Advanced Forensic Accounting -ACC 465 UNIT 3 Dr. Doug Letsch I am online waiting for the live session to begin. If you have a general question, please.

Slides:



Advertisements
Similar presentations
Copyright, 1996 © Dale Carnegie & Associates, Inc. BANK ON IT Money Smart Course Indiana Department of Financial Institutions.
Advertisements

Prevention of Money Laundering Training session. Overview What is Money laundering? Requirements under the Act Arcadias policy Relevance to your routine.
Introduction and Overview of Digital Crime and Digital Terrorism
FORENSIC ACCOUNTING - BA124 - Fall 2008Slide 15-1 Today’s Topics n Shenanigan #5 n Fraud, bankruptcy and divorce n Bankruptcy overview n Bankruptcy participants.
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes.
Computer Fraud Chapter 5.
Consumer Powers and Protections
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Employee, Vendor, and Other Frauds against the Organization Other Frauds against the Organization McGraw-Hill/Irwin Copyright © 2012 by.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
What is identity theft, and how can you protect yourself from it?
Dr. Mohamed A. Hamada Lecturer of Accounting Information Systems
JCSD-aw Citizenship in an e-World Johnston Community School District.
Ohio Division of Securities Your Name Here Investment Fraud and Investor Protection.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
FORENSIC ACCOUNTING - BA Slide 15-1 Today’s Topics n Fraud, bankruptcy and divorce n Tax fraud n Bankruptcy overview n Bankruptcy participants.
FORENSIC ACCOUNTING - BA124 - Spring 2006Slide 15-1 Today’s Topics n Fraud, bankruptcy and divorce n Bankruptcy overview n Bankruptcy participants n Bankruptcy.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Data Protection Act. Lesson Objectives To understand the data protection act.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Beware! Consumer Fraud Module 9.1.
Click here for Game Rules & InstructionsClick here for Game Rules & Instructions: Copyright.
Take Control of Your Financial Future. What is the New Brunswick Securities Commission? Crown Corporation Established in 2004 Double role 2.
ANTI-MONEY LAUNDERING TRAINING FOR LENDERS Bill Heyman Offit Kurman
FRAUD. Fraud involves obtaining property illegally by intentionally making a misrepresentation with the purpose of deceiving another party (e.g., a person,
Computer Crime Confucius say: "Cracker who gets busted doing one of these crimes, will spend long time in jail house soup."
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
By Renata Jaruseviciute 1 ©Renata Jaruseviciute.  Financial Crime definition & types  Regulatory body  Legislation  Questions to be asked yourself.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Investment Scams By: Adam Majka. What is investment fraud? Investment fraud is the use of false advertisement to get investors to purchase what seems.
Chapter 10: Crimes Against Property
Computer Security Management: Assessment and Forensics Session 8.
New York State Mock Trial Introduction. 1 Session Overview  Mock Trial Schedule  Responsibilities of Student Participants  Important Legal Terms 
Your Orientation Seminar Facilitator: JANE DOE First Term Support Having technical issues? Contact TECHNICAL SUPPORT: (Toll Free) 1 Welcome.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Advanced Forensic Accounting -ACC 465 UNIT 1 Dr. Doug Letsch I am online waiting for the live session to begin. If you have a general question, please.
Cybercrime What is it, what does it cost, & how is it regulated?
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
1.3 Safeguarding Your Privacy Identity Theft is the illegal use of an individual’s personal information.
Managerial Accounting for Business Professionals ACC 330 UNIT 5 Dr. Doug Letsch I am online waiting for the live session to begin. If you have a general.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Chapter 14 Internal Control, Corporate Governance, and Ethics.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Legal Considerations Members in Practice (MIP) Members in Business (MIB)
Managerial Accounting for Business Professionals ACC 330 UNIT 1 Dr. Doug Letsch I am online waiting for the live session to begin. If you have a general.
Legal Considerations Members in Practice (MIP) Members in Business (MIB)
Your Orientation Seminar Facilitator: JANE DOE First Term Support Having technical issues? Contact TECHNICAL SUPPORT: (Toll Free) 1 Welcome.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
 Have you ever bought anything through the Internet?  How did you pay for it?  Did you receive the goods you bought safely?  Were the goods of satisfactory.
Advanced Forensic Accounting -ACC 465 UNIT 4 Dr. Doug Letsch I am online waiting for the live session to begin. If you have a general question, please.
Advanced Forensic Accounting -ACC 465 UNIT 8 Dr. Doug Letsch A woman had two sons who were born on the same hour of the same day of the same year, but.
Protecting Your Assets By Preventing Identity Theft
Cyberspace fraud and abuse
ACC 571 EDU Education Terms/acc571edu.com
ACC 571 PAPERS Expert Level /acc571papers.com
The Criminal Law And Business
ACC 571 PAPERS Education Your Life--
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Cyberspace fraud and abuse
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Advanced Forensic Accounting -ACC 465 UNIT 3 Dr. Doug Letsch I am online waiting for the live session to begin. If you have a general question, please ask it in the chat window. The only talking you will here is when I welcome someone who has just signed in. If you don’t hear me welcoming everyone, please adjust your speakers. Let me know if you have problems. Thanks, Dr. Doug

Cleanup WP Problem Review Chapter 4 Chapter 5 Questions

CLEAN UP Learning Journal Questions

LEARNING JOURNAL One due each week in the journal area – See tabs at top of page.

PROBLEM REVIEW What caused the most problem?

WEEK 1 PROBLEMS: Very good discussions – Keep it up! 50% had problem with this quiz question: Laws such as the RICO Act (racketeering influence and corrupt organizations), money laundering, false claims, bankruptcy fraud, tax evasion, conspiracy, and obstruction of justice require that "reasonable believe" is established prior to intrusive searches in order to comply with the regulatory rules of evidence. Pg 39 states “probable cause” so answer is false. Everything else was smooth sailing!

Watch a couple of videos and then match concepts; so please pay close attention. Each video has a poll question Watch n Match

First video: Money Laundering Watch first 5 ½ minutes, pause video, and then return to match! DO NOT LEAVE VIDEO AS YOU WILL RETURN FOR MORE… Watch n Match 1a1a

A.Move money to Legitimate Business B.Deposit in Small Increments C.Fanout Watch n Match 1.Placement Stage 2.Layering Stage 3.Re-Entry Stage Match the stages of money laundering to the appropriate activity

B.Deposit in Small Increments C.Fanout A.Move money to Legitimate Business Watch n Match 1.Placement Stage 2.Layering Stage 3.Re-Entry Stage Match the stages of money laundering to the appropriate activity

First video part 2: Money Laundering Return to watch the rest of your video! Watch n Match 1b1b

A.A method use to layer money B.Animal use to move money across border C.People who transport money across border within their person Watch n Match 1.Money Mule Match Money Mule to the correct description

A.A method use to layer money Watch n Match 1.Money Mule Match Money Mule to the correct description

Second video: Asset Forfeitures Watch complete 3 minutes and return to match! Watch n Match 2

1.Collect revenues for government 2.Return lost money to victims 3.Punish perpetrators 4.All of the above What is the purpose behind the asset forfeitures as identified in this CNN video?

Watch n Match 1.Collect revenues for government 2.Return lost money to victims 3.Punish perpetrators 4.All of the above What is the purpose behind the asset forfeitures as identified in this CNN video?

Last video: CNBC News Report on Drug Company Racketeering Watch complete 3 minutes and return This video will hurt! Watch n Match 3

1.Violent crimes 2.Money laundering 3.Mail and wire fraud 4.Securities fraud 5.All of the above What acts below are considered Racketeering? See pg 97 in text

TAX EVASION Tax avoidance consists of using legal means and methodology to minimize taxes within the existing framework of tax rules and regulations. Tax evasion is the intentional wrongdoing to evade taxes believed to be owed. Common tax evasion schemes include: Deliberate understatement of taxes owed The omission of taxable transactions and activities Fictitious events and activities Hidden events and activities False statements made to tax agents

BANKRUPTCY FRAUD The bankruptcy court has the right to appoint a trustee in cases where there are claims of fraud, dishonesty, incompetence, or gross mismanagement One of the roles of the trustee is to attempt to identify missing assets and locate them. Bankruptcy crimes are investigated by the FBI and prosecuted by the U.S. Attorney’s Office.

SECURITIES FRAUD Pyramid Schemes –Ponzi “Prime Bank” Fraud – promise huge returns Churning-excessive selling of securities Unsuitable Recommendations by brokers Parking – selling securities with buyback agreements avoid Front Running-insiders at exchange trade before large blocks Bucket Shops –unlicensed brokerage business Misuse or Misappropriation of a Customer’s Securities- use client funds as own. Market Manipulations –artificial control of stock price Insider Trading- use non public information

CHAPTER 5 Cybercrime

CYBERCRIMECYBERCRIME Criminal activity using computer or network of computers Examples include spamming, theft of electronic intellectual property, unauthorized access (e.g., defeating access controls), malicious code (e.g., computer viruses), denial-of-service attacks, theft of service (e.g., telecom fraud), and computer-based investment and other financial frauds.

CYBERCRIMECYBERCRIME The Department of Justice categorizes computer crime in three ways: 1.The computer as a target - attacking the computers of others (spreading viruses is an example). 2.The computer as a weapon - using a computer to commit "traditional crime" that we see in the physical world (such as fraud or illegal gambling). 3.The computer as an accessory - using a computer as a "fancy filing cabinet" to store illegal or stolen information. Source:

CYBERCRIME VIDEO Video review of Cybercrime by McAfee Please watch this video and return here. Type Done in the chat window when finished Click on Watch five minute introductory video

CYBERCRIME VIDEO In this video you heard specific information about cybercrime. After our meeting, return to this site and do this steps; then take off for the night as McAfee checks your system for elements of cybercrime. DO NOT DO THIS NOW! Go to the SAME video site site and check to see if your computer has been infected. 1.Use Internet Explorer only. 2.Instead of clicking on the five minute video, click on “Access your risk” at the top section of the page. 3.Read the possible causes and click on “My computer is not acting the way it normally does”. You can click other areas if you like. 4.Click on Submit 5.Click on “McAfee Cybercrime Scanner” 6.Read the information and click on “CONTINUE” 7.Return 60 minutes later to reveal results.

CYBERCRIME RESOURCES Great resource to support reading this week: Information on crimes of fraud, cybercrime, etc. from Interpol Deloitte white paper on cybercrime UnitedStates/Local%20Assets/Documents/AERS/us_aers_Deloitte%20Cyber%20Crime%20P OV%20Jan pdf MacAfee report on cybercrime Speech by Shawn Henry, Director of the FBI on responding to cybercrime FBI information on cybercrime Learn about Internet Fraud and the schemes used from the FBI

Are there any questions? If you attending the live session tonight, then you do NOT need to complete the alternative seminar assignment.