FTI Journal
FTI Journal | Critical Thinking at the Critical Time
 

The Asset Tracers


How FTI Consulting combines sophisticated data analysis with classic investigative skills to help clients fight fraud


5

5 Ways to Maximize Asset Recovery

ome investigations result in the full recovery of disputed assets. Other times, fraud victims recover only a fraction of the missing funds. How can countries and companies maximize their asset recovery chances?


Act fast // Don’t give suspects time to cover their tracks. Secure all relevant electronic data in a forensically sound manner and launch a full investigation.


Think differently // These days, the smoking gun in a fraud investigation is usually a piece of electronic data that might not live on a laptop or desktop PC, but could just as easily be found in an iPod, smartphone or cloud-based social network.


Work with experts // With billions of dollars potentially at stake, suspects typically go to great lengths to cover their tracks from both a technological and a social/human perspective. Experienced investigators with proven effective methods have the best chance of identifying perpetrators, mapping asset trails and working with the judicial system to achieve optimum asset recovery.


Build a smart database // Data analysis also plays a huge role in national fraud and theft investigations. Having the relevant data is useless unless you are able to properly analyze it and find the connections that matter. FTI Consulting’s proprietary Attenex® analytical software can identify subtle patterns and unearth critical data points. Attenex’s analysis actually improves over time as it learns to identify the sort of material that investigators are seeking.


Go international // Major fraud cases typically involve far-flung money transfers and asset purchases, from Switzerland to the Cayman Islands. To follow the trail and recover assets once they have been located, it pays to work with an international team of investigators who have on-the-ground contacts in each country who are capable of pursuing leads and working with the courts to freeze or seize assets and cash wherever possible.

Published April 2012

© Copyright 2012. The views expressed herein are those of the authors and do not necessarily represent the views of FTI Consulting, Inc. or its other professionals.

About The Authors


Andrew Durant
andrew.durant@fticonsulting.com
Senior Managing Director
Forensic & Litigation Consulting
FTI Consulting

Andrew Kendall
Senior Managing Director, FTI Technology, FTI Consulting

Share This

Latest Articles

  • Stay Protected While Connected: Wi-Fi Safety
    Stay Protected While Connected: Wi-Fi Safety
    Think your Wi-Fi connection is secure? Think again. Whether at home or in public, the connection may leave a window open for nefarious actors to climb inside your digital life. In the third of four articles for National Cybersecurity Awareness Month (October), FTI’s cybersecurity team presents essential best practices for protecting your wireless connection.
  • Secure Your Data by Tightening Your Weakest Links
    Secure Your Data by Tightening Your Weakest Links
    The old adage “you’re only as strong as your weakest link” is spot-on when it comes to safeguarding your computer systems from cyber attack. In the second of four articles for National Cybersecurity Awareness Month (October), FTI Cybersecurity presents essential best practices for fortifying basic barriers that secure your most sensitive data.
  • Keep Your Phone Close — And Your Data Closer
    Keep Your Phone Close — And Your Data Closer
    With employees depending heavily on their mobile devices to accomplish business goals, the need to keep those devices secure is imperative. Here, in the first of four articles for National Cybersecurity Awareness Month (October), FTI Cybersecurity presents best practices for securing your mobile device.

Latest Articles

  • Stay Protected While Connected: Wi-Fi Safety
    Stay Protected While Connected: Wi-Fi Safety
    Think your Wi-Fi connection is secure? Think again. Whether at home or in public, the connection may leave a window open for nefarious actors to climb inside your digital life. In the third of four articles for National Cybersecurity Awareness Month (October), FTI’s cybersecurity team presents essential best practices for protecting your wireless connection.
  • Secure Your Data by Tightening Your Weakest Links
    Secure Your Data by Tightening Your Weakest Links
    The old adage “you’re only as strong as your weakest link” is spot-on when it comes to safeguarding your computer systems from cyber attack. In the second of four articles for National Cybersecurity Awareness Month (October), FTI Cybersecurity presents essential best practices for fortifying basic barriers that secure your most sensitive data.
  • Keep Your Phone Close — And Your Data Closer
    Keep Your Phone Close — And Your Data Closer
    With employees depending heavily on their mobile devices to accomplish business goals, the need to keep those devices secure is imperative. Here, in the first of four articles for National Cybersecurity Awareness Month (October), FTI Cybersecurity presents best practices for securing your mobile device.
It looks like you're enjoying this article. If you'd like to receive email updates from the FTI Journal, please consider subscribing.
The views expressed in this article(s) are those of the author and not necessarily those of FTI Consulting, Inc., or its professionals.
©Copyright, FTI Consulting, Inc., 2012. All rights reserved.

http://ftijournal.com/article/the-asset-tracers