Tax evasion is the criminal practice in which corporation, organization or a person intentionally avoid paying the required state or federal taxes. Evasion of tax applies to both when there is illegal underpayments as well as illegal nonpayment of taxes. Every step of taxation process is vulnerable to fraud. For instance, failure to file tax returns makes it difficult for the IRS to audit finances of an individual. Underreporting income is the most common methods people use to evade taxation. Employees and businesses that mostly deal in cash such as retail store owners, hairdressers and wait staff at times underreport their income because there is little paper documentation of such the transactions. Also, some businesses can inflate their expenses to reduce tax deductions.Identity TheftIt is a type of fraud where a fraudster obtains financial and personal information of another person to use it in assuming the identity of the person to make purchases and transactions. Many ways are used in committing identity theft. Identity thieves can use high-tech methods such as gaining access to a corporate database to steal customer information. Some identity thieves look for a credit card or bank statement in trash bins where the target individual has discarded it. Credit card fraud involves taking of another person’s credit card information without their authorization to remove fund from their accounts or charge purchases to the account.There is four type of identity theft, child, financial, medical and criminal identity theft. Child identity theft involves the misuse of Social Security number of a child to apply for bank accounts, government benefits, and other services. Most criminals often prefer children’s information since the damage may take more time to notice. Financial identity theft is where a criminal uses information or identity of another person to obtain benefits, services, and foods. Criminal identity theft involves a criminal using another person to misrepresent himself or herself to avoid arrest or summons. Medical identity theft happens when someone obtains free medical care as a result of identifying himself or herself as another person.Securities FraudIt occurs when someone prepares a false statement about the stock value or financial information of a company to persuade other to use the false information in making financial decisions. The knowledge of security regulation is required to understand the securities. There are various forms of securities fraud. A company can participate in securities fraud. The type of fraud happens when a company’s director of corporate reports financial information to the shareholders inaccurately. As a result, the worth of company’s stocks raises artificially, and investors become encouraged to busy share from such company. The people who used the false information to buy bought shares will completely lose their investment when the firm goes bankrupt. An example is the Enron scandal where the corporate office did not report the expenses of the company hence making the profit to seem larger than the real profit.Another form of securities fraud is insider trading. It occurs when someone within a company who has access to company’s confidential financial information uses the information in making decisions on whether to sell or buy the stock before public disclose the information. For instance, a company accountant may decide to sell his or her stock without noticing the board after realizing that the firm is becoming bankrupt. Third party misrepresentation can also contribute to fraud. A third party may decide to give the public false stock market information firm, a scheme known as “pump and dump.” To accomplish pump and dump scheme, an individual looks for a small, usually unknown company having cheap stock then buys a large number of shares. The perpetrator then encourages other people to buy the stock through the use of the false information. After sometimes, the stock will be high, and the perpetrator makes a profit after the selling his or her shares.Whether an evidence chart is necessary for a fraud proceedingAn evidence chart is an important tool used in the analysis of fraud hence it is necessary for a fraud proceeding. It presents various vital advantages. First, it makes it possible to organize all the potentially relevant and relevant data of a complex fraud case into a single structure that is clear and coherent to help in an argument. Secondly, precise identification and articulation of each proposition considered to be essential in the case’s argument are required. Therefore, precision is the value being achieved. Finally, the person doing analysis using the method is required to specify each step in every argument being advanced precisely. Fraud cases usually have three distinct information layers, a hypothesis (proposition) layer, a law layer and finally an evidence layer. Therefore, any fraud case will have case theory or hypothesis, for instance, Y defraud X, a law layer which provides specific law elements that require stratification for proving of a fraud case and evidence material facts which serves as facts of a case.Fraud case in an evidence chartThe fraud involved illegal online solicitation that happened in the financial market of Italy that CONSOB regulates. The Smallxchange Company whose headquarters was British Virgin Island aimed to provide an unauthorized 24-hour stock exchange. The company asked the investors to tender shares to get a stake in the venture in exchange. The trade of the shares was to occur between partners. A WWW page that advertises financial investment services solicited the investors. The consideration of the appropriateness of CONSOB’s jurisdiction is required to establish the internet fraud regulation efficacy. Smallxchange’s target was Italian national investment market thus jurisdiction of CONSOB was affirmed. The soliciting agent did not have the license to trade as per the Directive 93/22/EEC requirement, and the web page had false statements.