THE HOTTEST JOBS For College Grads FORENSIC ACCOUNTANT Combines accounting, auditing and investigative skills: $30,000-$150,000 LOGISTICS MANAGER Plan,

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

1 Insurance Fraud Dennis Pompa, Associate Commissioner Texas Department of Insurance Fraud Unit.
Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011.
Computer Forensics and Access Data’s Ultimate Tool Kit Presented by: Kaukab ZuberiVice Chairman KRYS Dustin HulburtSenior Trainer and Manager Acces Data.
Fraud Examination, 3E Chapter 1: The Nature of Fraud COPYRIGHT © 2009 South-Western, a part of Cengage Learning.
Forensic and Investigative Accounting Chapter 2 Forensic Accounting Education, Institutions, and Specialties © 2009 CCH. All Rights Reserved W. Peterson.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
Contents What is Forensic Accounting Nature of work of Forensic Accountants Need of Forensic accounting Activities of Forensic accountants Forensic Accountant…An.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Chapter 14 Crime and Justice in the New Millennium
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Security, Privacy, and Ethics Online Computer Crimes.
Hands-On Ethical Hacking and Network Defense
Indiana State University Forensic Accounting By Dr. Thomas D. Harris.
Forensic and Investigative Accounting
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Chapter 1: The Nature of Fraud
Forensic Accountant Steven Auerbach. Forensic Accountant  Forensic accountants are experienced auditors and investigators of financial documents who.
Forensic and Investigative Accounting Chapter 2 Forensic Accounting Education, Institutions, and Specialties © 2007 CCH. All Rights Reserved W. Peterson.
Introduction to Forensic Accounting and Fraud Examination McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights.
Forensic Accounting. Agenda Definition History Skills Business scandals Cases.
Forensic and Investigative Accounting Chapter 1 Introduction to Forensic and Investigative Accounting © 2007 CCH. All Rights Reserved W. Peterson.
Chapter 16 Prepared by Richard J. Campbell Copyright 2011, Wiley and Sons Topics Beyond the Integrated Audit.
Career number 1. E- Discovery Professional  Electronic Discovery- Technology based Identifies, preserves and manages electronically stored information.
Chapter 6 Audit Responsibilities and Objectives
Brought to you by: Myles Banks and-security-investigationshttp:// and-security-investigations/
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
1–11–1 1-1 Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Litigation Support, Investigations and Expert Witness Services Rick Potocek, CPA, MBA, CFE.
Risk Management Reconstructed Implementing fraud risk intelligence practices July 2011 KPMG FORENSIC SM.
Chapter 1: Accounting Information Systems and the Accountant
 An orderly analysis, investigation, inquiry, test, inspection, or examination along a “paper trail” in the search for fraud, embezzlement, or hidden.
Case 6.3 WorldCom Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill.
Summary of the Investor Protection, Auditor Reform, and Transparency Act of 2002 (Sarbanes-Oxley Act)
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Computer Forensics Principles and Practices
Fraud Examination Evidence III: Forensic Science and Computer Forensics McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
 Collecting Evidence ◦ Subpoenas, court orders, search warrants, electronic surveillance, and traditional methods You have to know where to look! Let’s.
Deloitte Forensic Forensic Technology Conference of Regulatory Officers - CORO November 2012.
00 CHAPTER 1 Governance, Ethics, and Managerial Decision Making © 2009 Cengage Learning.
ACCOUNTING KNOWN AS “THE LANGUAGE OF BUSINESS”. Branches of Accounting Financial Managerial Cost Auditing Tax Fiduciary Forensic Accounting System.
By: Amanda Breazeale Mrs.Moravits Period 6 9/23/14.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
Objectives SWBAT Identify the various procedures in the enactment, implementation, and enforcement of law SWBAT compare responsibilities, jurisdictions,
Fraud Examination Evidence III: Forensic Science and Computer Forensics McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Cybercrime What is it, what does it cost, & how is it regulated?
Presents Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Forensic and Investigative Accounting Chapter 2 Forensic Accounting Education, Institutions, and Specialties © 2011 CCH. All Rights Reserved W. Peterson.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Business Computer Applications I Business Computer Applications II Accounting Principles I Accounting Principles II Business Law (offered 2017) Intro to.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
By: Casey Crawford.  - Foundation in chemistry, biology, physics, and math  - General chemistry I and II and lab for science majors (8 credit hours)
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Computer Forensics 1 1.
JASA AKUNTANSI FORENSIK
LAW 531 Education for Service-- tutorialrank.com
U.S. Department of Justice
Forensic and Investigative Accounting
Forensic and Investigative Accounting
CCP 420: FRAUD DETECTION AND MANAGEMENT
Introduction to Digital Forensics
Presentation transcript:

THE HOTTEST JOBS For College Grads FORENSIC ACCOUNTANT Combines accounting, auditing and investigative skills: $30,000-$150,000 LOGISTICS MANAGER Plan, implement and control flow of goods or services: $35,000-$118,000 CORPORATE LIBRARIAN More companies need specialists to manage information: $37,000-$93,000 EMERGING MEDIA SPECIALIST Managers in Web content and online marketing need communication skills and tech savvy: $26,500-$100,000 PHYSICAL THERAPIST Aging baby boomers will drive the increasing need: $34,600-$74,000 INFORMATION SECURITY Workers plan, implement and support network security: $47,000-$122,000 FORENSIC ACCOUNTING

FORENSIC: Refers to items used in debate or argument. In commerce or business, things forensic are generally those things that relate to a legal forum or court. ACCOUNTING: “The language of business”. Quantifying data for financial purposes; accounting refers to many activities that relate to financial accounts.

WHAT IS FORENSIC ACCOUNTING? Forensic accounting refers to: The use of accounting for legal purposes. The use of intelligence-gathering techniques and accounting to develop information and opinion for use by attorneys involved in civil litigation and give trial testimony if called upon. Identifying, recording, settling, extracting, sorting, reporting, and verifying past financial data or other accounting activities for settling prospective legal disputes or using such past financial data for projecting future financial data to settle legal disputes.

FORENSIC AUDIT V. FINANCIAL AUDIT Financial audit is generally a sampling activity that does not look at every transaction. A financial audit relies heavily on a company’s internal control system. An auditor expresses an opinion as to whether or not the financial statements are presented in conformity with GAAP. Forensic audit looks at the detail of a specific aspect of the records. Forensic accountant usually brought in when fraud is suspected.

BACKGROUND Before financial statements were audited by an independent auditor, the courts were often the only place where challenges were made and accounting experts were brought in to give testimony on the disputes in question. In North America, forensic accounting can be traced back as far as 1817 to Meyer v. Sefton, a Canadian case, that allowed an ‘expert witness’ to testify in court.

FAMOUS FORENSIC CASE or HOW AN ACCOUNTANT NABBED AL CAPONE Al Capone, bootlegger and gangster, seemed to be impossible to arrest and convict on any crime. Although he made millions from his illegal activities, he had never filed a tax return. The IRS ushered forensic accounting into the modern age in the US when they went after Al Capone. An IRS agent from the Special Intelligence Unit found enough evidence to convict Capone of income tax evasion. Capone received an 11 year sentence.

FORENSIC ACCOUNTING COMES OF AGE In the 40s and 50s, Forensic accountant becomes an investigative accountant, not just an expert witness. During WWII, FBI employed 500 agents who were accountants. In the 60s, J. Edgar Hoover emphasized fraud detection. Today, there are more than 600 FBI agents with accounting backgrounds. The Financial Crimes Section investigates money laundering, internet crimes, financial institution fraud and other economic crimes.

WHAT DO FORENSIC ACCOUNTANTS DO?? Investigate occupational fraud and abuse. Investigate fraudulent financial reporting. Serve as a litigation services specialist and expert witness. Trace assets in bankruptcy or divorce cases. Consulting. Work for government agencies such as IRS, FBI, SEC, law enforcement agencies, corporate security specialists.

Occupational Fraud and Abuse Losses from occupational fraud and abuse has been estimated to run in the billions. Many cases are never reported. Actual cost unknown. Difficult to discover because it’s an inside job. When fraud is suspected, the forensic accountant may be called in to investigate.

Fraudulent Financial Reporting In the 80s, Crazy Eddie’s. In 2001 and 2002, several major financial statement frauds resulting in billions of dollars of loss. Adelphia:Rigas family defrauded the company out of 3.1 billion. Enron:more than $1 billion. Merck:$12.4 billion Bristol-Myers Squibb:$1.5 billion. WorldCom:$3.8 billion. Prison time for many of the perpetrators.

Typical White-Collar Criminal Likely to be married Member of a church Educated beyond high school No arrest record Age range from teens to older than 60 Socially conforming Employment tenure from 1 to 20 years Acts alone 70% of the time Bottom Line: Given the right pressures, opportunities and rationalizations, many people are capable of committing crime.

GOVERNMENTAL FORENSIC ACCOUNTANTS Most common: IRS agents. Look for unreported income or disallowable expenses. Techniques include income reconstruction and “follow the money trail”. DEA, FBI, CIA and other governmental agencies use forensics accountants also. Treasury department agents work hand-in-hand with the DEA. They carry a badge and pack iron. Who better to “follow the money” than an accountant?

COMPUTER FORENSICS Analysis of electronic data and residual data for the purposes of discovery, legal preservation, authentication, reconstruction, and presentation to solve or aid in solving technology-based crimes. Most financial fraud involves a computer. Forensic accountant needs to be technologically savvy! May employ services of a tech person to assist in investigation.

CYBERCRIMES Fraudulent spam Financial frauds Unauthorized access Industrial espionage Illegal use of encryption Cyberstalking Denial of service Damaging networks or computers Illegal use of resources obtained from hacking activities.

CYBERCRIME STATUTES International law: No international laws per se, each country responsible for its own legislation. Many countries have no such laws on the books.

US Federal Legislation See: These laws: outlaw “counterfeit” access devices that are used for fraudulent purposes; deal with fraud in connection with computers, communication lines, interception of electronic communications, etc. USA Patriot Act, passed in 2001, strengthened US cyber laws and expanded cybercrime definitions. Under the Patriot Act, an activity covered by the law is considered a crime if it causes a loss exceeding $5000, impairment of medical records, harm to a person or a threat to public safety.

STATE LEGISLATION Unique to each state. Arkansas Code Sections and cover computer related crimes.

KSAs FOR FIGHTING CIBERCRIME KSAs: knowledge, skills and abilities. Ability to build an internet audit trail. Skills needed to collect “usable” courtroom electronic evidence. Basic understanding of the information that can be collected from various computer logs. Ability to place a valuation on incurred losses. Technical familiarity with the internet, web servers, firewalls, attack methodologies, security procedures, and penetration testing. Understanding of legal protocols to prevent employee rights violations.

ROLL OF FORENSIC ACCOUNTANT When fraud is suspected, may be called in to investigate. Gathers evidence. May interview witnesses. Determines suspects. Estimates losses. Serves as expert witness. CANNOT AND DOES NOT HAVE AUTHORITY TO ACT AS LAW ENFORCEMENT OFFICER UNLESS HE/SHE IS A LAW ENFORCEMENT OFFICER.

KNOWLEDGE BASE Obviously, need strong background in accounting. Investigative auditing. Law, legal system, courts and courtroom procedures. Criminology, criminal law and criminal procedure. Computer skills, including computer auditing. Oral and written communication skills.

SUGGESTED COURSES Major accounting courses. Financial statement analysis course. Taxation and business law. Technical writing. Criminology. Computer forensics. Psychology Business ethics. Business valuation.