SlideShare a Scribd company logo
Chapter Nine
Fraud Examination
Presented by Kirsty Peterson
5th August 2013
Conversion Investigation Methods
Learning Objectives
 Explain why it is important to find out how perpetrators
convert and spend their stolen funds
 Understand how public records can assist in following
the financial “tracks” of suspected perpetrators
 Access information from the internet to assist in an
investigation
 Perform net worth calculations on suspected
perpetrators and understand how they are effective in
court and in obtaining confessions
Spending Stolen Funds
 “With few exceptions, perpetrators spend what they
steal. Because of this, looking at spending patterns is a
primary investigation technique”
(Albrecht, Albrecht, Albrecht, & Zimbelman, 2012)
 “Whether driving his Lamborghini, cruising on his luxury
boat in Fiji, or relaxing in his antique-furnished historic
homestead, Michael Swann made no secret of his high-
flying lifestyle”
(“How Mr Money Bags got rich”, 2008)
Fraud Motivation
Conversion Searches
Conversion searches are performed for two reasons:
1. To determine the extent of the embezzlement, and
2. To gather evidence that can be used in interrogations
to obtain a confession
 The most common technique used to investigate and
resolve fraud is by interviewing. By providing evidence of
lifestyle and expenditures that cannot be supported by
earned income, cornered suspects may breakdown and
confess.
Conversion Searches
Information can be gathered from:
1. Government, council and other public organisations
2. Private sources of information
3. Online sources of information
4. Using the net worth method of analysing information
Conversion Searches
Public Records
Government
Central
Local
Private Sources
Acquaintances
Trash cover
Credit agencies
Online Database
Subscription
Per-search fee
Free
Internet Searches
Google
Yahoo! etc
Government and Public Sources
 Electoral Roll Post Office or Library
 Companies Office www.business.govt.nz/companies
 Local Councils e.g. www.rdc.govt.nz
 Land Info NZ www.linz.govt.nz
 Min. Economic Dev. www.insolvency.govt.nz
 Personal Property www.ppsr.govt.nz
Securities Register
While some information can be obtained by anyone who requests it, other
information is covered by privacy laws (such as the Privacy Act 1993) and
requires authorisation
Online Sources
Examples:
 www.veda.co.nz
 www.dnb.co.nz
 www.carjam.co.nz
 www.terranet.co.nz
 www.lexisnexis.com
Private Sources
 Private acquaintances
 “Trashing”
 Shredded documents
 Original files on computers
Be sure you have the legal rights to gather and use the information
Internet Searches
 Google
 Search by phrase
 Minus search terms
 Domain restrictions
 Google Groups
 Cached Results
 Google Images
 Google Earth
 Yahoo!
Net Worth Calculations
1. Assets – Liabilities
= Net Worth
2. Net Worth
– Prior Years Net Worth
= Net Worth Increase
3. Net Worth Increase
+ Living Expenses
= Income
4. Income
– Funds from Known Sources
= Funds from Unknown Sources
Net Worth Example
Financial Data for Joe Blogs 2012 2013 Financial Data for Joe Blogs 2011 2012 2013
Income Assets
Salary 39,000 41,000 Dwelling 250,000 250,000 250,000
Vehicle 20,000 20,000 60,000
Expenses Cash at bank 1,000 5,000 15,000
Mortgage repayments 10,000 10,000 Total Assets 271,000 275,000 325,000
Vehicle loan repayments 3,000 3,000
Living expenses 15,000 16,000 Liabilities
28,000 29,000 Mortgage 200,000 195,000 141,000
Vehicle loan 10,000 8,000 -
Total Liabilities 210,000 203,000 141,000
Net Worth 61,000 72,000 184,000
Change in net worth 11,000 112,000
Plus living expenses 28,000 29,000
Total income 39,000 141,000
Less known Income 39,000 41,000
Income from unknown sources - 100,000
Summary
 Discovering how perpetrators convert and spend their
funds is an important investigation technique
 Government and other public records are important
sources of information about the financial “tracks” of
suspected perpetrators
 Private and online sources of information are important
sources of information during an investigation
 Net worth calculations are effective in court and in
obtaining confessions from suspected perpetrators
Questions
References
1. Albrecht, W.S., Albrecht, C.O., Albrecht, C.C., & Zimbelman, M.F. (2012).
Fraud Examination (4th Ed.). Mason, OH: South-Western.
2. Akuhatawhare, W. (2011, October 6). Te Puia ticket seller was stealing
more than $1000 a day. The New Zealand Herald. Retrieved from
http://www.nzherald.co.nz.
3. Granny avoids jail term for Te Puia theft. (2012, June 22). 3 News.
Retrieved from http://www.3news.co.nz.
4. Hartevelt, A. (2011, November 11). Jail term for theft at Te Puia.
Rotorua Daily Post. Retrieved from http://www.rotoruadailypost.co.nz.
5. How Mr Money Bags got rich by robbing the sick. (2008, December 13).
Otago Daily Times. Retrieved from http://www.nzherald.co.nz.
6. KPMG. (2013). A survey of fraud, bribery and corruption in Australia &
New Zealand 2012. Retrieved from http://www.kpmg.com/au.

More Related Content

PDF
Georgetown blackman-assisted-decision-making
PDF
Future of healthcare
DOC
Manual de radio_mobile
DOCX
Alexandra 4 ° c
PDF
Boycott, Divestment & Sanctions
PPT
Power point for de paul feb 2012
PDF
Complete Home Marketing Plan
Georgetown blackman-assisted-decision-making
Future of healthcare
Manual de radio_mobile
Alexandra 4 ° c
Boycott, Divestment & Sanctions
Power point for de paul feb 2012
Complete Home Marketing Plan

Viewers also liked (7)

PDF
[Ebook] edicions upc antenas - spanish español
PPTX
Test slideshow
PPT
Chapter 15Consumer Fraud by Rachel
PPTX
Chapter 8 investigating concealment david shen
PPTX
Chapter 1 the nature of fraud
PPT
Social styles 2013 sspdd april bu
PPTX
Brief history of Australian Shoes
[Ebook] edicions upc antenas - spanish español
Test slideshow
Chapter 15Consumer Fraud by Rachel
Chapter 8 investigating concealment david shen
Chapter 1 the nature of fraud
Social styles 2013 sspdd april bu
Brief history of Australian Shoes
Ad

Similar to Conversion investigation methods (20)

PDF
100 Successful College Application Essays By Ano
PDF
5 How To Make A Payroll Check Stu. Online assignment writing service.
PDF
United States Secret Service: Protecting the Nation's Leaders and Financial I...
PPTX
What is Money Laundering - An Introduction
PDF
Abstract Examples For Research Papers. How To
PDF
Writing Analysis Essay. Online assignment writing service.
PPT
Armour Intelligence: Actionable Intelligence explained
PDF
Slavery In America Essay Thesis. Online assignment writing service.
PDF
IELTS Essay Writing Tips Mindmineglobal.Com S
DOCX
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
PDF
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
PDF
When I Look Back To My First Experi
PDF
Virtual currencies emerging regulatory, law enforcement, and consumer protect...
PDF
Essay Career Path
PDF
Higher French Short Essay Questions. Online assignment writing service.
PDF
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PDF
How To Teach Paragraph Writing P. Online assignment writing service.
PDF
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...
PDF
Hemisphere Database
PDF
Eugenics Essay. Online assignment writing service.
100 Successful College Application Essays By Ano
5 How To Make A Payroll Check Stu. Online assignment writing service.
United States Secret Service: Protecting the Nation's Leaders and Financial I...
What is Money Laundering - An Introduction
Abstract Examples For Research Papers. How To
Writing Analysis Essay. Online assignment writing service.
Armour Intelligence: Actionable Intelligence explained
Slavery In America Essay Thesis. Online assignment writing service.
IELTS Essay Writing Tips Mindmineglobal.Com S
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
When I Look Back To My First Experi
Virtual currencies emerging regulatory, law enforcement, and consumer protect...
Essay Career Path
Higher French Short Essay Questions. Online assignment writing service.
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
How To Teach Paragraph Writing P. Online assignment writing service.
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...
Hemisphere Database
Eugenics Essay. Online assignment writing service.
Ad

More from VidaB (14)

PPTX
E commerce fraud chapter 17 B Ahmed
PPTX
Chapter 17 a fraud in e commerce Jen
PPTX
Chapter 16 bankruptcy, divorce and tax fraud by Emma
PPTX
Chapter 16 B Artika
PPTX
Chapter 14 by Svetlana
PPTX
Chapter 13 Inadequate disclosures
PPTX
Chapter 12 B: Revenue And Inventory Fraud
PPTX
Chapter 12:Revenue and Inventory Fraud by J Hachet
PPTX
Chapter 11 b :Financial Statement fraud
PPTX
Chapter 11 a:Financial statement fraud
PDF
Conversion investigation methods
PPTX
Chapter 5:Recognizing the symptoms of fraud
PPTX
Chapter 3: Fighting Fraud
PPT
Week 1 audit and assurance services
E commerce fraud chapter 17 B Ahmed
Chapter 17 a fraud in e commerce Jen
Chapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 B Artika
Chapter 14 by Svetlana
Chapter 13 Inadequate disclosures
Chapter 12 B: Revenue And Inventory Fraud
Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 11 b :Financial Statement fraud
Chapter 11 a:Financial statement fraud
Conversion investigation methods
Chapter 5:Recognizing the symptoms of fraud
Chapter 3: Fighting Fraud
Week 1 audit and assurance services

Recently uploaded (20)

PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Spectroscopy.pptx food analysis technology
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Getting Started with Data Integration: FME Form 101
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
1. Introduction to Computer Programming.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Heart disease approach using modified random forest and particle swarm optimi...
A comparative study of natural language inference in Swahili using monolingua...
Spectroscopy.pptx food analysis technology
OMC Textile Division Presentation 2021.pptx
Unlocking AI with Model Context Protocol (MCP)
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Getting Started with Data Integration: FME Form 101
Per capita expenditure prediction using model stacking based on satellite ima...
Diabetes mellitus diagnosis method based random forest with bat algorithm
A comparative analysis of optical character recognition models for extracting...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Approach and Philosophy of On baking technology
1. Introduction to Computer Programming.pptx
Programs and apps: productivity, graphics, security and other tools
Group 1 Presentation -Planning and Decision Making .pptx
Network Security Unit 5.pdf for BCA BBA.
Univ-Connecticut-ChatGPT-Presentaion.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Conversion investigation methods

  • 1. Chapter Nine Fraud Examination Presented by Kirsty Peterson 5th August 2013 Conversion Investigation Methods
  • 2. Learning Objectives  Explain why it is important to find out how perpetrators convert and spend their stolen funds  Understand how public records can assist in following the financial “tracks” of suspected perpetrators  Access information from the internet to assist in an investigation  Perform net worth calculations on suspected perpetrators and understand how they are effective in court and in obtaining confessions
  • 3. Spending Stolen Funds  “With few exceptions, perpetrators spend what they steal. Because of this, looking at spending patterns is a primary investigation technique” (Albrecht, Albrecht, Albrecht, & Zimbelman, 2012)  “Whether driving his Lamborghini, cruising on his luxury boat in Fiji, or relaxing in his antique-furnished historic homestead, Michael Swann made no secret of his high- flying lifestyle” (“How Mr Money Bags got rich”, 2008)
  • 5. Conversion Searches Conversion searches are performed for two reasons: 1. To determine the extent of the embezzlement, and 2. To gather evidence that can be used in interrogations to obtain a confession  The most common technique used to investigate and resolve fraud is by interviewing. By providing evidence of lifestyle and expenditures that cannot be supported by earned income, cornered suspects may breakdown and confess.
  • 6. Conversion Searches Information can be gathered from: 1. Government, council and other public organisations 2. Private sources of information 3. Online sources of information 4. Using the net worth method of analysing information
  • 7. Conversion Searches Public Records Government Central Local Private Sources Acquaintances Trash cover Credit agencies Online Database Subscription Per-search fee Free Internet Searches Google Yahoo! etc
  • 8. Government and Public Sources  Electoral Roll Post Office or Library  Companies Office www.business.govt.nz/companies  Local Councils e.g. www.rdc.govt.nz  Land Info NZ www.linz.govt.nz  Min. Economic Dev. www.insolvency.govt.nz  Personal Property www.ppsr.govt.nz Securities Register While some information can be obtained by anyone who requests it, other information is covered by privacy laws (such as the Privacy Act 1993) and requires authorisation
  • 9. Online Sources Examples:  www.veda.co.nz  www.dnb.co.nz  www.carjam.co.nz  www.terranet.co.nz  www.lexisnexis.com
  • 10. Private Sources  Private acquaintances  “Trashing”  Shredded documents  Original files on computers Be sure you have the legal rights to gather and use the information
  • 11. Internet Searches  Google  Search by phrase  Minus search terms  Domain restrictions  Google Groups  Cached Results  Google Images  Google Earth  Yahoo!
  • 12. Net Worth Calculations 1. Assets – Liabilities = Net Worth 2. Net Worth – Prior Years Net Worth = Net Worth Increase 3. Net Worth Increase + Living Expenses = Income 4. Income – Funds from Known Sources = Funds from Unknown Sources
  • 13. Net Worth Example Financial Data for Joe Blogs 2012 2013 Financial Data for Joe Blogs 2011 2012 2013 Income Assets Salary 39,000 41,000 Dwelling 250,000 250,000 250,000 Vehicle 20,000 20,000 60,000 Expenses Cash at bank 1,000 5,000 15,000 Mortgage repayments 10,000 10,000 Total Assets 271,000 275,000 325,000 Vehicle loan repayments 3,000 3,000 Living expenses 15,000 16,000 Liabilities 28,000 29,000 Mortgage 200,000 195,000 141,000 Vehicle loan 10,000 8,000 - Total Liabilities 210,000 203,000 141,000 Net Worth 61,000 72,000 184,000 Change in net worth 11,000 112,000 Plus living expenses 28,000 29,000 Total income 39,000 141,000 Less known Income 39,000 41,000 Income from unknown sources - 100,000
  • 14. Summary  Discovering how perpetrators convert and spend their funds is an important investigation technique  Government and other public records are important sources of information about the financial “tracks” of suspected perpetrators  Private and online sources of information are important sources of information during an investigation  Net worth calculations are effective in court and in obtaining confessions from suspected perpetrators
  • 16. References 1. Albrecht, W.S., Albrecht, C.O., Albrecht, C.C., & Zimbelman, M.F. (2012). Fraud Examination (4th Ed.). Mason, OH: South-Western. 2. Akuhatawhare, W. (2011, October 6). Te Puia ticket seller was stealing more than $1000 a day. The New Zealand Herald. Retrieved from http://www.nzherald.co.nz. 3. Granny avoids jail term for Te Puia theft. (2012, June 22). 3 News. Retrieved from http://www.3news.co.nz. 4. Hartevelt, A. (2011, November 11). Jail term for theft at Te Puia. Rotorua Daily Post. Retrieved from http://www.rotoruadailypost.co.nz. 5. How Mr Money Bags got rich by robbing the sick. (2008, December 13). Otago Daily Times. Retrieved from http://www.nzherald.co.nz. 6. KPMG. (2013). A survey of fraud, bribery and corruption in Australia & New Zealand 2012. Retrieved from http://www.kpmg.com/au.