06 Sources of Information Flashcards
(49 cards)
A fraud examiner in an organized crime investigation believes a particular commercial restaurant is being used as a place of operation for the suspects. Which of the following types of records would be the LEAST likely to help the fraud examiner discover who owns the building in which the restaurant operates?
A. Voter registration records
B. Building permit records
C. Health department records
D. Fire department records
A. Voter registration records
There are many public records often found at the local level that can help fraud examiners gather various types of information. To determine who owns a particular property, there might be direct information or leads found in the records of several agencies, including health and fire departments. Many local health or fire departments conduct routine inspections of businesses for health and safety code or fire code violations. These inspection records might contain valuable information about the business, its operations, the employees, and the owners.
If a business or individual constructs a new building or makes improvements to an existing building, there should be a building permit on file with the local building authority. In addition, before most businesses can open their doors, the local agencies might require that they possess certain permits. In many cases, the person applying for permits will be the owner or someone traceable to the owner.
Voter registration records are not public in all jurisdictions, but if they are available, they might contain useful information. Usually, much of the information contained in such records is withheld from the public for privacy purposes, but voter registration records might contain a person’s date of birth, mailing address, and political affiliation. However, this information is less likely than the other sources listed to identify the owner of a commercial building.
Mario wants to locate Jim, a fraud suspect. Mario calls Jim’s parents posing as an old friend and asks for Jim’s address, which they give him. This act would be considered illegal pretexting in all jurisdictions.
A. True
B. False
B. False
Broadly defined, pretexting is the act of impersonating someone else or making false or misleading statements to obtain, sell, or buy information about a person or organization. Under the broad definition, pretexting for nonfraudulent purposes is not always illegal, but it should be used with caution. For example, if a fraud examiner is trying to find a witness or a suspect, he might call the person’s relative and pretend to be an old friend who is requesting the individual’s phone number. This type of pretexting might be permissible. However, it is more often illegal to use pretexting to obtain certain types of information, such as financial records and phone history records.
Which of the following types of investigations would generally benefit from investigating external sources of information?
A. Searching for ownership of competitors and vendors
B. Locating assets and witnesses
C. Conducting a background investigation
D. All of the above
D. All of the above
A large amount of information and documentary evidence can be gathered from external sources. External sources can be particularly crucial in helping investigators locate missing assets; locate witnesses and suspects; determine ownership in vendors, competitors, and other related parties; research the suspects’ assets and financial condition; and document the suspects’ lifestyle and background information. All of this information will help an investigator build a case and will provide the basis for conducting interviews and obtaining confessions later in the investigation.
Audrey asks the employee to turn over the account statements, but the employee refuses her request. Which of the following methods of obtaining the account statements would be IMPROPER?
A. Referring the case for criminal prosecution and working with law enforcement to obtain a search warrant
B. Requesting the records from the bank and threatening to sue the bank president for impeding justice if the bank does not turn over the records
C. Filing a civil suit and obtaining a subpoena or legal order for the records
D. Filing an administrative action and obtaining a subpoena or legal order for the records
B. Requesting the records from the bank and threatening to sue the bank president for impeding justice if the bank does not turn over the records
Fraud examiners might be able to obtain nonpublic records even if the subject does not volunteer the records. Subpoenas and other legal processes, such as depositions and document requests, are available if a civil or criminal action is filed. For example, a wronged organization may file a civil or administrative action or make a criminal referral so that records can be subpoenaed or obtained by a legal order (e.g., a search warrant). In a civil case, both private and public parties may obtain nonpublic records such as bank account, brokerage account, travel, credit card, credit agency, and telephone toll records by subpoena or other legal order.
However, records obtained while executing a search warrant or similar legal order usually are available only to the government during the underlying investigation, and perhaps thereafter if not disclosed at trial. In addition, law enforcement agencies may also subpoena records, but, depending on the jurisdiction, might not disclose the contents of such records with the victim or third parties.
In most jurisdictions, third-party organizations that maintain nonpublic records, such as banks and hospitals, are usually prohibited from revealing such records without express authorization from the subject or a legal order.
If a fraud examiner thinks that information from a social media website will be used in court as evidence, the fraud examiner must take steps to capture the information so that it can be established as authentic.
A. True
B. False
A. True
Generally, documentary evidence, including digital evidence, will not be admitted in a legal proceeding, or it will not be given much weight, unless it is established as authentic (i.e., the evidence is what it purports to be and is in the same condition as when it was seized).
There are a number of techniques used to authenticate information from social media. Often, authenticity can be established through the testimony of a witness who verifies that the exhibit at issue accurately reflects what he observed on the site, and typically, the witness is the party who collected the evidence. Consequently, fraud examiners who collect evidence from social media often become a form of eyewitness, and for this reason, fraud examiners must capture, download, and preserve any useful information as soon as they discover it. They must memorialize each step of the collection process, creating a record of what they see at any point in the investigation.
Which of the following types of information on corporations whose stocks and securities are sold to the public might be available from regulatory securities records?
A. Financial statements
B. Identities of officers and directors
C. Identities of accountants and attorneys
D. All of the above
D. All of the above
While jurisdictions treat the concept of securities differently, governments or self-regulatory bodies generally set rules for the issuing and trading of certain types of securities. Among the most common and important rules are disclosure requirements for companies with publicly traded securities. These rules are designed to make sure that investors are reasonably informed about stock that they purchase. Beyond helping investors, these disclosures typically are made public, and they can provide a wealth of information about the filing company, including its type of business, history, organizational structure, auditor, balance sheets, and income statements.
Different securities regulators have varying disclosure requirements, but these records might include the following information:
* Corporate financial statements
* Identification of officers and directors
* Identification of significant owners (e.g., those with more than 10 percent of a business’s stock)
* A description of the registrant’s properties and businesses
* A description of the significant provisions of the security to be offered for sale and its relationship to the registrant’s other capital securities
* Identification of events of interest to investors
* Identification of accountants and attorneys
* A history of the business
Which of the following is a good practice when searching the Internet for information?
A. Use more than one search engine
B. Use specific nouns instead of pronouns
C. Use filters to focus searches
D. All of the above
D. All of the above
The following is a list of tips and guidelines for searching the Internet for information:
* Use more than one search engine. Everyone has their favorite search engine, but relying on one search engine is not sufficient because every search engine collects and catalogs information differently.
* Be clear about what is being looked for. Define the search topic as clearly and succinctly as possible.
* Use unique, specific keywords. Be specific when entering search terms.
* Use nouns for keywords.
* Use format terms (e.g., transcript, document, report, statistics, pdf, policy, dictionary) in addition to subject words.
* Exclude articles (e.g., a, an, the) and pronouns (e.g., he, she, it, they) from search terms, unless they are part of a key phrase.
* Use correct spelling and include alternative spellings (e.g., colour and color).
* Use filters to focus searches. Filters tell search engines to screen out specified types of pages or files.
* Check all the tips and features of any search engine to be used, and use them.
* Increase the number of results displayed per page.
* Customize searches using advanced search operators, such as the minus (-) operator and quotation marks, to narrow the search results.
* Search for phrases. Search for a sequence of words in a specific order, using quotation marks around the phrase.
* Search for base words (drop suffixes) to avoid excluding relevant pages.
* Use metasearch engines if early searches are unfruitful.
* Set a time limit for searching, and when the set amount of time has elapsed, stop and try another method.
* Use a browser’s find feature to find a word or phrase on a Web page and help navigate search results.
By examining the probate records of a deceased individual, a fraud examiner can discover:
A. An indication of the value of the property willed to the deceased’s heirs
B. The names of individuals with an interest in the deceased’s estate
C. The deceased’s financial position at the time of death
D. All of the above
D. All of the above
Some jurisdictions have separate probate courts to determine the dispersal of assets after a subject’s death. The probate court conducts an investigation to verify any debts owed by an individual’s estate and sees to the dispersal of assets after all debts are paid. Probate court records include documents filed to show the dispersal of assets after a subject’s death.
The debts left in an individual’s estate will give the investigator information on the following:
* Names of individuals with an interest in the deceased’s estate
* The subject’s financial position at the time of death
The dispersal of assets will reveal:
* The names and addresses of heirs to the deceased
* Some indication of the value of the property willed to them
In general, which of the following types of information is commonly available through a municipal or regional building inspector’s office?
A. Building inspectors’ reports
B. Building permits
C. Blueprints and plans submitted with applications
D. All of the above
D. All of the above
The following information is generally available through a municipal or regional building inspector’s office:
* Building permits, showing the names of the applicants, the address of construction, the estimated costs, and the name of the builder or contractor
* Blueprints and plans showing construction details that are often submitted with applications for building permits
* Building inspectors’ reports containing information regarding compliance with construction specifications
Which of the following statements best describes the function of metasearch engines?
A. Metasearch engines send user requests to several other search engines and aggregate the results for display
B. Metasearch engines narrow searches to only those search engines that achieve the best results
C. Metasearch engines contain links to websites that are sorted into categories
D. None of the above
A. Metasearch engines send user requests to several other search engines and aggregate the results for display
Metasearch engines send user requests to several other search engines and aggregate the results for display.
Which of the following is a type of information that can be obtained from the deep Web?
A. Websites without any links pointing to them
B. An archived version of a Web page that is no longer online
C. Web content indexed by standard search engines
D. An old version of a Web page that has since been updated
A. Websites without any links pointing to them
The deep Web (also known as the invisible Web) refers to Web content that is not indexed by standard search engines. There are a number of reasons why the deep Web exists. For instance, there are sites where Web crawlers (search engine robots or spiders) cannot enter. Web crawlers are scripts that create a copy of a visited Web page which are later indexed by a search engine to provide faster searches. These deep Web resources include websites without any links pointing to them, certain file formats that search engines cannot handle, sites that have been blocked from Web crawler access, password-protected sites, and information stored in databases. Also, search engines limit the depth of their crawl on a website. Moreover, Web crawlers cannot crawl as quickly as pages are added or updated.
Alternatively, the term Internet archives refers to archived versions of Web pages that have since been updated or are no longer available online. The most popular tool for searching the Internet archives is the Wayback Machine, located at www.archive.org. The Wayback Machine allows users to see archived versions of Web pages throughout time. Fraud examiners can use the Wayback Machine to find historical information, such as:
* A photo posted on a website that has been removed
* Content, views, writing, and opinions rescinded by an author
* A company’s old job ads, statements, affiliations, or product lines
Morris, a CFE, is investigating Crump, who is active on an online social networking site in which he voluntarily shares information about himself. Morris wants to search and extract information from Crump’s social network profile. Which of the following is the most accurate statement about the privacy of information Crump shared through his social network profile?
A. To search for information that Crump posted and made available to the public through his social network profile, Morris must provide Crump notice beforehand.
B. Morris could be liable for violating Crump’s privacy rights if he hacks or breaks into areas of the social networking site Crump has designated as private.
C. To access any information posted on Crump’s social network profile, Morris must obtain some type of legal order from the jurisdiction in which Crump resides.
D. The Privacy of Social Networks Treaty is an international law that makes it illegal for Morris to seek the login credentials from Crump’s social networking account.
B. Morris could be liable for violating Crump’s privacy rights if he hacks or breaks into areas of the social networking site Crump has designated as private.
Social media sites might contain valuable information. Fraud examiners are free to search and extract information from a subject’s page if it is open to the public, but there are limitations to the information fraud examiners can access on a social networking site due to privacy settings and anonymity.
Many users set their privacy settings in a way that prevents anyone besides their friends from seeing their profile information, and this creates several issues of legal access and privacy rights. Accessing information set to private could result in claims under privacy laws. Thus, accessing information on social media sites that is restricted by privacy settings could result in liability for fraud examiners due to violation of users’ privacy rights.
Privacy rights, however, vary between countries.
Which of the following is a type of information that can be obtained from the Internet archives?
A. Content on a website that is protected by passwords
B. Content on websites without any links pointing to them
C. Content on websites not indexed by standard search engines
D. Content posted on a website that has been removed
D. Content posted on a website that has been removed
The term Internet archives refers to archived versions of Web pages that have since been updated or are no longer available online. The most popular tool for searching the Internet archives is the Wayback Machine, located at www.archive.org. The Wayback Machine allows users to see archived versions of Web pages throughout time. Fraud examiners can use the Wayback Machine to find historical information, such as:
* A photo posted on a website that has been removed
* Content, views, writing, and opinions rescinded by an author
* A company’s old job ads, statements, affiliations, or product lines
Alternatively, the deep Web (also known as the invisible Web) refers to Web content that is not indexed by standard search engines. There are a number of reasons why the deep Web exists. For instance, there are sites where Web crawlers (search engine robots or spiders) cannot enter. Web crawlers are scripts that create a copy of a visited Web page which are later indexed by a search engine to provide faster searches. These deep Web resources include websites without any links pointing to them, certain file formats that search engines cannot handle, sites that have been blocked from Web crawler access, password-protected sites, and information stored in databases. Also, search engines limit the depth of their crawl on a website. Moreover, Web crawlers cannot crawl as quickly as pages are added or updated.
In jurisdictions that protect the processing and dissemination of credit information and personal data, businesses are not subject to the same protections that individuals have.
A. True
B. False
A. True
In the case of consumer (individual) credit records and personal data, a growing number of jurisdictions regulate both how such information is collected and stored, as well as who may access this information and for what purpose. In many cases, the consumer must be notified and must consent to the use of the report. Agencies that process and disseminate such information are called credit reporting agencies, data controllers, and similar names, depending on the jurisdiction.
Information on a business organization’s creditworthiness may also be obtained from credit reporting agencies. The responses for such searches might include payment trends from creditors, public records, banking information, and key facts as to the type of business and ownership. But unlike consumer credit information, business credit information is generally not subject to the same legal protections that individuals have.
When searching regulatory securities records for information on a publicly traded company, which of the following information is LEAST LIKELY to be found?
A. Identity of major owners of the company
B. Major events that are of interest to investors
C. Identity of the company’s officers and directors
D. The complete books and records of the company
D. The complete books and records of the company
While jurisdictions treat the concept of securities differently, governments or self-regulatory bodies generally set rules for the issuing and trading of certain types of securities. Among the most common and important rules are disclosure requirements for companies with publicly traded securities. These rules are designed to make sure that investors are reasonably informed about stock that they purchase. Beyond helping investors, these disclosures typically are made public, and they can provide a wealth of information about the filing company, including its type of business, history, organizational structure, auditor, balance sheets, and income statements.
Different regulators have varying disclosure requirements, but these records might include the following information:
* Corporate financial statements
* Identification of officers and directors
* Identification of significant owners (e.g., those with more than 10 percent of a business’s stock)
* A description of the registrant’s properties and businesses
* A description of the significant provisions of the security to be offered for sale and its relationship to the registrant’s other capital securities
* Identification of events of interest to investors
* Identification of accountants and attorneys
* A history of the business
The complete books and records of a company, however, are not available in securities records searches.
Which of the following is a limitation of conducting a search for public records using online databases?
A. Information from online databases must be validated for accuracy and timeliness
B. Online public records searches are limited in the area they cover, often requiring fraud examiners to search multiple jurisdictions
C. Online coverage of public records varies widely from jurisdiction to jurisdiction
D. All of the above
D. All of the above
The main limitations of conducting searches for public records using online databases include:
* Online coverage of public records varies widely from jurisdiction to jurisdiction, and therefore, there are many degrees of accessibility to public records between jurisdictions.
* Online public records searches are limited in the area they cover. Therefore, when looking for information on a subject, fraud examiners often must search for public records in multiple jurisdictions.
* Often, online public records are brief abstracts of the original public record.
* The source of the information compiled in an online database must be reliable.
* Fraud examiners must validate information retrieved from online databases to determine if it is accurate and up-to-date.
* The public records compiled in an electronic format might cover only a limited period.
* Online searches can be erratic in the information they return.
Even when a victim refers a fraud case for criminal prosecution, the government will usually not disclose the contents of nonpublic records with the victim during the investigation.
A. True
B. False
A. True
A wronged organization may make a criminal referral so that records can be subpoenaed by the government or obtained by a legal order (e.g., a search warrant). Records obtained while executing a search warrant or similar legal order usually are available only to the government during the underlying investigation, and perhaps thereafter if not disclosed at trial. In addition, law enforcement agencies may also subpoena records, but, depending on the jurisdiction, might not disclose the contents of such records with the victim or third parties.
A company’s organizational filing with the government generally includes information about the company’s ownership, initial shareholders, and the location of its principal office.
A. True
B. False
A. True
Companies are formed by submitting some type of organizational filing to the government of the jurisdiction in which the entity is incorporated. These filings might be referred to in various ways in different jurisdictions (e.g., articles of incorporation, corporate constitution, or corporate charter). Organizational filings are generally public records and usually include:
* Corporate name
* Ownership information
* Nominal stock value
* Names of initial shareholders
* Names of the directors and officers
* Registered agent
* Location of the principal office
* Date of incorporation
* Standing/status
If a fraud examiner was gathering information about a fraud suspect, which of the following types of information would likely require access to nonpublic sources of information to obtain?
A. The subject’s habits and lifestyle
B. The subject’s phone records
C. Where the subject currently resides
D. All of the above
B. The subject’s phone records
Nonpublic records—financial or otherwise—might be needed to prove fraud or to provide leads in a fraud examination. Nonpublic records include information about a person or business considered to be private and confidential. But unlike public records, nonpublic records are not available to the public, and because members of the public and, by extension, fraud examiners do not have an absolute right to see these personal records, obtaining access might be difficult or impossible.
Some of the most valuable types of personal records include:
* Banking records
* Tax records
* Credit records of individuals
* Phone records
* Credit card account records
* Personal health care records
In most jurisdictions, which of the following statements about bankruptcy court records is CORRECT?
A. A bankruptcy file typically contains the bankruptcy petition or filing document
B. Only the party filing for bankruptcy and the creditors may access bankruptcy records
C. Bankruptcy documents are usually located in the jurisdiction where the most debt was incurred
D. All of the above
A. A bankruptcy file typically contains the bankruptcy petition or filing document
Many jurisdictions provide bankruptcy records to the authorized parties or the general public. Bankruptcy proceedings generally occur in the jurisdiction in which the debtor resides. It is common for countries to have separate bankruptcy courts that handle most or all of such cases. The information available in bankruptcy records varies, but common items include:
* The bankruptcy petition or other type of filing document, which might include the subject’s government identification number; street address and primary place of business; location of principal assets of business; type of business; name of legal representative; estimated amount of assets; estimated number of creditors, liabilities, and employees; financial data; and a list of corporate shareholders
* Claim documents by creditors listing the amounts that the debtor allegedly owes
* A final accounting that shows which claims were paid
* A descriptive list of the debtor’s property at the time of filing (real estate, personal property, investments, accounts receivables, etc.)
* Filings that describe the debtor’s income and expenditures
* The bankruptcy plan (some jurisdictions allow bankrupt parties to reorganize businesses or participate in a debt reduction plan, as opposed to liquidating all assets)
* Details from a fraud examination if the bankrupt party was suspected of bankruptcy fraud
In many jurisdictions, when an individual purchases real estate, he usually becomes a registrant in which of the following records?
A. Real property records
B. Tax assessor records
C. Property tax records
D. All of the above
D. All of the above
Real property records are extremely important, and in many jurisdictions, they are relatively easy to access and contain a vast amount of information. It is common for real property records to be found at the local level of government, but some jurisdictions might keep them at a centralized location. When an individual purchases real estate, he becomes a registrant in real property records, property tax records, and tax assessor records (if applicable).
In many jurisdictions, all of the following information can usually be obtained from real property records EXCEPT:
A. Who financed the purchase of a property, if applicable
B. A property’s historical sales price
C. A property owner’s credit report
D. The addresses of a property’s buyer and seller
C. A property owner’s credit report
Real property records are extremely important, and in many jurisdictions, they are relatively easy to access and contain a vast amount of information. It is common for real property records to be found at the local level of government, but some jurisdictions might keep them at a centralized location. When an individual purchases real estate, he becomes a registrant in real property records, property tax records, and tax assessor records (if applicable).
Most jurisdictions have a land registry office that maintains various information on real property and its owner(s). Both the level of government where these records are found and the information they contain will vary by jurisdiction, but the following information is often present:
* Documents pertaining to real estate transactions—including deeds, grants, transfers and mortgages of real estate, releases of mortgages, powers of attorney, and leases that have been acknowledged or approved
* Mortgages on real property
* Security interests or liens on property
* Wills admitted to probate
* Official bonds
* Notices of mechanic’s liens
* Transcripts of judgments that are made liens on real estate
* Notices of attachment on real estate
* Land cadaster (a registry of land surveys that specifically detail each plot of real estate in an area and may contain information about value, ownership rights, and other details)
* Papers in connection with bankruptcy
* Certified copies of decrees and judgments of courts of record
* Other documents permitted by law to be recorded
* Historical sale prices
* Residences and addresses of the buyer and seller
* Identity of the party financing the property, if applicable
* Improvements to a property
A credit report involves a third party’s assessment of a person’s credit history and capacity to take out and repay debt; this information is not found in public property records.
Green believes that Blue, a fraud suspect, has purchased hidden personal property through suspicious financing. Which of the following sources, if available, would most likely contain information that Green could use to locate Blue’s possible hidden assets?
A. Commercial filings
B. Registrar of voters
C. Health department records
D. Surveyor office records
A. Commercial filings
Commercial filings are records that can help fraud examiners identify personal property that an individual or business has financed. These filings and supporting documents can help fraud examiners uncover hidden ownership or relationships between parties by viewing the names of all listed debtors and their addresses. The fraud examiner might find information linking individuals to the companies they own or discover information about a company’s subsidiaries, branch offices, or parent company. Additionally, discovering financed assets can reveal information about a person or organization’s financial condition.
Able, a fraud examiner, is investigating a suspected embezzlement by one of XYZ Corporation’s employees. As part of the investigation, he is assembling a financial profile of the suspect. Among other things, he wants to see if the suspect has made any significant real estate purchases since the embezzlement scheme began. Information on real estate transactions such as deeds, grants, transfers, and mortgages is usually located:
A. With the jurisdiction’s organizational filing agency
B. With the local court clerk or judicial records agency
C. With the jurisdiction’s land registry office
D. With the jurisdiction’s commercial filing registrar
C. With the jurisdiction’s land registry office
Most jurisdictions have a land registry office that maintains various information on real property and its owner(s). Both the level of government where these records are found and the information they contain will vary by jurisdiction, but the following information is often present:
* Documents pertaining to real estate transactions—including deeds, grants, real estate transfers and mortgages, releases of mortgages, powers of attorney, and leases that have been acknowledged or approved
* Mortgages on real property
* Security interests or liens on property
* Wills admitted to probate
* Official bonds
* Notices of mechanic’s liens
* Transcripts of judgments that are made liens on real estate
* Notices of attachment on real estate
* Land cadaster (a registry of land surveys that specifically detail each plot of real estate in an area and may contain information about value, ownership rights, and other details)
* Papers in connection with bankruptcy
* Certified copies of decrees and judgments of courts of record
* Other documents permitted by law to be recorded
* Historical sale prices
* Residences and addresses of the buyer and seller
* Identity of the party financing the property, if applicable
* Improvements to a property