ...................................... 2.213 The Convention on Combating Bribery of Foreign Public Officials in International Business Transactions .......................................................................... 2.214 Other OECD Instruments ............................................................................................. 2.216

United Nations Convention Against Corruption ............................................................. 2.219 Prevention ........................................................................................................................ 2.220 Criminalization ................................................................................................................. 2.220

Propietario
Resaltado
Page 33: Indice manual de certificación ACFE

LAW

2.ii 2011 Fraud Examiners Manual (International)

THE LAW RELATED TO FRAUD (CONT.) Asset Recovery ................................................................................................................. 2.221 International Cooperation .............................................................................................. 2.222

Major Regional Initiatives Against Corruption ........................................................................ 2.222 Inter-American Convention Against Corruption ............................................................. 2.222 European Union Convention on the Fight Against Corruption Involving Officials of the European Communities or Officials of Member States ................... 2.222 Council of Europe Criminal Law Convention on Corruption ....................................... 2.223 African Union Convention on Preventing and Combating Corruption ....................... 2.223

BANKRUPTCY (INSOLVENCY) FRAUD Introduction .................................................................................................................................. 2.301 Bankruptcy Schemes .................................................................................................................... 2.301

Concealed Assets ................................................................................................................... 2.301 The Planned Bustout ............................................................................................................ 2.301 Multiple Filings ...................................................................................................................... 2.302 Credit Card Bustout .............................................................................................................. 2.302 Forged Filings ........................................................................................................................ 2.302 Typing Services or Petition Mills ........................................................................................ 2.303

The World Bank Principles for Effective Insolvency and Creditor Rights Systems.......... 2.303 Introduction ........................................................................................................................... 2.303 Objectives and Scope of the World Bank Principles ....................................................... 2.304 Legal Framework for Creditor Rights ................................................................................ 2.306

Compatible Credit and Enforcement Systems ............................................................ 2.306 Collateral Systems ............................................................................................................ 2.306 Enforcement Systems ..................................................................................................... 2.307

Legal Framework for Insolvency ........................................................................................ 2.307 Selected Antifraud Requirements........................................................................................ 2.309

Governance and Management ....................................................................................... 2.309 Avoidable Transactions .................................................................................................. 2.309

Reorganisation Proceedings ................................................................................................. 2.310 Implementation: Institutional and Regulatory Frameworks ........................................... 2.310

Overarching Considerations of Sound Investment Climates: Transparency, Accountability, and Corporate Governance ............................................................ 2.311

Selected Antifraud Requirements........................................................................................ 2.315 Integrity of the System .................................................................................................... 2.315 Competence and Integrity of Insolvency Representatives ........................................ 2.315

SECURITIES FRAUD Introduction .................................................................................................................................. 2.401 Securities Laws and Regulations ................................................................................................ 2.401 What Constitutes a Security? ...................................................................................................... 2.401

Traditional Securities ............................................................................................................ 2.402 Stocks ................................................................................................................................ 2.402 Bonds ................................................................................................................................ 2.402

Page 34: Indice manual de certificación ACFE

LAW

2011 Fraud Examiners Manual (International) 2.iii

SECURITIES FRAUD (CONT.) Certificates of Deposit .................................................................................................... 2.402 Futures and Options ....................................................................................................... 2.403

Investment Contracts ........................................................................................................... 2.404 Examples of Investment Contracts .............................................................................. 2.404

Commodity Futures, Exchange-Traded Options, and OTC Options ................................. 2.412 Commodity Futures Primer ................................................................................................. 2.412

The Principle of Offset ................................................................................................... 2.413 Trading on Margin........................................................................................................... 2.413 Trading Basics .................................................................................................................. 2.414

Options Primer ...................................................................................................................... 2.414 Exchange-Traded Options ............................................................................................. 2.415 Relationship of the Underlying Security to an Option .............................................. 2.415 Option Values and Premiums ....................................................................................... 2.416

Over-the-Counter (OTC) Options ..................................................................................... 2.416 Securities Fraud Schemes ............................................................................................................ 2.417

Securities Fraud by Registered Persons and Entities ....................................................... 2.417 Churning ........................................................................................................................... 2.417 Unsuitable Recommendations ....................................................................................... 2.418 Failure to Supervise ......................................................................................................... 2.418 Parking .............................................................................................................................. 2.418 Front Running—Dual Trading ..................................................................................... 2.419 Bucket Shops .................................................................................................................... 2.420 Excessive Markups .......................................................................................................... 2.420 Misuse or Misappropriation of Customer’s Securities ............................................... 2.420 Unauthorised Trading ..................................................................................................... 2.420 Systematically Trading Accounts Against Each Other .............................................. 2.420 Block Order Schemes ..................................................................................................... 2.421 Market Manipulation ....................................................................................................... 2.422 Insider Trading................................................................................................................. 2.423 Disclosures (Misrepresentations and Omissions) ....................................................... 2.423

Securities Fraud by Unregistered Persons ......................................................................... 2.424 Backdating Stock Options ................................................................................................... 2.424

Investigative Tips ......................................................................................................................... 2.425 Promotional Materials .......................................................................................................... 2.425

Securities Fraud and the Internet ............................................................................................... 2.427 Same Old Frauds, New Medium ......................................................................................... 2.427

Newsletters ....................................................................................................................... 2.428 Online Trading ................................................................................................................. 2.428

The International Organisation of Securities Commissions .................................................. 2.429 Overview of the IOSCO Principles ................................................................................... 2.430

The Protection of Investors ........................................................................................... 2.430 Ensuring That Markets Are Fair, Efficient, and Transparent ................................... 2.431 The Reduction of Systemic Risk ................................................................................... 2.432

The IOSCO Fraud Report ................................................................................................... 2.435 Corporate Governance ................................................................................................... 2.436

Page 35: Indice manual de certificación ACFE

LAW

2.iv 2011 Fraud Examiners Manual (International)

SECURITIES FRAUD (CONT.) Transparency and Regulation of Corporate Bond Markets ...................................... 2.437 Conflicts of Interest in Initial Public Offerings .......................................................... 2.437 Special Purpose Entities ................................................................................................. 2.438

MONEY LAUNDERING

Money Laundering Methods ............................................................................................... 2.501 The Money Laundering Process ......................................................................................... 2.502

Placement.......................................................................................................................... 2.502 Layering ............................................................................................................................. 2.502 Integration ........................................................................................................................ 2.502

Using a Legitimate Business to Launder Funds ................................................................ 2.504 Income Statement Laundering ...................................................................................... 2.504 Balance Sheet Laundering .............................................................................................. 2.505

Favourite Businesses for Hiding or Laundering Money .................................................. 2.506 Bars, Restaurants, and Night Clubs .............................................................................. 2.506 Vending Machine Operations ........................................................................................ 2.507 Wholesale Distribution ................................................................................................... 2.507 Real Estate Purchases ..................................................................................................... 2.507 ATMs ................................................................................................................................ 2.507

Calling in a Specialist ............................................................................................................. 2.508 Enforcement and Prevention Strategies ................................................................................... 2.508

Policy Statement .................................................................................................................... 2.508 “Know Your Customer” Programs .................................................................................... 2.509

New Deposit Accounts .................................................................................................. 2.509 New Loan Accounts ....................................................................................................... 2.510 Services for Non-Accountholders ................................................................................ 2.510

Monitoring Accounts ............................................................................................................ 2.511 Special Problems for Insurance Companies ...................................................................... 2.511

Red Flags........................................................................................................................... 2.511 Detection .......................................................................................................................... 2.512

Alternative Remittance Systems ................................................................................................. 2.512 International Anti-Money Laundering Organizations and Initiatives .................................. 2.515

The Financial Action Task Force ........................................................................................ 2.516 The United Nations .............................................................................................................. 2.516 International Monetary Fund/World Bank ....................................................................... 2.516 The Egmont Group of Financial Intelligence Units ........................................................ 2.516

The Financial Action Task Force .............................................................................................. 2.517 40+9 Recommendations ...................................................................................................... 2.517 Recent Revisions to the Forty Recommendations ........................................................... 2.518

Legal Systems ................................................................................................................... 2.518 Financial Institutions and Related Professions ........................................................... 2.518 International Cooperation .............................................................................................. 2.521

Non-Cooperative Countries and Territories ..................................................................... 2.521

Page 36: Indice manual de certificación ACFE

LAW

2011 Fraud Examiners Manual (International) 2.v

INDIVIDUAL RIGHTS Rights and Obligations Under Criminal Law ........................................................................... 2.601

The Right to Remain Silent .................................................................................................. 2.601 Right to Counsel .................................................................................................................... 2.602 Confessions ............................................................................................................................ 2.602

The Law Relating to Search and Seizure .................................................................................. 2.602 Reasonableness ...................................................................................................................... 2.603 Definition of a Search Warrant ........................................................................................... 2.603 Consent Searches ................................................................................................................... 2.604 Evidence in Plain View ......................................................................................................... 2.604 Surveillance ............................................................................................................................. 2.604

Investigations in Private Actions ............................................................................................... 2.606 Defamation ............................................................................................................................. 2.607

Untrue Statement of Fact ............................................................................................... 2.607 Published to Third Parties .............................................................................................. 2.607 Unprivileged Occasions .................................................................................................. 2.607 Damaging to Reputation ................................................................................................ 2.608

Invasion of Privacy ............................................................................................................... 2.608 Publicity of Private Facts ................................................................................................ 2.608 Intrusion into Seclusion .................................................................................................. 2.609

False Imprisonment .............................................................................................................. 2.609 Malicious Prosecution ........................................................................................................... 2.610 Intentional Infliction of Emotional Distress ..................................................................... 2.610 Wrongful Discharge .............................................................................................................. 2.610 Whistleblower Laws .............................................................................................................. 2.611

THE CIVIL JUSTICE SYSTEM Introduction .................................................................................................................................. 2.701 Procedure in Civil Cases ............................................................................................................. 2.701

Beginning the Action ............................................................................................................ 2.701 Discovery ................................................................................................................................ 2.702 Trials in Civil Cases ............................................................................................................... 2.703 Decisions in Civil Cases ....................................................................................................... 2.704

THE CRIMINAL JUSTICE SYSTEM The Charging Process .................................................................................................................. 2.801

Information or Indictment .................................................................................................. 2.801 The Trial Process ......................................................................................................................... 2.801

The Burden of Proof in Criminal Trials ............................................................................ 2.801 Participants in the Trial Process .......................................................................................... 2.802 Witnesses ......................................................................................................................... 2.802

The Prosecutor ................................................................................................................ 2.802 Defence Counsel ............................................................................................................. 2.803 The Judge .......................................................................................................................... 2.803

Page 37: Indice manual de certificación ACFE

LAW

2.vi 2011 Fraud Examiners Manual (International)

THE CRIMINAL JUSTICE SYSTEM (CONT.) Jury Selection ......................................................................................................................... 2.803 How a Trial is Conducted .................................................................................................... 2.804 Reaching a Verdict ................................................................................................................ 2.805

Sentencing ..................................................................................................................................... 2.806 Appeal ............................................................................................................................................ 2.806 Punishment ................................................................................................................................... 2.806 Corporate Criminal Liability ....................................................................................................... 2.806

Liability of Officers and Employees ................................................................................... 2.807 Punishment of Corporations ............................................................................................... 2.807

EVIDENCE Three Basic Forms of Evidence ................................................................................................ 2.901 Direct Versus Circumstantial Evidence .................................................................................... 2.902 Admissibility of Evidence ........................................................................................................... 2.902 Special Rules Concerning Some Types of Circumstantial Evidence .................................... 2.904

Character Evidence ............................................................................................................... 2.904 Opinion Testimony ............................................................................................................... 2.905

Exceptions to the Opinion Rule ................................................................................... 2.906 Exhibits .......................................................................................................................................... 2.906

Authenticating Typical Exhibits .......................................................................................... 2.907 Demonstrative Evidence ................................................................................................ 2.907 Diagrams ........................................................................................................................... 2.908 Writings ............................................................................................................................. 2.908 Business Records and Other Documents .................................................................... 2.908 Government Documents ............................................................................................... 2.909 Digital Evidence .............................................................................................................. 2.909 Photographs ..................................................................................................................... 2.909

General Points .............................................................................................................................. 2.910 The “Best Evidence” Rule ................................................................................................... 2.910 Objections to Exhibits .......................................................................................................... 2.911

Chain of Custody ............................................................................................................. 2.911 Hearsay .......................................................................................................................................... 2.913

Exceptions to the Hearsay Rule .......................................................................................... 2.914 The Truth of the Statement Is Not at Issue ................................................................ 2.914 Admissions by an Adverse Party ................................................................................... 2.914 Statement Against Interest ............................................................................................. 2.915 Business and Government Records .............................................................................. 2.915 Absence of an Entry in Business Records ................................................................... 2.915 Recorded Recollections .................................................................................................. 2.916 Former Testimony ........................................................................................................... 2.916 Present Sense Impressions ............................................................................................. 2.916 Excited Utterances .......................................................................................................... 2.916 Then Existing Mental, Emotional, or Physical Condition ........................................ 2.917 Statements for Purposes of Medical Diagnosis or Treatment .................................. 2.917

Page 38: Indice manual de certificación ACFE

LAW

2011 Fraud Examiners Manual (International) 2.vii

EVIDENCE (CONT.) Printed Matter, Learned Treatises, and Refresher Writings ...................................... 2.917 Other Exceptions ............................................................................................................ 2.918

Impeachment ......................................................................................................................... 2.918 Privileges ........................................................................................................................................ 2.919

Introduction ........................................................................................................................... 2.919 Attorney-Client Privilege ...................................................................................................... 2.919 Attorney Work Product ........................................................................................................ 2.921 Self Evaluation Privilege....................................................................................................... 2.921 Marital Privilege ..................................................................................................................... 2.922 Law Enforcement Privilege to Withhold the Identity of an Informant ........................ 2.922

TESTIFYING AS A WITNESS Introduction .................................................................................................................................. 2.1001 Pre-Trial Preparation ................................................................................................................... 2.1003

Conflicts of Interest .............................................................................................................. 2.1003 Preparing a Report ................................................................................................................ 2.1004 Discoverability of Expert’s Reports ................................................................................... 2.1005 Keeping Good Files .............................................................................................................. 2.1005

Qualifying to Testify as an Expert Witness .............................................................................. 2.1005 Qualifications ......................................................................................................................... 2.1006 Testimony ............................................................................................................................... 2.1007

Preparing to Testify ..................................................................................................................... 2.1008 Depositions of Expert Witnesses ....................................................................................... 2.1008 Appearance ............................................................................................................................. 2.1009 Do’s and Don’ts .................................................................................................................... 2.1009

Direct Examination ..................................................................................................................... 2.1011 Presenting Expert Testimony. ............................................................................................. 2.1011 Direct Testimony Considerations ....................................................................................... 2.1012

Cross-Examination ...................................................................................................................... 2.1013 Myopic Vision ........................................................................................................................ 2.1015 Safety ....................................................................................................................................... 2.1015 Contradiction ......................................................................................................................... 2.1016 New Information .................................................................................................................. 2.1016 Support Opposing Side’s Theory ........................................................................................ 2.1016 Bias .......................................................................................................................................... 2.1016 Confrontation ........................................................................................................................ 2.1017 Sounding Board ..................................................................................................................... 2.1017 Fees .......................................................................................................................................... 2.1017 Terms of Engagement .......................................................................................................... 2.1017 Discrediting the Witness ...................................................................................................... 2.1017

Attacking the Fraud Examiner ................................................................................................... 2.1018 Personal Attacks .................................................................................................................... 2.1018

Page 39: Indice manual de certificación ACFE

LAW

2.viii 2011 Fraud Examiners Manual (International)

TESTIFYING AS A WITNESS (CONT.) Failure to Follow the Standards of the Profession ........................................................... 2.1018

Expressing an Opinion on Guilt................................................................................................ 2.1019 Summary ........................................................................................................................................ 2.1020

Page 40: Indice manual de certificación ACFE

INVESTIGATION

2011 Fraud Examiners Manual (International) 3.i

FRAUD EXAMINERS MANUAL INTERNATIONAL VERSION

TABLE OF CONTENTS ANALYSING DOCUMENTS Obtaining Documentary Evidence ............................................................................................ 3.101

Types of Evidence ................................................................................................................. 3.102 Organisation of Evidence .................................................................................................... 3.102

Chronologies ................................................................................................................... 3.103 To-Do Lists ..................................................................................................................... 3.103

Examining Fraudulent Documents ........................................................................................... 3.103 Early Consultation with an Expert Can Prove Valuable ........................................................ 3.104 Types of Forensic Document Examinations ........................................................................... 3.104 Handling Documents as Physical Evidence ............................................................................. 3.105

Chain of Custody ................................................................................................................... 3.106 Preserving for Fingerprint Examinations .......................................................................... 3.106 Charred or Partially Burned Documents ........................................................................... 3.107 Recognising Phoney Documents ........................................................................................ 3.107

Identifying Writings ..................................................................................................................... 3.108 Class Characteristics .............................................................................................................. 3.109

Copy-Book Styles ........................................................................................................... 3.109 “Copycat” Styles ............................................................................................................. 3.109

Natural Variations, Disguise, Distortions, and Forgeries ................................................ 3.109 Variations ......................................................................................................................... 3.109 Disguise ............................................................................................................................ 3.110 Distortions ....................................................................................................................... 3.110 Forgeries .......................................................................................................................... 3.110

The Document Expert’s Findings ............................................................................................. 3.111 Non-Identification ................................................................................................................ 3.111 Identification .......................................................................................................................... 3.111 Inconclusive ........................................................................................................................... 3.112

How to Obtain Handwriting Samples ...................................................................................... 3.112 Non-Dictated Writing Samples ........................................................................................... 3.112 Dictated Writing Samples .................................................................................................... 3.113

Obtaining Dictated Handwriting Samples by Court Order ..................................... 3.113 Preparation for Taking Dictated Handwriting Samples ........................................... 3.113 Directions for Obtaining Dictated Handwriting Samples ........................................ 3.114

Typewriters and Computer Printers .......................................................................................... 3.114 Typewriter Ribbons Could Be Evidence ........................................................................... 3.115 Avoid Taking Unnecessary Samples ................................................................................... 3.115 Taking Typewriter Samples.................................................................................................. 3.115

Propietario
Resaltado
Page 41: Indice manual de certificación ACFE

INVESTIGATION

3.ii 2011 Fraud Examiners Manual (International)

ANALYSING DOCUMENTS (CONT.) Photocopies .................................................................................................................................. 3.116

Identifying the Source of a Photocopy .............................................................................. 3.116 Permanent “Trash Marks” ............................................................................................ 3.117 Transient “Trash Marks” ............................................................................................... 3.117

Taking Photocopier Samples ............................................................................................... 3.117 Dating a Document ..................................................................................................................... 3.118

The “Alibi” Document ......................................................................................................... 3.118 The “Long Lost” Will ........................................................................................................... 3.118 Valuable Historical and Collectible Documents ............................................................... 3.118 Anachronisms in Documentary Materials ......................................................................... 3.119

Indented Writings ........................................................................................................................ 3.119 Developing Indented Writings ............................................................................................ 3.120

Counterfeit Printed Documents ................................................................................................ 3.120 Counterfeiting Methods ....................................................................................................... 3.121 Detecting Counterfeits ......................................................................................................... 3.121

Fingerprints ................................................................................................................................... 3.122 Fingerprints on Paper or Other Absorbent Porous Surfaces ......................................... 3.122 Fingerprints on Hard, Non-Porous Surfaces .................................................................... 3.123 Fingerprint Comparison Standards .................................................................................... 3.123

INTERVIEW THEORY AND APPLICATION Preparation .................................................................................................................................... 3.201 Characteristics of a Good Interview ......................................................................................... 3.201 Characteristics of a Good Interviewer ...................................................................................... 3.202 Question Typology ...................................................................................................................... 3.202

Introductory Questions ........................................................................................................ 3.203 Informational Questions ...................................................................................................... 3.203 Closing Questions ................................................................................................................. 3.203 Assessment Questions .......................................................................................................... 3.203 Admission-Seeking Questions ............................................................................................. 3.204

Legal Considerations When Conducting an Interview ........................................................... 3.204 Legal Authority to Conduct Interviews ............................................................................. 3.204 False Imprisonment .............................................................................................................. 3.204 Use of Deception in Interviews .......................................................................................... 3.205 Recording Interviews ............................................................................................................ 3.205

Elements of Conversations......................................................................................................... 3.205 Expression .............................................................................................................................. 3.205 Persuasion ............................................................................................................................... 3.206 Therapy ................................................................................................................................... 3.206 Ritual ....................................................................................................................................... 3.206 Information Exchange.......................................................................................................... 3.206

Inhibitors of Communication .................................................................................................... 3.207

Page 42: Indice manual de certificación ACFE

INVESTIGATION

2011 Fraud Examiners Manual (International) 3.iii

INTERVIEW THEORY AND APPLICATION (CONT.) Competing Demands for Time ........................................................................................... 3.207 Ego Threat ............................................................................................................................. 3.207

Repression ....................................................................................................................... 3.207 Disapproval ..................................................................................................................... 3.207 Loss of Status .................................................................................................................. 3.208

Etiquette ................................................................................................................................. 3.208 Trauma .................................................................................................................................... 3.208 Forgetting ............................................................................................................................... 3.208 Chronological Confusion ..................................................................................................... 3.209 Inferential Confusion ............................................................................................................ 3.209 Unconscious Behaviour........................................................................................................ 3.209

Facilitators of Communication .................................................................................................. 3.209 Fulfilling Expectations .......................................................................................................... 3.210 Recognition ............................................................................................................................ 3.210 Altruistic Appeals .................................................................................................................. 3.210 Sympathetic Understanding ................................................................................................. 3.210 New Experience .................................................................................................................... 3.211 Catharsis.................................................................................................................................. 3.211 Need for Meaning ................................................................................................................. 3.211 Extrinsic Rewards .................................................................................................................. 3.211

Interview Mechanics .................................................................................................................... 3.212 Note-Taking ........................................................................................................................... 3.212 Maintain Eye Contact ........................................................................................................... 3.212 Opinions ................................................................................................................................. 3.212 Writing Down Questions ..................................................................................................... 3.213 Documenting Results ........................................................................................................... 3.213

Introductory Questions ............................................................................................................... 3.213 Four Objectives ..................................................................................................................... 3.213

Provide the Introduction ............................................................................................... 3.213 Establish Rapport ........................................................................................................... 3.213 Establish the Interview Theme .................................................................................... 3.214 Observe Reactions .......................................................................................................... 3.216

Methodology .......................................................................................................................... 3.219 Physical Contact ............................................................................................................. 3.219 Don’t Interview More than One Person ..................................................................... 3.220 Privacy .............................................................................................................................. 3.220 Establish Transitional Statement .................................................................................. 3.220 Seek Continuous Agreement ........................................................................................ 3.221 Do Not Invade Body Space .......................................................................................... 3.221

Informational Questions ............................................................................................................. 3.221 Question Sequences .............................................................................................................. 3.222 Questioning Techniques....................................................................................................... 3.222

Page 43: Indice manual de certificación ACFE

INVESTIGATION

3.iv 2011 Fraud Examiners Manual (International)

INTERVIEW THEORY AND APPLICATION (CONT.) Open Questions .............................................................................................................. 3.222 Closed Questions ............................................................................................................ 3.223 Leading Questions .......................................................................................................... 3.223 Double-Negative Questions ......................................................................................... 3.224 Complex Questions ........................................................................................................ 3.224 Attitude Questions ......................................................................................................... 3.224 Controlled Answer Techniques .................................................................................... 3.224 Free Narratives................................................................................................................ 3.225

Suggestions ............................................................................................................................. 3.225 Methodology .......................................................................................................................... 3.226

Begin with Background Questions .............................................................................. 3.226 Observe Verbal and Nonverbal Behaviour ................................................................ 3.227 Ask Nonleading (Open) Questions ............................................................................. 3.227 Approach Sensitive Questions Carefully ..................................................................... 3.228

Dealing with Resistance ........................................................................................................ 3.228 “I’m Too Busy” .............................................................................................................. 3.229 “I Don’t Know Anything About It” ........................................................................... 3.229 “I Don’t Remember” ..................................................................................................... 3.229 “What Do You Mean by That?” .................................................................................. 3.230

Difficult People ..................................................................................................................... 3.230 Don’t React ..................................................................................................................... 3.230 Disarm the Person .......................................................................................................... 3.230 Change Tactics ................................................................................................................ 3.231 Make It Easy to Say “Yes” ............................................................................................ 3.231 Make It Hard to Say “No” ............................................................................................ 3.231

Volatile Interviews ................................................................................................................ 3.231 Physical Symptoms ......................................................................................................... 3.232 Other Considerations ..................................................................................................... 3.232 Overcoming Objections ................................................................................................ 3.233

Closing Questions ........................................................................................................................ 3.234 Reconfirm Facts .............................................................................................................. 3.234 Gather Additional Facts ................................................................................................ 3.234 Conclude the Interview ................................................................................................. 3.236

Assessment Questions ................................................................................................................. 3.237 Norming or Calibrating ........................................................................................................ 3.237 Physiology of Deception ...................................................................................................... 3.238

Verbal Clues .................................................................................................................... 3.239 Nonverbal Clues ............................................................................................................. 3.242

Methodology of Assessment Questions ............................................................................ 3.243 Admission-Seeking Questions .................................................................................................... 3.248

Purpose of Questions ........................................................................................................... 3.249 Preparation ............................................................................................................................. 3.249

Page 44: Indice manual de certificación ACFE

INVESTIGATION

2011 Fraud Examiners Manual (International) 3.v

INTERVIEW THEORY AND APPLICATION (CONT.) Interview Room .............................................................................................................. 3.249 Note-Taking .................................................................................................................... 3.250 Presence of Outsiders .................................................................................................... 3.250

Theme Development ............................................................................................................ 3.250 Steps in the Admission-Seeking Interview ........................................................................ 3.251

Direct Accusation ........................................................................................................... 3.251 Observe Reaction ........................................................................................................... 3.252 Repeat Accusation .......................................................................................................... 3.252 Interrupt Denials ............................................................................................................ 3.253 Establish Rationalisation ............................................................................................... 3.255 Diffuse Alibis .................................................................................................................. 3.260 Present an Alternative Question .................................................................................. 3.263 Obtain a Benchmark Admission .................................................................................. 3.263 Reinforce Rationalisation .............................................................................................. 3.264 Verbal Confession .......................................................................................................... 3.264 Motive for Offence ........................................................................................................ 3.267

Kinesic Interview and Interrogation ......................................................................................... 3.271 Self-Initiated Verbal Statements .......................................................................................... 3.272 Prompted Verbal Responses ............................................................................................... 3.273

Structured Questions ..................................................................................................... 3.273 Nonverbal Behaviour/Body Language .............................................................................. 3.273

Criteria-Based Statement Analysis ............................................................................................. 3.275 Parts of Speech ...................................................................................................................... 3.275

Pronouns .......................................................................................................................... 3.275 Possessive Pronouns ...................................................................................................... 3.276 Verbs ................................................................................................................................ 3.276

Balance of the Statement ...................................................................................................... 3.277 General Characteristics ......................................................................................................... 3.277 Specific Content .................................................................................................................... 3.278 Peculiarities of Content ........................................................................................................ 3.278

The Cognitive Interview Technique .......................................................................................... 3.279 The Narrative Phase ............................................................................................................. 3.280

Reconstruct the Circumstances of the Event ............................................................. 3.281 Instruct the Eyewitness to Report Everything and Be Complete ........................... 3.281 Recall the Events in Different Orders......................................................................... 3.281 Change Perspective ........................................................................................................ 3.281

Specific Details ...................................................................................................................... 3.282 Physical Appearance ...................................................................................................... 3.282 Names .............................................................................................................................. 3.282 Number ............................................................................................................................ 3.282 Speech Characteristics ................................................................................................... 3.283 Conversation ................................................................................................................... 3.283

Page 45: Indice manual de certificación ACFE

INVESTIGATION

3.vi 2011 Fraud Examiners Manual (International)

COVERT EXAMINATIONS Establishing an Identity ............................................................................................................... 3.302 Objectives ...................................................................................................................................... 3.303 Problems in Covert Operations ................................................................................................. 3.304 Surveillance ................................................................................................................................... 3.305

Methods of Surveillance ....................................................................................................... 3.305 Preparation ............................................................................................................................. 3.306

Electronic Equipment .................................................................................................... 3.306 Basic Precautions ............................................................................................................ 3.306

Techniques of Foot Surveillance ......................................................................................... 3.307 One-Person Surveillance ............................................................................................... 3.307 Two-Person Surveillance ............................................................................................... 3.307 Three-Person Surveillance ............................................................................................. 3.307 Other Techniques ........................................................................................................... 3.308

Techniques of Vehicle Surveillance .................................................................................... 3.308 General ............................................................................................................................. 3.308 One-Vehicle Surveillance .............................................................................................. 3.309 Two-Vehicle Surveillance .............................................................................................. 3.309

Fixed Surveillance .................................................................................................................. 3.309 Satellite Surveillance .............................................................................................................. 3.310 Night Surveillance Equipment ............................................................................................ 3.310

Sources and Informants .............................................................................................................. 3.311 Types of Informants ............................................................................................................. 3.312

Basic Lead Informants ................................................................................................... 3.312 Participant Informants ................................................................................................... 3.312 Covert Informants .......................................................................................................... 3.312 Accomplice/Witness Informants ................................................................................. 3.312

Objectives of Source and Informant Information ........................................................... 3.313 Recruitment of Sources and Informants ........................................................................... 3.314 Motives of Sources and Informants ................................................................................... 3.315

Sources ............................................................................................................................. 3.315 Informants ....................................................................................................................... 3.315

Legal Considerations ............................................................................................................. 3.316 Reporting Contacts ............................................................................................................... 3.316 Promises of Confidentiality ................................................................................................. 3.317

Use of Operatives ........................................................................................................................ 3.318 SOURCES OF INFORMATION Municipal/Regional/County Government .............................................................................. 3.401

Building Inspector Records ................................................................................................. 3.401 Regulatory Agency Records ................................................................................................. 3.402 City Tax Assessor/Collector Records ................................................................................ 3.402 Coroner’s Register ................................................................................................................. 3.402

Page 46: Indice manual de certificación ACFE

INVESTIGATION

2011 Fraud Examiners Manual (International) 3.vii

SOURCES OF INFORMATION (CONT.) Court Records ........................................................................................................................ 3.402

Federal, State, and Provincial Governments ............................................................................ 3.403 Birth, Death, and Marriage Records ................................................................................... 3.403 Professional Associations and Licensing Boards .............................................................. 3.403 Land Registry Office ............................................................................................................. 3.404 Business Filings Division ..................................................................................................... 3.405 Department of Labour ......................................................................................................... 3.405 Civil Litigation Records ........................................................................................................ 3.405 Criminal Records ................................................................................................................... 3.405 Bankruptcy Records .............................................................................................................. 3.405 Customs and Revenue Agencies ......................................................................................... 3.405 Other Regulatory Agencies .................................................................................................. 3.406

Commercial Sources of Information......................................................................................... 3.406 Associations and Lobby Groups ......................................................................................... 3.406

Better Business Bureau .................................................................................................. 3.406 Chamber of Commerce ................................................................................................. 3.406

Abstract and Title Companies ............................................................................................. 3.407 Bonding Companies .............................................................................................................. 3.407 Credit Card Records ............................................................................................................. 3.407 Stockbrokers .......................................................................................................................... 3.407 Western Union ....................................................................................................................... 3.407 International Air Transport Association ............................................................................ 3.407 International Foundation for Art Research ....................................................................... 3.408

Public Record Database Vendors .............................................................................................. 3.408 Types of Public Record Database Vendors ...................................................................... 3.408

Commercial Database Vendors .................................................................................... 3.408 Search Firms .................................................................................................................... 3.408 Document Retrievers ..................................................................................................... 3.409

Types of Information Available .......................................................................................... 3.409 Directories ..................................................................................................................................... 3.409

City Directories ...................................................................................................................... 3.410 Gale ......................................................................................................................................... 3.410

Gale Directory Library ................................................................................................... 3.410 Gale Directory of Databases......................................................................................... 3.410 Directories in Print ......................................................................................................... 3.411 Gale Directory of Publications and Broadcast Media ............................................... 3.411 Encyclopedia of Associations ....................................................................................... 3.411 Encyclopedia of Business Information Sources ........................................................ 3.411

D&B’s Million Dollar Database Series............................................................................... 3.412 Factiva ..................................................................................................................................... 3.412 Index to Legal Periodicals .................................................................................................... 3.412 Insurance Reporting Services .............................................................................................. 3.412

Page 47: Indice manual de certificación ACFE

INVESTIGATION

3.viii 2011 Fraud Examiners Manual (International)

SOURCES OF INFORMATION (CONT.) IHS Fairplay ........................................................................................................................... 3.412 Magazines for Libraries ........................................................................................................ 3.413 Mergent ................................................................................................................................... 3.413

Mergent’s Bank and Finance Manual and News Reports ......................................... 3.413 Reader’s Guide to Periodical Literature ............................................................................. 3.413 Standard & Poor’s NetAdvantage ...................................................................................... 3.414

Corporation Records ...................................................................................................... 3.414 Company Profile ............................................................................................................. 3.414 Register of Corporations, Directors, and Executives ............................................... 3.414

The Global Banking Resource ............................................................................................ 3.414 Banks and Financial Institutions ................................................................................................ 3.414 International Law Enforcement Organisations ....................................................................... 3.415

International Criminal Police Organisation ....................................................................... 3.415 International Chamber of Commerce Commercial Crime Bureau ................................ 3.416 International Criminal Police Organisation Case Tracking System ............................... 3.416 United Nations Crime and Justice Information Network ............................................... 3.416 World Criminal Justice Library Network ........................................................................... 3.416

ACCESSING INFORMATION ONLINE Limitations of Online Database Searches .......................................................................... 3.501 Online Searches Through Database Vendors ................................................................... 3.502 Locating People Using Online Records ............................................................................. 3.503

Types of Searches ........................................................................................................... 3.503 Obtaining Financial Information and Locating Assets .................................................... 3.503

Searches for Hard Assets............................................................................................... 3.504 Searches for Potential Assets ........................................................................................ 3.504

Finding Legal Records .......................................................................................................... 3.504 Conducting Background Checks ......................................................................................... 3.505

Due Diligence ................................................................................................................. 3.505 Employment Background ............................................................................................. 3.505

Newspaper/Media Databases ............................................................................................. 3.506 LexisNexis ....................................................................................................................... 3.507 HighBeam Research ....................................................................................................... 3.507

Investigating with the Internet ................................................................................................... 3.507 Traditional Methods for Finding Information on the Internet ...................................... 3.508

Search Engines ................................................................................................................ 3.508 Meta-search Engines ...................................................................................................... 3.509 Directories ....................................................................................................................... 3.510

Non-traditional Methods for Finding Information on the Internet .............................. 3.512 eBay .................................................................................................................................. 3.513 The Whois Protocol ....................................................................................................... 3.513 Craigslist ........................................................................................................................... 3.513

Page 48: Indice manual de certificación ACFE

INVESTIGATION

2011 Fraud Examiners Manual (International) 3.ix

ACCESSING INFORMATION ONLINE (CONT.) Archive ............................................................................................................................. 3.514 Zoominfo......................................................................................................................... 3.514 GuideStar ......................................................................................................................... 3.514 Noza ................................................................................................................................. 3.514 Social-Networking Websites ......................................................................................... 3.514

A Guide to Successful Internet Searching ......................................................................... 3.515 Boolean Operators ......................................................................................................... 3.515 Reserved Words and Noise Words .............................................................................. 3.516 Specific Search Operators ............................................................................................. 3.516

DATA ANALYSIS AND REPORTING TOOLS Data Mining .................................................................................................................................. 3.601 Data Analysis ................................................................................................................................ 3.604 Using Data Analysis Software .................................................................................................... 3.604

Advantages of Using Data Analysis Software ................................................................... 3.604 Core Data Analysis Software Functions ................................................................................... 3.605

Sorting ..................................................................................................................................... 3.606 Record Selection .................................................................................................................... 3.607 Joining Files ............................................................................................................................ 3.607 Multi-File Processing ............................................................................................................ 3.607 Correlation Analysis .............................................................................................................. 3.608 Verifying Multiples of a Number ........................................................................................ 3.608 Compliance Verification ....................................................................................................... 3.608 Duplicate Searches ................................................................................................................ 3.609 Vertical Ratio Analysis .......................................................................................................... 3.609 Horizontal Ratio Analysis .................................................................................................... 3.609 Date Functions ...................................................................................................................... 3.610 Graphing ................................................................................................................................. 3.611 Examples of Data Analysis Queries ................................................................................... 3.611

General Ledger Analysis ................................................................................................ 3.611 Accounts Receivable ...................................................................................................... 3.612 Sales Analysis .................................................................................................................. 3.612 Accounts Payable ............................................................................................................ 3.612 Asset Management ......................................................................................................... 3.612 Cash Disbursement ........................................................................................................ 3.612 Payroll ............................................................................................................................... 3.613 Purchasing ....................................................................................................................... 3.613

Data Analysis Checklist ........................................................................................................ 3.613 Evaluating Data Analysis Software ..................................................................................... 3.614 Evaluating Data Mining Software ....................................................................................... 3.614 Evaluating Data Mining Consultants ................................................................................. 3.615

Types of Data Mining and Analysis Software .......................................................................... 3.615

Page 49: Indice manual de certificación ACFE

INVESTIGATION

3.x 2011 Fraud Examiners Manual (International)

DATA ANALYSIS AND REPORTING TOOLS (CONT.) ACL ......................................................................................................................................... 3.616 IDEA ...................................................................................................................................... 3.617

General Functions .......................................................................................................... 3.618 Fraud Tests ...................................................................................................................... 3.619

Excel ........................................................................................................................................ 3.620 ActiveData for Excel ............................................................................................................ 3.621

Fraud Detection Techniques for Accounts Payable ................................................. 3.622 Fraud Detection Techniques for the General Ledger ............................................... 3.626 Fraud Detection Techniques for Revenue .................................................................. 3.627

AutoAudit ............................................................................................................................... 3.629 SNAP! Reporter ..................................................................................................................... 3.630 DataWatch Corporation’s Monarch for Windows ........................................................... 3.630 DATAS for IDEA ................................................................................................................ 3.632 IDEA for Windows .............................................................................................................. 3.633

Files, File Management, and File Manipulation ......................................................... 3.633 Data .................................................................................................................................. 3.633 Sampling........................................................................................................................... 3.634 Analysis ............................................................................................................................ 3.634

Arbutus Query ....................................................................................................................... 3.634 Oversight Systems ................................................................................................................. 3.634

Reporting and Case Management Software ............................................................................. 3.634 i2’s Analysis Product Line .................................................................................................... 3.635 Analyst’s Notebook ............................................................................................................... 3.635

iBase .................................................................................................................................. 3.636 Data Miner ....................................................................................................................... 3.636 Analyst’s Workstation .................................................................................................... 3.636

CaseMap by CaseSoft ........................................................................................................... 3.636 Spreadsheets .................................................................................................................... 3.637 Issue Spreadsheet ........................................................................................................... 3.639 Question Spreadsheet .................................................................................................... 3.639 Research Spreadsheets ................................................................................................... 3.639 Linking ............................................................................................................................. 3.640 Filtering ............................................................................................................................ 3.640

Xanalys Suite .......................................................................................................................... 3.641 PowerCase ....................................................................................................................... 3.641 Link Explorer .................................................................................................................. 3.642 Indexer ............................................................................................................................. 3.642

Enterprise Investigation Management ............................................................................... 3.643 Multi-Channel Fraud ............................................................................................................. 3.643 i-Sight Case Management Software .................................................................................... 3.644 EthicsPoint Issue and Event Manager ............................................................................... 3.644

Page 50: Indice manual de certificación ACFE

INVESTIGATION

2011 Fraud Examiners Manual (International) 3.xi

DIGITAL FORENSICS Conducting an Investigation Involving Computers ................................................................ 3.701

Computer Investigation Versus Computer Forensics ..................................................... 3.701 Digital Evidence .................................................................................................................... 3.701 Integrity of Digital Evidence ............................................................................................... 3.702 Forensic Experts ................................................................................................................... 3.703 Locating Evidence ................................................................................................................. 3.705

Workstation ..................................................................................................................... 3.706 Network ........................................................................................................................... 3.708

Law Enforcement Assistance .............................................................................................. 3.708 Computer Investigation and Computer Forensics .................................................................. 3.708

Seizing Digital Evidence ................................................................................................ 3.708 Image Acquisition ........................................................................................................... 3.712 Analysis ............................................................................................................................ 3.713 Reporting and Testifying ............................................................................................... 3.714

Guidelines for Processing Evidence for Removal ............................................................ 3.714 Evidence Storage ................................................................................................................... 3.718

Forensic Examination and Analysis .......................................................................................... 3.719 Keyword Searches ................................................................................................................. 3.720 Recovering Evidence ............................................................................................................ 3.720

User-Created Files .......................................................................................................... 3.721 User-Protected Files ....................................................................................................... 3.721 Computer-Created Files ................................................................................................ 3.722

Digital Forensics Software .......................................................................................................... 3.724 EnCase Forensic .................................................................................................................... 3.724

How EnCase Forensic Works ....................................................................................... 3.725

Key Features .................................................................................................................... 3.726 Forensic ToolKit ................................................................................................................... 3.726

Integrated Computer Forensics .................................................................................... 3.726 Enterprise-Class Architecture ....................................................................................... 3.726 Powerful Processing and Speed ................................................................................... 3.727 Advanced Analytics ........................................................................................................ 3.727 Preview, Acquisition, and Analysis of Live Data ....................................................... 3.727

Password Recovery Toolkit ................................................................................................. 3.727 Security Risk Assessment Tool ..................................................................................... 3.727 Features ............................................................................................................................ 3.728

ProDiscover Forensics ......................................................................................................... 3.728 Features ............................................................................................................................ 3.729

Gargoyle Investigator Forensic Pro Edition ..................................................................... 3.730 Stego Suite .............................................................................................................................. 3.731

Page 51: Indice manual de certificación ACFE

INVESTIGATION

3.xii 2011 Fraud Examiners Manual (International)

TRACING ILLICIT TRANSACTIONS Comprehensive Guidelines for Information to Be Collected in Financial Interviews ...... 3.801

Identification .......................................................................................................................... 3.801 Birth ......................................................................................................................................... 3.801 Address During Pertinent Years ......................................................................................... 3.801 Occupation ............................................................................................................................. 3.802 General Background ............................................................................................................. 3.802 Financial Institutions (Business and Personal) ................................................................. 3.802 Source of Income .................................................................................................................. 3.803 Net Income and Expenditures ............................................................................................ 3.803 Liabilities ................................................................................................................................. 3.804 Expenditures .......................................................................................................................... 3.804 Business Operations ............................................................................................................. 3.804 Books and Records ............................................................................................................... 3.804 Business Receipts .................................................................................................................. 3.805

Direct Methods of Tracing Financial Transactions ................................................................ 3.805 Financial Institutions ............................................................................................................ 3.805 Internal Bookkeeping Procedures....................................................................................... 3.806 Electronic Banking ................................................................................................................ 3.806 Gaining Access to Records Held by Financial Institutions ............................................ 3.807 Types of Bank Records ........................................................................................................ 3.807

Account Opening Documents ..................................................................................... 3.807 Negotiated Cheques ....................................................................................................... 3.808 Deposit Slips ................................................................................................................... 3.809 Wire Transfers ................................................................................................................ 3.810 Telegraphic Transfers .................................................................................................... 3.810 Intrabank Transfers ........................................................................................................ 3.810 Savings Accounts ............................................................................................................ 3.810 Certificates of Deposit ................................................................................................... 3.810 Bank Statements ............................................................................................................. 3.811 Other Exchange Instruments ....................................................................................... 3.812

Loan Records ......................................................................................................................... 3.813 Line of Credit or Borrowing an Overdraft ................................................................. 3.814 Mortgage Loan Files ...................................................................................................... 3.815 Consumer or Instalment Loans .................................................................................... 3.815

Credit Card Records ............................................................................................................. 3.815 Bank Collection Department Records ............................................................................... 3.816 Debit Cards and Automated Teller Machines .................................................................. 3.816 Safe-Deposit Box Records ................................................................................................... 3.816 Stock Brokerage Records ..................................................................................................... 3.817 Tax Returns and Related Documents ................................................................................ 3.818 Establish a Database ............................................................................................................. 3.818

Indirect Methods of Tracing Financial Transactions .............................................................. 3.821

Page 52: Indice manual de certificación ACFE

INVESTIGATION

2011 Fraud Examiners Manual (International) 3.xiii

TRACING ILLICIT TRANSACTIONS (CONT.) Elements of Financial Examination Techniques .............................................................. 3.822

The Environment ........................................................................................................... 3.822 The Accounting System ................................................................................................. 3.822

Various Detection Techniques ............................................................................................ 3.823 Statistical Sampling ......................................................................................................... 3.823 Net Worth Methods ....................................................................................................... 3.826 Net-Worth Analysis ....................................................................................................... 3.831

Locating Hidden Assets .............................................................................................................. 3.839 Common Asset Hiding Techniques ................................................................................... 3.839

Transfer to Family Members or Parties Under Their Control ................................ 3.839 Children’s or Family Trust ............................................................................................ 3.839 Home Mortgage Pay-Down .......................................................................................... 3.840 Insurance Policies ........................................................................................................... 3.840 Prepaid Credit Cards ...................................................................................................... 3.840 Savings Bond Purchases ................................................................................................ 3.840 Cashier’s Cheques and Traveller’s Cheques ............................................................... 3.841

Computer Databases ............................................................................................................. 3.841 Locating Assets Through Subpoenas ................................................................................. 3.841 Locating Assets Offshore .................................................................................................... 3.841 Legal Assistance in Obtaining Information Regarding Foreign Assets ........................ 3.843

Letter Rogatory ............................................................................................................... 3.843 Mutual Legal Assistance Treaties ................................................................................. 3.844 Public Records ................................................................................................................ 3.844

REPORTING STANDARDS Preparation .................................................................................................................................... 3.901 Accuracy of Reports .................................................................................................................... 3.902 Clarity ............................................................................................................................................. 3.902 Impartiality and Relevance .......................................................................................................... 3.902 Timeliness ...................................................................................................................................... 3.902 Common Reporting Mistakes .................................................................................................... 3.903

Conclusions and Opinions ................................................................................................... 3.903 Evidence ................................................................................................................................. 3.903 Copy Documents .................................................................................................................. 3.904 Safeguarding and Maintaining Documents........................................................................ 3.904

Effective Note Taking ................................................................................................................. 3.904 Organisation of Information ...................................................................................................... 3.905

Chronological ......................................................................................................................... 3.905 By Transaction ....................................................................................................................... 3.905

Analysing the Reader ................................................................................................................... 3.906 Company Insiders ................................................................................................................. 3.906 Attorneys ................................................................................................................................ 3.906

Page 53: Indice manual de certificación ACFE

INVESTIGATION

3.xiv 2011 Fraud Examiners Manual (International)

REPORTING STANDARDS (CONT.) Defendants and Witnesses ................................................................................................... 3.906 Press ........................................................................................................................................ 3.907 Juries ........................................................................................................................................ 3.907

Outlining........................................................................................................................................ 3.907 Step One ................................................................................................................................. 3.907 Step Two ................................................................................................................................. 3.908 Step Three .............................................................................................................................. 3.908

Grammatical Considerations ...................................................................................................... 3.908 Style ......................................................................................................................................... 3.908 Voice ....................................................................................................................................... 3.908 Person ..................................................................................................................................... 3.909 Point of View ......................................................................................................................... 3.909 Constructing Clear Sentences .............................................................................................. 3.910

Rambling Sentences ....................................................................................................... 3.910 Run-On Sentences .......................................................................................................... 3.910 Omitted Verbs ................................................................................................................ 3.910 Omitted Subjects ............................................................................................................ 3.911 Unnecessary Compound Sentences ............................................................................. 3.911 Misplaced Modifiers ....................................................................................................... 3.911

Paragraph Structure ............................................................................................................... 3.912 Report Structure ........................................................................................................................... 3.912

Suggested Standard Format ................................................................................................. 3.912 Background ..................................................................................................................... 3.912 Executive Summary........................................................................................................ 3.912 Scope ................................................................................................................................ 3.913 Approach ......................................................................................................................... 3.913 Findings ............................................................................................................................ 3.913 Summary .......................................................................................................................... 3.914 Impact .............................................................................................................................. 3.914 Recommendations .......................................................................................................... 3.914

Reporting Documents .......................................................................................................... 3.914 Memoranda ............................................................................................................................ 3.915 Cover Page or Letter ............................................................................................................. 3.915 Exhibits ................................................................................................................................... 3.915 Forms ...................................................................................................................................... 3.915

Consent to Search .......................................................................................................... 3.916 Receipt for Property ....................................................................................................... 3.916 Telephone Recording Consent ..................................................................................... 3.916 Consent to Record ......................................................................................................... 3.916 Customer Consent and Authorisation for Access to Financial Records ................ 3.917 Evidence Control Log ................................................................................................... 3.917

Signed Confessions ...................................................................................................................... 3.917

Page 54: Indice manual de certificación ACFE

INVESTIGATION

2011 Fraud Examiners Manual (International) 3.xv

REPORTING STANDARDS (CONT.) Voluntariness of Confessions .............................................................................................. 3.917 Intent ....................................................................................................................................... 3.917 Approximate Dates of Offence .......................................................................................... 3.918 Approximate Amounts of Losses ....................................................................................... 3.918 Approximate Number of Instances .................................................................................... 3.918 Willingness to Cooperate ..................................................................................................... 3.918 Excuse Clause ........................................................................................................................ 3.919 Confessor Read the Statement ............................................................................................ 3.919 Truthfulness of Statement.................................................................................................... 3.919 Key Points in Signed Statements ........................................................................................ 3.919

Visual Aids .................................................................................................................................... 3.920 Link-Network Diagrams ...................................................................................................... 3.920 Matrices ................................................................................................................................... 3.922 Time-Flow Diagrams ............................................................................................................ 3.923 Summaries of Witnesses’ Statements ................................................................................. 3.923

Engagement Contracts ................................................................................................................ 3.924 Elements of the Engagement Contract.............................................................................. 3.924

The Long Form .............................................................................................................. 3.925 The Short Form .............................................................................................................. 3.925 Terms ............................................................................................................................... 3.925 Close ................................................................................................................................. 3.925 Indemnity Clause ............................................................................................................ 3.926

Opinions ................................................................................................................................. 3.926 Fraud Examination Checklist ..................................................................................................... 3.927

Page 55: Indice manual de certificación ACFE

INVESTIGATION

3.xvi 2011 Fraud Examiners Manual (International)

APPENDIX

FRAUD EXAMINATION CHECKLIST Fraud Examination Checklist ..................................................................................................... 3.1001 SAMPLE FRAUD EXAMINATION REPORTS Bailey Books, Incorporated ........................................................................................................ 3.1101 ENGAGEMENT CONTRACTS AND OPINION LETTERS Engagement Letters

Fraud Policy Review Proposal ............................................................................................. 3.1201 Fraud Examination Proposal ............................................................................................... 3.1202 Fraud Policy Review Opinion ............................................................................................. 3.1203

Fraud Examination Opinion Letters Evidence Does Not Support Allegation ............................................................................ 3.1205 Evidence Supports Allegation ............................................................................................. 3.1206 Inconclusive Evidence .......................................................................................................... 3.1207

Page 56: Indice manual de certificación ACFE

FRAUD PREVENTION AND DETERRENCE

2011 Fraud Examiners Manual (International) 4.i

FRAUD EXAMINERS MANUAL INTERNATIONAL VERSION

TABLE OF CONTENTS

UNDERSTANDING HUMAN BEHAVIOUR Behavioural Analysis and the Detection of Fraud .................................................................. 4.101

Conclusion .............................................................................................................................. 4.106 Why People Obey the Law ......................................................................................................... 4.108

Instrumental Perspective ...................................................................................................... 4.108 Normative Perspective ......................................................................................................... 4.108 Legitimacy ............................................................................................................................... 4.109 Voluntary Compliance .......................................................................................................... 4.110 Measuring Legitimacy and Compliance ............................................................................. 4.111

Legitimacy and Compliance .......................................................................................... 4.112 Implications of the Chicago Study ............................................................................... 4.113 The Psychological Variables ......................................................................................... 4.113 Legitimacy and Experience ........................................................................................... 4.114 The Meaning of Procedural Justice .............................................................................. 4.115 Influence of Control on the Meaning of Procedural Justice .................................... 4.116

THEORIES OF CRIME CAUSATION Classical Criminology .................................................................................................................. 4.201 Routine Activities Theory ........................................................................................................... 4.202 Biological Theories ...................................................................................................................... 4.203 Psychological Theories ................................................................................................................ 4.204

Cognitive Theories ................................................................................................................ 4.204 Integrated Theories ............................................................................................................... 4.204 Conditioning Theory ............................................................................................................ 4.204

Social Structure Theories ............................................................................................................ 4.205 Theory of Anomie ................................................................................................................. 4.205

Social Process Theories ............................................................................................................... 4.206 Social Learning Theories ...................................................................................................... 4.206 Theory of Differential Association ..................................................................................... 4.206 Social Control Theory ........................................................................................................... 4.208 Differential Reinforcement Theory .................................................................................... 4.210

WHITE-COLLAR CRIME What Is White-Collar Crime? ..................................................................................................... 4.301 Public Perceptions of White-Collar Crime ............................................................................... 4.303

National Survey of Crime Severity Ratings: Selected Offence Stimuli .......................... 4.303 Crimes of the Middle Classes—A Look at White-Collar Crime .................................................. 4.305

Propietario
Resaltado
Page 57: Indice manual de certificación ACFE

FRAUD PREVENTION AND DETERRENCE

4.ii 2011 Fraud Examiners Manual (International)

WHITE-COLLAR CRIME (CONT.) Profiles of Offenders ............................................................................................................ 4.306 Cressey Study ......................................................................................................................... 4.306 Effect of Status ...................................................................................................................... 4.307 Organisational Opportunity ................................................................................................. 4.307 The Middle Class ................................................................................................................... 4.307 Methodology .......................................................................................................................... 4.308 Offenders Ranked by Status, with Selected Demographic Information ....................... 4.309 Cooperating Defendants ...................................................................................................... 4.310 Pleas by White-Collar Defendants ...................................................................................... 4.311 Judgements ............................................................................................................................. 4.311 Personal Suffering ................................................................................................................. 4.312 Imprisonment ........................................................................................................................ 4.312 Contributing Factors ............................................................................................................. 4.313 Conclusion .............................................................................................................................. 4.314

ORGANISATIONAL CRIME Corporate Organisation and Criminal Behaviour ................................................................... 4.402

The Image of the Corporation ............................................................................................ 4.402 Clinard and Yeager ................................................................................................................ 4.403

Opportunities for Unlawful Organisational Behaviour .......................................................... 4.404 Organisational Structure ....................................................................................................... 4.404

Criminogenic Organisational Structures ................................................................................... 4.406 Corporate Executives and Criminal Liability ........................................................................... 4.409 Management Behaviour .............................................................................................................. 4.411 Controlling Organisational Crime ............................................................................................. 4.412

The Enforcement Effort: Preventing and Reducing Fraud ............................................ 4.414 Compliance ...................................................................................................................... 4.414 Deterrence ....................................................................................................................... 4.415 Increased Enforcement ................................................................................................. 4.415

Fraud Prevention Programs ................................................................................................. 4.415 OCCUPATIONAL FRAUD Research in Occupational Fraud and Abuse ............................................................................ 4.501

Edwin H. Sutherland ............................................................................................................ 4.501 Donald R. Cressey ................................................................................................................. 4.502

Cressey’s Hypothesis ...................................................................................................... 4.502 Non-Shareable Financial Problems ............................................................................. 4.503 Perceived Opportunity .................................................................................................. 4.505 Rationalisations ............................................................................................................... 4.506 Conjuncture of Events .................................................................................................. 4.510 Conclusions ..................................................................................................................... 4.510

Dr. Steve Albrecht ................................................................................................................. 4.510

Page 58: Indice manual de certificación ACFE

FRAUD PREVENTION AND DETERRENCE

2011 Fraud Examiners Manual (International) 4.iii

OCCUPATIONAL FRAUD (CONT.) The Albrecht Study ........................................................................................................ 4.510 The Fraud Scale .............................................................................................................. 4.512

Richard C. Hollinger and John P. Clark ............................................................................. 4.514 The Hollinger-Clark Study ............................................................................................ 4.514 Hypotheses of Employee Theft ................................................................................... 4.514

2010 Report to the Nations on Occupational Fraud and Abuse ................................... 4.519 Measuring the Cost of Occupational Fraud ............................................................... 4.520 How Occupational Fraud Is Committed .................................................................... 4.521 Duration of Fraud Schemes .......................................................................................... 4.524 Detection of Fraud Schemes ........................................................................................ 4.524 Geographical Location of Organisations .................................................................... 4.526 Victims of Occupational Fraud .................................................................................... 4.527

FRAUD PREVENTION PROGRAMS Responsibility for Fraud Prevention ......................................................................................... 4.601

Vicarious or Imputed Liability ............................................................................................ 4.601 The Treadway Commission ................................................................................................. 4.602 COSO Recommendations ................................................................................................... 4.602

Control Environment .................................................................................................... 4.603 Risk Assessment ............................................................................................................. 4.604 Control Activities............................................................................................................ 4.605 Information and Communication ................................................................................ 4.606 Monitoring ....................................................................................................................... 4.606

Implementing a Corporate Compliance Program ................................................................... 4.607 Establishing Standards .......................................................................................................... 4.610 Assigning Responsibility ....................................................................................................... 4.610 Audit Committees ................................................................................................................. 4.611 Due Diligence in Hiring ....................................................................................................... 4.611 Communicating the Policy ................................................................................................... 4.612

Training Employees ....................................................................................................... 4.612 Achieving Compliance .......................................................................................................... 4.613 Disciplinary Action ............................................................................................................... 4.613 Appropriate Responses ........................................................................................................ 4.614 Periodic Assessment ............................................................................................................. 4.615 Relation of COSO and Corporate Sentencing Guidelines .............................................. 4.615

Procedures to Prevent Fraud ...................................................................................................... 4.617 Proactive Fraud Policies ....................................................................................................... 4.617

Use of Analytical Review ............................................................................................... 4.617 Fraud Assessment Questioning .................................................................................... 4.617 Enforcement of Mandatory Vacations ........................................................................ 4.618 Job Rotation .................................................................................................................... 4.618

Page 59: Indice manual de certificación ACFE

FRAUD PREVENTION AND DETERRENCE

4.iv 2011 Fraud Examiners Manual (International)

FRAUD PREVENTION PROGRAMS (CONT.) Surprise Audits Where Possible ................................................................................... 4.618

Management Oversight ........................................................................................................ 4.618 Increasing the Perception of Detection ...................................................................... 4.619 Employee Education ...................................................................................................... 4.619 Minimise Employee Pressures ...................................................................................... 4.619 Open-Door Policies ....................................................................................................... 4.619 Employee Support Programs........................................................................................ 4.620 Management Climate ..................................................................................................... 4.620

Monitoring Systems .............................................................................................................. 4.620 Reporting Programs ....................................................................................................... 4.621 Hotlines ............................................................................................................................ 4.621

Fraud Prevention Policy .............................................................................................................. 4.622 Fraud Policy Objectives ....................................................................................................... 4.622 Selling Fraud Prevention to Management ......................................................................... 4.622

The Impact on the Bottom Line .................................................................................. 4.623 The Impact of Publicity ................................................................................................. 4.623

Writing the Fraud Policy ...................................................................................................... 4.624 Policy Statement ............................................................................................................. 4.624 Scope of Policy ............................................................................................................... 4.624 Actions Constituting Fraud ........................................................................................... 4.624 Nonfraud Irregularities .................................................................................................. 4.624 Investigation Responsibilities ....................................................................................... 4.625 Confidentiality ................................................................................................................. 4.625 Authorisation for Investigation .................................................................................... 4.625 Reporting Procedures .................................................................................................... 4.625 Termination ..................................................................................................................... 4.625

Communicating the Fraud Policy ....................................................................................... 4.625 Orientation/Annual Training ....................................................................................... 4.625 Memoranda ..................................................................................................................... 4.625 Posters .............................................................................................................................. 4.626 Employee Morale ........................................................................................................... 4.626 Legal Considerations ...................................................................................................... 4.626

Ethics Programs ........................................................................................................................... 4.626 Origins of Ethics ................................................................................................................... 4.627 Ethics’ Current Place in Business ....................................................................................... 4.628 Ethics Program Development ............................................................................................. 4.628

Sample Fraud Policy .................................................................................................................... 4.630 Sample Code of Business Ethics and Conduct ........................................................................ 4.634

Introduction ........................................................................................................................... 4.634 Competition ........................................................................................................................... 4.635

Fair Competition ............................................................................................................ 4.635 Compliance with Laws and Regulatory Orders ................................................................ 4.636

Page 60: Indice manual de certificación ACFE

FRAUD PREVENTION AND DETERRENCE

2011 Fraud Examiners Manual (International) 4.v

FRAUD PREVENTION PROGRAMS (CONT.) Conflicts of Interest .............................................................................................................. 4.636

Gifts and Entertainment................................................................................................ 4.636 Outside Employment ..................................................................................................... 4.638 Relationships with Suppliers and Customers ............................................................. 4.638 Employment of Relatives .............................................................................................. 4.639

Confidential Information and Privacy of Communications ........................................... 4.639 Confidential Information .............................................................................................. 4.639

Company Assets .................................................................................................................... 4.640 Cash and Bank Accounts .............................................................................................. 4.640 Company Assets and Transactions .............................................................................. 4.641 Expense Reimbursement ............................................................................................... 4.642 Company Credit Card .................................................................................................... 4.642 Software and Computers ............................................................................................... 4.642

Political Contributions .......................................................................................................... 4.643 Employee Conduct ............................................................................................................... 4.643

Conduct on Company Business ................................................................................... 4.643 Reporting Violations ............................................................................................................. 4.644 Discipline ................................................................................................................................ 4.644 Compliance Letter and Conflict of Interest Questionnaire ............................................ 4.646

Code of Conduct Compliance Questionnaire .......................................................................... 4.647 Conflict of Interest ................................................................................................................ 4.647 Political ................................................................................................................................... 4.649 Securities Trading .................................................................................................................. 4.649 Financial Integrity .................................................................................................................. 4.649 Other ....................................................................................................................................... 4.649

FRAUD RISK ASSESSMENT What Is Fraud Risk? .................................................................................................................... 4.701

Why Should an Organisation Be Concerned About Fraud Risk? .................................. 4.701 The Business It Is In ...................................................................................................... 4.702 The Environment in Which It Operates ..................................................................... 4.702 The Effectiveness of Internal Controls Within the Business Processes ................ 4.702 The Ethics and Values of the Company and the People Within It ......................... 4.702

What Is a Fraud Risk Assessment? ............................................................................................ 4.703 What Is the Objective of a Fraud Risk Assessment? ....................................................... 4.703 Why Should Organisations Conduct Fraud Risk Assessments? .................................... 4.703

Improve Communication and Awareness About Fraud .......................................... 4.703 Identify What Activities Are the Most Vulnerable to Fraud .................................... 4.704 Know Who Puts the Organisation at the Greatest Risk ........................................... 4.704 Develop Plans to Mitigate Fraud Risk ......................................................................... 4.704 Develop Techniques to Determine If Fraud Has Occurred in High-Risk Areas .......................................................................................................... 4.704

Page 61: Indice manual de certificación ACFE

FRAUD PREVENTION AND DETERRENCE

4.vi 2011 Fraud Examiners Manual (International)

FRAUD RISK ASSESSMENT (CONT.) What Makes a Good Fraud Risk Assessment? ................................................................. 4.704

The Right Sponsor ......................................................................................................... 4.705 Independence/Objectivity of the People Leading and Conducting the Work ....................................................................................................................... 4.705 A Good Working Knowledge of the Business .......................................................... 4.706 Access to People at All Levels of the Organisation .................................................. 4.706 Engendered Trust ........................................................................................................... 4.707 The Ability to Think the Unthinkable ......................................................................... 4.707 A Plan to Keep It Alive and Relevant ......................................................................... 4.707

Considerations for Developing an Effective Fraud Risk Assessment .......................... 4.707 Packaging It Right .......................................................................................................... 4.707 One Size Does Not Fit All ............................................................................................ 4.708 Keeping It Simple ........................................................................................................... 4.708

Preparing the Company for a Fraud Risk Assessment ........................................................... 4.708 Assemble the Right Team to Lead and Conduct the Fraud Risk Assessment ............. 4.709 Determine the Best Techniques to Use to Conduct the Fraud Risk Assessment ....... 4.709

Interviews ........................................................................................................................ 4.710 Focus Groups ................................................................................................................. 4.710 Surveys ............................................................................................................................. 4.710 Anonymous Feedback Mechanisms ............................................................................ 4.711

Obtain the Sponsor’s Agreement on the Work to Be Performed ................................. 4.711 Educate the Organisation and Openly Promote the Process ......................................... 4.711

Executing the Fraud Risk Assessment ...................................................................................... 4.712 Choosing a Framework ........................................................................................................ 4.712 Sample Fraud Risk Assessment Framework #1 ............................................................... 4.712

Identify Potential Inherent Fraud Risks ...................................................................... 4.713 Assess the Likelihood of Occurrence of the Identified Fraud Risks ...................... 4.716 Assess the Significance to the Organisation of the Fraud Risks ............................. 4.717 Evaluate Which People and Departments Are Most Likely to Commit Fraud and Identify the Methods They Are Likely to Use ................................................. 4.717 Identify and Map Existing Preventive and Detective Controls to the Relevant Fraud Risks .................................................................................................. 4.717 Evaluate Whether the Identified Controls Are Operating Effectively and Efficiently ..................................................................................................................... 4.718 Identify and Evaluate Residual Fraud Risks Resulting from Ineffective or Nonexistent Controls ................................................................................................. 4.719

Sample Fraud Risk Assessment Framework #2—Fraud Risk Index ............................ 4.719 Fraud Risk Index ............................................................................................................ 4.719 Leadership Risk Profile .................................................................................................. 4.720

Responding to Residual Fraud Risks ......................................................................................... 4.721 Avoid the Risk ....................................................................................................................... 4.722 Transfer the Risk ................................................................................................................... 4.722

Page 62: Indice manual de certificación ACFE

FRAUD PREVENTION AND DETERRENCE

2011 Fraud Examiners Manual (International) 4.vii

FRAUD RISK ASSESSMENT (CONT.) Mitigate the Risk .................................................................................................................... 4.722 Assume the Risk .................................................................................................................... 4.722 Combination Approach ........................................................................................................ 4.722

Reporting the Results of the Fraud Risk Assessment ............................................................. 4.723 Considerations When Reporting the Assessment Results ............................................... 4.723

Report Objective—Not Subjective—Results ............................................................ 4.723 Keep It Simple ................................................................................................................ 4.723 Focus On What Really Matters .................................................................................... 4.723 Identify Actions That Are Clear and Measurable to Drive Results ........................ 4.723

Sample Report Formats ........................................................................................................ 4.724 Graphic Report Format ................................................................................................. 4.724 Executive Summary Report Format ............................................................................ 4.724

Reporting the Leadership Risk Assessment Results ........................................................ 4.725 Making an Impact with the Fraud Risk Assessment ............................................................... 4.725

Begin a Dialogue Across the Company ............................................................................. 4.725 Look for Fraud in High-Risk Areas ................................................................................... 4.726 Hold Action Owners Accountable for Progress .............................................................. 4.726 Keep It Alive and Relevant .................................................................................................. 4.726

The Fraud Risk Assessment and the Audit Process ............................................................... 4.726 The Fraud Risk Assessment Tool .............................................................................................. 4.728

Introduction ........................................................................................................................... 4.728 MODULE # 1—Employee Assessment .......................................................................... 4.729 MODULE # 2—Management/Key Employee Assessment ......................................... 4.733 MODULE # 3—Physical Controls to Deter Employee Theft and Fraud .................. 4.738 MODULE # 4—Skimming Schemes ................................................................................ 4.740 MODULE # 5—Cash Larceny Schemes .......................................................................... 4.743 MODULE # 6—Cheque Tampering Schemes ................................................................ 4.746 MODULE # 7—Cash Register Schemes ......................................................................... 4.749 MODULE # 8—Purchasing and Billing Schemes .......................................................... 4.751 MODULE # 9—Payroll Schemes ..................................................................................... 4.754 MODULE # 10—Expense Schemes ................................................................................ 4.756 MODULE # 11—Theft of Inventory and Equipment .................................................. 4.757 MODULE # 12—Theft of Proprietary Information ..................................................... 4.761 MODULE # 13—Corruption ............................................................................................ 4.763 MODULE # 14—Conflicts of Interest ............................................................................ 4.764 MODULE # 15—Fraudulent Financial Reports ............................................................. 4.765

ETHICS FOR FRAUD EXAMINERS What Is Ethics?............................................................................................................................. 4.801

An Ethical Decision Maker’s Role ...................................................................................... 4.802 Ethical Decisions ................................................................................................................... 4.802

Morality, Ethics, and Legality ..................................................................................................... 4.803

Page 63: Indice manual de certificación ACFE

FRAUD PREVENTION AND DETERRENCE

4.viii 2011 Fraud Examiners Manual (International)

ETHICS FOR FRAUD EXAMINERS (CONT.) The High Road ...................................................................................................................... 4.803 Philosophy, Ethics, and Law ............................................................................................... 4.804 Means and Ends .................................................................................................................... 4.805

Some Concluding Remarks......................................................................................................... 4.806 ACFE CODE OF PROFESIONAL ETHICS Commitment to Professionalism and Diligence ...................................................................... 4.902

Professionalism ...................................................................................................................... 4.902 Specialised Knowledge and Formal Education .......................................................... 4.902 Professional Admission Standards ............................................................................... 4.903 Standards of Conduct .................................................................................................... 4.903 Individual Fraud Examiners ......................................................................................... 4.903

Diligence ................................................................................................................................. 4.904 Legal and Ethical Conduct and Conflict of Interest ............................................................... 4.904

Illegal Conduct ....................................................................................................................... 4.904 Libel and Slander ............................................................................................................ 4.904 False Imprisonment ....................................................................................................... 4.905

Unethical Conduct ................................................................................................................ 4.905 Conflict of Interest and “Independence” Considerations............................................... 4.906

Integrity and Competence ........................................................................................................... 4.906 Integrity ................................................................................................................................... 4.907 Professional Competence ..................................................................................................... 4.907

Programming ................................................................................................................... 4.908 Investigation .................................................................................................................... 4.908 Reporting ......................................................................................................................... 4.908

Professional Scepticism ........................................................................................................ 4.908 Court Orders and Testimony ..................................................................................................... 4.909 Reasonable Evidential Basis for Opinions ............................................................................... 4.910

Evidential Basis for Opinions ............................................................................................. 4.910 Guilt and Innocence ............................................................................................................. 4.911

Confidential Information ............................................................................................................ 4.912 Proper Authorisation ............................................................................................................ 4.914 Relation to Conflict of Interest ........................................................................................... 4.914 Public Information ................................................................................................................ 4.915 Blowing the Whistle .............................................................................................................. 4.915

Complete Reporting of Material Matters .................................................................................. 4.916 Professional Improvement ......................................................................................................... 4.917 Professional Standards and Practices ........................................................................................ 4.918

General Standards ................................................................................................................. 4.918 Independence and Objectivity ...................................................................................... 4.918 Qualifications .................................................................................................................. 4.918 Fraud Examinations ....................................................................................................... 4.919

Page 64: Indice manual de certificación ACFE

FRAUD PREVENTION AND DETERRENCE

2011 Fraud Examiners Manual (International) 4.ix

ACFE CODE OF PROFESIONAL ETHICS (CONT.) Confidentiality ................................................................................................................. 4.919

Specific Standards.................................................................................................................. 4.919 Independence and Objectivity ...................................................................................... 4.919 Qualifications .................................................................................................................. 4.920 Fraud Examination ......................................................................................................... 4.921 Confidentiality ................................................................................................................. 4.921

Predication Standards .................................................................................................................. 4.922 Bribery ..................................................................................................................................... 4.922 Conflicts of Interest .............................................................................................................. 4.922 Embezzlement ....................................................................................................................... 4.923 False Financial Statements ................................................................................................... 4.923 False Pretences ....................................................................................................................... 4.923 Theft ........................................................................................................................................ 4.924

CFE CODE OF PROFESIONAL STANDARDS CFE Code of Professional Standards ....................................................................................... 4.1001

I. Preamble ............................................................................................................................. 4.1001 II. Applicability of Code ....................................................................................................... 4.1001 III. Standards of Professional Conduct ............................................................................. 4.1002 IV. Standards of Examination ............................................................................................. 4.1004 V. Standards of Reporting ................................................................................................... 4.1004