You are on page 1of 7

Albrecht: Fraud Examination, 4e

Solution Manual for Principles of Fraud Examination 4th


Edition Wells 1118922344 9781118922347
Full download link at:
Solution manual: https://testbankpack.com/p/solution-manual-for-principles-of-
fraud-examination-4th-edition-wells-1118922344-9781118922347/
Test bank: https://testbankpack.com/p/test-bank-for-principles-of-fraud-
examination-4th-edition-wells-1118922344-9781118922347/
Chapter 8

INVESTIGATING CONCEALMENT

Discussion Questions

1. Concealment is generally accomplished by manipulating documentary evidence, such


as purchase invoices, sales invoices, credit memos, deposit slips, checks, receiving
reports, bills of lading, leases, titles, sales receipts, money orders, cashier's checks, or
insurance policies.

2. Primary aspects of documentary evidence include:

 Chain of custody of documents


 Marking of evidence
 Organization of documentary evidence
 Coordination of evidence
 Rules concerning original versus copies of documents

3. From the time documentary evidence is received, its chain of custody must be
maintained in order for it to be accepted by the courts. Contesting attorneys will make
every attempt to introduce the possibility that the document has been altered or
tampered with.

4. Programs to help coordinate evidence include CaseMap, CaseCentral, Zantaz,


RingTail, and DatiCon. Programs that help in link analysis include the Analyst’s
Notebook from i2, Inc. and Xanalys Link Analysis.

5. Documents contain extremely valuable information for conducting fraud


investigations. When faced with a choice between an eyewitness and a good
document as evidence, most fraud experts would choose the document. Unlike
witnesses, documents do not forget, they cannot be cross-examined or confused by
attorneys, they cannot commit perjury, and they never tell inconsistent stories.

Chapter 8 1
Albrecht: Fraud Examination, 4e

6. Documentary evidence such as the manipulation of purchase invoices, sales invoices,


credit memos, deposit slips, checks, receiving reports, bills of lading, leases, titles,
sales receipts, money orders, cashier's checks, or insurance policies provides
extremely valuable information when conducting an investigation. It is important to
obtain such information because perpetrators, when faced with such information, are
much more likely to give a confession. Furthermore, documentary evidence is usually
a vital link in proving guilt when a confession is not obtained.

7. Documents contain extremely valuable information for conducting fraud


examinations. Documents are some of the best sources of evidence in court, and they
provide solid evidence in a case.

8. Discovery (statistical) sampling allows a fraud examiner to generalize and make


inferences from the sample to the population. Many fraud cases involve large
databases, and when several examiners are involved in the sampling, the chance for
human error increases. However, with computers and technology, examiners can
quantify both risk and samples with little or no human error.

9. The three most common ways that investigators can obtain hard-to-get documentary
evidence are subpoena, search warrant, and voluntary consent.

True/False

1. True

2. False. Checks are documentary evidence.

3. False. The traditional chain of custody of evidence procedures apply to electronic


evidence, along with new procedures like cloning and calculating checksums on the
hard drive.

4. False. Original documents are always preferable to photocopies as documentary


evidence.

5. False. Graphologists limit their analysis to the study of handwriting, while forensic
examiners focus on many more aspects of documents, including date, machine
prepared on, etc.

6. True

7. True

8. False. Discovery sampling is one of the easiest of all statistical sampling methods to
understand.

Chapter 8 2
Albrecht: Fraud Examination, 4e

9. False. When samples are taken, they are always subject to sampling error, meaning
that the sample is not representative of the population.

10. True

11. True

12. False. Random number tables are very effective.

13. True

14. True

15. True

16. False. The best way to obtain documentary evidence in a computer database is to
analyze full populations with queries (data mining).

Multiple Choice

1. a

2. b

3. c

4. d

5. d

6. d

7. a

8. d

9. c

10. b

11. c

12. c

13. a

Chapter 8 3
Albrecht: Fraud Examination, 4e

14. c

Short Cases

Case 1

The 15 checks selected would have the following numbers: 664, 789, 650, 136, 365, 538,
800, 657, 110, 136, 398, 645, 214, 544, 777.

Case 2

1. You have found an actual example of fraud. Because fraud is present in the sample,
you can conclude that fraud exists in the population from which the sample was
taken. Your only question now is how many fraud instances there are in the entire
population. At this point, you should terminate sampling and examine the entire
population to discover the extent of the fraud.

2. If fraud is not present in the sample, you cannot know for sure whether fraud exists in
the population. You would need to examine all checks to be 100 percent sure that
fraud does not exist. Based on your sample size, you can state that, at a certain
confidence level, the probability of fraud is not more than a certain percent. If you
want to be more confident or reduce the probability of fraud, you must take a larger
sample.

Case 3

1. Fraud examiners and auditors should never underestimate the value of documents in
an investigation, as they can be more valuable to an investigation than eyewitnesses.
If the fraud was suspected or known to have occurred, the auditors should have taken
the following steps with respect to the documents: collect, protect, identify, and
preserve relevant documents in as good a condition as possible; and make copies of
the original documents for use during the investigation so the originals will be
available for court.

Case 4

2. Clearly, there appears to be something wrong. First of all, they could only produce
photocopies of the invoices, which is not acceptable. The fact that it took them
several hours to produce these documents also causes suspicion. Your first step in
studying the invoices might be to examine a sample of the invoices given to you. You
should stratify the invoices by purchasing agent, then use a random number table or
another method of drawing a random sample and select invoices to study. For
example, you might start from the top left of the chart, working from left to right and

Chapter 8 4
Albrecht: Fraud Examination, 4e

from top to bottom. You could use the last four digits of each five-digit number,
skipping the numbers that fall outside of the range. You could verify fifty invoices for
each agent. (Obviously, other sampling approaches are also acceptable answers.)

Case Studies

Case Study 1

Most fraud examiners prefer documents as evidence instead of witnesses because unlike
witnesses, documents do not forget, they cannot be cross-examined or confused by attorneys,
they cannot commit perjury, and they never tell inconsistent stories. Of course, where
possible, documents should be used in conjunction with witnesses.

Once a document is in the custody of John Doe (through a subpoena or other method), he
needs to document and maintain its chain of custody. This means that he must keep a record
of when he receives a document and what has happened to the document since it came into
his possession. Opposing attorneys will attempt to discredit the document’s credibility and
authenticity by asking questions about the document’s history.

When John Doe receives a document, he should uniquely mark it so that it can be identified
later. He should then put the document in a transparent envelope marked with the date
received. A copy of the document should be made for investigative purposes to preserve the
original document for trial. It is necessary to protect the original document because
photocopies are only admissible in court:

 When the original document has been lost or destroyed without the intent or fault of
the party seeking to introduce the secondary evidence.
 When the original document is in the possession of an adverse party who fails to
produce it after a written notice to do so, or when the party in possession is outside
the jurisdiction of the subpoena power of the court.
 When the document or record is in the custody of a public office.
 When the original documents are too voluminous to permit careful examination, and
a summary of their contents is acceptable.

John Doe also needs a consistent organizational scheme for his documents, whether it is by
witness, date, or transaction. Such an organized scheme is necessary to accommodate the
large amount of documents that can accumulate throughout an investigation process.

Case Study 2

Note that while this case calls for full-population analysis using ACL, Picalo, IDEA,
ActiveData, or another software package, it could be easily modified to use discovery
sampling as well.

Chapter 8 5
Albrecht: Fraud Examination, 4e

1. The following records use a form of post office box in their address (note the
different notation in the addresses):

 253093: Post Office Box 5122


 338127: P.O. Box 25332
 530853: PO Box 19877
 657378: PO Box 51222
 730751: P.O. Box 31

2. There are at least two ways to solve this problem. If your students are using a package
that supports stratification via text fields, first stratify the claims file by dentist_id and
then check for sequential numbering. If your software does not support advanced
operations (such as sequential checking) on stratified/classified groups (ACL is in this
group), your students can simply sort the file first by dentist id and then by claim id.
Being sorted in this way, the records for each dentist group together. Now check for
sequential numbering to locate the problem records. Dentist with id 748218 is
sending sequential claim numbers that start at 1000 and continue through about 20
claims sent.

3. Dentist with id 476227 has worked on patient 20372, for a total of 58 times during the
three-month period; all of these claims are for cavity fillings.

4. Dentist with id 438439 has a total of five claims for patients that live outside of
Maine.

Internet Assignment

In the Resources menu, choose Fraud Mall, and then High-Tech Tools. Many different kinds
of services and products are offered. The listed packages change often, but the listing should
provide a set of examples for the type of software available.

Debates

Pro: The obtaining of a search warrant allows the FBI to search the suspect’s residence
without violating Fourth Amendment rights. Searching files on a computer is also
permissible, according to common law. Thus, it seems that the FBI was fully “warranted” in
its search and seizure of incriminating evidence.

Con: Possible Fourth Amendment violations could have occurred because of the use of the
Key Logger System (KLS). Had KLS been used solely for the purpose of seizing
incriminating evidence, the FBI would be justified. However, KLS also monitored activities
of the suspect in normal activities, such as the visitation of non-incriminating Web sites on
the Internet. It is possible that the FBI overstepped its rights and infringed Mr. Dayley’s
Fourth Amendment rights.

Chapter 8 6
Albrecht: Fraud Examination, 4e

Answers to Stop and Think Boxes

1. Does concealment investigation change when electronic transactions are


involved?

a. The basic process of concealment investigation does not change when


electronic evidence is used. However, some additional steps, such as
checksums on documents, may need to be taken.

2. What types of cases should use link analysis software? Is the cost justified in
these cases?

a. Generally, very large cases employ link analysis software. When tens or even
hundreds of investigators are involved, combining of evidence becomes an
issue. In these cases, link analysis software is considered extremely useful.

3. What are the best methods of obtaining documentary evidence? Why?

a. The best method of obtaining documentary evidence is the data-driven


approach, as discussed in Chapter 6. It allows full-population analysis of large
populations of records.

4. When is it appropriate to hire a document expert? When is it not required?

a. A document expert is required when the authenticity of a document is in


question. An expert can make judgments on whether documents are genuine,
counterfeit, fraudulent, or forged.

Chapter 8 7

You might also like