15 Jun 2022

415

Teledata Communications, Inc. Fraud

Format: APA

Academic level: College

Paper type: Research Paper

Words: 1027

Pages: 3

Downloads: 0

Plan and coordinate an investigation in a manner that would not arouse suspicion from Cummings and Baptiste. 

Most organizations are faced with the challenge of being exposed to fraud, particularly from the employees working in the company. The cause of fraud is common nowadays and has been increasing, primarily due to the rise in technological inventions and other internet platforms that tend to make the criminal process easier. Taking this case into consideration, the best way to investigate this case is through the use of surveillance methods. Most investigative agencies such as the Federal Bureau of Investigation have deploy the use of this approach especially if want the suspects to not suspicious of whatever is going on. It means that the process will be carried out secretly through all possible legal means that will not damage the name of the company (PInow, 2020). Some of the ways that a successful surveillance process can be carried out are through the installation of secret cameras, wiretapping and microphones for recording whatever is going on with the suspect's activities. This method will be crucial in monitoring Cummings and Baptiste’s use of social media, phones and email. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Additionally, this method can also be accomplished with simple steps such as following or tailing the suspect and also observing the suspect's daily routine and activities. The purpose of following or tailing the suspects is for the investigators to know whether the suspect is going or talking to the wrong people or places. The reason for recording the suspect's conversation will be done to establish whether the act of fraud is a collaborative activity or not, as it can be seen in the case that it involves more than one person. The investigators can also think of getting a legal permit that will allow them to trace calls, bank accounts, messages as well as emails of the suspect to establish how they plan and execute the fraud (Albrecht et al., 2011). Additionally, the information will also help the investigators determine where the suspects are not only saving their money but the victims as well as the amount of money stolen. 

Create a vulnerability chart to coordinate the various elements of the possible fraud. 

Information Taken  The fraudsters were able to take and tamper with the confidential information about clients and transfer money from their accounts through data stored in Teledata Company. 
Fraud chances  Philip Cummings was the employee who was entrusted with the clients' data and worked as the customer service representative of the company. This position makes him more vulnerable to crime. 
Movement of the Assets  The assets were moved using the clients' data that was stored in the company where they used it to access the bank accounts of the clients. 
Modes of Concealing the Fraud  In order to hide their devious acts, they had to change the addresses of the clients. This was done in the aim of preventing the clients from receiving notifications regarding the transactions. 
Conversion of the Assets  Most likely, the money was being transferred into the suspects' accounts or cashed in using the ATM that was recently ordered. 
Suspicions  The company was suspicious of the fact that some clients were complaining of not getting their bank statements despite the suspicious balances that proved to be incorrect. Additionally, the credit cards used by the suspects showed increasing debts that were not accounted for. 
Reasons  Considering that Philip Cummings is well-paid, then the reason for the criminal act would be greed and not lack of enough pay. 
Measures taken  More restriction measures were taken and authorization given only to authorized personnel. 
Recommendations  More measure should be put in place to ensure that such act does not happen in future. This can be done by installing more CCTVs and employing a whistle blower who will report such suspicious activities if they were to take place again. 

Assuming your investigation used surveillance and/ or covert investigation techniques, what types of surveillance and/or covert operations would you use? How would technology play a role in this part of the investigation? 

As mentioned earlier, surveillance is the best method of investigation in this particular case since it incorporates types of surveillance modes that will not make the suspect suspicious of the investigations. In this case, almost all kinds of surveillance apply correctly, but it will be most preferably to consider the electronic type of surveillance as it will be most effective for obtaining the evidence. The reason as to why electronic surveillance will best fit for this case is because the company is digitally and technologically equipped with all the latest technological systems that are probably used by the suspects to conduct their fraud activities. Since the company is electronically operated, there is a higher chance that the investigator will find traces of evidence that will be used in court with respect to the fraudulent transactions. Thus, this means that it would be easier for the investigator to analyze and carefully check the company's electronic data using electronic surveillance ( Albrecht et al., 2011). Technology would most definitely play a significant role when using electronic surveillance to investigate the case. The operation would not be possible if the technology does not exist, and conducting an electronic observation would not be an option. Some of the technologies used in the company include servers, computers as well as other digital systems installed in the company, including the company's database and the internet. All the above technologies would be used to investigate both the fraudulent act and the fraud investigation thoroughly. Additionally, the CCTVs that are installed around the company will also help determine the possibilities of where the action is taking place. 

Finally, how would analysis of physical evidence help in this investigation? What types of physical evidence would be especially helpful? 

A case without physical evidence is always weak, and there are high chances of losing such a situation. However, not all instances are physical evidence, the determinant of the case since there are other means of presenting evidence. In some cases, such as criminal acts or theft of inventory, the effectiveness of the case is highly influenced by the presence of physical evidence. Inventories, accounting records, contracts, and invoices are some of the physical pieces of evidence that most investigators consider helpful. In this particular case, some of the things that can be used to get the physical evidence include digital gadgets, for instance, the mobile and laptop of the suspect since it might be where they communicate regarding the fraud ( PInow, 2020). Additionally, the most helpful source of physical evidence for the case will be to conduct a thorough search through the company's systems and the office of the suspects, including all his gadgets. This method will be of great importance since it is where the activities are conducted through the internet and the company system. 

References 

Albrecht, W. S., Albrecht, C. O., Albrecht, C. C., & Zimbelman, M. F. (2011). Fraud examination . Cengage Learning. 

PInow. (2020). Electronic Surveillance. PInow.com . https://www.pinow.com/investigations/electronic-surveillance 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Teledata Communications, Inc. Fraud.
https://studybounty.com/teledata-communications-inc-fraud-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Texas Roadhouse: The Best Steakhouse in Town

Running Head: TEXAS ROADHOUSE 1 Texas Roadhouse Prospective analysis is often used to determine specific challenges within systems used in operating different organizations. Thereafter, the leadership of that...

Words: 282

Pages: 1

Views: 94

The Benefits of an Accounting Analysis Strategy

Running head: AT & T FINANCE ANALLYSIS 1 AT & T Financial Analysis Accounting Analysis strategy and Disclosure Quality Accounting strategy is brought about by management flexibility where they can use...

Words: 1458

Pages: 6

Views: 82

Employee Benefits: Fringe Benefits

_De Minimis Fringe Benefits _ _Why are De Minimis Fringe Benefits excluded under Internal Revenue Code section 132(a)(4)? _ De minimis fringe benefits are excluded under Internal Revenue Code section 132(a)(4)...

Words: 1748

Pages: 8

Views: 197

Standard Costs and Variance Analysis

As the business firms embark on production, the stakeholders have to plan the cost of offering the services sufficiently. Therefore, firms have to come up with a standard cost and cumulatively a budget, which they...

Words: 1103

Pages: 4

Views: 180

The Best Boat Marinas in the United Kingdom

I. Analyzing Information Needs The types of information that Molly Mackenzie Boat Marina requires in its business operations and decision making include basic customer information, information about the rates,...

Words: 627

Pages: 4

Views: 98

Spies v. United States: The Supreme Court's Landmark Ruling on Espionage

This is a case which dealt with the issue of income tax evasion. The case determined that for income tax evasion to be found to have transpired, one must willfully disregard their duty to pay tax and engage in ways...

Words: 277

Pages: 1

Views: 121

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration