Chapter 1 Introduction To Forensic And Investigative Accounting |
|
1-1 | (1) |
|
Definition and Development of Forensic Accounting |
|
|
|
Defining Forensic Accounting |
|
|
|
Historical Roots of Accounting |
|
|
|
History of Financial Reports and Legal Challenges |
|
|
|
Threads of Forensic Accounting |
|
|
|
Accounting Literature Parallels Accounting Practice |
|
|
|
The Phrase "Forensic Accounting" Is Born |
|
|
|
Forensic Accounting and Investigative Accounting Come of Age |
|
|
|
The Forensic Accountant Becomes an Investigator |
|
|
|
|
|
First Forensic Accounting Books in United States |
|
|
|
|
|
American Management Association Course |
|
|
|
The Panel on Audit Effectiveness |
|
|
|
AICPA Fraud Task Force Report |
|
|
|
Controversy Surrounding the Accountant's Role in Fraud Detection |
|
|
|
American Accounting Association Forensic Accounting Section |
|
|
|
Foreign Corrupt Practices Act |
|
|
|
Securities Whistleblower Incentive and Protection Provisions of Dodd-Frank Act |
|
|
|
AICPA's Standards for Forensic Services |
|
|
|
|
|
|
|
|
Chapter 2 Forensic Accounting Education, Institutions, And Specialties |
|
2-1 | (1) |
|
Preparing to Become a Forensic Accountant |
|
|
|
College and University Programs |
|
|
|
Keystones of Forensic Accounting Curricula |
|
|
|
KSAs and Education of the Forensic Accountant |
|
|
|
Career Tracks in Forensic Accounting |
|
|
|
Income Expectations for Forensic Accountants |
|
|
|
Specialties within Forensic and Investigative Accounting |
|
|
|
Forensic Groups and Credentials |
|
|
|
Summary of Forensic Certifications |
|
|
|
American Board of Forensic Accounting® (ABFA) |
|
|
|
Association of Certified Fraud Examiners |
|
|
|
Association of Certified Fraud Specialists |
|
|
|
Forensic Accounting Society of North America |
|
|
|
National Association of Certified Valuators & Analysts |
|
|
|
Network of Independent Forensic Accountants |
|
|
|
Institute of Business Appraisers |
|
|
|
AICPA Certified in Financial Forensics Credential |
|
|
|
Other Organizations Serving Forensic Practitioners |
|
|
|
|
|
|
Chapter 3 Fraudulent Financial Reporting |
|
3-1 | (1) |
|
Importance of Transparent Financial Information |
|
|
|
|
|
Statement of Financial Accounting Concepts No. 2 |
|
|
|
Means and Schemes of Financial Reporting Fraud |
|
|
|
Three M's of Financial Reporting Fraud |
|
|
|
Abusive Schemes Involving Fraudulent Financial Reporting |
|
|
|
Shenanigans to Boost Earnings |
|
|
|
Sources of Fraudulent Financial Reporting |
|
|
|
Internal Versus External Fraud |
|
|
|
Motivation and Contributing Factors |
|
|
|
Contributing Factor Model |
|
|
|
Surveys Show Global Fraud Persists |
|
|
|
|
|
Incidence of Crime and Characteristics of Perpetrators |
|
|
|
Studies of the Prevalence of Fraud in Business |
|
|
|
Characteristics of the White-Collar Criminal |
|
|
|
Earnings Management and GAAP |
|
|
|
|
|
|
|
|
Chapter 4 Detecting Fraud In Financial Reporting |
|
4-1 | (1) |
|
|
|
|
|
Responsibilities and Roles in Financial Reporting |
|
|
|
Independent Audit Procedures and the Auditor's Role |
|
|
|
Internal Auditor's Procedures and Role |
|
|
|
|
|
|
|
|
|
Forensic Accountant's Role |
|
|
|
Financial Statement Fraud Categories and Red Flags |
|
|
|
|
|
|
|
|
|
Earnings Problems: Masking Reduced Cash Flow |
|
|
|
Earnings Before Interest, Taxes, Depreciation, and Amortization (EBITDA) |
|
|
|
|
|
|
|
|
|
Sales and Expenses Problems |
|
|
|
|
|
Balance Sheet Account Problems |
|
|
|
|
|
|
|
|
|
|
|
Financial Fraud Detection Tools |
|
|
|
|
|
|
|
|
|
Using Checklists to Help Detect Fraud |
|
|
|
|
|
|
|
|
Chapter 5 External/Internal Fraud: Misappropriation Of Assets |
|
5-1 | (1) |
|
Fraud Schemes and Their Schemers |
|
|
|
Company Susceptibility to Fraud |
|
|
|
|
|
Types of Misappropriations |
|
|
|
|
|
|
|
Accounts Receivable Fraud |
|
|
|
|
|
|
|
|
|
Walking the Walk of Fraud Detection Programs |
|
|
|
Company Fraud Prevention, Detection, and Mitigation Measures |
|
|
|
Companies on the Front Lines in Preventing Employee Fraud |
|
|
|
Searching for Fraud Symptoms |
|
|
|
Nonprofit Entities as Special Fraud Targets |
|
|
|
Reasons for Fraud in Not-for-Profits |
|
|
|
Prevention Programs for Not-for-Profits |
|
|
|
Fraud in Federal, State, and Local Governments |
|
|
|
When It's Time to Call in Professionals |
|
|
|
Some Forensic Accountant's Techniques |
|
|
|
Game Theory and Strategic Reasoning |
|
|
|
Continuous Monitoring and Continuous Auditing |
|
|
|
Some Forensic Techniques and Tools |
|
|
|
Carbon Dating Paper and Signatures |
|
|
|
|
|
Conflict-of-Interest Policy |
|
|
|
|
Chapter 6 Indirect Methods Of Reconstructing Income |
|
6-1 | (1) |
|
Forensic Audit Approaches Used by the IRS |
|
|
|
|
|
|
|
IRS's Financial Status Audits |
|
|
|
|
|
Market Segment Specialization Program |
|
|
|
|
|
Source and Application of Funds Method (Expenditure Approach) |
|
|
|
|
|
|
|
Contract and Procurement Fraud |
|
|
|
Piercing the Corporate Veil |
|
|
|
|
Chapter 7 Money Laundering And Transnational Financial Flows |
|
7-1 | (1) |
|
Money Laundering: An Introduction |
|
|
|
Legal and Illegal Laundering |
|
|
|
|
|
Cybercash and Digital Money Create More Laundering Opportunities |
|
|
|
Who Uses Money Laundering Practices? |
|
|
|
Financial Institutions' Role in Money Laundering |
|
|
|
|
|
Tools Banks Use to Identify Money Launderers |
|
|
|
Due Diligence Laws for Banks |
|
|
|
|
|
Other Businesses' Role in Money Laundering |
|
|
|
|
|
Audit Trail for Business Money Laundering Schemes |
|
|
|
Finding Money Laundering Schemes |
|
|
|
|
|
Guarding Against Money Laundering |
|
|
|
Individual Due Diligence Using Identity Checks |
|
|
|
Company Due Diligence in Verification Procedures |
|
|
|
Trust Due Diligence Using Trust Deeds |
|
|
|
Organization-Wide Suspicious Activities |
|
|
|
The Accountant's Role as Gateway Keeper |
|
|
|
|
|
Anti-Money Laundering Act of 2021 |
|
|
|
|
Chapter 8 Litigation Services Provided By Accountants |
|
8-1 | (1) |
|
Litigation in the United States |
|
|
|
|
|
|
|
|
|
Types of Litigation Services Provided by Accountants |
|
|
|
|
|
|
|
Masters and Special Masters |
|
|
|
Standards of Conduct for Performing Litigation Services |
|
|
|
Knowledge, Skills, Experience, Training, and Education |
|
|
|
Professional Codes of Conduct |
|
|
|
|
|
Written Agreement to Perform Litigation Services |
|
|
|
Becoming an Expert Witness |
|
|
|
Expert Witnesses Distinguished from Lay Witnesses |
|
|
|
What Lawyers Look for in an Expert Witness |
|
|
|
Qualifying as an Expert Witness |
|
|
|
Court-Appointed Expert Witnesses |
|
|
|
Preparing to Testify as an Expert Witness |
|
|
|
Maintaining Independence from the Client |
|
|
|
Evidence Upon Which Experts May Rely |
|
|
|
Use of Confidential Client Information |
|
|
|
|
|
|
|
Evaluation of Other Experts |
|
|
|
Exhibits and Other Demonstrative Evidence |
|
|
|
Testifying as an Expert Witness |
|
|
|
Testifying at a Deposition |
|
|
|
Preparing to Testify at Trial |
|
|
|
|
|
Liability of Expert Witnesses |
|
|
|
|
|
|
|
|
|
|
Chapter 9 Proper Evidence Management |
|
9-1 | (1) |
|
|
|
What Are the Rules of Evidence? |
|
|
|
|
|
Process for Determining the Admissibility of Evidence |
|
|
|
|
|
Privileged Communications |
|
|
|
|
|
Authentication Requirement |
|
|
|
|
|
|
|
Special Rules for Criminal Cases |
|
|
|
Special Rules in Administrative Proceedings |
|
|
|
|
|
Maximizing Client Confidentiality |
|
|
|
Using Technology to Gather Evidence |
|
|
|
|
|
Ensuring the Admissibility of Evidence in Court |
|
|
|
Security for Evidence and Working Papers |
|
|
|
|
|
Evaluating the Quality and Persuasiveness of Evidence |
|
|
|
|
|
|
|
|
Chapter 10 Commercial Damages |
|
10-1 | (1) |
|
|
|
Expert Witnesses' Qualifications |
|
|
|
Expert Witnesses' Testimony Requirements |
|
|
|
Basics of Damages Litigation |
|
|
|
The Legal Framework of Damages |
|
|
|
Two Types of Harm: Tort and Breach of Contract |
|
|
|
Two Types of Damages: Restitution and Reliance |
|
|
|
Approaches to Loss Estimation |
|
|
|
Damages Calculation Approaches |
|
|
|
|
|
|
|
Economic Framework for the Lost Profits Estimation Process |
|
|
|
|
|
Length of the Loss Period |
|
|
|
|
|
The Defendant's Damages Estimate |
|
|
|
The Plaintiff's Damages Estimate |
|
|
|
Lost Sales and Lost Gross Profits |
|
|
|
Production or Other Cost Increases |
|
|
|
Customer Ill Will and Future Lost Profits |
|
|
|
|
|
The Expert's Journey Through the Legal System |
|
|
|
|
|
Defending the Expert Report |
|
|
|
Damages Period and Discount Rate |
|
|
|
The Unique Role of Communication in Forensic Accounting |
|
|
|
The Reasonableness of Damages Calculations |
|
|
|
|
Chapter 11 Litigation Support In Special Situations |
|
11-1 | (1) |
|
|
|
Overview of Antitrust Laws |
|
|
|
Role of Accountants in Antitrust Litigation |
|
|
|
Actions That Constitute Predatory Pricing |
|
|
|
Determining a Company's Average Variable Costs |
|
|
|
|
|
Common Types of Cost Behavior |
|
|
|
Cost Behavior Assumptions |
|
|
|
|
|
|
|
Federal False Claims Act Litigation |
|
|
|
Overview of the Federal False Claims Act |
|
|
|
The Accountant's Role in False Claim Act Litigation |
|
|
|
|
|
The Nature and Characteristics of Intellectual Property |
|
|
|
Common Issues in Proving/Defending Patent Infringement Cases |
|
|
|
|
Chapter 12 Computing Economic Damages |
|
12-1 | (1) |
|
The Nature of Economic Damages |
|
|
|
Wrongful Termination (Non-Renewal) of Contract Case |
|
|
|
Permanent Disability Case |
|
|
|
|
Chapter 13 Investigation Of Electronic Data: A Brief Introduction |
|
13-1 | (1) |
|
Introduction to Electronic Evidence |
|
|
|
Perspectives on Investigation |
|
|
|
Auditor's Job as Related to Computer Forensics |
|
|
|
Computer Forensics: Electronic Evidence Collection |
|
|
|
Can Digital Evidence Really Be Destroyed? |
|
|
|
The Auditor's Computer Forensics Skill Set |
|
|
|
Encase and the Forensic Environment |
|
|
|
Collection or Seizure of Electronic Evidence |
|
|
|
How Can Electronic Evidence Be Legally Collected? |
|
|
|
Data Mining: Electronic Evidence Collection |
|
|
|
|
Chapter 14 Digital Forensics Analysis |
|
14-1 | (1) |
|
|
|
|
|
|
|
|
|
Internet Protocols: Technical Searches Begin Here |
|
|
|
Decoding Packet Information |
|
|
|
Decoding Simple Mail Transfer Protocol (SMTP) |
|
|
|
Decoded IP Addresses: Tracing Tools |
|
|
|
Decoded IP Addresses: Narrowing the Search |
|
|
|
Tracing Financial Frauds in the Executive Boardroom |
|
|
|
|
|
Internet Databases: Informational Searches Begin Here |
|
|
|
|
|
|
|
|
|
|
Chapter 15 Cybercrime Management: Legal Issues And Loss Valuations |
|
15-1 | (1) |
|
Cybercrimes: An Introduction |
|
|
|
Net Frauds: No Skills Needed |
|
|
|
Unauthorized Access to Network Assets |
|
|
|
The Unauthorized Access Skill Set |
|
|
|
Criminality of Cybercrimes |
|
|
|
When Is a Cybercrime Really a Cybercrime? |
|
|
|
Lagging Technology Legislation |
|
|
|
|
|
|
|
The Cybersecurity and Infrastructure Security Agency |
|
|
|
|
|
Guidelines for Cybercrime Management |
|
|
|
KSAs for Fighting Cybercrime |
|
|
|
Filing Reports of Cybercrimes |
|
|
|
Attacks on Tangibles and Intangibles |
|
|
|
Computing Cybercrime Damages |
|
|
|
High-Tech "Tangible" Losses Attributed to Cyberattacks |
|
|
|
High-Tech Intangible Losses |
|
|
|
Loss Valuations and Insurance Claims |
|
|
|
|
|
Costs and Types of Coverage |
|
|
|
|
|
|
Chapter 16 Business Valuations |
|
16-1 | (1) |
|
|
|
Valuation and Appraiser Accreditations |
|
|
|
Engagement Agreements That Create Successful Client Relationships |
|
|
|
Purposes for Obtaining Business Valuations |
|
|
|
|
|
A Closer Look at Valuation Discounts |
|
|
|
Purpose of the Valuation Affects the Valuation Methods Used |
|
|
|
The Three Valuation Approaches |
|
|
|
|
|
|
|
|
|
Gathering Initial Information |
|
|
|
Initial Information Request |
|
|
|
Discerning What Data Is Required |
|
|
|
|
|
How Much History Is Enough? |
|
|
|
Spreading the Financial Statements |
|
|
|
Analyzing Financial Statements for Trends and Risks |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Income Statement Methods of Determining a Business Valuation |
|
|
|
Cash Flow Methods of Determining the Business Valuation |
|
|
|
Balance Sheet Valuation Methods |
|
|
|
Rules of Thumb-Valuation on the Cheap |
|
|
|
Business Valuation Standards |
|
|
|
Uniform Standards of Professional Appraisal Practice (USPAP) |
|
|
|
American Institute of Certified Public Accountants (AICPA) |
|
|
|
Common Requirements of Business Valuation Standards of Valuation Societies |
|
|
|
Features of the Standards |
|
|
|
Business Valuation Reports |
|
|
|
|
|
Pay Attention to Mechanics |
|
|
|
Main Sections of the Valuation Report |
|
|
|
|
|
Strategies for Effective Testimony |
|
|
|
|
Chapter 17 Forensic Accounting In Action |
|
17-1 | |
|
|
|
Eye on the Investigative Outcome |
|
|
|
Case Number 1: TruGloss Shanghai JV |
|
|
|
Principles of Applied Forensic Analysis |
|
|
|
Unusual or Unrealistic Procedures and Relationships |
|
|
|
Case Number 2: Madon Oilfield Services, Inc. |
|
|
|
|
Appendices |
|
|
Appendix 1: Sample Engagement Letters |
|
|
A-1 | |
|
Appendix 2: Sample IDEA Project |
|
|
A-5 | |
Glossary Of Terms |
|
G-1 | |
Topical Index |
|
I-1 | |