What Clues Caused Jane To Suspect That Fraud Was Involved?

Decent Essays
1. What clues caused Jane to suspect that fraud was involved?
The first clue that Jane came across as suspicious was that some of the checks did not have a complete endorsement from the collectors. This would be suspicious because if a check was cashed without having the necessary endorsements there must be a breach in the company’s internal controls. After looking further into the situation Gus and Jane notice that along with the endorsement problem the signatures of several different individuals looked very similar. Finding forgery is a big red flag because it is illegal to forge someone’s signature. Not only were the checks forged by what they suspected was one individual, the checks that had been signed were all cashed in at the same convenience store as rushed payments. Not only was it close to their place of employment, but it was out of the way for most of the individuals whose names were on the checks lived.
2.
…show more content…
Why is it important for fraud examiners to follow up on even the smallest inconsistencies?
It is important for a fraud examiner to follow up on the smallest inconsistencies because not only is it what they are trained for but inconsistencies in reporting be the biggest indication that something major is going on. Fraud examiners must consider that the smallest inconsistencies are caused by someone trying to fabricate a plot to steal. A fraud examiners job is to study every inconsistency to uncover any fraudulent crime committed.
3. In an attempt to identify possible suspects, the auditors researched the personal files of every employee in the department. What things might they have been looking for to help them identify possible suspects?
They were looking for people who might have a motive to steal from the company including financial hardships an employee recently went through to those who would have access to that part of the

Related Documents

  • Improved Essays

    The Unusual Suspect Cases

    • 989 Words
    • 4 Pages

    Case Study: The Unusual Suspect According to the case The Unusual Suspect, Diann had committed an embezzlement fraud that she pleaded guilty to embezzling approximately $500,000 from her employer and she was sentenced for 18 months in Florida prison. Diann's fraud scheme is a form of an anti-organizational crime, and she had committed several types of the fraud schemes such as: First, she started to mistakenly pay for her vacation expense through her company’s account, Second, she called the payroll company and told the company to make changes to her salary range. Third, she made duplications of her bonus checks.…

    • 989 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Armando stated that he was not the one that attempted to withdrawal the money as he knew he had a balance of zero dollars. The teller provided Armando with a print out of the two checks that someone had used in an attempt to withdrawal…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Achievements this week: 1. Drafted a professional recommendation for Duncan Karcher to ask data from square trade for auditing Purposes. We did receive the data from square trade to the same affect which had all the data fields requested. 2. Queries posed by Devin at Square trade were analyzed and answered.…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    1. What are the danger to the system? There numerous dangers that can put your system at danger, for example, infections, spyware, worms, Trojans and PC programmers. Your systems are additionally helpless excessively critical who perpetrate cybercrimes. 2.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Miranda Vs Arizona Essay

    • 925 Words
    • 4 Pages

    In all of the cases stated, suspects were questioned by various…

    • 925 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Professional Interview A medical biller responsibility in a healthcare facility is to follow the claim to ensure that the practice receives reimbursement for the work that the providers perform. A medical biller also review hospital and patient records, examine and submit claims, answer patient questions, calculate charges, and manage payments. In this interview we will learn the difference between an NPI and a TIN number, explains what a EOB/ERA is, the difference between a deductible, co-pay and co-insurance, the three (3) common mistakes for a claim denial, and the seven (7) step process to submitting an electronic claim. Difference between an NPI and TIN number…

    • 599 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    It would also be important to look into transaction descriptions. It is often the case that a fraudulent transaction will be paired with very little or no description at all. Through pattern and frequency analysis we could single out transactions that prove whether or not this type of entry was in fact fraudulent or not. Understanding industry regularities could also prove to help us in successfully identifying the fraudulent entries in…

    • 1732 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Essay On Eyewitness

    • 989 Words
    • 4 Pages

    Few pieces of evidence are more powerful than an eyewitness to a crime pointing to a suspect in a police lineup and exclaiming “That’s him! He’s the one!” There are also few pieces of evidence more flawed, imperfect, and subject to manipulation by police and prosecutors. Study after study has shown eyewitness identification to be notoriously unreliable. In fact, as the Innocence Project notes: “Eyewitness misidentification is the greatest contributing factor to wrongful convictions proven by DNA testing, playing a role in more than 70% of convictions overturned through DNA testing nationwide.”…

    • 989 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    Why Collect HR Data

    • 1110 Words
    • 5 Pages

    Data Protection Act This act applies to all organisations that process data relating to their staff and customers. It is the main legal framework in UK that protects personal data. The act contains 8 data protection principles which are: Personal data should be processed fairly and lawfully, this can be achieved by asking the employees to use their information, on the employment contract.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    He stated, “The fact that they didn 't catch the fraud leads me to believe that they blew it” (Stewart).The auditors of these funds should have somehow at least tested or dug deeper into the material provided to them to discover whether or not the underlying assets were…

    • 1325 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Criminal profiling is hands down one of the most beneficial forms of offender identification tools that law enforcement has at their disposal. Education on the different forms of criminal profiling is important for both the general public as well as law enforcement. Further, proper use of criminal profiling is a leading method by which law enforcement can reduce recidivism. Knowledge on how each type of profiling is conducted is important because misuse or a misguided procedure for different forms of profiling may lead to faulty results.…

    • 677 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Security benefits, W2’s and paystubs for the Work Number identified employer and fraud period. 10. The designated administrative staff member is responsible for maintaining a daily log of all customers contact information provided by each Investigator. She is also responsible for maintaining a log of each customer’s confirmed face to face interview date and time.…

    • 546 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Assignment 5.3: Role of Investigator Introduction Investigators have an immense role in the criminal justice system. They have to ensure they follow due process, as well as, keeping the integrity of the evidence to prove continuity when entered into court. In the QB trial video, R v. Perry and Manitoba (2016), the investigating officer, Constable York, seized four exhibits: a wallet, a Timex watch, a kitchen knife, and a gun replica, which entered into court as physical evidence. Constable York also testified as a key witness, who then had to undergo a cross-examination by the defence counsel.…

    • 964 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The first thing I would do in processing the crime scene is interview the first officer that arrived at the crime scene to establish a theory of the case. Second I would examine the crime scene to see if the theory of the case is substantiated by what I observed. During this time I would start identifying possible items of evidence, identifying entry and exit points and getting a general outline of the homicide scene. Third, I would take some pictures. Photographing the scene would allow me to record a pictorial view of what the scene looked like undisturbed and to record items that is possible evidence.…

    • 918 Words
    • 4 Pages
    Improved Essays