SlideShare a Scribd company logo
1 of 9
Download to read offline
MICHIGAN INVESTIGATIVE GROUP




     … Looking out for you
I N S U R A N C E F R AU D
Fraud/SIU Team:
MIG has created a dedicated fraud control team with specialized expertise and resources committed to
minimizing the adverse effects of fraud for its industry clients. Our fraud investigators sole focus is to provide
professional, timely, quality and cost-effective investigative services to the insurance industry from inception
to final disposition.

Michigan Investigative Group investigators help clients reduce exposure of losses, recover fraudulent claims
costs and prevent unwarranted risks in a cost-effective manner.


Due Diligence Surveillance:
A background check and extensive review of the case is conducted to assess the true exposure and validity of
a prospective claimant for our client‘s. Information is verified and all documentation obtained is supplied to
the client to better assist their claim management. Why should due diligence investigations be conducted?
Because clients always want to take as little risk as possible and must be assured that any monies allocated or
advanced will be worth that risk. By utilizing the MIG investigative team, our clients have witnessed and
testify that their claims are handled efficiently and economical to aggressively reduce the fraud exposure.




                     MICHIGAN INVESTIGATIVE GROUP                                     (800) 723-4580
I N S U R A N C E F R AU D c o n t …
MIG – Fraud/SIU Investigators specialize in :
 Surveillance
 Neighborhood Canvassing
                                          Digital Video Capturing
 Asset & Receipt verification
 Video Interviews & Statements            Electronic Report Delivery
Surveillance for:
                                          Secure Client Log-In Portal
                                                        Log-
  Automobile/No-Fault
  Worker’s Compensation
  Premises Liability                      Mobile Video Streaming
  General Defense Litigation



                MICHIGAN INVESTIGATIVE GROUP          (800) 723-4580
W O R K E R ’s C O M P E N SAT I O N
Workers Compensation Fraud: We prove legitimacy of workers compensation claims! We do not just try to
impeach the claimants. As professionals who have to adjust claims, we know that many are serious and can be
proven correct. We at MIG mandate an environment where we look to establish hard facts. This approach is
tenacious and objective, saving you the hassle of inadmissible reports and evidence.

Workers compensation claimants sometimes exaggerate their claims to collect higher benefits. This can greatly
affect the bottom line of even the largest organization. Workers' compensation is usually a state-provided
protection in the United States. Compensation schedules vary from state to state. Insurance is typically provided
based on the type of injury and the degree of disability of the worker. This is where MIG takes the lead.

In many circumstances workers compensation claims are incorrect or have been mislead. MIG conducts
investigations for the employer or the insuring agency, providing actual real life examples of how the claimant is
adhering or progressing through the healing or disabled process.

Many of our clients use MIG not only when they are suspicious but whenever they have a claim. We are available
now to assist you on the inquiry process.


                    SURVEILLANCE                                    EXPERTS
                     MICHIGAN INVESTIGATIVE GROUP                                    (800) 723-4580
INSURANCE FRAUD cont…
                                                                                  C O R PAT E F R AU D
How to conduct an appropriate fraud investigation
Would your company be ready to handle this type of examination?
Imagine that your company is being investigated for fraud. One of your employees is caught forging documents, or another is
involved in a grand money laundering scheme or "cooking" the financial reporting books. A team of forensic accounting and
fraud investigators enters your workplace to conduct a review and investigation. If you found your company under investigation -
- how would you handle it? If you are unsure, then you should know how Michigan Investigative Group's forensic specialists
conduct a comprehensive fraud investigation. It is a carefully planned and thorough undertaking that has to be done right. A
poorly executed investigation can make a delicate situation for your company much worse. Fraud takes on many forms. The
Canadian Institute of Chartered Accountants defines fraud as "an intentional act, by one or more individuals among
management, other employees, those charged with governance or third parties, involving the use of deception to obtain an
unjust or illegal advantage." These activities can include misappropriation of cash or inventory, fraudulent financial reporting and
money laundering. In looking at these activities, our fraud investigators take a three-step approach in their investigation:
secure and collect all tangible and oral evidence in a manner consistent with the rules of evidence to ensure admissibility
analyze the evidence, and present the evidence in an understandable manner in a venue of the client's choosing
These stages normally involve using the technology of computer forensic analysis, data analytics and conducting interviews.

MIG's fraud investigators take a three-step approach:
1. Secure and collect all tangible and oral evidence
2. Analyze the evidence
3. Present the evidence in an understandable manner

                        MICHIGAN INVESTIGATIVE GROUP                                              (800) 723-4580
INSURANCE FRAUD cont…
                                                                                 C O R PAT E F R AU D
Securing and collecting the evidence: computer forensics
The most successful method of detecting improper activities at corporations where fraud is suspected is through the use of
technology. Nearly all of a company's information is created and managed electronically, yet typically only a third of that
information is committed to paper. The majority of investigations, therefore, require careful searches of electronic information
rather than following a paper trail.
Computer forensics allows fraud investigators to uncover more of the facts, support otherwise unsubstantiated information,
confirm or refute allegations, and analyze competing theories in relation to those facts. It involves identifying, collecting,
analyzing large numbers of data. But without the correct presentation or codification of data, it may not be admissible in a legal
proceeding. Typically, the forensic group would search and analyze:

Emails
Documents and files that may be hidden, password protected, or encrypted Files that have been generated from the operating
system (i.e., enhanced metafiles) Databases of all user input and activity Recently opened, accessed, created or deleted files, and
Online activities, including Internet banking transactions However, electronic evidence is not limited just to laptop and network
computers at the workplace. Offsite computer files, servers, and even the head accountant's BlackBerry can prove valuable in an
investigation. If your company is being investigated, it is wise to be as cooperative as you can during the "electronic" phase of the
investigation. Computer forensic analysts use sophisticated tools and laboratories to conduct a thorough and accurate
investigation. There's really nowhere to hide your data anymore, and any attempts to do so merely create additional evidence
pointing toward an attempted cover-up.




                        MICHIGAN INVESTIGATIVE GROUP                                               (800) 723-4580
INSURANCE FRAUD cont…
                                                               C O R PAT E F R AU D c o n t …
Gathering additional evidence through interviews
Successful fraud investigations require interviewing potential witnesses, people with information about a particular infraction,
and in some cases, speaking with the suspected perpetrators of fraud themselves. The professional interviewer, therefore, has a
detailed and organized plan in place. Knowing this will help you understand how investigators acquire oral evidence. The
objective of an interview in a fraud situation is to gather facts related to potential motives on the part of the perpetrator, and to
verify opportunities presented to the perpetrator for committing a fraud. The interviewer carefully organizes the structure of the
interview, including its location, attendees, and the series of questions that will be asked. Questions are designed so that they
draw out the best possible information from the interviewee. For instance: What will be gained from the interview? What should
be known about this individual's activities? Is the interviewee a suspect or just a lead? As well, the interviewer often takes into
account body language and certain words and phrases which could indicate deception.

The bottom line
Using computer forensics, data analytics and interviews allows investigators to assemble much of the needed evidence for an
investigation. MIG's professionals then present the evidence in a way that allows them to make a compelling case if needed.
Going through a fraud investigation can be a stressful time for your company. But you can get through it with cooperation,
patience and the right knowledge.


REMEMBER: The MIG 3 Steps
1. Secure and collect all tangible and oral evidence
2. Analyze the evidence
3. Present the evidence in an understandable manner


                        MICHIGAN INVESTIGATIVE GROUP                                               (800) 723-4580
INSURANCE FRAUD cont…
                                                            B A C KG RO UN D C H EC K S
MIG is a provider of background check information related to credit history, social security number verification, driving
records, criminal history, education verification, professional license verification, personal and professional reference
verification. Our Lead Investigators have many years of experience in handling your cases with care.

Features:
  On line background check ordering and record retrieval.
  Personal individual service, you will be assigned a Lead Investigator
  No long term commitments or enrollment fees
  Custom Background check Reporting Available

Below is a partial list of the background check services we offer.
Social Security Verification                             Driving Record
Credit Report                                            Employment Verification
County Criminal Background Check Record                  Education Verification
Search                                                   Nationwide Sex Offender
Nationwide Database Background Check                     Tenant Screening
Search                                                   Government Database Search
Statewide Criminal Background Checks                     I9 Compliance
Civil Court Record Searches

                      MICHIGAN INVESTIGATIVE GROUP                                        (800) 723-4580
MICHIGAN INVESTIGATIVE GROUP



51194 Romeo Plank Rd. #223
Macomb, MI 48042
(800) 723-4580 Corporate Office
(586) 648-8090 Macomb County
(248) 823-7021 Oakland County
(586) 591-5995 Fax

Website:   http://www.migpi.com
Email:     dadamczyk@migpi.com

More Related Content

What's hot

SAS for Claims Fraud
SAS for Claims FraudSAS for Claims Fraud
SAS for Claims Fraudstuartdrose
 
Kroll...Identity Theft Program
Kroll...Identity Theft ProgramKroll...Identity Theft Program
Kroll...Identity Theft Programjbmillen
 
Hacked Customer Accounts
Hacked Customer AccountsHacked Customer Accounts
Hacked Customer AccountsAbbie Olson
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudGeo Coelho
 
Indice manual de certificación ACFE
Indice manual de certificación ACFEIndice manual de certificación ACFE
Indice manual de certificación ACFEAndres Baytelman
 
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion AttemptDigital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion AttemptDigital Shadows
 
Social Engineering Flyer.pdf- chatter
Social Engineering Flyer.pdf- chatterSocial Engineering Flyer.pdf- chatter
Social Engineering Flyer.pdf- chatterEleni Petros
 
New York - Virtual Currencies Compliance Conference
New York - Virtual Currencies Compliance ConferenceNew York - Virtual Currencies Compliance Conference
New York - Virtual Currencies Compliance ConferenceJuan Llanos
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachGuardian Analytics
 
Preventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldPreventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldGuardian Analytics
 
Ntrust case study_iovation
Ntrust case study_iovationNtrust case study_iovation
Ntrust case study_iovationTransUnion
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take OverLaurent Pacalin
 
Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015TransUnion
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6seadeloitte
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10seadeloitte
 

What's hot (19)

SAS for Claims Fraud
SAS for Claims FraudSAS for Claims Fraud
SAS for Claims Fraud
 
Kroll...Identity Theft Program
Kroll...Identity Theft ProgramKroll...Identity Theft Program
Kroll...Identity Theft Program
 
Hacked Customer Accounts
Hacked Customer AccountsHacked Customer Accounts
Hacked Customer Accounts
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
 
Indice manual de certificación ACFE
Indice manual de certificación ACFEIndice manual de certificación ACFE
Indice manual de certificación ACFE
 
Internet fraud
Internet fraudInternet fraud
Internet fraud
 
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion AttemptDigital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
 
Social Engineering Flyer.pdf- chatter
Social Engineering Flyer.pdf- chatterSocial Engineering Flyer.pdf- chatter
Social Engineering Flyer.pdf- chatter
 
New York - Virtual Currencies Compliance Conference
New York - Virtual Currencies Compliance ConferenceNew York - Virtual Currencies Compliance Conference
New York - Virtual Currencies Compliance Conference
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
 
Preventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldPreventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach World
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Ntrust case study_iovation
Ntrust case study_iovationNtrust case study_iovation
Ntrust case study_iovation
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take Over
 
Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 

Similar to MIG White Papers

Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditFraudBusters
 
Claims Fraud Network Analysis
Claims Fraud Network AnalysisClaims Fraud Network Analysis
Claims Fraud Network AnalysisCogitate.us
 
Subject Forensic AccountngAs we move forward, and computer te.pdf
Subject  Forensic AccountngAs we move forward, and computer te.pdfSubject  Forensic AccountngAs we move forward, and computer te.pdf
Subject Forensic AccountngAs we move forward, and computer te.pdfakilastationarrymdu
 
Workplace Investigations - Threat Management And Protection, Inc.
Workplace Investigations - Threat Management And Protection, Inc.Workplace Investigations - Threat Management And Protection, Inc.
Workplace Investigations - Threat Management And Protection, Inc.rjkirschner
 
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsCXO 2.0 Conference
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdfMerchantech - Payment Processing Services
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptxdarrengracia
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftCBIZ, Inc.
 
Fraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesFraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesShred Station
 
ID Theft Final Oct 2015
ID Theft Final Oct 2015ID Theft Final Oct 2015
ID Theft Final Oct 2015James Kane
 
Aig Uk Claims Fraud Management Introduction Aig Takes Its Responsibilities
Aig Uk Claims Fraud Management Introduction Aig Takes Its ResponsibilitiesAig Uk Claims Fraud Management Introduction Aig Takes Its Responsibilities
Aig Uk Claims Fraud Management Introduction Aig Takes Its ResponsibilitiesAIGdocs
 

Similar to MIG White Papers (20)

Case study on forensic audit
Case study on forensic auditCase study on forensic audit
Case study on forensic audit
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
Investigation and forensic audit in a computerized work environment
Investigation and forensic audit in a computerized work environmentInvestigation and forensic audit in a computerized work environment
Investigation and forensic audit in a computerized work environment
 
Claims Fraud Network Analysis
Claims Fraud Network AnalysisClaims Fraud Network Analysis
Claims Fraud Network Analysis
 
Subject Forensic AccountngAs we move forward, and computer te.pdf
Subject  Forensic AccountngAs we move forward, and computer te.pdfSubject  Forensic AccountngAs we move forward, and computer te.pdf
Subject Forensic AccountngAs we move forward, and computer te.pdf
 
Kenya AMC Presentation 2
Kenya AMC Presentation 2Kenya AMC Presentation 2
Kenya AMC Presentation 2
 
Workplace Investigations - Threat Management And Protection, Inc.
Workplace Investigations - Threat Management And Protection, Inc.Workplace Investigations - Threat Management And Protection, Inc.
Workplace Investigations - Threat Management And Protection, Inc.
 
Insurance Fraud Whitepaper
Insurance Fraud WhitepaperInsurance Fraud Whitepaper
Insurance Fraud Whitepaper
 
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
 
DRAFT 2 RP.docx
DRAFT 2 RP.docxDRAFT 2 RP.docx
DRAFT 2 RP.docx
 
Forensic Audit.pptx
Forensic Audit.pptxForensic Audit.pptx
Forensic Audit.pptx
 
Fraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesFraud Awareness Guide for Businesses
Fraud Awareness Guide for Businesses
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
ID Theft Final Oct 2015
ID Theft Final Oct 2015ID Theft Final Oct 2015
ID Theft Final Oct 2015
 
Aig Uk Claims Fraud Management Introduction Aig Takes Its Responsibilities
Aig Uk Claims Fraud Management Introduction Aig Takes Its ResponsibilitiesAig Uk Claims Fraud Management Introduction Aig Takes Its Responsibilities
Aig Uk Claims Fraud Management Introduction Aig Takes Its Responsibilities
 

MIG White Papers

  • 1. MICHIGAN INVESTIGATIVE GROUP … Looking out for you
  • 2. I N S U R A N C E F R AU D Fraud/SIU Team: MIG has created a dedicated fraud control team with specialized expertise and resources committed to minimizing the adverse effects of fraud for its industry clients. Our fraud investigators sole focus is to provide professional, timely, quality and cost-effective investigative services to the insurance industry from inception to final disposition. Michigan Investigative Group investigators help clients reduce exposure of losses, recover fraudulent claims costs and prevent unwarranted risks in a cost-effective manner. Due Diligence Surveillance: A background check and extensive review of the case is conducted to assess the true exposure and validity of a prospective claimant for our client‘s. Information is verified and all documentation obtained is supplied to the client to better assist their claim management. Why should due diligence investigations be conducted? Because clients always want to take as little risk as possible and must be assured that any monies allocated or advanced will be worth that risk. By utilizing the MIG investigative team, our clients have witnessed and testify that their claims are handled efficiently and economical to aggressively reduce the fraud exposure. MICHIGAN INVESTIGATIVE GROUP (800) 723-4580
  • 3. I N S U R A N C E F R AU D c o n t … MIG – Fraud/SIU Investigators specialize in : Surveillance Neighborhood Canvassing Digital Video Capturing Asset & Receipt verification Video Interviews & Statements Electronic Report Delivery Surveillance for: Secure Client Log-In Portal Log- Automobile/No-Fault Worker’s Compensation Premises Liability Mobile Video Streaming General Defense Litigation MICHIGAN INVESTIGATIVE GROUP (800) 723-4580
  • 4. W O R K E R ’s C O M P E N SAT I O N Workers Compensation Fraud: We prove legitimacy of workers compensation claims! We do not just try to impeach the claimants. As professionals who have to adjust claims, we know that many are serious and can be proven correct. We at MIG mandate an environment where we look to establish hard facts. This approach is tenacious and objective, saving you the hassle of inadmissible reports and evidence. Workers compensation claimants sometimes exaggerate their claims to collect higher benefits. This can greatly affect the bottom line of even the largest organization. Workers' compensation is usually a state-provided protection in the United States. Compensation schedules vary from state to state. Insurance is typically provided based on the type of injury and the degree of disability of the worker. This is where MIG takes the lead. In many circumstances workers compensation claims are incorrect or have been mislead. MIG conducts investigations for the employer or the insuring agency, providing actual real life examples of how the claimant is adhering or progressing through the healing or disabled process. Many of our clients use MIG not only when they are suspicious but whenever they have a claim. We are available now to assist you on the inquiry process. SURVEILLANCE EXPERTS MICHIGAN INVESTIGATIVE GROUP (800) 723-4580
  • 5. INSURANCE FRAUD cont… C O R PAT E F R AU D How to conduct an appropriate fraud investigation Would your company be ready to handle this type of examination? Imagine that your company is being investigated for fraud. One of your employees is caught forging documents, or another is involved in a grand money laundering scheme or "cooking" the financial reporting books. A team of forensic accounting and fraud investigators enters your workplace to conduct a review and investigation. If you found your company under investigation - - how would you handle it? If you are unsure, then you should know how Michigan Investigative Group's forensic specialists conduct a comprehensive fraud investigation. It is a carefully planned and thorough undertaking that has to be done right. A poorly executed investigation can make a delicate situation for your company much worse. Fraud takes on many forms. The Canadian Institute of Chartered Accountants defines fraud as "an intentional act, by one or more individuals among management, other employees, those charged with governance or third parties, involving the use of deception to obtain an unjust or illegal advantage." These activities can include misappropriation of cash or inventory, fraudulent financial reporting and money laundering. In looking at these activities, our fraud investigators take a three-step approach in their investigation: secure and collect all tangible and oral evidence in a manner consistent with the rules of evidence to ensure admissibility analyze the evidence, and present the evidence in an understandable manner in a venue of the client's choosing These stages normally involve using the technology of computer forensic analysis, data analytics and conducting interviews. MIG's fraud investigators take a three-step approach: 1. Secure and collect all tangible and oral evidence 2. Analyze the evidence 3. Present the evidence in an understandable manner MICHIGAN INVESTIGATIVE GROUP (800) 723-4580
  • 6. INSURANCE FRAUD cont… C O R PAT E F R AU D Securing and collecting the evidence: computer forensics The most successful method of detecting improper activities at corporations where fraud is suspected is through the use of technology. Nearly all of a company's information is created and managed electronically, yet typically only a third of that information is committed to paper. The majority of investigations, therefore, require careful searches of electronic information rather than following a paper trail. Computer forensics allows fraud investigators to uncover more of the facts, support otherwise unsubstantiated information, confirm or refute allegations, and analyze competing theories in relation to those facts. It involves identifying, collecting, analyzing large numbers of data. But without the correct presentation or codification of data, it may not be admissible in a legal proceeding. Typically, the forensic group would search and analyze: Emails Documents and files that may be hidden, password protected, or encrypted Files that have been generated from the operating system (i.e., enhanced metafiles) Databases of all user input and activity Recently opened, accessed, created or deleted files, and Online activities, including Internet banking transactions However, electronic evidence is not limited just to laptop and network computers at the workplace. Offsite computer files, servers, and even the head accountant's BlackBerry can prove valuable in an investigation. If your company is being investigated, it is wise to be as cooperative as you can during the "electronic" phase of the investigation. Computer forensic analysts use sophisticated tools and laboratories to conduct a thorough and accurate investigation. There's really nowhere to hide your data anymore, and any attempts to do so merely create additional evidence pointing toward an attempted cover-up. MICHIGAN INVESTIGATIVE GROUP (800) 723-4580
  • 7. INSURANCE FRAUD cont… C O R PAT E F R AU D c o n t … Gathering additional evidence through interviews Successful fraud investigations require interviewing potential witnesses, people with information about a particular infraction, and in some cases, speaking with the suspected perpetrators of fraud themselves. The professional interviewer, therefore, has a detailed and organized plan in place. Knowing this will help you understand how investigators acquire oral evidence. The objective of an interview in a fraud situation is to gather facts related to potential motives on the part of the perpetrator, and to verify opportunities presented to the perpetrator for committing a fraud. The interviewer carefully organizes the structure of the interview, including its location, attendees, and the series of questions that will be asked. Questions are designed so that they draw out the best possible information from the interviewee. For instance: What will be gained from the interview? What should be known about this individual's activities? Is the interviewee a suspect or just a lead? As well, the interviewer often takes into account body language and certain words and phrases which could indicate deception. The bottom line Using computer forensics, data analytics and interviews allows investigators to assemble much of the needed evidence for an investigation. MIG's professionals then present the evidence in a way that allows them to make a compelling case if needed. Going through a fraud investigation can be a stressful time for your company. But you can get through it with cooperation, patience and the right knowledge. REMEMBER: The MIG 3 Steps 1. Secure and collect all tangible and oral evidence 2. Analyze the evidence 3. Present the evidence in an understandable manner MICHIGAN INVESTIGATIVE GROUP (800) 723-4580
  • 8. INSURANCE FRAUD cont… B A C KG RO UN D C H EC K S MIG is a provider of background check information related to credit history, social security number verification, driving records, criminal history, education verification, professional license verification, personal and professional reference verification. Our Lead Investigators have many years of experience in handling your cases with care. Features: On line background check ordering and record retrieval. Personal individual service, you will be assigned a Lead Investigator No long term commitments or enrollment fees Custom Background check Reporting Available Below is a partial list of the background check services we offer. Social Security Verification Driving Record Credit Report Employment Verification County Criminal Background Check Record Education Verification Search Nationwide Sex Offender Nationwide Database Background Check Tenant Screening Search Government Database Search Statewide Criminal Background Checks I9 Compliance Civil Court Record Searches MICHIGAN INVESTIGATIVE GROUP (800) 723-4580
  • 9. MICHIGAN INVESTIGATIVE GROUP 51194 Romeo Plank Rd. #223 Macomb, MI 48042 (800) 723-4580 Corporate Office (586) 648-8090 Macomb County (248) 823-7021 Oakland County (586) 591-5995 Fax Website: http://www.migpi.com Email: dadamczyk@migpi.com