The correct use of Benford’s Law for fraud detection.
The fingerprints (number patterns) of fraud numbers which are amounts that are round, show a high period-over-period growth, are just above or below some threshold, cause deviations from Benford’s Law, are the duplicates of authentic transactions, are outliers because they are excessively large, and have been purposefully rounded up or down.
Forensic analytics run on purchasing card and purchase order data of the DC government.
A review of the Harriette Walters tax refund fraud case where the millions of dollars of losses could have been avoided by employing some basic detective and/or preventive controls.
A discussion of the South Carolina Charlene Corley government vendor fraud scheme where millions of dollars of losses could have been avoided by using some basic detective controls and/or preventive controls. This case has some cybersecurity attributes.
A review of the Richard Hatch tax evasion case. This case illustrates some interesting aspects of the thought process and defective logic used by fraudsters.
The Nathan Mueller fraud scheme with an emphasis on the preventive and detective measures that would have prevented or detected his fraud scheme.
A review of short fraud cases with an emphasis on the fraud data and preventive measures.
A review of the software package R, and the use of R in forensic analytics (one hour).
A review of Excel and the Nigrini Cycle, and the use of Excel in forensic analytics (one hour)
A review of Tableau and it’s use in forensic analytics (30 minutes).
A review of other analytics-related technologies including IDEA and others (one hour).
A hands-on case study related to purchasing card fraud (one hour).
The conclusion will discuss the Susan Thompson fraud case and the issues involved with getting a prosecution and sentence for corporate fraud.