Presentation is loading. Please wait.

Presentation is loading. Please wait.

Advanced Forensic Accounting -ACC 465 UNIT 3 Dr. Doug Letsch I am online waiting for the live session to begin. If you have a general question, please.

Similar presentations


Presentation on theme: "Advanced Forensic Accounting -ACC 465 UNIT 3 Dr. Doug Letsch I am online waiting for the live session to begin. If you have a general question, please."— Presentation transcript:

1 Advanced Forensic Accounting -ACC 465 UNIT 3 Dr. Doug Letsch I am online waiting for the live session to begin. If you have a general question, please ask it in the chat window. The only talking you will here is when I welcome someone who has just signed in. If you don’t hear me welcoming everyone, please adjust your speakers. Let me know if you have problems. Thanks, Dr. Doug

2 Cleanup WP Problem Review Chapter 4 Chapter 5 Questions

3 CLEAN UP Learning Journal Questions

4 LEARNING JOURNAL One due each week in the journal area – See tabs at top of page.

5 PROBLEM REVIEW What caused the most problem?

6 WEEK 1 PROBLEMS: Very good discussions – Keep it up! 50% had problem with this quiz question: Laws such as the RICO Act (racketeering influence and corrupt organizations), money laundering, false claims, bankruptcy fraud, tax evasion, conspiracy, and obstruction of justice require that "reasonable believe" is established prior to intrusive searches in order to comply with the regulatory rules of evidence. Pg 39 states “probable cause” so answer is false. Everything else was smooth sailing!

7 Watch a couple of videos and then match concepts; so please pay close attention. Each video has a poll question Watch n Match

8 First video: Money Laundering http://www.youtube.com/watch?v=1yQ9dVOt8DA Watch first 5 ½ minutes, pause video, and then return to match! DO NOT LEAVE VIDEO AS YOU WILL RETURN FOR MORE… Watch n Match 1a1a

9 A.Move money to Legitimate Business B.Deposit in Small Increments C.Fanout Watch n Match 1.Placement Stage 2.Layering Stage 3.Re-Entry Stage Match the stages of money laundering to the appropriate activity

10 B.Deposit in Small Increments C.Fanout A.Move money to Legitimate Business Watch n Match 1.Placement Stage 2.Layering Stage 3.Re-Entry Stage Match the stages of money laundering to the appropriate activity

11 First video part 2: Money Laundering http://www.youtube.com/watch?v=1yQ9dVOt8DA Return to watch the rest of your video! Watch n Match 1b1b

12 A.A method use to layer money B.Animal use to move money across border C.People who transport money across border within their person Watch n Match 1.Money Mule Match Money Mule to the correct description

13 A.A method use to layer money Watch n Match 1.Money Mule Match Money Mule to the correct description

14 Second video: Asset Forfeitures Watch complete 3 minutes and return to match! http://www.youtube.com/watch?v=pdcyetVibf0 Watch n Match 2

15 1.Collect revenues for government 2.Return lost money to victims 3.Punish perpetrators 4.All of the above What is the purpose behind the asset forfeitures as identified in this CNN video?

16 Watch n Match 1.Collect revenues for government 2.Return lost money to victims 3.Punish perpetrators 4.All of the above What is the purpose behind the asset forfeitures as identified in this CNN video?

17 Last video: CNBC News Report on Drug Company Racketeering Watch complete 3 minutes and return http://www.youtube.com/watch?v=-dYmxjcs7WY This video will hurt! Watch n Match 3

18 1.Violent crimes 2.Money laundering 3.Mail and wire fraud 4.Securities fraud 5.All of the above What acts below are considered Racketeering? See pg 97 in text

19 TAX EVASION Tax avoidance consists of using legal means and methodology to minimize taxes within the existing framework of tax rules and regulations. Tax evasion is the intentional wrongdoing to evade taxes believed to be owed. Common tax evasion schemes include: Deliberate understatement of taxes owed The omission of taxable transactions and activities Fictitious events and activities Hidden events and activities False statements made to tax agents

20 BANKRUPTCY FRAUD The bankruptcy court has the right to appoint a trustee in cases where there are claims of fraud, dishonesty, incompetence, or gross mismanagement One of the roles of the trustee is to attempt to identify missing assets and locate them. Bankruptcy crimes are investigated by the FBI and prosecuted by the U.S. Attorney’s Office.

21 SECURITIES FRAUD Pyramid Schemes –Ponzi “Prime Bank” Fraud – promise huge returns Churning-excessive selling of securities Unsuitable Recommendations by brokers Parking – selling securities with buyback agreements avoid Front Running-insiders at exchange trade before large blocks Bucket Shops –unlicensed brokerage business Misuse or Misappropriation of a Customer’s Securities- use client funds as own. Market Manipulations –artificial control of stock price Insider Trading- use non public information

22 CHAPTER 5 Cybercrime

23 CYBERCRIMECYBERCRIME Criminal activity using computer or network of computers Examples include spamming, theft of electronic intellectual property, unauthorized access (e.g., defeating access controls), malicious code (e.g., computer viruses), denial-of-service attacks, theft of service (e.g., telecom fraud), and computer-based investment and other financial frauds.

24 CYBERCRIMECYBERCRIME The Department of Justice categorizes computer crime in three ways: 1.The computer as a target - attacking the computers of others (spreading viruses is an example). 2.The computer as a weapon - using a computer to commit "traditional crime" that we see in the physical world (such as fraud or illegal gambling). 3.The computer as an accessory - using a computer as a "fancy filing cabinet" to store illegal or stolen information. Source: http://www.cybercitizenship.org/crime/crime.htmlhttp://www.cybercitizenship.org/crime/crime.html

25 CYBERCRIME VIDEO Video review of Cybercrime by McAfee Please watch this video and return here. Type Done in the chat window when finished http://www.mcafee.com/us/campaigns/fight_cybercrime/cru/index.html Click on Watch five minute introductory video

26 CYBERCRIME VIDEO In this video you heard specific information about cybercrime. After our meeting, return to this site and do this steps; then take off for the night as McAfee checks your system for elements of cybercrime. DO NOT DO THIS NOW! Go to the SAME video site site and check to see if your computer has been infected. 1.Use Internet Explorer only. 2.Instead of clicking on the five minute video, click on “Access your risk” at the top section of the page. 3.Read the possible causes and click on “My computer is not acting the way it normally does”. You can click other areas if you like. 4.Click on Submit 5.Click on “McAfee Cybercrime Scanner” 6.Read the information and click on “CONTINUE” 7.Return 60 minutes later to reveal results.

27 CYBERCRIME RESOURCES Great resource to support reading this week: Information on crimes of fraud, cybercrime, etc. from Interpol http://www.interpol.int/Crime-areas Deloitte white paper on cybercrime http://www.deloitte.com/assets/Dcom- UnitedStates/Local%20Assets/Documents/AERS/us_aers_Deloitte%20Cyber%20Crime%20P OV%20Jan252010.pdf MacAfee report on cybercrime http://www.mcafee.com/us/resources/reports/rp-virtual-criminology-report-2009.pdf Speech by Shawn Henry, Director of the FBI on responding to cybercrime http://www.fbi.gov/news/speeches/responding-to-the-cyber-threat FBI information on cybercrime http://www.fbi.gov/about-us/investigate/cyber/cyber Learn about Internet Fraud and the schemes used from the FBI http://www.fbi.gov/scams-safety/fraud/internet_fraud

28 Are there any questions? If you attending the live session tonight, then you do NOT need to complete the alternative seminar assignment.


Download ppt "Advanced Forensic Accounting -ACC 465 UNIT 3 Dr. Doug Letsch I am online waiting for the live session to begin. If you have a general question, please."

Similar presentations


Ads by Google