Forensics Journal - Stevenson University 2015 | Page 48

STEVENSON UNIVERSITY is legally admissible as evidence in U.S. criminal cases at the federal, state, and local levels. This fact alone substantiates the potential usefulness of using Benford’s Law” (Singleton, 2011). Conversely, one disadvantage of Benford’s Law is the large-scale approach used to detecting fraudulent information. A Benford’s Law analysis populates a broad view of where the fraud could be taking place, instead of a narrowly focused view. This broad view could waste the time and resources of forensic accountants who are searching through a wide array of fraudulent possibilities. DATA MINING SOFTWARE Data mining software is a tool utilized by forensic accountants to “look for patterns in large batches of data” (“Data Mining,” 2014). Data mining is useful in tracking terrorist’s financial sources because it is capable of discerning unusual patterns and identifying outof-the-ordinary transactions (not attributable to normal business transactions). The Department of Homeland Security (DHS) uses data mining tools to collect an individual’s identifying markers. Some of these markers include educational or employment background and financial transactions “that contain [the] name or the identifying number…assigned to the individual” (5 USC 552a, 1975). DHS utilizes data mining software in an effort to protect citizens from terrorists and national threats of terrorism. However, personal information is sometimes used against the same citizens it was meant to protect. One example of DHS using personal information against a United States citizen was in 2012. DHS used social media monitoring to single out a photographer for the local Miami-Dade Police. The photographer, Carlos Miller, “was going to be taking photographs of the protests at Occupy Miami. DHS said their [practice of ] Facebook monitoring is a normal procedure” (Smith, 2013). However, Miller felt DHS infringed on his Constitutional rights. ACCOUNTING COMMAND LANGUAGE (ACL) SOFTWARE Accounting Command Language (ACL) software aids forensic accountants who analyze transaction data to identify risk and compliance within an organization, and has transformed the way “risk and compliance groups identify, investigate, and mitigate business risks” (“Products,” 2014). Forensic accountants utilize ACL software to uncover instances of fraud, lapses in internal controls, and the misappropriation of funds, as well as quickly analyze and log transactional data to seek instances of duplicate and overpriced vendor invoices, employee mismanagement of funds, fictitious vendors, and other instances of fraud, waste, and abuse. The best use of ACL software is to analyze business records (i.e. payroll and accounts payable and receivable) for company fraud. ACL is also applicable in small businesses that do not house a large amount of data such as small not-for-profits and charities. Interactive Data Extraction and Analysis (IDEA) software is better equipped to handle the size and brevity of large data sets of information. An audit report produced by the Government Accountability Office (GAO) noted misuse by the DHS of data mining techniques. They found DHS shared information from the Immigration and Customs Enforcement Pattern Analysis as well as the Information Collection program with state and law enforcement agencies thereby violating privacy rules (United States Government, Accountability Office). The GAO investigated the Analysis, Dissemination, Visualization, Insight, and Semantic Enhancement (ADVISE) data mining tool to determine if privacy risks and inadequate controls were present. The ADVISE data mining tool analyzed the relational data patterns among people, organizations and events, producin