the use of technology to combat fraud

17
The Use of Technology to Combat Fraud Colin Farley Colin Farley ACII FCILA ACII FCILA

Upload: naif

Post on 19-Jan-2016

43 views

Category:

Documents


0 download

DESCRIPTION

The Use of Technology to Combat Fraud. Colin Farley ACII FCILA. Data entry into I Base. Link charting using I2 Analyst Note Book & I Base. The global view of all connections. A close up view of one of the main organisations. All connections to this organisation. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: The Use of Technology  to  Combat Fraud

The Use of Technology to

Combat Fraud

Colin FarleyColin FarleyACII FCILAACII FCILA

Page 2: The Use of Technology  to  Combat Fraud

Data entry into I Base

Page 3: The Use of Technology  to  Combat Fraud

Link charting using I2 Analyst Note Book & I Base

Page 4: The Use of Technology  to  Combat Fraud

The global view of all connections

Page 5: The Use of Technology  to  Combat Fraud

A close up view of one of the main organisations

Page 6: The Use of Technology  to  Combat Fraud

All connections to this organisation

Page 7: The Use of Technology  to  Combat Fraud

Lateral thinking to explore connections

Page 8: The Use of Technology  to  Combat Fraud

Vehicles connected to key person and organisation

Page 9: The Use of Technology  to  Combat Fraud

Persons using the same telephone number

Page 10: The Use of Technology  to  Combat Fraud

Connections to the ‘ring leader’ or key person

Page 11: The Use of Technology  to  Combat Fraud

Forensic Document Analysis

Microscopic Examination of Microscopic Examination of DocumentsDocuments

ESDAESDA Video Spectrum Comparator (VSC)Video Spectrum Comparator (VSC)

Page 12: The Use of Technology  to  Combat Fraud

Forensic Document AnalysisForensic Document Analysis

To authenticate official documents and

For comparison of type/styles and handwriting

Page 13: The Use of Technology  to  Combat Fraud

To reveal indentations or erasures on a document.

Forensic Document AnalysisESDA

To reveal indentations or erasures on a document.

Page 14: The Use of Technology  to  Combat Fraud

Identification of alterations to documentsIdentification of alterations to documents where different inks have been usedwhere different inks have been used

Video Spectrum ComparatorVideo Spectrum Comparator

Page 15: The Use of Technology  to  Combat Fraud

Video Spectrum ComparatorVideo Spectrum ComparatorVSC

Identification of alterations to documentsIdentification of alterations to documents where different inks have been usedwhere different inks have been used

Page 16: The Use of Technology  to  Combat Fraud

InternetInternet‘Connecting People’‘Connecting People’

Page 17: The Use of Technology  to  Combat Fraud

QuestionsQuestions

John FreemanJohn Freeman

&&

Colin FarleyColin Farley