NCJ Number
200896
Journal
White Paper Volume: 16 Issue: 6 Dated: November/December 2002 Pages: 45-47
Date Published
November 2003
Length
3 pages
Annotation
This article explains how the work of fraud examiners can be useful in identifying possible terrorist activity that may be involved in preparing and planning an attack.
Abstract
Fraud examiners worldwide routinely deal with vast amounts of data that define the movement of people, goods, and money around the world; and these examiners have the skills and tools necessary for the analysis of this data. The collapse of controls in financially crippled companies provides opportunities for abuse by terrorists; for example, fraud examiners who inspect asset records for troubled companies should give particular attention to the disposition of equipment that contains radioactive sources. Fraud examiners who work with chemical companies are in a unique position to spot shortages or "shrinkage" in both raw materials and finished products. Examiners may also notice changes in purchasing patterns and new hazardous chemical buyers. Further, fraud examiners can detect patterns of attempted intrusions into client computer systems. Computers control dams, water treatment, electric power, and natural gas supplies, and most of these computers are connected to the Internet. Fraud examiners can also look for unusual requests for information and investigate unexplained changes in transportation patterns associated with hazardous materials, unusual equipment rentals, or unusual training requests. Fraud examiners should be essential members of any anti-terrorism team. They can discuss terrorism issues with chief security officers, senior management, and legal counsel, who can all work with local law enforcement agencies. Fraud examiners should share their methods and findings with anti-terrorism teams.