Two. Must-Know Points (HIGH PRIORITY)
Three. Key Concepts and Explanations
Three Major Categories (Fraud Tree):
B. Fraud Triangle (Cressey)
C. Accounting Concepts (Foundation of Fraud)
Accrual versus Cash Accounting
D. Financial Statement Fraud (MOST TESTED)
Direction of manipulation:
Five Core Financial Statement Fraud Schemes (HIGH PRIORITY)
E. Asset Misappropriation
G. Identity Theft, Cyberfraud, and Data Theft
H. Fraud Examination and Investigation
I. Fraud Prevention and Deterrence
Four. Important Terms and Definitions
Five. Comparisons and Distinctions
Audit versus Fraud Examination
Asset Misappropriation versus Financial Statement Fraud
Seven. Likely Exam / High-Yield Points
Eight. Quick Recall Sheet (Last-Minute Review)
Financial Statement Fraud and Asset Misappropriation (Cash Receipts and Disbursements)
Two. Must-Know Points (HIGH PRIORITY)
Three. Key Concepts and Explanations
Common Methods (HIGH PRIORITY)
Two. Improper capitalization
Three. Undisclosed warranty and return liabilities
B. Improper Capitalization versus Improper Expensing
Common disclosure fraud areas:
D. Red Flags of Financial Statement Fraud (EXAM FAVORITE)
Four. Important Terms and Definitions
Five. Comparisons and Distinctions
Seven. Likely Exam / High-Yield Points
Eight. Quick Recall Sheet (Last-Minute)
Financial Statement Fraud and Asset Misappropriation (Cash Receipts and Disbursements)
Two. Must-Know Points (HIGH PRIORITY)
Three. Key Concepts and Explanations
Why this scheme is attractive to fraudsters
Three Primary Methods (HIGH PRIORITY)
Two. Improper capitalization
Three. Failure to record warranty and return liabilities
Detection of Omitted Liabilities
B. Capitalizing versus Expensing Costs
D. Red Flags of Financial Statement Fraud
E. Financial Statement Analysis as a Detection Tool
Key Ratios and Fraud Signals (EXAM FAVORITES)
F. Interviews in Financial Statement Fraud
G. Prevention of Financial Statement Fraud
Four. Important Terms and Definitions
Five. Comparisons and Distinctions
Capitalizing versus Expensing
Seven. Likely Exam / High-Yield Points
Eight. Quick Recall Sheet (Last-Minute Scan)
PART ONE - ASSET MISAPPROPRIATION: FRAUDULENT DISBURSEMENTS
Common Concealment Methods
Two. Billing Schemes (Most Common Fraudulent Disbursement)
B. Nonaccomplice Vendor Schemes (Pay-and-Return)
C. Personal Purchases with Company Funds
Three. Detection of Billing Schemes
PART TWO - PAYROLL FRAUD SCHEMES
Two. Falsified Hours and Salary
Three. Commission Schemes
Four. Payroll Fraud Prevention
PART THREE - EXPENSE REIMBURSEMENT SCHEMES
Three. Fictitious Expenses
Four. Multiple Reimbursements
PART FOUR - INVENTORY AND OTHER ASSETS
Two. Inventory Theft Methods
Three. Concealment Techniques
PART FIVE - CORRUPTION (HIGH-IMPACT EXAM AREA)
Three. Detection of Corruption
Four. Proving Corrupt Payments
FINAL CERTIFIED FRAUD EXAMINER EXAM QUICK HITS
CERTIFIED FRAUD EXAMINER HIGH-YIELD SUMMARY AND EXAMINATION NOTES
One. Conflicts of Interest
Major Conflicts of Interest Schemes
Two. Detecting Conflicts of Interest
Classic Conflict of Interest Red Flags
Three. Prevention and Governance
ISO three seven zero zero one - Anti-Bribery (Exam Tip)
Four. Theft of Data and Intellectual Property
Intellectual Property Includes
Five. Competitive Intelligence versus Espionage
Six. Corporate Espionage - Methods
CERTIFIED FRAUD EXAMINER Top Controls (Memorize)
Nine. Financial Institution Fraud (Introduction)
CERTIFIED FRAUD EXAMINER EXAM MEMORY ANCHORS
Financial Institution Fraud, Mortgage Fraud, Payment Fraud, Insurance Fraud.
Two. Must-Know Points (HIGH PRIORITY)
Three. Key Concepts and Explanations
Uses of Fraudulent Appraisals
Red Flags (EXAM FAVORITE)
B. Mortgage Industry Structure (Exam Framework)
C. Why Mortgage Fraud Persists
D. Core Mortgage Fraud Schemes (HIGH PRIORITY)
Three. Identity Fraud versus Identity Theft
Five. Foreclosure Rescue Scams
Seven. Property Flipping versus Flopping
Nine. Reverse Mortgage Fraud
E. New Account Fraud (Banking EXAM FAVORITE)
F. Wire Transfer Fraud (VERY HIGH RISK)
G. Payment Fraud (Largest Scope, Highest Volume)
H. Electronic and Emerging Payments
I. Cryptocurrency and Virtual Economies
J. Insurance Fraud Internal (Agent or Employee).
Four. Important Terms and Definitions
Five. Comparisons and Distinctions
Identity Fraud versus Identity Theft.
Seven. Likely Exam / High-Yield Points
Eight. Quick Recall Sheet
Insurance Fraud - Health Care Fraud - Consumer Fraud - Ponzi and Pyramid Schemes.
Two CFE Must-Know Frameworks (Very High Yield)
B. Where Fraud Occurs Most
Three point one Major Categories
Three point two Workers' Compensation Fraud - HIGH YIELD
Organized Fraud (Exam Favorite)
Three point three Insurance Fraud Red Flags (Memorize)
Four HEALTH CARE FRAUD (Largest Volume on Exam)
Four point two Health Care Systems (Conceptual Foundation) Four point three Reimbursement Models and Fraud Incentives
Coding Fraud (VERY HIGH YIELD)
Four point five. Institutional Fraud
Four point six. Electronic Claims (EDI Fraud)
Four point seven. Health Care Compliance Programs (Exam Essay Favorite)
Five. CONSUMER FRAUD (Emotion-Driven)
Electronic Consumer Fraud
Elder Fraud (Explicitly Tested)
Six. PONZI and PYRAMID SCHEMES (Guaranteed Exam Questions)
Seven. Ultra-High Yield CFE Memory Hooks
Eight. Fifteen-Second Recall Sheet
Fraud Examiners Manual - Consumer Fraud, Cyberfraud, and Procurement Fraud
Two. Common Ponzi Product Fronts
Three. MLM versus Illegal Pyramid (Exam Favorite)
One. Definition (Must Memorize)
Two. Cyberfraud Characteristics
Three. Indicators of Intrusion (IOCs)
Three. SOCIAL ENGINEERING SCHEMES (HIGH-YIELD)
Four. HACKING and UNAUTHORIZED ACCESS METHODS
Five. MALWARE (EXAM ESSENTIAL)
Six. PROCUREMENT and CONTRACT FRAUD (CORE FOR CFE)
Two. Procurement Phases (Memorize Order)
Three. Major Procurement Fraud Schemes
Seven. INFORMATION SECURITY CONTROLS
Eight. INCIDENT RESPONSE (VERY TESTABLE)
FINAL EXAM FAST-REVIEW (ONE-PAGE MEMORY)
CONTRACT and PROCUREMENT FRAUD plus LEGAL FOUNDATIONS
One. CONTRACT and PROCUREMENT FRAUD
Two. Common Cost Mischarging Methods
II. THREE TYPES OF COST MISCHARGES
MATERIAL MISCHARGE RED FLAGS
Material Mischarge Detection
Labor Mischarge Detection
IV. PREVENTING PROCUREMENT FRAUD
V Exam tip: Control weakness # fraud, but enables it
V. LEGAL FOUNDATIONS (CFE CORE - LAW)
C. ELEMENTS OF FRAUD (CORE)
VI. SPECIAL FRAUD CATEGORIES (EXAM TRAPS)
VIII. WHAT CFE EXAMS LOVE TO ASK
Civil vs criminal thresholds
CONTRACT & PROCUREMENT FRAUD + LEGAL FOUNDATIONS
I. CONTRACT & PROCUREMENT FRAUD
Two. Common Cost Mischarging Methods
Three. RED FLAGS - Cost Mischarging
II. THREE TYPES OF COST MISCHARGES
MATERIAL MISCHARGE RED FLAGS
Material Mischarge Detection
Labor Mischarge Detection
IV. PREVENTING PROCUREMENT FRAUD
C. Vendor Management (HIGH-YIELD)
A. TYPES OF LAW (Mnemonic: S-P-A-I-C)
B. CRIMINAL vs CIVIL FRAUD
VI. SPECIAL FRAUD CATEGORIES (EXAM TRAPS)
VIII. WHAT CFE EXAMS LOVE TO ASK
Civil vs criminal thresholds
FRAUD EXAMINERS MANUAL - SECURITIES FRAUD & MONEY LAUNDERING
I. SECURITIES - CORE CONCEPTS
B. Traditional Securities
· Call equals right to buy
C. OTC Derivatives (Major Risk Area)
III. INVESTMENT CONTRACTS (VERY EXAMINABLE)
B. Common Investment Contracts
IV. CLASSIC SECURITIES FRAUD SCHEMES
B. Illegal Pyramid Schemes
C. Prime Bank Note Schemes
V. PARTNERSHIPS and BUSINESS STRUCTURES
Common Misrepresentations
VII. HEDGE FUNDS - FRAUD RISK AREAS
VIII. PROMISSORY NOTES - SECURITY OR NOT?
IX. SECURITIES REGULATION - PURPOSE
Major Regulators (Illustrative)
X. SECURITIES FRAUD BY REGISTERED PERSONS
B. Churning (EXAM FAVORITE)
XI. MATERIAL MISREPRESENTATIONS and OMISSIONS
XII. MONEY LAUNDERING - CORE FRAMEWORK
XIII. COMMON LAUNDERING METHODS (HIGH-YIELD)
XIV. FATF FRAMEWORK (VERY EXAMINABLE)
Financial Institutions Must:
XV. KEY ANTI-MONEY LAUNDERING RED FLAGS (MEMORIZE LIST TYPE)
XVI. INVESTIGATIVE TAKEAWAYS (CFE PRACTICAL)
CFE REVIEWER - TAX FRAUD, LEGAL RIGHTS and EVIDENCE
I. TAX FRAUD - CORE CONCEPTS
Tax Evasion versus Tax Avoidance
Conduct Showing Willfulness
· Even without willfulness -> civil penalties may still apply
IV. TYPES OF TAX EVASION SCHEMES
Two. Falsifying Tax Deductions
Three. Tax Credit Schemes
Four. Consumption Tax Schemes (VERY TESTED)
VI. DEFENSES TO TAX EVASION
· No Tax Deficiency (best defense)
VII. FRAUD SCHEMES TARGETING TAXPAYERS
VIII. INDIVIDUAL RIGHTS DURING EXAMINATIONS (VERY TESTED)
IX. RIGHT TO REMAIN SILENT
X Internal investigations by private employers
XI. DEFAMATION and PRIVACY (EXAM FAVORITES)
XII. DATA PRIVACY - INTERNATIONAL FRAME
Thirteen. Basic Principles of Evidence
Direct vs. Circumstantial
Law: Evidence, Privileges, and Testifying
One. Basic Principles of Evidence
B. Refreshing a Witness's Memory
C. Other Hearsay Exceptions
D. Hearsay in Civil Law Systems
B. What Must Be Documented
Three. Impeachment of Witnesses
C. Criminal Convictions (United States FRE six zero nine)
D. Collateral Matters Rule
Four. Privileges and Protections
B. Legal Professional Privileges (Global)
E. Work-Product Doctrine (United States)
B. Information vs. Evidence
C. Lay Opinions Allowed For:
B. Expert Functions (Matson)
C. Qualifying an Expert (Common Law)
E. ACFE Ethics - Critical Rule
Seven. Exam Strategy Summary
Planning, Evidence, and Interviews (Fraud Examination Core)
Two. Investigation Leader
Three. Understanding the Organization
Four. Investigation Planning (Very Exam-Heavy)
Core Planning Elements (Memorize):
Five. Key "What is Known" Questions
Six. Goals of the Investigation
Seven. Scope of the Investigation
Nine. Law Enforcement Involvement
Eleven. Operational Issues (Exam Favorite)
Twelve. Case Plan (COURSE OF ACTION)
Thirteen. Confidentiality (CRITICAL)
II. EVIDENTIARY PRIVILEGE (HIGH-YIELD)
Two. General Rules for Documents
Three. Obtaining Documents
Four. Categories of Evidence
Five. Organizing Evidence
Six. Chain of Custody (EXAM ESSENTIAL)
Seven. Handling Physical Documents
Eight. Forensic Document Examination
Nine. Handwriting and Forgeries
Eleven. Disposal of Evidence
IV. INTERVIEW THEORY and APPLICATION
Two. Interview Preparation
Three. Interview Environment
Four. Characteristics of Good Interviewers
Six. PEACE Interview Model (MEMORIZE)
Seven. Cognitive Interview Technique
Nine. Indicators of Deception
V. Never rely on one indicator alone
FRAUD EXAMINERS MANUAL - SOURCES OF INFORMATION and DATA ANALYTICS
I. INTERNET and OPEN-SOURCE SEARCHING (OSINT)
Advanced Operators (Bing and Google):
B. Deep Web versus Dark Web
II. PUBLIC RECORDS and DATABASES
B. Public Record Search Limitations (Highly Tested)
V. Always consult legal counsel before accessing:
III. SOCIAL MEDIA AS EVIDENCE
B. Legal and Privacy Rules (VERY EXAM-HEAVY)
C. Evidence Collection Best Practices
IV. BACKGROUND and DUE DILIGENCE SEARCHES
B. Employment Background Checks
Mandatory background checks apply to:
V. ASSET and PEOPLE LOCATIONS (HIGH-VALUE)
V. Combine public records plus social media plus lifestyle analysis.
A. Structured versus Unstructured Data
Three. Testing and interpretation
C. Core Fraud Analytics Techniques
D. Benford's Law (VERY HIGH-YIELD)
E. Scheme-Specific Analytics
Financial Statement Fraud
Seven. Advanced and Emerging Analytics
Five. Link analysis is critical for:
Eight. Digital Forensics (Foundational Knowledge)
C. Common Digital Evidence Locations
D. Forensic Process (MEMORIZE)
Digital Forensics and Tracing Illicit Transactions
Part One - Digital Forensics (Big Picture)
A. Digital Evidence Seizure - Core Rules
Two. If Computer Is Off - Leave It Off
B. Live Data Collection (Volatile Data)
When Live Collection Is Appropriate
Order of Volatility (Most to Least)
Basic Live Collection Steps (Exam Gold)
C. Shutdown Methods (Running Systems)
Graceful Shutdown (Risky)
D. Securing Digital Evidence
Chain of Custody Must Show
Processing (Data Culling)
F. Cloud and Mobile Forensics - Key Risks
Part Two - Tracing Illicit Transactions
B. General Tracing Process
D. Direct versus Indirect Methods (Critical)
Two. Indirect Methods (Circumstantial Proof)
E. Three Indirect Methods (MEMORIZE)
Three. Bank Deposit Analysis
F. Common Records to Examine
G. Common Asset-Hiding Methods (Exam List)
H. Cryptocurrency - Key Points
I. Recovery and Legal Avennes
Digital Forensics and Tracing Illicit Transactions
Part One - Digital Forensics (Big Picture)
A. Digital Evidence Seizure - Core Rules
Two. If Computer Is off, then leave it off
B. LIVE DATA COLLECTION (VOLATILE DATA)
When Live Collection Is Appropriate
Basic Live Collection Steps (Exam Gold)
C. SHUTDOWN METHODS (Running Systems)
D. SECURING DIGITAL EVIDENCE
Processing (Data Culling)
F. CLOUD and MOBILE FORENSICS - KEY RISKS
PART TWO - TRACING ILLICIT TRANSACTIONS
B. GENERAL TRACING PROCESS
D. DIRECT versus INDIRECT METHODS (CRITICAL)
Two. INDIRECT METHODS (Circumstantial Proof)
E. THREE INDIRECT METHODS (MEMORIZE)
Three. Bank Deposit Analysis
F. COMMON RECORDS TO EXAMINE
G. COMMON ASSET-HIDING METHODS (EXAM LIST)
H. CRYPTOCURRENCY - KEY POINTS
I. RECOVERY and LEGAL AVENUES
I. TRACING ILLICIT TRANSACTIONS (INTERNATIONAL)
D. Tax Information Exchange Agreements (TIEAs)
E. Approach to Finding Assets Abroad (EXAM FAVORITE)
B. Five-Step Recovery Process (VERY TESTED)
C. Evaluate Potential for Recovery
D. Civil versus Criminal Actions
E. Securing, Judging, Enforcing
III. Report Writing (Very High-Yield)
B. Principles of Good Reports
C. Common Reporting Mistakes (Exam Gold)
D. Proper versus Improper Language (Tested)
F. Organization of Reports
G. Reader Analysis (Exam Favorite)
IV. Standard Fraud Examination Report Structure
V. Expert Reports (Advanced Topic)
VI. Prosecution Considerations
Fraud examiners should NOT
VII. Exam Quick Hits (Memorize)
Tracing Illicit Transactions, Asset Recovery, and Report Writing
I. Tracing Illicit Transactions (International)
D. Tax Information Exchange Agreements (TIEAs)
E. Approach to Finding Assets Abroad (Exam Favorite)
B. Five-Step Recovery Process (Very Tested)
C. Evaluate Potential for Recovery
D. Civil versus Criminal Actions
E. Securing, Judging, Enforcing
III. Report Writing (Very High-Yield)
B. Principles of Good Reports
C. Common Reporting Mistakes (Exam Gold)
D. Proper versus Improper Language (Tested)
F. Organization of Reports
G. Reader Analysis (Exam Favorite)
IV. Standard Fraud Examination Report Structure
V. Expert Reports (Advanced Topic)
VI. Prosecution Considerations
VII. Exam Quick Hits (Memorize)
One. Case Synopsis (Executive-Level)
One. Kickbacks via Inflated Pricing (twenty nineteen to twenty twenty)
Two. Non-Competitive Procurement Override
Three. Fictitious Invoicing and Payment for Non-Delivery (twenty twenty)
Four. Key Fraud Indicators Identified
B. Payment and Accounting Red Flags
Five. Control Failures (Condition)
Seven. Financial Impact (Effect)
Banking and Check Tracing
V. Confessions and Sworn Statements
Observation One: Procurement Function Susceptible to Abuse of Authority
Eleven. Recommended Enhancements (High-Level)
Twelve. How You Can Reuse This Output
One. WHY WHITE-COLLAR CRIME OCCURS (CORE THEMES)
B. Obedience and Authority (Milgram Effect)
Two. CORPORATE EXECUTIVES and LIABILITY
B. Barriers to Prosecution
C. Sentencing Rationalizations
Three. MANAGEMENT BEHAVIOR and RATIONALIZATION
Corporate Subculture (Braithwaite)
Four. COSTS OF WHITE-COLLAR CRIME
B. Indirect Costs (Often Worse)
Five. CONTROLLING ORGANIZATIONAL CRIME
Two. Government intervention
Six. COMPLIANCE versus DETERRENCE
A. Cressey's Fraud Triangle >
B. Non-Shareable Financial Problems
D. Rationalization (Pre-Crime, Not After)
Eight. TYPES OF OCCUPATIONAL OFFENDERS (CRESSEY)
Nine. ALBRECHT FRAUD SCALE (EXAM FAVORITE)
Top Organizational Red Flags
Ten. ACFE OCCUPATIONAL FRAUD - KEY FINDINGS
B. Detection Methods (Ranked)
Eleven. FRAUD DURATION INSIGHT
Twelve. CORPORATE GOVERNANCE and FRAUD
Strong Governance Includes:
Thirteen. MANAGEMENT'S FRAUD RESPONSIBILITIES
Fourteen. COSO INTERNAL CONTROL - FRAUD LENS
Two. Risk assessment (must consider fraud)
Four. Information and communication
Fifteen. COMPLIANCE and ETHICS PROGRAM (USSG and ISO)
Sixteen. AUDITORS' FRAUD RESPONSIBILITIES
Two Fraud Types Auditors Care About:
FINAL MEMORY ANCHORS (FOR EXAMS)
Fraud Prevention and Auditors' Fraud Responsibilities
I. CORE CONCEPTS YOU MUST REMEMBER (EXAM FAVORITES)
Two. Why Fraud Is Harder to Detect Than Error
II. FRAUD TRIANGLE (TESTED HEAVILY)
III. AUDITOR'S RESPONSIBILITIES (ISA two forty - MUST MEMORIZE)
B. Professional Skepticism (ISA two hundred)
IV. FRAUD RISK ASSESSMENT - HOW AUDITORS DO IT
Two. Fraud Risk Factors - Categories
V. RESPONSES TO FRAUD RISK (ISA three hundred thirty)
B. Mandatory Procedures - Management Override
VI. WHEN FRAUD IS IDENTIFIED
VII. COMMUNICATION and DOCUMENTATION
VIII. INTERNAL AUDIT - FRAUD ROLE (IIA STANDARDS)
Internal Audit Key Fraud Responsibilities:
IX. FRAUD PREVENTION PROGRAMS (VERY EXAMABLE)
X. WHISTLEBLOWING and HOTLINES (FREQUENT CFE QUESTION)
XI. FRAUD RISK ASSESSMENT (ORGANIZATION-WIDE)
XII. EXAM POWER MEMORY (QUICK FIRE)
One. FRAUD RISK ASSESSMENT (FRA)
Key FRA Questions (Think Like a Fraudster)
What Makes a "Good" Fraud Risk Assessment
Step One: Identify Inherent Fraud Risks
Recognize internal versus external sources of fraud risk.
Impact (Significance) levels
Step Three: Identify People or Departments Most Likely to Commit Fraud
Step Four: Map Existing Controls
Step five: Evaluate Control Effectiveness
Step six: Identify Residual Fraud Risk
Three. FRAUD RISK ASSESSMENT FRAMEWORKS
Framework two (Holistic / Portfolio-Based)
Four. RESPONDING TO FRAUD RISK
Five. REPORTING FRAUD RISK ASSESSMENT RESULTS
Six. FRAUD RISK MANAGEMENT (FRM)
FRM Foundational Frameworks
FRM twenty twenty-three - Five Principles
Seven. THIRD-PARTY FRAUD RISK
Vendor Fraud Risk Controls
Eight. ETHICS FOR FRAUD EXAMINERS (VERY HIGH EXAM WEIGHT)
Nine. PROFESSIONAL SKEPTICISM
Ten. PRACTICAL MEMORY ANCHOR (FOR EXAM)
ACFE Code of Professional Ethics and CFE Code of Professional Standards
PART A - ACFE CODE OF PROFESSIONAL ETHICS
One. CONFIDENTIALITY and DISCLOSURE (CRITICAL)
When External Disclosure May Be Justified
Two. COMPLETE REPORTING OF MATERIAL MATTERS
Materiality (User-Oriented Concept)
Three. PROFESSIONAL IMPROVEMENT (CONTINUING OBLIGATION)
PART B - CFE CODE OF PROFESSIONAL STANDARDS (ADOPTED twenty twenty)
One. PREAMBLE (TONE and RESPONSIBILITY)
Three. STANDARDS OF PROFESSIONAL CONDUCT
B. Professional Competence
C. Due Professional Care (EXAM FAVORITE)
D. Understanding with Client or Employer
E. Communication with Client or Employer
F. Confidentiality (Standards Layer)
Four. STANDARDS OF EXAMINATION
V. STANDARDS OF REPORTING
B. Report Content (VERY HIGH EXAM WEIGHT)
PRACTICAL USE (Audit and Investigation)
I. FOUNDATIONS OF FRAUD EXAMINATION
II. WHY FRAUD OCCURS - FRAUD THEORY (HIGH EXAM WEIGHT)
III. FRAUD RISK MANAGEMENT and ASSESSMENT
IV. TYPES OF FRAUD (CLASSIC plus MODERN)
Regulatory and Ethical Misconduct
V. PREVENTION, DETECTION and RESPONSE CONTROLS
VI. FRAUD INVESTIGATION PROCESS
VII. INTERVIEWING and BEHAVIORAL ANALYSIS
VIII. DATA ANALYTICS IN FRAUD
IX. ETHICS - THE BACKBONE OF FRAUD EXAMINATION
Confidentiality (Critical Exam Area)
Materiality and Complete Reporting
X. CFE CODE OF PROFESSIONAL STANDARDS (PRACTICE RULES)
XI. REPORTING FRAUD FINDINGS
XII. ROLES and RESPONSIBILITIES
Internal Audit and Fraud Function
XIII. MASTER MEMORY FRAMEWORK (EXAM and PRACTICE)