Financial Forensics Body of Knowledge
eBook - ePub

Financial Forensics Body of Knowledge

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Financial Forensics Body of Knowledge

Book details
Book preview
Table of contents
Citations

About This Book

The definitive, must-have guide for the forensic accounting professional

Financial Forensics Body of Knowledge is the unique, innovative, and definitive guide and technical reference work for the financial forensics and/or forensic accounting professional, including nearly 300 forensic tools, techniques, methods and methodologies apply to virtually all civil, criminal and dispute matters. Many of the tools have never before been published.

It defines the profession: " The Art & Science of Investigating People & Money. "

It defines Forensic Operators: "ā€¦financial forensics-capable personnelā€¦ possess unique and specific skills, knowledge, experience, education, training, and integrity to function in the financial forensics discipline."

It defines why: " If you understand financial forensics you understand fraud, but not vice versa " by applying financial forensics to all aspects of the financial community.

It contains a book-within-a-book Companion Section for financial valuation and litigation specialists.

It defines foundational financial forensics/forensic accounting methodologies: FAIM, Forensic Accounting Investigation Methodology, ICE/SCORE, CICO, APD, forensic lexicology, and others.

It contains a Reader Lookup Table that permits everyone in the financial community to immediately focus on the pertinent issues.

Frequently asked questions

Simply head over to the account section in settings and click on ā€œCancel Subscriptionā€ - itā€™s as simple as that. After you cancel, your membership will stay active for the remainder of the time youā€™ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlegoā€™s features. The only differences are the price and subscription period: With the annual plan youā€™ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weā€™ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Financial Forensics Body of Knowledge by Darrell D. Dorrell, Gregory A. Gadawski in PDF and/or ePUB format, as well as other popular books in Business & Accounting. We have over one million books available in our catalogue for you to explore.

Information

Publisher
Wiley
Year
2012
ISBN
9781118218983
Edition
1
Subtopic
Accounting
PART One
Financial Forensics Tools, Techniques, Methods, and Methodologies
CHAPTER 1
Foundational Phase
Forensic operators must initiate assignments by clearly identifying and documenting the entities, parties, and ownership interests in the matter at hand. This phase is essential and cannot be disregarded since it charts the vector for the remainder of the assignment, notwithstanding subsequent refinements.
ASSIGNMENT DEVELOPMENT STAGE
Purpose of Stage
This action anchors the forensic assignment and shapes the context and defines the framework for assignment execution. See Exhibit 1.1.
The objective of this action is to complete necessary policy and procedural due diligence before taking any steps toward launching the assignment. This is the starting point for all forensic assignments.
Specific actions include:
  • Identify all parties in the matter, internal and external. This includes, but is not limited to: plaintiff and defendant, petitioner and respondent, prosecutor and defendant, claimant and disputant, etc., including legal and regulatory parties.
  • Correlate the matters of law, as applicable.
  • Establish technical requirements.
  • Uniquely identify the assignment with a client or case number or both.
References
This action confirms access to pertinent technical references, whether currently available or requiring acquisition. Technical resources comprise written materials and training, including self-study, webinar, and live classroom training.
EXHIBIT 1.1 Assignment Development
ch01fig001.eps
The objective of this action is to ensure that necessary technical resources are at hand.
Specific actions include:
  • Search, for example, the Internet for pertinent technical reference sources.
  • Develop a list of required sources.
  • Compare required sources against currently available sources.
  • Acquire sources not otherwise available.
Example of Reference Sources
The following reference sources serve to jump start the forensic operator. The Key Internet Sites and Key Reference Materials are not all-inclusive but provide starting points from which to build resources. Also, refer to the bibliography.
Key Internet sites
  • All forensic operators
    www.financialforensicsacademy.com
    www.fjc.gov
    • ā€œReference Manual on Scientific Evidence,ā€ Reference Guide on Economic Losses in Damages Awards, by Mark A. Allen, Robert E. Hall and Victoria A. Lazear.
  • CPA forensic operators
    www.financialforensicsacademy.com
Key Reference materials
  • All forensic operators
    • Financial Forensics Body of Knowledge, published by John Wiley & Sons.
  • CPA forensic operators
    • Litigation Services Handbook: The Role of the Financial Expert, 4th ed., published by John Wiley & Sons. Also, earlier editions and supplements contain significant additional material.
Tasks to Be Performed
This action outlines likely tasks but is not a checklist since each forensic assignment is unique. Use the tasks as a guideline and modify according to the unique facts and circumstances of the assignment.
The objective of this action is to ensure that the forensic operator thinks through the assignment from inception to completion before launching activities.
Specific actions include:
  • Initiate full-and-false inclusion1
    The full-and-false inclusion technique is foundational to financial forensics yet is foreign to many forensic operators and thus routinely overlooked. It is the single most important element of financial forensics yet is unknown or disregarded by untrained forensic operators. The technique is indispensable because it identifies the evidence essential to the forensic assignment at hand.
    Full-and-false-inclusion testing serves as the real-time map continuously constructed by the GPS-like capabilities of financial forensics. (See the following chain of custody.)
  • Initiate chain of custody2
    The chain of custody is the fraternal twin of full-and-false inclusion. The term is familiar to forensic operators with criminal investigation backgrounds. Chain of custody likewise applies in civil and mere dispute matters just as it applies in criminal matters. (See full-and-false inclusion, above.)
  • Formally clear conflict.
  • Confirm the expectations of the responsible party(s). This could include a testimony role, consulting role, advisory role, or other capacity.
  • Confirm the applicable laws, jurisdiction, regulations, precedent, and other requirements to ensure compliance.
  • Confirm internal technical capabilities or alternatively, identify technical assistance, or initiate specific training.
  • Search for pertinent technical reference sources via, for example, the Internet.
Example Chain of Custody Form
Note: The following example chain of custody form (see Exhibit 1.2) permits all forensic operators to establish and maintain a contemporaneously documented trail of data and evidence. There are no generalized requirements for chain of custody forms except those unique to the forensic operator's organization. Nonetheless, it is often essential in both criminal and civil matters.
EXHIBIT 1.2 Chain of Custody Form
ch01fig002.eps
Descriptors: Each portion is self-explanatory regarding completion, with N/A indicated as necessary.
Custody: The prenumbered chain of custody forms trace to the chain of custody issue log. Both the chain of custody issue log and the chain of custody forms are permanently maintained in the evidence (work paper, library, etc.) room or locker.
Potential Issues
This action prompts the forensic operator to consider the boundaries of the people, parties, entities, timelines, data, output, cost, technical standards, and related criteria pertinent to the respective assignment. The suggested list is not an all-inclusive checklist since each forensic assignment is unique. Use the tasks as a guideline and modify according to the unique facts and circumstances of the assignment.
The objective of this action is to ensure that the forensic operator contemplates exigencies that may surface during the assignment. The forensic operator can minimize exigencies (to the extent possible) by diligent attention to this action.
W...

Table of contents

  1. Cover
  2. Series
  3. Title Page
  4. Copyright
  5. Dedication
  6. Preface
  7. Acknowledgments
  8. Introduction
  9. PART One: Financial Forensics Tools, Techniques, Methods, and Methodologies
  10. PART Two: Financial Forensics Special Topics
  11. APPENDIX: Forensic Inventory
  12. Bibliography
  13. About the Authors and Contributors
  14. Index