0 valutazioniIl 0% ha trovato utile questo documento (0 voti)
17 visualizzazioni44 pagine
Identify and gather relevant data -Vendor Listing, employee listing, secretary of state websites, land and property records, invoices, email, Facebook. If there is a conflict of interest, look for it in the data.
Identify and gather relevant data -Vendor Listing, employee listing, secretary of state websites, land and property records, invoices, email, Facebook. If there is a conflict of interest, look for it in the data.
Identify and gather relevant data -Vendor Listing, employee listing, secretary of state websites, land and property records, invoices, email, Facebook. If there is a conflict of interest, look for it in the data.
October 31, 2012 Geocoding Tools: Google Earth, Batchgeo 2 Data Analytics
3 Data Analysis Process 1) Identify & gather relevant data
2) Process that data with an appropriate tool
3) Analyze output generated by that tool
4 Search for Conflicts of Interest 1) Identify & gather relevant data -Vendor Listing, Employee Listing, Secretary of State Websites, Land and Property Records, Invoices, Email, Facebook 2) Process that data with an appropriate tool -Relationship Mapping Software such as IBM i2 Analysts Notebook, Node XL or Gephi
3) Analyze the output generated by that tool
5 Identify and Gather Relevant Data Christopher Andrews is an employee of Diamond Design Jackal, Inc. is a vendor of Diamond Design Jerome Johnston is an owner of Jackal, Inc. Jerome Johnston is also an owner of Imperial Design Imperial Design shares an address with Coldwater Constructors Beth Woodard is an owner of Coldwater Constructors Beth Woodard has the same phone number on file as Jerome Johnston, & they are married Slimline Architects sends invoice to Jackal, Inc., which is then marked up by Jackal, Inc. & sent to Diamond Design Eugene Graham is an owner of Slimline Architects Steve Andrews is the father of Christopher Andrews Steve Andrews is an owner of Imperial Building Imperial Building is a vendor of Diamond Design 6 Process that Data with an Appropriate Tool 7 Analyze the Output Generated by that Tool 8 11
Tools: Analysts Notebook, Node XL, Gephi 12 Relationship Mapping Degree Number of links to other entities Find entities who may be the most active in the network based on number of direct links to other entities
Betweenness Number of paths through each entity Find gatekeeper entities who may control information flow between different parts of the network
Closeness/Centrality Proximity of entity to other entities Find entities who may have the best access to other parts of the network & visibility of activities within the rest of the network
Eigenvector (Hubs/Authorities) Closeness to key players Find entities that may have strong influence in the network due to their direct links to other highly active or well connected entities 13 Social Network Analysis Relationship Mapping Social Network Analysis Degree Number of links to other entities Find entities who may be most active in the network based on the number of direct links to other entities 14 Relationship Mapping Social Network Analysis Betweenness Number of paths through each entity Find gatekeeper entities who may control information flow between different parts of the network
15 Relationship Mapping Social Network Analysis Closeness/Centrality Proximity of entity to other entities Find entities who may have the best access to other parts of network & visibility of activities within the rest of the network
16
17 Theatre Map 18 Theory 1: Tickets Sold at a Price of Zero (Comped) 19 Theory 2: Unsold Seats were Actually Sold at Zero Cost, Then Reclassified as Unsold 20 Theory 3: Tickets Sold Below Market 21 Applicability to Other Companies All Companies Payment detail, payroll detail, vendor listing, employee listing, general ledger detail Manufacturing Cost of goods sold & inventory detail Health care Patient accounting detail Banking Loan maintenance file Every company has unique data that should be considered
22 Sequential Checks to the Same Vendor Tools: ACL, Access, Excel, or IDEA 23 Missing Checks Tools: ACL, Access, Excel, or IDEA 24 Other Data Mining Procedures indicative of a Vendor/Billing Scheme Name similarity (phonetics, acronyms, etc.) Acceleration (systematic spending increases) Employee address matches customer/vendor address Customer Tax ID matches another customer Tax ID Customer/vendor phone number matches employee phone Duplicate invoices or slightly altered attributes Sudden spike in invoice volume or activity Missing contact information (address, phone, names) High volume of transactions ending in 0 or 5 Unusual activity compared to similar vendors or customers Weekend or holiday transaction dates Transactions processed at unusual hours Address is PO Box, maildrop, prison Dormant account suddenly active
25 Computer Forensics Computer Forensics Computer forensics (more accurately digital forensics) is the science of recovering digital data in a manner that will withstand courtroom scrutiny Must follow proper chain of custody procedures Must maintain data integrity Not strictly an IT pursuit Typically includes analysis in addition to recovery, which includes review of deleted files, unallocated clusters & metadata 27 Not Only Computers 28 E-discovery Discovery of evidence in an electronic format, also referred to as electronically stored information (ESI), searched in the course of litigation
Covers a variety of data, including documents, email, audio files, photos, metadata & more 29 Computer Forensics E-Discovery STEP 1: Acquisition STEP 2: Analysis/ Review Computer Forensics Technician Computer Forensics Technician Lawyers & Other Investigators Computer Forensics Technician 30 Predictive Coding Analysis & identification of relevant electronic data assisted by artificial intelligence
Also known as Technology-Assisted Review 31 Growth of Unstructured Data
Explosion of text data + Rapid growth in storage capacity + Over 95% of data never leaves the digital domain = Overwhelming volume to review by traditional means
32 Evolution: Keyword Search Brute force search for exact, specific term car 33 Evolution: Thesaurus search Expansion of original term, but still applied as a brute force search car automobile auto motorcar 34 Evolution: Hyper-Thesaurus search Expands to troponyms, hypo/hypernyms, meronyms, entailments, slang, etc automobile auto motorcar tire engine hood chrome headlights car vehicle garage freeway parking lot ride hotrod clunker beamer Mustang Ford A8 Chevy 35 Evolution: Concept Searching Performs true latent semantic analysis machine learning of text to do find more like this searches
To: Vendor From: Employee --------------------------------------------- Thank you for the gift it looks great in my driveway! I cant wait to take it out on the open road. I promise I wont tell anyone where it came from.
Documents related to topic Emails related to topic 36 Evolution: Predictive Coding Uses concept search technology but incorporates statistical predictions of relevance based on observation of & interaction with, the user Senior attorney codes an initial sample set as relevant or not Artificial Intelligence learns from this set & presents another Iterations continue until predictions match reality Alternative approach AI watches reviewers as they code documents & learns from them, then begins presenting predicted relevant documents
37 Issues Courts still largely undecided its a legal minefield Works best on documents rich in text (email, word processing, PDFs, etc.) it doesnt on spreadsheets, databases & others Multi-lingual data sets can cause strange results Our experience has shown it to struggle with jargon, abbreviations, innuendo, sarcasm, slang & effect of emoticons Can only predict relevance based on what you teach it it doesnt have a crystal ball
38 Best Uses In litigation, only in large cases & by agreement of both parties & consent of the court Early case assessment (ECA) to rapidly identify relevant material or to cull down corpus to a more manageable size Post-review quality control helps answer What did we miss? Forensic investigations as a supplement to traditional computer forensics & data mining efforts
39 Summary 40 James A. Snyder J.D., CFE | Managing Partner | 816.701.0260 | jsnyder@bkd.com Tom Haldiman CPA, CFE | Supervising Consultant | 816.221.6300 | thaldiman@bkd.com BKD Forensics Institute Upcoming Schedule Deciphering Financial Statements: Tips & Tricks for Attorneys o Wednesday, November 7, 2012 o 11:30 a.m. 12:30 p.m. CST o Presented by Jeff Roberts, CPA, CFE, CFF
Data Visualization: Taking Your Analytics from Blah to Bam! o Wednesday, November 14, 2012 o 11:30 a.m. 12:30 p.m. CST o Presented by Jeremy Clopton, CPA, ACDA, CFE bkd.com/fi
42 Starbucks Gift Card & Certificate To help promote the event as an associate training tool, we are offering a bonus o Associates who attend all three sessions will receive a Starbucks gift card & Certificate of Participation from BKD
43 Slides & Webinar Archive Todays presentation slides are available at bkd.com/fi. A recorded copy of the webinar will be available at the same location at the conclusion of webinar series
If you have any questions, please contact Dane Ryals @ dryals@bkd.com