You Are Here: Home » Financial Forensics (Page 2)

Unlike most financial litigation training that tends to be general in scope, the Foundations of Financial Forensics Workshop, offered by the Consultants’ Training Instituteprovides attendees with an understanding of the professional responsibilities and legal underpinnings necessary to providing credible financial forensics services along with an overview of the highest growth areas of financial forensics practice.  The nationally recognized and seasoned financial forensic experts who teach the program also dive into the methodologies and approaches for calculating damages, financial investigative and forensic accounting techniques, skills development for communicating with judges, attorneys, and juries, and practice building strategies that are being employed by successful and emerging financial forensic analysts.

Decrypting Coinbase Accounts

A Guide for Forensic Analysts As cryptocurrencies become more mainstream, it is vital for forensic analysts to understand and analyze digital currency data. Forensic analysts are increasingly being brought in to trace and help recover crypto assets in criminal matters, such as money laundering and other fraud prosecutions. There is also a noticeable increase in the use of forensic analysts in civil litigati ...

Read more

Rationalization and Concealment

Signs of Ethical Deterioration The 21st century has brought not only the worst pandemic in over 100 years, but also an alarming deterioration in ethical culture. We see examples of this in the types of fraud being perpetrated, as well as in the behavior of elected officials, athletes, business owners, and wealthy parents of students. Where is this trend headed, and can it be reversed? In this article, the a ...

Read more

What Forensic Accountants Should Consider When Analyzing a Business Interruption Insurance Claim

Following a Ransomware Attack As businesses continue to rely on computers and digital storage of important data, cyberattacks are a growing potential threat to these organizations—especially now, as businesses have transitioned their workforces to work remotely. There are many types of cyber threats, and the pandemic has driven a surge in ransomware attacks. Ransomware is malware specifically designed to di ...

Read more

Food v. Fraud

Fraud Issues in the Hospitality Industry Post-COVID-19 Pandemic The hospitality industry is already experiencing an increase in fraud, and everyone associated with the business—including operators, owners, managers, employees, and even guests—is at risk of being affected. In this article, the author identifies areas of fraud and provides recommendations to mitigate risk.  As a self-proclaimed foodie, I am e ...

Read more

New Advisories on Ransomware Payments

The Dark Web Criminals Both the Financial Crimes Enforcement Network (FinCEN) and the U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) have issued recent advisories concerning ransomware payments. This article provides an overview of those advisories. Both the Financial Crimes Enforcement Network (FinCEN) and the U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) have ...

Read more

Technology and the Birth of Digital Forensics

The Evolution of Digital Forensics and Growth of the Industry The rapid growth of technology has resulted in the computer age, which has given rise to cybercrimes. Savvy criminals today use devices such as tablets, computers, smartphones, and cloud storage in the planning and commission of cybercrimes, whether to wreak havoc in the system of an organization or in the commission of a crime of self-enrichment ...

Read more

What is Cryptocurrency?

How Does it Work? Everyone seems to be talking about cryptocurrency these days, but many are unsure how to define it and fewer still, know exactly how it works. Cryptocurrency is a digital construct without physical substance; the only evidence of its existence is the digital record or ledger indicating balances held (like a balance sheet) and transactions that have occurred (like an income statement). What ...

Read more

Elder Fraud

Risks in a Post Pandemic Environment The pandemic placed many individuals into an environment where they had to rely on technology to conduct daily life and the financial transactions associated with it. This was a major change; especially for a generation that was accustomed to handling their banking and financial transactions face to face. Forcing a generation to begin to conduct banking and purchasing on ...

Read more

How to Use a General Ledger to Find (and Stop) Fraud

Spotting Internal Fraud Schemes To identify whether an organization is vulnerable or has been a victim of fraudulent behavior, it is critical to spot common warning signs of internal fraud schemes. The first step is knowing where to look. The company’s general ledger (GL) is a good place to start. It is a book that can tell stories of fraud, manipulation, and betrayal. Unfortunately, few know how to read th ...

Read more

Risk and Fraud

in the Cryptocurrency Economy Although cryptocurrency and blockchain technology create an environment that can help combat fraud within their systems, their introduction into the global economy has opened numerous doors for nefarious activity. This article provides an overview of what is cryptocurrency, blockchain technology, and the rise of threats to digital assets. Fraud used to be much simpler for the f ...

Read more

How Open Source Research Can Advance Your Business Intelligence Work

Employing Open Source Data, OSINT, and SOCMINT in the Due Diligence Phase Today’s accountants specialize in document management, research, money laundering, inter-national banking, e-discovery, and much more. They go even further. They ask to learn about open source research, cryptocurrency, and network-based financial transactions. In this article, the author discusses how to use public record resources, s ...

Read more

Using International Economic Time Series Data in Determining Lost Profits

Forensic engagements that involve determining lost profits or other economic damages often require a “time series” of economic and market data. When the lost profits or other economic damages engagement involves comparing international companies, multi-country economic data, and international market data, the challenges in locating meaningful data become especially difficult. In this article, the authors sh ...

Read more

The Intersection of Advocacy and Financial Forensics

The Role of the Expert in 21st Century Dispute Resolution—A Recovering Judge’s Perspective As technology evolves, the role of the expert and the interplay between experts and the judiciary will evolve. This change is already underway. In this article, QuickRead presents the presentation made by Retired Judge Platt at the NACVA and the CTI’s Annual Consultants’ Conference, held in Salt Lake City. Judge Platt ...

Read more

Money Laundering

In More Ways Than One It seems every few months we read about a financial institution involved in a money laundering scandal. The bank typically agrees to pay a fine, promises to behave, hires consultants to monitor and report to the regulators, and the scandal is generally forgotten. You may ask what do the consultants do and what do they monitor? This article will discuss the development of two recent sca ...

Read more

Ownership, Specificity, and Brevity

(OSB) The OSB technique is indispensable to establish veracity when hearing or reading questions and answers, such as deposition transcripts, expert report content and even daily conversation. You can (and should) use the OSB mnemonic in most of your public and private communications, including if you provide expert witness testimony. And, once you begin applying the technique you will find it indispensable ...

Read more

The Pink Elephant in the Courtroom

Un-Impeaching Opinions of Calculated Values Valuation or calculation? That is the question asked, answered, and argued by judges, experts, lawyers, and industry thought leaders apropos to whether a calculation of value can be used in litigation. The answer echoed throughout courtrooms across America thus far is a resounding “it depends.” This article offers a synopsis of the debate over calculation engageme ...

Read more

Condition, Cause, and Outlook

Case Study on the Use of Visuals to Track Revenue, Expenses, and Process What is CCO? How is it used? The CCO technique has no traceable origin, but its application is self-evident and imminently practical. The technique is typified by its initialism, i.e., CCO that self-describes the process: what is the condition underlying the problem(s), what is the cause of the underlying problem(s), and what is the ou ...

Read more

“Left of Bang”

Behavior Detection in Forensics The United States Marine Corps (USMC) has deployed behavior detection techniques for years, most recently in counterterrorism actions. Marines are taught the techniques during their Combat Hunter Course so that bad guys can be detected before they can do bad things. “Left of bang” means before the bad things happen; “right of bang” means that bad things have already happened, ...

Read more

©2024 NACVA and the Consultants' Training Institute • Toll-Free (800) 677-2009 • 1218 East 7800 South, Suite 301, Sandy, UT 84094 USA

event themes - theme rewards

Scroll to top
G-MZGY5C5SX1
lw