the use of technology to combat fraud
DESCRIPTION
The Use of Technology to Combat Fraud. Colin Farley ACII FCILA. Data entry into I Base. Link charting using I2 Analyst Note Book & I Base. The global view of all connections. A close up view of one of the main organisations. All connections to this organisation. - PowerPoint PPT PresentationTRANSCRIPT
The Use of Technology to
Combat Fraud
Colin FarleyColin FarleyACII FCILAACII FCILA
Data entry into I Base
Link charting using I2 Analyst Note Book & I Base
The global view of all connections
A close up view of one of the main organisations
All connections to this organisation
Lateral thinking to explore connections
Vehicles connected to key person and organisation
Persons using the same telephone number
Connections to the ‘ring leader’ or key person
Forensic Document Analysis
Microscopic Examination of Microscopic Examination of DocumentsDocuments
ESDAESDA Video Spectrum Comparator (VSC)Video Spectrum Comparator (VSC)
Forensic Document AnalysisForensic Document Analysis
To authenticate official documents and
For comparison of type/styles and handwriting
To reveal indentations or erasures on a document.
Forensic Document AnalysisESDA
To reveal indentations or erasures on a document.
Identification of alterations to documentsIdentification of alterations to documents where different inks have been usedwhere different inks have been used
Video Spectrum ComparatorVideo Spectrum Comparator
Video Spectrum ComparatorVideo Spectrum ComparatorVSC
Identification of alterations to documentsIdentification of alterations to documents where different inks have been usedwhere different inks have been used
InternetInternet‘Connecting People’‘Connecting People’
QuestionsQuestions
John FreemanJohn Freeman
&&
Colin FarleyColin Farley