06 Sources of Information Flashcards

(49 cards)

1
Q

A fraud examiner in an organized crime investigation believes a particular commercial restaurant is being used as a place of operation for the suspects. Which of the following types of records would be the LEAST likely to help the fraud examiner discover who owns the building in which the restaurant operates?
A. Voter registration records
B. Building permit records
C. Health department records
D. Fire department records

A

A. Voter registration records

There are many public records often found at the local level that can help fraud examiners gather various types of information. To determine who owns a particular property, there might be direct information or leads found in the records of several agencies, including health and fire departments. Many local health or fire departments conduct routine inspections of businesses for health and safety code or fire code violations. These inspection records might contain valuable information about the business, its operations, the employees, and the owners.
If a business or individual constructs a new building or makes improvements to an existing building, there should be a building permit on file with the local building authority. In addition, before most businesses can open their doors, the local agencies might require that they possess certain permits. In many cases, the person applying for permits will be the owner or someone traceable to the owner.
Voter registration records are not public in all jurisdictions, but if they are available, they might contain useful information. Usually, much of the information contained in such records is withheld from the public for privacy purposes, but voter registration records might contain a person’s date of birth, mailing address, and political affiliation. However, this information is less likely than the other sources listed to identify the owner of a commercial building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mario wants to locate Jim, a fraud suspect. Mario calls Jim’s parents posing as an old friend and asks for Jim’s address, which they give him. This act would be considered illegal pretexting in all jurisdictions.

A. True
B. False

A

B. False

Broadly defined, pretexting is the act of impersonating someone else or making false or misleading statements to obtain, sell, or buy information about a person or organization. Under the broad definition, pretexting for nonfraudulent purposes is not always illegal, but it should be used with caution. For example, if a fraud examiner is trying to find a witness or a suspect, he might call the person’s relative and pretend to be an old friend who is requesting the individual’s phone number. This type of pretexting might be permissible. However, it is more often illegal to use pretexting to obtain certain types of information, such as financial records and phone history records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following types of investigations would generally benefit from investigating external sources of information?

A. Searching for ownership of competitors and vendors
B. Locating assets and witnesses
C. Conducting a background investigation
D. All of the above

A

D. All of the above

A large amount of information and documentary evidence can be gathered from external sources. External sources can be particularly crucial in helping investigators locate missing assets; locate witnesses and suspects; determine ownership in vendors, competitors, and other related parties; research the suspects’ assets and financial condition; and document the suspects’ lifestyle and background information. All of this information will help an investigator build a case and will provide the basis for conducting interviews and obtaining confessions later in the investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Audrey asks the employee to turn over the account statements, but the employee refuses her request. Which of the following methods of obtaining the account statements would be IMPROPER?
A. Referring the case for criminal prosecution and working with law enforcement to obtain a search warrant
B. Requesting the records from the bank and threatening to sue the bank president for impeding justice if the bank does not turn over the records
C. Filing a civil suit and obtaining a subpoena or legal order for the records
D. Filing an administrative action and obtaining a subpoena or legal order for the records

A

B. Requesting the records from the bank and threatening to sue the bank president for impeding justice if the bank does not turn over the records

Fraud examiners might be able to obtain nonpublic records even if the subject does not volunteer the records. Subpoenas and other legal processes, such as depositions and document requests, are available if a civil or criminal action is filed. For example, a wronged organization may file a civil or administrative action or make a criminal referral so that records can be subpoenaed or obtained by a legal order (e.g., a search warrant). In a civil case, both private and public parties may obtain nonpublic records such as bank account, brokerage account, travel, credit card, credit agency, and telephone toll records by subpoena or other legal order.
However, records obtained while executing a search warrant or similar legal order usually are available only to the government during the underlying investigation, and perhaps thereafter if not disclosed at trial. In addition, law enforcement agencies may also subpoena records, but, depending on the jurisdiction, might not disclose the contents of such records with the victim or third parties.
In most jurisdictions, third-party organizations that maintain nonpublic records, such as banks and hospitals, are usually prohibited from revealing such records without express authorization from the subject or a legal order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If a fraud examiner thinks that information from a social media website will be used in court as evidence, the fraud examiner must take steps to capture the information so that it can be established as authentic.

A. True
B. False

A

A. True

Generally, documentary evidence, including digital evidence, will not be admitted in a legal proceeding, or it will not be given much weight, unless it is established as authentic (i.e., the evidence is what it purports to be and is in the same condition as when it was seized).
There are a number of techniques used to authenticate information from social media. Often, authenticity can be established through the testimony of a witness who verifies that the exhibit at issue accurately reflects what he observed on the site, and typically, the witness is the party who collected the evidence. Consequently, fraud examiners who collect evidence from social media often become a form of eyewitness, and for this reason, fraud examiners must capture, download, and preserve any useful information as soon as they discover it. They must memorialize each step of the collection process, creating a record of what they see at any point in the investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following types of information on corporations whose stocks and securities are sold to the public might be available from regulatory securities records?

A. Financial statements
B. Identities of officers and directors
C. Identities of accountants and attorneys
D. All of the above

A

D. All of the above

While jurisdictions treat the concept of securities differently, governments or self-regulatory bodies generally set rules for the issuing and trading of certain types of securities. Among the most common and important rules are disclosure requirements for companies with publicly traded securities. These rules are designed to make sure that investors are reasonably informed about stock that they purchase. Beyond helping investors, these disclosures typically are made public, and they can provide a wealth of information about the filing company, including its type of business, history, organizational structure, auditor, balance sheets, and income statements.
Different securities regulators have varying disclosure requirements, but these records might include the following information:
* Corporate financial statements
* Identification of officers and directors
* Identification of significant owners (e.g., those with more than 10 percent of a business’s stock)
* A description of the registrant’s properties and businesses
* A description of the significant provisions of the security to be offered for sale and its relationship to the registrant’s other capital securities
* Identification of events of interest to investors
* Identification of accountants and attorneys
* A history of the business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a good practice when searching the Internet for information?

A. Use more than one search engine
B. Use specific nouns instead of pronouns
C. Use filters to focus searches
D. All of the above

A

D. All of the above

The following is a list of tips and guidelines for searching the Internet for information:
* Use more than one search engine. Everyone has their favorite search engine, but relying on one search engine is not sufficient because every search engine collects and catalogs information differently.
* Be clear about what is being looked for. Define the search topic as clearly and succinctly as possible.
* Use unique, specific keywords. Be specific when entering search terms.
* Use nouns for keywords.
* Use format terms (e.g., transcript, document, report, statistics, pdf, policy, dictionary) in addition to subject words.
* Exclude articles (e.g., a, an, the) and pronouns (e.g., he, she, it, they) from search terms, unless they are part of a key phrase.
* Use correct spelling and include alternative spellings (e.g., colour and color).
* Use filters to focus searches. Filters tell search engines to screen out specified types of pages or files.
* Check all the tips and features of any search engine to be used, and use them.
* Increase the number of results displayed per page.
* Customize searches using advanced search operators, such as the minus (-) operator and quotation marks, to narrow the search results.
* Search for phrases. Search for a sequence of words in a specific order, using quotation marks around the phrase.
* Search for base words (drop suffixes) to avoid excluding relevant pages.
* Use metasearch engines if early searches are unfruitful.
* Set a time limit for searching, and when the set amount of time has elapsed, stop and try another method.
* Use a browser’s find feature to find a word or phrase on a Web page and help navigate search results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

By examining the probate records of a deceased individual, a fraud examiner can discover:
A. An indication of the value of the property willed to the deceased’s heirs
B. The names of individuals with an interest in the deceased’s estate
C. The deceased’s financial position at the time of death
D. All of the above

A

D. All of the above

Some jurisdictions have separate probate courts to determine the dispersal of assets after a subject’s death. The probate court conducts an investigation to verify any debts owed by an individual’s estate and sees to the dispersal of assets after all debts are paid. Probate court records include documents filed to show the dispersal of assets after a subject’s death.
The debts left in an individual’s estate will give the investigator information on the following:
* Names of individuals with an interest in the deceased’s estate
* The subject’s financial position at the time of death
The dispersal of assets will reveal:
* The names and addresses of heirs to the deceased
* Some indication of the value of the property willed to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In general, which of the following types of information is commonly available through a municipal or regional building inspector’s office?

A. Building inspectors’ reports
B. Building permits
C. Blueprints and plans submitted with applications
D. All of the above

A

D. All of the above

The following information is generally available through a municipal or regional building inspector’s office:
* Building permits, showing the names of the applicants, the address of construction, the estimated costs, and the name of the builder or contractor
* Blueprints and plans showing construction details that are often submitted with applications for building permits
* Building inspectors’ reports containing information regarding compliance with construction specifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following statements best describes the function of metasearch engines?
A. Metasearch engines send user requests to several other search engines and aggregate the results for display
B. Metasearch engines narrow searches to only those search engines that achieve the best results
C. Metasearch engines contain links to websites that are sorted into categories
D. None of the above

A

A. Metasearch engines send user requests to several other search engines and aggregate the results for display

Metasearch engines send user requests to several other search engines and aggregate the results for display.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a type of information that can be obtained from the deep Web?
A. Websites without any links pointing to them
B. An archived version of a Web page that is no longer online
C. Web content indexed by standard search engines
D. An old version of a Web page that has since been updated

A

A. Websites without any links pointing to them

The deep Web (also known as the invisible Web) refers to Web content that is not indexed by standard search engines. There are a number of reasons why the deep Web exists. For instance, there are sites where Web crawlers (search engine robots or spiders) cannot enter. Web crawlers are scripts that create a copy of a visited Web page which are later indexed by a search engine to provide faster searches. These deep Web resources include websites without any links pointing to them, certain file formats that search engines cannot handle, sites that have been blocked from Web crawler access, password-protected sites, and information stored in databases. Also, search engines limit the depth of their crawl on a website. Moreover, Web crawlers cannot crawl as quickly as pages are added or updated.
Alternatively, the term Internet archives refers to archived versions of Web pages that have since been updated or are no longer available online. The most popular tool for searching the Internet archives is the Wayback Machine, located at www.archive.org. The Wayback Machine allows users to see archived versions of Web pages throughout time. Fraud examiners can use the Wayback Machine to find historical information, such as:
* A photo posted on a website that has been removed
* Content, views, writing, and opinions rescinded by an author
* A company’s old job ads, statements, affiliations, or product lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Morris, a CFE, is investigating Crump, who is active on an online social networking site in which he voluntarily shares information about himself. Morris wants to search and extract information from Crump’s social network profile. Which of the following is the most accurate statement about the privacy of information Crump shared through his social network profile?

A. To search for information that Crump posted and made available to the public through his social network profile, Morris must provide Crump notice beforehand.
B. Morris could be liable for violating Crump’s privacy rights if he hacks or breaks into areas of the social networking site Crump has designated as private.
C. To access any information posted on Crump’s social network profile, Morris must obtain some type of legal order from the jurisdiction in which Crump resides.
D. The Privacy of Social Networks Treaty is an international law that makes it illegal for Morris to seek the login credentials from Crump’s social networking account.

A

B. Morris could be liable for violating Crump’s privacy rights if he hacks or breaks into areas of the social networking site Crump has designated as private.

Social media sites might contain valuable information. Fraud examiners are free to search and extract information from a subject’s page if it is open to the public, but there are limitations to the information fraud examiners can access on a social networking site due to privacy settings and anonymity.
Many users set their privacy settings in a way that prevents anyone besides their friends from seeing their profile information, and this creates several issues of legal access and privacy rights. Accessing information set to private could result in claims under privacy laws. Thus, accessing information on social media sites that is restricted by privacy settings could result in liability for fraud examiners due to violation of users’ privacy rights.
Privacy rights, however, vary between countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a type of information that can be obtained from the Internet archives?

A. Content on a website that is protected by passwords
B. Content on websites without any links pointing to them
C. Content on websites not indexed by standard search engines
D. Content posted on a website that has been removed

A

D. Content posted on a website that has been removed

The term Internet archives refers to archived versions of Web pages that have since been updated or are no longer available online. The most popular tool for searching the Internet archives is the Wayback Machine, located at www.archive.org. The Wayback Machine allows users to see archived versions of Web pages throughout time. Fraud examiners can use the Wayback Machine to find historical information, such as:
* A photo posted on a website that has been removed
* Content, views, writing, and opinions rescinded by an author
* A company’s old job ads, statements, affiliations, or product lines
Alternatively, the deep Web (also known as the invisible Web) refers to Web content that is not indexed by standard search engines. There are a number of reasons why the deep Web exists. For instance, there are sites where Web crawlers (search engine robots or spiders) cannot enter. Web crawlers are scripts that create a copy of a visited Web page which are later indexed by a search engine to provide faster searches. These deep Web resources include websites without any links pointing to them, certain file formats that search engines cannot handle, sites that have been blocked from Web crawler access, password-protected sites, and information stored in databases. Also, search engines limit the depth of their crawl on a website. Moreover, Web crawlers cannot crawl as quickly as pages are added or updated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In jurisdictions that protect the processing and dissemination of credit information and personal data, businesses are not subject to the same protections that individuals have.
A. True
B. False

A

A. True

In the case of consumer (individual) credit records and personal data, a growing number of jurisdictions regulate both how such information is collected and stored, as well as who may access this information and for what purpose. In many cases, the consumer must be notified and must consent to the use of the report. Agencies that process and disseminate such information are called credit reporting agencies, data controllers, and similar names, depending on the jurisdiction.
Information on a business organization’s creditworthiness may also be obtained from credit reporting agencies. The responses for such searches might include payment trends from creditors, public records, banking information, and key facts as to the type of business and ownership. But unlike consumer credit information, business credit information is generally not subject to the same legal protections that individuals have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When searching regulatory securities records for information on a publicly traded company, which of the following information is LEAST LIKELY to be found?
A. Identity of major owners of the company
B. Major events that are of interest to investors
C. Identity of the company’s officers and directors
D. The complete books and records of the company

A

D. The complete books and records of the company

While jurisdictions treat the concept of securities differently, governments or self-regulatory bodies generally set rules for the issuing and trading of certain types of securities. Among the most common and important rules are disclosure requirements for companies with publicly traded securities. These rules are designed to make sure that investors are reasonably informed about stock that they purchase. Beyond helping investors, these disclosures typically are made public, and they can provide a wealth of information about the filing company, including its type of business, history, organizational structure, auditor, balance sheets, and income statements.
Different regulators have varying disclosure requirements, but these records might include the following information:
* Corporate financial statements
* Identification of officers and directors
* Identification of significant owners (e.g., those with more than 10 percent of a business’s stock)
* A description of the registrant’s properties and businesses
* A description of the significant provisions of the security to be offered for sale and its relationship to the registrant’s other capital securities
* Identification of events of interest to investors
* Identification of accountants and attorneys
* A history of the business
The complete books and records of a company, however, are not available in securities records searches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is a limitation of conducting a search for public records using online databases?
A. Information from online databases must be validated for accuracy and timeliness
B. Online public records searches are limited in the area they cover, often requiring fraud examiners to search multiple jurisdictions
C. Online coverage of public records varies widely from jurisdiction to jurisdiction
D. All of the above

A

D. All of the above

The main limitations of conducting searches for public records using online databases include:
* Online coverage of public records varies widely from jurisdiction to jurisdiction, and therefore, there are many degrees of accessibility to public records between jurisdictions.
* Online public records searches are limited in the area they cover. Therefore, when looking for information on a subject, fraud examiners often must search for public records in multiple jurisdictions.
* Often, online public records are brief abstracts of the original public record.
* The source of the information compiled in an online database must be reliable.
* Fraud examiners must validate information retrieved from online databases to determine if it is accurate and up-to-date.
* The public records compiled in an electronic format might cover only a limited period.
* Online searches can be erratic in the information they return.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Even when a victim refers a fraud case for criminal prosecution, the government will usually not disclose the contents of nonpublic records with the victim during the investigation.

A. True
B. False

A

A. True

A wronged organization may make a criminal referral so that records can be subpoenaed by the government or obtained by a legal order (e.g., a search warrant). Records obtained while executing a search warrant or similar legal order usually are available only to the government during the underlying investigation, and perhaps thereafter if not disclosed at trial. In addition, law enforcement agencies may also subpoena records, but, depending on the jurisdiction, might not disclose the contents of such records with the victim or third parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A company’s organizational filing with the government generally includes information about the company’s ownership, initial shareholders, and the location of its principal office.
A. True
B. False

A

A. True

Companies are formed by submitting some type of organizational filing to the government of the jurisdiction in which the entity is incorporated. These filings might be referred to in various ways in different jurisdictions (e.g., articles of incorporation, corporate constitution, or corporate charter). Organizational filings are generally public records and usually include:
* Corporate name
* Ownership information
* Nominal stock value
* Names of initial shareholders
* Names of the directors and officers
* Registered agent
* Location of the principal office
* Date of incorporation
* Standing/status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If a fraud examiner was gathering information about a fraud suspect, which of the following types of information would likely require access to nonpublic sources of information to obtain?

A. The subject’s habits and lifestyle
B. The subject’s phone records
C. Where the subject currently resides
D. All of the above

A

B. The subject’s phone records

Nonpublic records—financial or otherwise—might be needed to prove fraud or to provide leads in a fraud examination. Nonpublic records include information about a person or business considered to be private and confidential. But unlike public records, nonpublic records are not available to the public, and because members of the public and, by extension, fraud examiners do not have an absolute right to see these personal records, obtaining access might be difficult or impossible.
Some of the most valuable types of personal records include:
* Banking records
* Tax records
* Credit records of individuals
* Phone records
* Credit card account records
* Personal health care records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In most jurisdictions, which of the following statements about bankruptcy court records is CORRECT?

A. A bankruptcy file typically contains the bankruptcy petition or filing document
B. Only the party filing for bankruptcy and the creditors may access bankruptcy records
C. Bankruptcy documents are usually located in the jurisdiction where the most debt was incurred
D. All of the above

A

A. A bankruptcy file typically contains the bankruptcy petition or filing document

Many jurisdictions provide bankruptcy records to the authorized parties or the general public. Bankruptcy proceedings generally occur in the jurisdiction in which the debtor resides. It is common for countries to have separate bankruptcy courts that handle most or all of such cases. The information available in bankruptcy records varies, but common items include:
* The bankruptcy petition or other type of filing document, which might include the subject’s government identification number; street address and primary place of business; location of principal assets of business; type of business; name of legal representative; estimated amount of assets; estimated number of creditors, liabilities, and employees; financial data; and a list of corporate shareholders
* Claim documents by creditors listing the amounts that the debtor allegedly owes
* A final accounting that shows which claims were paid
* A descriptive list of the debtor’s property at the time of filing (real estate, personal property, investments, accounts receivables, etc.)
* Filings that describe the debtor’s income and expenditures
* The bankruptcy plan (some jurisdictions allow bankrupt parties to reorganize businesses or participate in a debt reduction plan, as opposed to liquidating all assets)
* Details from a fraud examination if the bankrupt party was suspected of bankruptcy fraud

21
Q

In many jurisdictions, when an individual purchases real estate, he usually becomes a registrant in which of the following records?

A. Real property records
B. Tax assessor records
C. Property tax records
D. All of the above

A

D. All of the above

Real property records are extremely important, and in many jurisdictions, they are relatively easy to access and contain a vast amount of information. It is common for real property records to be found at the local level of government, but some jurisdictions might keep them at a centralized location. When an individual purchases real estate, he becomes a registrant in real property records, property tax records, and tax assessor records (if applicable).

22
Q

In many jurisdictions, all of the following information can usually be obtained from real property records EXCEPT:

A. Who financed the purchase of a property, if applicable
B. A property’s historical sales price
C. A property owner’s credit report
D. The addresses of a property’s buyer and seller

A

C. A property owner’s credit report

Real property records are extremely important, and in many jurisdictions, they are relatively easy to access and contain a vast amount of information. It is common for real property records to be found at the local level of government, but some jurisdictions might keep them at a centralized location. When an individual purchases real estate, he becomes a registrant in real property records, property tax records, and tax assessor records (if applicable).
Most jurisdictions have a land registry office that maintains various information on real property and its owner(s). Both the level of government where these records are found and the information they contain will vary by jurisdiction, but the following information is often present:
* Documents pertaining to real estate transactions—including deeds, grants, transfers and mortgages of real estate, releases of mortgages, powers of attorney, and leases that have been acknowledged or approved
* Mortgages on real property
* Security interests or liens on property
* Wills admitted to probate
* Official bonds
* Notices of mechanic’s liens
* Transcripts of judgments that are made liens on real estate
* Notices of attachment on real estate
* Land cadaster (a registry of land surveys that specifically detail each plot of real estate in an area and may contain information about value, ownership rights, and other details)
* Papers in connection with bankruptcy
* Certified copies of decrees and judgments of courts of record
* Other documents permitted by law to be recorded
* Historical sale prices
* Residences and addresses of the buyer and seller
* Identity of the party financing the property, if applicable
* Improvements to a property
A credit report involves a third party’s assessment of a person’s credit history and capacity to take out and repay debt; this information is not found in public property records.

23
Q

Green believes that Blue, a fraud suspect, has purchased hidden personal property through suspicious financing. Which of the following sources, if available, would most likely contain information that Green could use to locate Blue’s possible hidden assets?

A. Commercial filings
B. Registrar of voters
C. Health department records
D. Surveyor office records

A

A. Commercial filings

Commercial filings are records that can help fraud examiners identify personal property that an individual or business has financed. These filings and supporting documents can help fraud examiners uncover hidden ownership or relationships between parties by viewing the names of all listed debtors and their addresses. The fraud examiner might find information linking individuals to the companies they own or discover information about a company’s subsidiaries, branch offices, or parent company. Additionally, discovering financed assets can reveal information about a person or organization’s financial condition.

24
Q

Able, a fraud examiner, is investigating a suspected embezzlement by one of XYZ Corporation’s employees. As part of the investigation, he is assembling a financial profile of the suspect. Among other things, he wants to see if the suspect has made any significant real estate purchases since the embezzlement scheme began. Information on real estate transactions such as deeds, grants, transfers, and mortgages is usually located:

A. With the jurisdiction’s organizational filing agency
B. With the local court clerk or judicial records agency
C. With the jurisdiction’s land registry office
D. With the jurisdiction’s commercial filing registrar

A

C. With the jurisdiction’s land registry office

Most jurisdictions have a land registry office that maintains various information on real property and its owner(s). Both the level of government where these records are found and the information they contain will vary by jurisdiction, but the following information is often present:
* Documents pertaining to real estate transactions—including deeds, grants, real estate transfers and mortgages, releases of mortgages, powers of attorney, and leases that have been acknowledged or approved
* Mortgages on real property
* Security interests or liens on property
* Wills admitted to probate
* Official bonds
* Notices of mechanic’s liens
* Transcripts of judgments that are made liens on real estate
* Notices of attachment on real estate
* Land cadaster (a registry of land surveys that specifically detail each plot of real estate in an area and may contain information about value, ownership rights, and other details)
* Papers in connection with bankruptcy
* Certified copies of decrees and judgments of courts of record
* Other documents permitted by law to be recorded
* Historical sale prices
* Residences and addresses of the buyer and seller
* Identity of the party financing the property, if applicable
* Improvements to a property

25
A fraud examiner can request a business’s bank records even if the business is not legally obligated to comply. A. True B. False
A. True ## Footnote The simplest way to obtain relevant documents, such as bank records, is to request them. This usually works for fraud examiners representing large organizations that are important customers to the party with the information. Vendors and other customers of the company conducting the investigation might cooperate voluntarily if they have nothing to hide (or think that incriminating evidence cannot be found) and are anxious to maintain good relations with the company. A subject can consent to produce the records or execute a written consent for the fraud examiner to obtain such records from banks, credit agencies, or the taxing authority. If the business does not voluntarily provide the records, fraud examiners may pursue them through subpoenas and other legal processes.
26
Which of the following is the most accurate statement about trying to locate a subject using online records? A. If an individual has moved, obtaining a past address is usually of no help. B. Efforts to locate a subject using online records should begin with a search of the suspect’s vehicle records. C. Online records are generally not useful in locating subjects whose address is unknown. D. Obtaining a past address of the subject should be the first step in trying to locate a subject using online records.
D. Obtaining a past address of the subject should be the first step in trying to locate a subject using online records. ## Footnote To locate people using online records, fraud examiners should adhere to three principles. First, when searching for an individual, the fraud examiner should obtain a past address of the subject, and search activities should begin with that information. Second, the fraud examiner should consider the cost effectiveness of the search activity and avoid ordering online searches that yield unnecessary or impractical information. Third, the fraud examiner should know the most powerful and useful types of searches.
27
Freddie calls Alex’s bank, claiming to be Alex, with the intention of stealing Alex’s identity. Freddie tells the bank representative that he needs to make sure the bank has the government identification number on his account because he had noticed an error on his statement. The bank representative refuses to give the number, and Freddie hangs up. Assuming that each of the following is illegal in the relevant jurisdiction, which of the following crimes did Freddie commit? A. Defalcation B. Pretexting with a financial institution C. Embezzlement D. Fraud in the inducement
B. Pretexting with a financial institution ## Footnote Broadly defined, pretexting is the act of impersonating someone else or making false or misleading statements to obtain, sell, or buy information about a person or organization. Under the broad definition, pretexting for nonfraudulent purposes is not always illegal, but it should be used with caution. For example, if a fraud examiner is trying to find a witness or a suspect, he might call the person’s relative and pretend to be an old school friend who is requesting the individual’s phone number. This type of pretexting might be permissible. However, it is more often illegal to use pretexting to obtain certain types of information, such as financial records and phone history records. Several jurisdictions have prohibited pretexting against financial institutions, even if no fraudulent intent is present. In the context of financial institutions, pretexting is the act of obtaining or attempting to obtain customer information from financial institutions through these deceptive tactics. Some individuals used pretexting as a means to gather financial information about a subject. Pretexters would contact a financial institution and pretend to be the customer or someone else authorized to obtain financial information and basically trick the financial institution into providing information about the subject.
28
Which of the following is the most accurate statement regarding what fraud examiners should do when collecting information from social media sites? A. The information from social networking sites should be preserved so that it can be established as authentic if used in court. B. Saving a social networking Web page as a “bookmark” is sufficient to preserve the information on the site for authentication purposes. C. Conducting a forensic shutdown of the computer viewing a social networking site will preserve the website’s metadata for authentication purposes. D. Fraud examiners can use the contents of each social networking website to authenticate the websites themselves.
A. The information from social networking sites should be preserved so that it can be established as authentic if used in court. ## Footnote Generally, documentary evidence, including digital evidence, will not be admitted in a legal proceeding, or it will not be given much weight, unless it is established as authentic (i.e., the evidence is what it purports to be and is in the same condition as when it was seized). There are a number of techniques used to authenticate information from social media. Often, authenticity can be established through the testimony of a witness who verifies that the exhibit at issue accurately reflects what he observed on the site, and typically, the witness is the party who collected the evidence. Consequently, fraud examiners who collect evidence from social media often become a form of eyewitness, and for this reason, fraud examiners must capture, download, and preserve any useful information as soon as they discover it. They must memorialize each step of the collection process, creating a record of what they see at any point in the investigation.
29
Carlos is conducting a background investigation of a corporation and its management. Which of the following can Carlos obtain without a legal order or subpoena? A. The company’s business filings B. The tax records of the company's owner C. The company's banking records D. The history of medical expenses of the company's employees
A. The company’s business filings ## Footnote Nonpublic records—financial or otherwise—might be needed to prove fraud or to provide leads in a fraud examination. Nonpublic records include information about a person or business considered to be private and confidential. But unlike public records, nonpublic records are not available to the public, and because members of the public and, by extension, fraud examiners do not have an absolute right to see these personal records, obtaining access might be difficult or impossible. Individuals generally will not willingly give their private records to a fraud examiner, and often, the authority of institutions to disclose nonpublic records is restricted by law. Some of the most valuable types of personal records include: * Banking records * Tax records * Credit records of individuals * Phone records * Credit card account records * Personal health care records Basic business organization—whether for businesses with a single owner or large corporations—is generally governed under the laws of the country in which the entity is organized. Most jurisdictions require business entities to file various types of records that contain information that might be useful in a fraud examination, and generally, such filings are available to the public.
30
Lance wants to search the Internet for sites with information on mortgage fraud. Which of the following search strings will yield the best result using a basic search engine? A. Mortgage OR fraud B. *Mortgage fraud C. Mortgage -fraud D. “Mortgage fraud”
D. “Mortgage fraud” ## Footnote Users can employ advanced search operators (or Boolean operators) to gain more control over the search results. Advanced search operators are query words or symbols used in search engine queries to instruct search engines to perform special actions when executing a search. They help search engines better understand exactly what the user is looking for, and they improve a search and return relevant links faster. Placing quotation marks around a phrase will indicate to the search engine that it is to search only for pages that have the exact phrase. Thus, performing a search for “mortgage fraud” will yield pages containing that exact phrase. In Lance's case, this search would yield the best results. In some search engines, adding the minus sign before unwanted terms will produce results that do not contain the word following the “-.” So, a search for “mortgage -fraud” will return pages in which the word “mortgage” appears but will exclude pages that reference the word “fraud.” In some search engines, adding the word "OR" between two terms will yield sites in which either word appears. In some search engines, a user can insert an asterisk (*) as a placeholder for any unknown terms.
31
In jurisdictions that regulate the processing and dissemination of personal credit information and personal data, such information cannot be obtained on an individual under any circumstances without the person’s consent. A. True B. False
B. False ## Footnote In the case of consumer (individual) credit records and personal data, a growing number of jurisdictions regulate both how such information is collected and stored, as well as who may access this information and for what purpose. In many cases, the consumer must be notified and must consent to the use of the report. In jurisdictions that regulate credit information and personal data, a fraud examiner will generally need a legally acceptable reason for accessing such information from third parties. However, simply suspecting an individual of fraud is generally not sufficient grounds for obtaining credit and personal data regarding the person from a reporting agency or data controller. The specific exceptions for allowing the processing and dissemination of credit and personal data vary, but some common circumstances include when: * The individual has given consent. * It is necessary for the extension of credit or to enter into a contract with the subject. * It is necessary to protect the subject’s vital interest. * It is necessary to comply with other legal requirements. * An employer is conducting a background check for hiring or other employment purposes (consent is still required in many jurisdictions). * It is necessary to serve the public interest.
32
Which of the following types of information are NOT typically open to the public for inspection? A. Personal telephone records B. Real property records C. Death records D. Divorce and probate court records
A. Personal telephone records ## Footnote Generally, a person’s private phone lines, such as home phone and personal mobile devices, will be considered private. Therefore, to access the records for these lines, investigators will need consent from subjects, a warrant or subpoena, or another legal order.
33
Which of the following statements concerning public records is MOST ACCURATE? A. Public records are the primary source of individual health information. B. Public records are valuable for obtaining background information on individuals. C. Public records are useful for searching banking records. D. Public records are those maintained by public companies.
B. Public records are valuable for obtaining background information on individuals. ## Footnote Public records are documents that a governmental agency is required to keep by law or that are necessary to discharge the duties imposed by law. Public records, which can be accessed by the public and are thus available to anyone who wishes to use them, can be helpful to fraud examiners for a number of reasons. They can supply invaluable background information on employees, suspects, and witnesses. They can also be used to corroborate or refute witness statements, help investigators track the flow of stolen money or other assets, and aid efforts to recover losses. Banking, health records, and consumer credit records are typically nonpublic information.
34
A fraud examiner is conducting an investigation involving ABC Company, a multi-national, publicly traded company, and wants to obtain regulatory securities records regarding the company. Which of the following best describes where the fraud examiner should check to find these records? A. Only domestic securities exchanges located in the jurisdiction where the company is incorporated B. Only domestic securities exchanges and exchanges in jurisdictions where the corporation has a substantial business presence C. Both domestic and foreign securities exchanges, including those in jurisdictions where the company has minimal business presence D. Only the securities exchanges in the jurisdiction where the company does most of its business
C. Both domestic and foreign securities exchanges, including those in jurisdictions where the company has minimal business presence ## Footnote While jurisdictions treat the concept of securities differently, governments or self-regulatory bodies generally set rules for the issuing and trading of certain types of securities. Among the most common and important rules are disclosure requirements for companies with publicly traded securities. These rules are designed to make sure that investors are reasonably informed about stock that they purchase. Fraud examiners should keep in mind that if a public company does not report to its domestic securities regulator, it might be registered with regulators of foreign securities exchanges. Even if the company has minimal or no presence in the foreign jurisdiction, it might be registered there to benefit from foreign investment. Therefore, searching multiple securities exchanges might be necessary for conducting a thorough securities records search.
35
Acme Services, a new business, has just been registered as a corporation in a particular country. Acme’s management wants to expand business outside of the country. Which of the following is most accurate? A. Acme may now conduct business anywhere in the world. B. Acme must register as a business entity in foreign jurisdictions in which it wishes to conduct business. C. Acme can only be incorporated in one jurisdiction. D. Being incorporated in one country allows Acme to conduct business in most countries.
B. Acme must register as a business entity in foreign jurisdictions in which it wishes to conduct business. ## Footnote Most jurisdictions require that foreign corporations (corporations which were incorporated in another jurisdiction) be registered with the domestic business organization agency if the foreign corporations transact business in that jurisdiction. For example, if a corporation that was chartered in Country A wishes to transact business in Country B, it must create a business organization filing in Country B.
36
Which of the following pieces of information about financed personal property can be found in a commercial filing? A. The type of collateral pledged as security B. The name of the financial lender or creditor C. The name of the debtor or joint debtors D. All of the above
D. All of the above ## Footnote Commercial filings are records that can help fraud examiners identify personal property that an individual or business has financed. Banks, finance companies, and other lenders will generate records or recorded filings of financial transactions conducted with individuals and businesses, such as purchases of household furniture, appliances, boats and yachts, automobiles, aircraft, and business equipment. To secure repayment, the financing party retains an interest in the debtor’s property. This interest is referred to as a security interest or a charge, depending on the jurisdiction. To document this interest, the creditors might create a commercial filing, which will be publicly searchable in some jurisdictions. In jurisdictions where commercial filings are not public record, access might be restricted to those who have a relationship with the debtor or creditor. These filings might help to identify: * Name(s) of the debtor or joint debtors * Current address of the debtor * Name of the financial lender or creditor * Type of collateral pledged as security * Date of filing and continuations
37
Which of the following is a common use of public records in fraud examinations? A. Accessing an individual’s income tax filings B. Tracing and recovering assets C. Obtaining a person’s credit records D. All of the above
B. Tracing and recovering assets ## Footnote Public records are documents that a governmental agency is required to keep by law or that are necessary to discharge the duties imposed by law. Public records, which can be accessed by the public and are thus available to anyone who wishes to use them, can be helpful to fraud examiners for a number of reasons. They can supply invaluable background information on employees, suspects, and witnesses. They can also be used to corroborate or refute witness statements, help investigators track the flow of stolen money or other assets, and aid efforts to recover losses. Individual tax records and consumer credit records are typically nonpublic information.
38
Bianca, a fraud examiner for the Levine Corporation, suspects that an employee of another company has committed a fraud scheme against Levine Corporation. The relevant jurisdiction regulates the distribution of credit information and personal data. Although Bianca has not obtained the suspect employee's consent, she will likely be allowed to access his credit report from a third party. A. True B. False
B. False ## Footnote In the case of consumer (individual) credit records and personal data, a growing number of jurisdictions regulate both how such information is collected and stored, as well as who may access this information and for what purpose. In many cases, the consumer must be notified and must consent to the use of the report. In jurisdictions that regulate credit information and personal data, a fraud examiner will generally need a legally acceptable reason for accessing such information from third parties. However, simply suspecting an individual of fraud is generally not sufficient grounds for obtaining credit and personal data regarding the person from a reporting agency or data controller. Some jurisdictions provide an exception to this rule when a party is conducting a background check for employment purposes, but since the suspect in this case is not an employee of the investigating party, the exception would not apply.
39
When gathering information for a fraud investigation, virtually all helpful documentary evidence will come from internal sources. A. True B. False
B. False ## Footnote Internal sources—those generated and kept within the subject organization—are often the only resource for certain types of documents, such as private business tax records or employee personnel files, unless the fraud examiner has the subject’s consent or a legal order to obtain those documents from other parties. Even so, a large amount of information and documentary evidence can also be gathered from external sources. External sources can be particularly crucial in helping investigators locate missing assets; locate witnesses and suspects; determine ownership in vendors, competitors, and other related parties; research the suspects’ assets and financial condition; and document the suspects' lifestyle and background information. All of this information will help an investigator build a case and will provide the basis for conducting interviews and obtaining confessions later in the investigation.
40
Gamma, a Certified Fraud Examiner, is attempting to locate the exact birthplace of Theta, a fraud suspect. Where is Gamma most likely to find such a record, if it exists? A. The jurisdiction’s tax assessor B. The jurisdiction’s health records agency C. The local commercial filing agency D. The local property records agency
B. The jurisdiction’s health records agency ## Footnote Some local health records agencies maintain birth and death records. The content and availability of these records varies widely, but they might include the name of the individual, address, sex, age, race, birthplace, birth date, death place, date and time of death, government identification number, close family members, occupational information, medical certificate, and coroner’s certificate. If such records are not available locally, there might be a state/provincial or national health office that maintains them.
41
Which of the following are query words or symbols used in search engine queries to instruct search engines to perform special actions when executing a search? A. Limiting factors B. Search fields C. Expansion numerals D. Boolean operators
D. Boolean operators ## Footnote Boolean operators (or advanced search operators) are query words or symbols used in search engine queries to instruct search engines to perform special actions when executing a search. They help search engines better understand exactly what the user is looking for, and they improve a search and return relevant links faster. By using search operators, users can get more accurate search results and reduce the time it takes to find relevant sources.
42
Which of the following types of records is/are commonly available from local governments? A. Utility records B. Health and fire department records C. Voter registration records D. All of the above
D. All of the above ## Footnote The following items are basic types of public records that can commonly be accessed at the local level of government: * Building inspector records * Building permit records * Health and fire department records * Birth and death records * Public school records * Coroner’s register * Voter registration records * Utility records * Marriage records
43
In most jurisdictions, a fraud examiner can easily and legally obtain an individual’s personal credit information from any third-party information vendor. A. True B. False
B. False ## Footnote In the case of consumer (individual) credit records and personal data, a growing number of jurisdictions regulate both how such information is collected and stored, as well as who may access this information and for what purpose. In many cases, the consumer must be notified and must consent to the use of the report. In jurisdictions that regulate credit information and personal data, a fraud examiner will generally need a legally acceptable reason for accessing such information from third parties. However, simply suspecting an individual of fraud is generally not sufficient grounds for obtaining credit and personal data regarding the person from a reporting agency or data controller. The specific exceptions for allowing the processing and dissemination of credit and personal data vary, but some common circumstances include when: * The individual has given consent. * It is necessary for the extension of credit or to enter into a contract with the subject. * It is necessary to protect the subject’s vital interest. * It is necessary to comply with other legal requirements. * An employer is conducting a background check for hiring or other employment purposes (consent is still required in many jurisdictions). * It is necessary to serve the public interest.
44
To protect privacy interests, courts generally find that audit clauses within business partner contracts are void, and most jurisdictions have laws that prohibit businesses from making threats to terminate a business relationship over a contracting party’s refusal to turn over nonpublic information. A. True B. False
B. False ## Footnote There are several ways to obtain nonpublic information. An organization may demand that a supplier, vendor, or agent turn over relevant documents as a condition of continued business. Taking this action is legal, in appropriate circumstances. Of course, management and counsel should be consulted before such demands are made, particularly if the other party has a contractual relationship with the demanding organization. An audit clause allows parties to a contract the right to access another party's books. Often, audit clauses are too narrow to provide useful information. However, if properly constructed, an audit clause can be a powerful method by which on-book information can be obtained.
45
Which of the following statements concerning court records is most accurate? A. In most countries, court records are not public records and require judicial authorization to access. B. There are multiple databases that contain a comprehensive database of court documents from all court cases in every country. C. In most countries, reliable court records are best obtained from the court in which the case was heard or filed. D. When searching for records for a particular court case, a fraud examiner needs only to search the central/federal court records, as they serve as a repository for all cases heard at all court levels.
C. In most countries, reliable court records are best obtained from the court in which the case was heard or filed. ## Footnote A great deal of litigation occurs each year, and many people might be subject to judicial action, voluntarily or not. Court records are a common direct and indirect source of information for fraud examinations. Many jurisdictions allow fraud examiners to search court records, and there are also a variety of services that compile and search such records. To perform court records searches, fraud examiners need to be familiar with the structure of the jurisdiction’s court system. Many jurisdictions implement a tiered court structure, where minor offenses and causes of action (e.g., small claims) are held in one set of courts, and more serious offenses or issues are held in another set. Similarly, a jurisdiction might have courts that are divided based on local/municipal, state/provincial, and central/federal levels of government. Court records are typically maintained by a clerk or administrative office of the court that heard the case. However, there might be an agency that maintains records from multiple court levels. Therefore, to conduct a thorough search of court records, fraud examiners might need to search at multiple court levels. It is rare for there to be a central public database that maintains all court records at every level of a jurisdiction, and there are no parties that maintain a comprehensive database of court records on a global basis (despite what some records merchants might claim).
46
In most countries, the entire history of court records is accessible through a single location or website. A. True B. False
B. False ## Footnote To perform court records searches, fraud examiners need to be familiar with the structure of a jurisdiction’s court system. Most jurisdictions implement a tiered court structure, where minor offenses and causes of action (e.g., small claims) are held in one set of courts, and more serious offenses or issues are held in another set. Similarly, a jurisdiction might have courts that are divided based on local/municipal, state/provincial, and central/federal levels of government. Court records are typically maintained by a clerk or administrative office of the court that heard the case. However, there might be an agency that maintains records from multiple court levels. Therefore, to conduct a thorough search of court records, fraud examiners might need to search at multiple court levels. It is rare for there to be a central public database that maintains all court records at every level of a jurisdiction, and there are no parties that maintain a comprehensive database of court records on a global basis (despite what some records merchants might claim).
47
Bill wants to search the Internet for articles about money laundering using a search engine. Which of the following search strings will yield the best results? A. filetype:“money laundering” B. inanchor:"money laundering" C. site:"money laundering" D. intitle:"money laundering"
D. intitle:"money laundering" ## Footnote Users can employ advanced search operators (or Boolean operators) to gain more control over the search results. Advanced search operators are query words or symbols used in search engine queries to instruct search engines to perform special actions when executing a search. They help search engines better understand exactly what the user is looking for, and they improve a search and return relevant links faster. The intitle:term search operator restricts results to those containing all the search terms specified in the title. So, entering [intitle:money laundering] in a search engine will return only documents that contain the words money and laundering in the title. Since Bill is searching specifically for articles on money laundering, this would be his best choice. Placing quotation marks around a phrase will indicate to the search engine that it is to search only for pages that have the exact phrase. Thus, performing a search for “money laundering” will yield pages containing that exact phrase. In Bill's case, this search would also yield good results. The site:URL search operator will return pages in which the URL contains any specified keyword(s). In some search engines, using the inanchor:term search operator returns pages that contain the specified terms in the link anchors of Web pages. In some search engines, the filetype: search operator will return items of a particular file type that match the keyword.
48
Accessing commercial filings will help identify: A. Personal property that is subject to a security interest or a charge B. A list of all companies that an individual is an officer or registered agent of C. Real estate ownership information D. All of the above
A. Personal property that is subject to a security interest or a charge ## Footnote Commercial filings are records that can help fraud examiners identify personal property that an individual or business has financed. Banks, finance companies, and other lenders will generate records or recorded filings of financial transactions conducted with individuals and businesses, such as purchases of household furniture, appliances, boats and yachts, automobiles, aircraft, and business equipment (but not real estate; these records are only for personal property). To secure repayment, the financing party retains an interest in the debtor’s property. This interest is referred to as a security interest or a charge, depending on the jurisdiction. To document this interest, the creditors might create a commercial filing, which will be publicly searchable in some jurisdictions. In jurisdictions where commercial filings are not public record, access might be restricted to those who have a relationship with the debtor or creditor. These filings might help to identify: * Name(s) of the debtor or joint debtors * Current address of the debtor * Name of the financial lender or creditor * Type of collateral pledged as security * Date of filing and continuations
49
Where permitted by law, searches of all of the following sources of information can be useful in developing background information for pre-employment purposes EXCEPT: A. Civil court records searches B. Criminal court records searches C. Income tax records D. Bankruptcy records searches
C. Income tax records ## Footnote Some of the searches useful in developing background information for employment purposes are listed below (where permitted by law): * Credit header searches are useful in confirming address and national identification number information. * Civil court records can be searched to determine if candidates are or have been involved in legal actions. * Criminal court records may be used to uncover past criminal problems. * Fraud examiners can search tax court liens to determine if candidates have been sued by tax authorities. * Aircraft mechanics, airmen, medical licenses, and other licenses are available to ensure that basic job requirements are met in the appropriate circumstance. * Consumer credit reports may be used for employee selection, retention, and promotion. * Bankruptcy filings, tax liens, and judgments may be used to identify adverse financial matters that can serve as potential motivators for fraud, defamation, and embezzlement. * Where a prospective or current employee drives a personally owned vehicle or an employer-owned vehicle, such activity might expose the employer to liability for damages; therefore, driving records must be checked in such circumstances. * A candidate’s prior education and employment can be verified by conducting education and employment verification searches. In most jurisdictions, income tax records are not public records and cannot be accessed for pre-employment purposes.