Forensic Accountants

advertisement
ACCT341, Chapter 11
A. Skim through Ch. 11 and answer the following questions. Note that surveys of accountings and
finance executives consistently show that cybersecurity is one of their top concerns regarding
operational risks and internal controls.
1. Do you think Adrian Lamo should have been arrested? Why or why not?
2. What is a logic bomb? T or F: Donald Burleson created a deadly logic bomb
that exploded, although damage was less than it could have been.
3. How did the manager at King Soopers supermarket steal $2 million?
Adrian Lamo
4. Why should IRS processing centers not have windows near their computers?
5. When managers fire disgruntled employees, why should they give a surprise notice in person,
allow the employees time to clean out their desks/offices, ask for their keys, have IT change
their passwords, and otherwise be physically present with them until they leave the premises?
6. Common approaches to obtaining passwords include phishing and social engineering. Do you
think it is illegal to obtain a password, even if you don’t end up using it?
7. What is data diddling and how did TRW (Experian) employees diddle the data?
8. For what reasons do people hack? What is the maximum penalty for hacking? What is an
ethical hacker?
9. T or F: Though the Slammer Worm cost over $1 billion, they did eventually catch and punish
the culprit.
10. What is the difference between a computer virus and a worm?
11. Apparently hackers love Trojans.
(A) What is a Trojan?
(B) If you remember history at all, why are these viruses called “Trojan Horses?”
12. What is social engineering and how can these efforts be thwarted?
13. Kevin Mitnick is likely the world’s most famous hacker who used social engineering to gain
access to information. For example, he would pretend to be an employee who forgot the
password and would ask for it. After serving about 5 years in jail, he was released in 2003.
According to the article below:
(A) What is Mitnick doing today?
(B) What was Mitnick’s first illegal act at the age of 12.
(C) What did Mitnick do at a 2014 conference in Las Vegas to prove how easy it is to
perpetrate identify theft?
14. What is a lockout system? Have you personally ever been locked out?
15. If you prepared official-looking but bogus invoices for under $300 of office supplies and
mailed the invoices to hundreds of companies, how many companies do you think would
actually pay the fake invoice? (This actually happened! See Case-in-Point 11.7)
16. When you get rid of an old computer, why should the disk drives be reformatted (either
formally or with a sledge hammer? (See Case-in-Point 11.9).
17. Does most computer fraud succeed because of the failure or the absence of controls? Why?
18. (A) According to your text, what do forensic accountants (or fraud auditors) do and who do
they usually work for?
(B) For the next few questions refer to the article at the end of this document. What are the
future job prospects for forensic accountants?
(C) What skills do forensic accountants need?
(D) What credentials does forensic accounting require?
19. (A) Define dumpster diving, phishing and smishing.
(B) Have you ever been phished before? Explain.
(C) At the end of this document is an email that I received supposedly coming from Bank of
America. Do you think this is a legitimate email from Bank of America?
20. At the end of this document is short piece explain the Salami Technique.
(A) What is the Salami Technique and how did it get its name?
(B) Complete Problem 11-14 from the back of the chapter.
Kevin David Mitnick
Kevin Mitnick (born August 6, 1963) is a controversial computer hacker and convicted criminal in the United States.
Mitnick was convicted in the late 1990s of illegally gaining access to computer networks and
stealing intellectual property. Though Mitnick has been convicted of computer related crimes and
possession of several forged identification documents, his supporters argue that his punishment
was excessive. In his 2002 book, The Art of Deception, Mitnick states that he compromised
computers solely by using passwords and codes that he gained by social engineering. It is
notable that Mitnick did not use software programs or hacking tools for cracking passwords or
otherwise exploiting computer or phone security.
Mitnick served five years in prison, of which four and a half years were pre-trial, and eight months
were in solitary confinement.[1] He was released on January 21, 2000. During his supervised release, which ended on
January 21, 2003, he was initially restricted from using any communications technology other than a landline telephone.
Mitnick fought this decision in court, and the judge ruled in his favor, allowing him to access the Internet. Today, Mitnick
now runs Mitnick Security Consulting, a computer security company that tests corporate security systems.
Early life
Kevin Mitnick began social engineering or perhaps discovered his first engineerable situation at the age of 12. He
realized he could bypass the punchcard system used for the Los Angeles bus system: by buying his own punch, he
could get free bus rides anywhere in the greater LA area. Social engineering became his primary method of obtaining
information, whether it be user names and passwords, modem phone numbers or any number of other pieces of data.
In high school, he was introduced to phone phreaking, the activity of manipulating telephones which was often used to
evade long distance charges for his benefit. Mitnick also became handy with ham radios; using such equipment, Mitnick
reportedly managed to gain unauthorized access to the speaker systems of nearby fast food restaurants, that way when
drive-thru customers gave their orders, Mitnick would heap insults upon them.
Computer hacking
Mitnick gained unauthorised access to his first computer network in 1979, when a friend gave him the phone number for
the Ark, the computer system at Digital Equipment Corporation (DEC) used for developing their RSTS/E operating
system software. He broke into DEC's computer network and copied DEC's software, for which he was later convicted.
This was the first of a series of run-ins with the law. Mitnick gained unauthorized access to dozens of computer
networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied
valuable proprietary software from some of the country's largest cellular telephone and computer companies. Mitnick
also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail.
Mitnick was apprehended on February 15, 1995, in Raleigh, North Carolina. He was found with cloned cellular phones,
more than 100 clone cellular phone codes, and multiple pieces of false identification.
Acts by Kevin Mitnick
Using the Los Angeles bus transfer system to get free rides
Evading the FBI
Hacking into DEC system(s) to view VMS source code (DEC reportedly spent $160,000 in cleanup costs)
Gaining full admin privileges to an IBM minicomputer at the Computer Learning Center in LA
Hacking Motorola, NEC, Nokia, Sun Microsystems and Fujitsu Siemens systems
Alleged
Stole computer manuals from a Pacific Bell telephone switching center in Los Angeles
Read the e-mail of computer security officials at MCI Communications and Digital
Wiretapped the California DMV
Made free cell phone calls
Hacked SCO, PacBell, Pentagon, Novell, CA DMV, USC and Los Angeles Unified School District systems
Recent activity
Kevin Mitnick is now a professional computer consultant (doing business as Mitnick Security Consulting, LLC), and has
co-authored three books on computer security: The Art of Deception (2002) (Co-authors William L. Simon and Steve
Wozniak), which focuses on social engineering; The Art of Intrusion (2005) (Co-author William L. Simon), focusing on
real stories of security exploits; and Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker, a
autobiography. At the 2014 annual Las Vegas hackers convention DEF CON, Kevin Mitnick asserted that he could
steal anyone's identity in 3 minutes. He defended this assertion by discovering online the Social Security number of a
single volunteer from the DEF CON audience.
Forensic Accountants
By Peter Vogt
An employee embezzles millions of dollars from his company, but he doesn't know his firm is on to him. To
combat his schemes, the company brings in a forensic accountant, a professional with a combination of
financial expertise and investigative prowess, to determine exactly what's going on.
Eventually, the forensic accountant uncovers the fraud, gathers evidence, and turns it over to the FBI. The
employee gets convicted and goes to prison.
This is not the plot of the latest Hollywood blockbuster, or the latest corporate accounting scandal for that
matter. This is a typical example of a day's work for a forensic accountant.
Given the amount of money organizations lose to fraud and abuse -- an estimated $1 trillion billion last year
alone, according to a study by the Association of Certified Fraud Examiners (ACFE) -- it's no wonder forensic
accounting is one of the fastest-growing sectors, not just of the accounting field but of the world of work as a
whole.
According to Accounting Today, nearly 40 percent of the top 100 accounting firms in the US are now
expanding their forensics-related services. US News & World Report calls forensic accounting one of the "20
hot job tracks of the future," and two-thirds of the companies that responded to a national study by Kessler
International, a forensic accounting and investigation firm based in New York City, say they've either used the
services of a forensic accountant already or have considered doing so in the recent past.
"Fraud can sometimes be the difference between a company posting a profit or a loss," says Michael Kessler,
president and CEO of Kessler International. "Our survey's results are indicative of the tightening economy
that is causing companies to hunt down any threat to their financial well-being."
Private companies aren't the only ones asking forensic accountants to hunt for wrongdoing. Government
agencies like the FBI, the Internal Revenue Service, and the Bureau of Alcohol, Tobacco and Firearms have
forensic accountants who investigate everything from money laundering and identity-theft-related fraud to
arson for profit and tax evasion. Law firms often use forensic accountants to help divorcees uncover their
exes' hidden assets. In recent months, forensic accountants have uncovered instances of companies cooking
the books to falsely inflate company profits, minimize losses or divert large amounts of money to company
leaders.
Well, it's no wonder that the number of forensic accountants is on the rise. If you'd like to join their ranks,
here's what you can do now to prepare for this field.
Develop Your Detective Abilities and Your Financial Skills
"Forensic accountants must have the skills of both a private investigator and an accountant," says Kessler.
That means your analytical abilities and research skills will be as essential to your success as your eventual
financial experience, including knowledge of accounting procedures (proper and improper).
Get the Appropriate Credentials
Most forensic accountants have a bachelor's degree in accounting, and many have additional academic
preparation in fields like criminal justice or law enforcement. The field generally requires that you have your
Certified Public Accountant (CPA) designation.
Expect to earn anywhere from up to $65,000 a year in your first entry-level position in the forensic accounting
field. Once you've accumulated a few years of experience, you will usually see an annual salary of six figures.
It's not uncommon for veteran forensic accountants to make several hundred thousand dollars a year.
To increase your value as a forensic accountant, you can take the Certified Fraud Examiner (CFE) exam,
administered by the ACFE. By earning this credential, you'll show prospective employers that you "exemplify
the highest moral and ethical standards" of the profession and you have, in ACFE's terms, "the ability to
conduct complete, efficient, thorough and ethical fraud investigations."
Exclusively
for:
Bruce J. Toews
Consolidate your balances. You could
make just one monthly payment.*
Complete a balance transfer today, and you
could make just one monthly payment.
It's time to make things simple. Managing your
finances can be a breeze when you consolidate
your balances online. You could have just one
monthly payment, it's the perfect opportunity to:



Take a well-deserved vacation.
Consolidate higher-rate bills.
Free up money for other expenses.
It only takes a moment to transfer balances to
your Bank of America® credit card. With a click,
you can transfer higher-rate balances. It's a
great way to make life easier. Just click to open
a world of new possibilities for yourself. Go to
bankofamerica.com/easybt to transfer balances.
Your account number ending in:
XXXX
Your credit line is:
$XXXXX
Click here to:



Complete a balance
transfer.
Simplify your finances.
Have one convenient
monthly payment.
SALAMI TECHNIQUE
Origins: As the banking industry replaced manual bookkeeping with computerized systems as a
means of keeping track of customer accounts, they unknowingly opened the door to a type of
embezzlement that had previously been difficult (if not impossible) to successfully pull off on a large
scale: the 'salami' technique. This was a scheme by which a bank employee (usually a computer
programmer) could surreptitiously stockpile a substantial amount of money not by grabbing large
sums all at once, but by 'slicing' off 'thin' amounts of cash from many different customers' accounts
and diverting them to one central account (which he controlled), thereby building up a tidy nest egg
while minimizing the risk that any single instance of his theft would be detected and investigated.
Thomas Whiteside reported a supposedly real example of this technique in action in 1978's Computer Capers:
The embezzler was evidently using the bank's computer to transfer twenty or thirty cents at a time, at random, from 300 checking
accounts at the bank and diverting the money to a dummy account for his own use. The computer criminal was careful never to
divert sums from any particular account more often than three times a year. Because a customer was unlikely to notice such a small
discrepancy in his monthly bank statement — or, if he did notice it, to find it worth his while to go to the bank and argue over it —
the embezzlement was likely to go on and on.
One way of taking the salami technique a step further was for the embezzler to cover his tracks by making even his small thefts of
a few cents at a time look legitimate:
Two programmers who were employed by a big New York garment firm instructed the company's computer to increase by two
cents the amount withheld from their fellow-employees' paychecks each week for federal taxes. They further programmed the
computer to direct the two cents per employee per week to their own federal withholding accounts. The result was that at the end
of the year they received the money in the form of refund checks from the Internal Revenue Service, which had been acting as an
unwitting bagman for the embezzled sums.
Even better was a variation of this technique in which the vanished sums were so unnoticeably small that they could be uncovered
only through the most rigorous of audits:
One way in which the computer criminals might employ the salami technique is to round down any sums ending in fractions to the
nearest whole number — for example, fractions of pennies as these are computed in interest-bearing accounts. In the meantime,
the criminal has established a dummy account at the same bank, and he programs the computer to divert the surplus from the
round-downs to this account. Quietly accumulating year in and year out, these fractional sums can mount handsomely, and usually
neither the bank nor the depositors know what is going on.
Legend has it that one unlucky thief who tried this last method fell victim to a fluke of a company promotion and was caught:
A programmer working at a mail-order sales company had its computer round down odd cents in the company's sales-commission
accounts and channel the round-downs into a dummy sales-commission account he had established under the name of Zwana. He
had invented the name Zwana because he knew that the computer processed the company's accounts in alphabetical order, and he
could easily program the computer to transfer all the round-downs into the last account in the computing sequence. The system
worked perfectly for three years, and then it failed — not because of a logical error on the culprit's part, but because the company,
as a public-relations exercise, decided to single out the holders of the first and last sales-commission accounts on its alphabetical
list for ceremonial treatment. Thus Zwana was unmasked, and his creator fired.
Sightings: The salami scheme is a factor in the plot of several films: 1983's Superman III, 1995's Hackers, and 1999's Office Space.
Read more at http://www.snopes.com/business/bank/salami.asp
Download