+ All Categories
Home > Documents > ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice...

ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice...

Date post: 08-Sep-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
22
FROM DE TECTION TO PROSECUTION Stephen Pedneault
Transcript
Page 1: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

(continued on back fl ap)

(continued from front fl ap)

4-COLOR GLOSSY

$49.95 USA/$59.95 CAN

Most fraud cases, especially thefts and em-bezzlements, never make it into the public eye. Those that do grab the media’s attention

merely report the end result of weeks, months, and even years of investigative procedures. For experienced and inexperienced fraud professionals alike, there is little available to keep abreast of the latest fraud tactics.

Providing unparalleled insights into what takes place during a fraud investigation, Anatomy of a Fraud Investigation is a valuable resource for you, whether you are a fraud investigator, auditor, or if you simply suspect fraud may be occurring in your organization and aren’t sure what to do. This is a fascinating, insider look at a fraud investigation, designed to help you better understand fraud detection, investigation, and prevention—from the inside out.

Written by a seasoned investigator with over twenty-two years of experience conducting fraud investigations, this unique book articulates the investigative thought process through an authentic case, from the fi rst tip to the forensic accountant that fraud is suspected, to the fi nal judgment in court. No detail is too small here, with consideration given to sometimes-overlooked details, including:

• How does a case come to light in the fi rst place?

• Who are the individuals behind the scene putting the case together, sifting through ledgers, cancelled checks, and other records that comprise a mountain of evidence?

• Who handles all the information, and where is evidence stored?

• Who are the witnesses, and how can you know if the suspect acted alone or with the assistance of an accomplice?

• If computer forensics is involved, how can you extract the most evidence from the suspects’ computers?

F R O M D E T E C T I O N T O P R O S E C U T I O N

FROM DETECTION TO PROSECUTION

ANATOMY OF A FRAUD INVESTIGATION

Stephen Pedneault

Pedneault

“In the fi rst book of its kind, Anatomy of a Fraud Investigation combines a detective story with a textbook. Mr. Pedneault leads the reader through the investigation of an embezzlement. Along the way, he shows us all the stages of a fraud case – from the initial detection through prosecution –and shares with us tips and techniques to successfully complete each stage. Providing instruction in the context of a case story results in an enjoyable and interesting experience for anyone interested in learning more about fraud investigation.”

—John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners

“In Anatomy of a Fraud Investigation, which reads like a thriller, Stephen Pedneault does a masterful job in exposing how thievery is discerned and stopped and thieves prosecuted.”

—Julie Jason, author of The AARP Retirement Survival Guide: How to Make Smart Financial Decisions in Good Times and Bad

“Effectively designed for comprehending the phases of a fraud investiga-tion. Progressively delineates the complexity of a fraud investigation through animating learning points within a continuous, unwinding narrative.”

—David R. Lavoie, Ph.D., M.L.I.S., Director of Instructional Design & Assessment, School of Business, University of Connecticut

Unpacking the fi ner points that make fraud investigative work interesting and challenging, Anatomy of a Fraud Investigation breaks down the “juicy details” of a fraud investigation from beginning to end, with a you-are-there analysis of the steps and measures involved in each stage of an actual fraud investigation.

Stephen Pedneault, CPA/CFF, CFE, is the founder and Principal of Forensic Accounting Services LLC, a CPA fi rm specializ-ing in forensic accounting, employee fraud, and litigation support matters. Steve is the author of Fraud 101: Techniques and Strategies for

Understanding Fraud (Wiley) and is a contributor to Fraud Casebook: Lessons from the Bad Side of Business (Wiley). He is writing his third book, Preventing and Detecting Employee Theft and Embezzlement: A Practical Guide (Wiley), due out in June 2010. Steve has also written numerous articles appearing in local and national media, and is a frequent speaker on the subjects of employee embezzlement and forensic accounting.

For more information about Stephen Pedneault, go to www.forensicaccountingservices.com.

Cover Design: David Riedy

ISBN: 978-0-470-56047-1

Praise for ANATOMY OF A FRAUD INVESTIGATION FROM DETECTION TO PROSECUTION

Author Photograph: B

rian Am

brose

Page 2: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1FFIRS 11/26/2009 9:28:36 Page 2

Page 3: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1FFIRS 11/26/2009 9:28:35 Page 1

ANATOMY OF A FRAUDINVESTIGATION

Page 4: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1FFIRS 11/26/2009 9:28:36 Page 2

Page 5: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1FFIRS 11/26/2009 9:28:36 Page 3

ANATOMY OF A FRAUDINVESTIGATION

F R O M D E T E C T I O N T O P R O S E C U T I O N

Stephen Pedneault

John Wiley & Sons, Inc.

Page 6: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1FFIRS 11/26/2009 9:28:36 Page 4

Copyright # 2010 by Stephen Pedneault. All rights reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.Published simultaneously in Canada.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted inany form or by any means, electronic, mechanical, photocopying, recording, scanning, orotherwise, except as permitted under Section 107 or 108 of the 1976 United States CopyrightAct, without either the prior written permission of the Publisher, or authorization throughpayment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222Rosewood Drive, Danvers, MA 01923, (978) 750�8400, fax (978) 750�4470, or on the web atwww.copyright.com. Requests to the Publisher for permission should be addressed to thePermissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201)748-6011, fax (201) 748-6008, or online at www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their bestefforts in preparing this book, they make no representations or warranties with respect to theaccuracy or completeness of the contents of this book and specifically disclaim any impliedwarranties of merchantability or fitness for a particular purpose. No warrantymay be created orextended by sales representatives or written sales materials. The advice and strategiescontained hereinmay not be suitable for your situation. You should consult with a professionalwhere appropriate. Neither the publisher nor author shall be liable for any loss of profit or anyother commercial damages, including but not limited to special, incidental, consequential, orother damages.

For general information on our other products and services or for technical support, pleasecontact our Customer CareDepartment within theUnited States at (800) 762-2974, outside theUnited States at (317) 572-3993 or fax (317) 572-4002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears inprint may not be available in electronic books. For more information about Wiley products,visit our web site at www.wiley.com.

Library of Congress Cataloging-in-Publication Data:

Pedneault, Stephen, 1966-Anatomy of a fraud investigation : from detection to prosecution/Stephen Pedneault.p. cm.

Includes bibliographical references and index.ISBN 978-0-470-56047-1 (cloth)1. Fraud. 2. Fraud investigation. I. Title.HV6691.P43 2010363.250963--dc22

2009035916

Printed in the United States of America.

10 9 8 7 6 5 4 3 2 1

Page 7: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1FFIRS 11/26/2009 9:28:36 Page 5

With deep appreciation and love, for my parents, Gerry and Dot.Your personal sacrifices gave me so many opportunities

growing up. Your strong work ethic, sense of values, and idealscreated the foundation for the man I strive to be today.

Thank you,—Steve

Page 8: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1FFIRS 11/26/2009 9:28:36 Page 6

Page 9: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1FTOC 11/20/2009 13:29:39 Page 7

CONTENTS

Acknowledgments ix

Introduction xi

Chapter 1 First Indications ( They're Doing What?) 1

Chapter 2 The Importance of Planning(Maximizing Desired Outcomes ) 11

Chapter 3 Collecting the Evidence(a.k.a. ‘‘The Raid’’) 25

Chapter 4 Reviewing the Evidence(The Day After) 45

Chapter 5 Electronic Evidence Considerations(Computers, Files, and Communications ) 57

Chapter 6 Interviewing (Responding to Tears ) 69

Chapter 7 Importance of Documentation(Keeping Track of Things ) 87

Chapter 8 Further Investigative Measures(Obtaining More Evidence ) 101

Chapter 9 Tracking Down Leads(The Plot Thickens ) 119

vii

Page 10: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1FTOC 11/20/2009 13:29:39 Page 8

Chapter 10 Drawing Conclusions (What DoesIt All Show? ) 131

Chapter 11 Confronting the Suspect( ‘‘I Didn't Do Anything Wrong’’ ) 147

Chapter 12 Documenting the Investigation( Your Written Report ) 159

Chapter 13 Working Toward a Resolution( ‘‘I Don't Want to Go to Prison’’ ) 167

Chapter 14 Case Closed! 177

Epilogue Do You Want to Know the Outcome? 181

Notes 185

About the Author 187

Index 189

viii Contents

Page 11: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1FLAST 11/07/2009 11:49:17 Page 9

ACKNOWLEDGMENTS

To my family, who allow me the time I need to accomplish so muchin so little time, who may not know how much I value the time wespend together (away from my work), and who provide me with thespirit and energy needed during my often long hours of work.

To my friends and trusted advisors, who at times think I am crazywith the number of projects and endeavors I undertake simulta-neously, yet continue to support me and my decisions anyway.

To Helen Koven, my friend and publicist, whose vision and driveis nothing less than that of Walt Disney himself, the brains behindthe curtain just beyond the spotlight, continually demonstrating herexperience and expertise in marketing and promotion.

To Timothy Burgard, Stacey Rivera, Lisa Vuoncino, and all thefolks at Wiley who have been a delight to work with in publishing myfirst book, Fraud 101, and who have extended themselves once againby creating a second opportunity for my writing.

To Lt. Albert J. Kerling, East Hartford Police Department(retired), who gave so much of his time and energy to the policeexplorer program, which provided me with much of my criminaljustice knowledge and experience, and created the backdrop for mycareer decisions.

And to the Association of Certified Fraud Examiners, the pre-mier international organization that provides superior educationalopportunities directed to prevent fraud as well as investigate fraud,leading the world on their crusade to bring fraudulent activity backto a controlled level.

ix

Page 12: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1FLAST 11/07/2009 11:49:17 Page 10

Page 13: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1CINTRO 11/20/2009 13:16:1 Page 11

INTRODUCTION

When the case became available to the public, journalists flocked tothe station to read the blotter details regarding the arrest. A well-known executive with strong community ties was charged with afinancial crime involving a very reputable non-profit organization.As the story broke that day to the public, it appeared in a localnewspaper and on a local television station. A camera crew went tothe suspect’s house to capture a distant glimpse of someone lookingout an upstairs window for the six o’clock news. Reporters fanned outto talk with neighbors about how great the suspect was, and howsurprised they were to hear the news. Nothing sells better thanunplanned reactions to ‘‘shock-and-awe’’ reporting.

When the printed story came out later that day, it was consistentwith so many others similarly reported, and read as follows:

Controller Charged With Embezzling from Non-Profit Agency

James Smith, 43, was arrested yesterday on charges that he pilfered hundreds of

thousands of dollars from his employer over the course of several years. Smith turned

himself in to local authorities accompanied by his attorney after learning that police had

secured a warrant for his arrest.

Smith started at Crestview as an accounting manager and rose through the ranks to

become their controller. A surprise audit revealed Smith used the organization’s credit

cards for personal expenses in support of his lavish lifestyle, including trips he took

throughout the world. Funds intended for Crestview were diverted into a bank account

opened by Smith that he allegedly used to pay the credit card activity each month.

Shortly after the discovery, Smith was placed on administrative leave. As part of the

negotiations for a potential plea deal, Smith purportedly agreed to initially return $78,000

and make restitution to Crestview for the full amount of their loss.

(Continued )

xi

Page 14: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1CINTRO 11/20/2009 13:16:1 Page 12

The story appeared that day, and nothing further was ever heardagain on the matter until the day of Mr. Smith’s sentencing. Eventhen the media’s attention was limited to a very small follow-uparticle revealing no new or additional details about the case. Notelevision crews were at the courthouse, and no reporters went to Mr.Smith’s neighbors for comment and reaction to the sentencehanded down. There was nothing reported from the media becauseit had become old news and there were other things happening inthe world worthy of attention.

There was nothing unique about this story. In fact, the only thingthat was even remotely unique was that it initially appeared in earlierstories at all. Most fraud cases, especially thefts and embezzlements,never even make it to the public’s eye for many reasons. Statistically,one in nine matters ever appear in the media, and I know from myown personal experience that one is nine is pretty accurate.

Cases are often resolved quietly under confidential circum-stances, and when they are reported for public access, they appearin abbreviated fashion. The lack of stories and details give readerslittle or no means of learning how these types of cases occur or arediscovered, investigated, and ultimately resolved. For experiencedand inexperienced fraud professionals alike, there is little availableto initially learn or keep abreast of the latest fraud tactics. Readerswant details. I want details. The problem is I never find them.

The stories and cases that actually do grab the media’s attentionmerely report the end result of weeks, months, and even years ofinvestigative procedures. Due to space, time, and cost limitations,only select highlights or points are typically included to tell the story.Along the lines of Sergeant Joe Friday’s approach from the televisionseries Dragnet, the story omits all the rich details in exchange for the‘‘Just the facts, Ma’am’’ writing style.

What about how the case came to light in the first place? Howabout the stakeout and raid used to secure much of the evidence

(Continued )

Smith was released on a $100,000 bond and is scheduled to appear in court next

month on March 29th. No one answered the phone at Smith’s residence, and messages left

for his attorney went unreturned.

xii Introduction

Page 15: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1CINTRO 11/20/2009 13:16:1 Page 13

that was instrumental in leading to the arrest? Who were theindividuals behind the scene putting the case together, siftingthrough ledgers, canceled checks, and other records that com-prised a mountain of evidence? Who handled all that information,and where does one store that kind of evidence? What else wasfound during the investigation, and where did it lead in the case?Who were the witnesses, and did the suspect act alone or with theassistance of an accomplice? Were computer forensics involved,and what was discovered on their computers? We want the juicydetails that are next to never reported.

The rich details are rarely found in the news stories, and arelacking in most books published on fraud and fraud investigations,yet the who, what, where, when, how, and why are the very details soughtby readers of all levels, within and beyond the fraud profession.There is such a need to tell the full tales of the unsung heroes (if youwill) who bring their expertise and experience into an investigationto help solve a particular matter or crime. I know from my ownexperience that getting paid for the work is a motivator for many, butmany fraud investigators like myself simply enjoy the challenge ofpiecing together a fraud investigation. Persisting on a minor detailthat leads to the discovery of major information, or listening to awitness’s or suspect’s story or explanation, only to systematically leadthem through an unraveling at their own hands, is what drives me.

These are the details that make fraud investigative work interest-ing and challenging—articulating the thought process from begin-ning to end. What led to the need to raid the location? What was itlike showing up unexpectedly and taking over? How did the employ-ees react? How did you deal with all that information, including thatof the employees’ computers? And why did the media never learnabout the whole thing going on right under their noses?

This book is intended to fill the void created by omitting the richdetails, and provide in as much detail as possible the steps andmeasures used in an actual fraud investigation, starting from the timethe initial allegation was received right through to the final resolu-tion of the matter.

While the facts specific to the case have been changed to protectthe identities of all parties involved, the basis of this book is an actualfraud investigation based on firsthand knowledge of all the details.This is particularly applicable when the nature and amount of thetheft is first identified. While the fraud schememay seem unusual for

Introduction xiii

Page 16: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1CINTRO 11/20/2009 13:16:1 Page 14

the organization depicted in the story, the number of transactions,dollar amounts, fraud methodology, and other details are factual,based on the actual victim organization.

In order to provide more to the reader beyond simply sharingan interesting story, fraud facts, learning points, and key consider-ations have been added throughout the book relevant to thesections of the investigation, enabling the reader not only to learncritical fraud-related issues at each stage of an investigation, butalso to relate the materials to the actual case discussed throughoutthe book.

I hope you enjoy the case involving Mr. Smith and Crestview.

xiv Introduction

Page 17: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1C01_1 11/20/2009 1

1C H A P T E R

FIRST INDICATIONS(THEY'RE DOING WHAT?)

It was a bit after 5:00 P.M. on a Friday afternoon. The sun was out andstill strong, and I was looking forward to ending my busy week byrelaxing outside in my reclining lawn chair, soaking up the warmevening air. I had just pulled into my driveway and started to unloadmy client files and briefcase from the trunk ofmy car when I heardmycell phone ringing. As it rang, I fumbled throughmy pockets trying tofind it, only to realize I had left it on the front seat of the car. Ofcourse, by then the fourth ring had finished, and the caller went intomy voicemail. I carried the files into the house and returned back outto retrievemy phone and see if the caller left amessage. Although themissed call number looked familiar, I couldn’t place it.

I retrieved the message and recognized the voice immediately.It was the chief financial officer of a well-known non-profit organi-zation called Crestview that I had done work for in the past. I knewright then before I concentrated on his message that if he was callingme on a Friday night after 5:00, something big was happening orabout to happen. His message went like this:

‘‘Steve, TimHill. How are you? Sorry to bother you on a weekend,but I need to talk with you, the sooner the better. Any chance you cancall me back tonight when you receive this message, I would appre-ciate it. I will be here late tonight, and you can reach me anytime onmy cell phone. My number is 806-510-1234. I would really like to talkwith you as soon as possible.’’

I took out a pen and pad from my car and listened to hismessage a second time, this time writing down his cell number. I

1

Page 18: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1C01_1 11/20/2009 2

walked into the house, checked in with my wife and kids, and letthem know I needed to return a very important call to a client that Ijust received. Then I walked back outside, straight over to my frontsteps, and sat down, knowing the call might take a while and thatthe sun lasted the longest in that area of my yard. I knew once Ireturned Tim’s call that my plans for a restful night and weekendwere going to change.

� � �

I dialed his number and he answered immediately. After asking eachother what was new and how things were going, I asked Tim how Icould help. He asked me if I had a few minutes, or did I want to callhim back later in the evening when he could spend a few minuteswith me on the phone. I told him now would be fine. Tim providedme with the following details:

‘‘I received information this week that a controller in one of ourdivisions could be stealing money from the organization. While theperson who provided me with this information wished to remainanonymous and provided little to no details, I told them there waslittle I could do unless they provided me with more details andpossibly examples of how the controller was stealing the funds.Reluctantly, they managed to get a copy of a credit card statementused by the controller that is paid through their division’s checkingaccount. Once I saw the statement, I realized I had a big problemdue to the high volume of personal charges made on the card inthe one month alone that was paid using the division’s funds. Thecontroller does not know I am aware of this information, or that Ihave a copy of his credit card statement. The person who providedme with the information works in the same division and cannotbecome known in this matter as the source of the information, norcan we acknowledge that we have a copy of the credit card statement.The controller will be able to identify who provided it to me im-mediately if it ever becomes known that we have it. The division hasfive employees at their location, and theymanage their own finances.They collect their own revenues and pay their own bills. The con-troller keeps all the records for their division out at their location,and he has an office manager who helps keep things filed andorganized. I need your help this weekend to think about what Ijust shared with you, and to come up with a plan to address this issue.

2 Anatomy of a Fraud Investigation

Page 19: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1C01_1 11/20/2009 3

I want to deal with it as quickly as possible, and will be available allweekend if needed to react to this by Monday morning. What areyour thoughts?’’

I simply sat in the sun in silence, listening to Tim provideme withthe details, and watching the sun set on my weekend plans. For aninstant, I thought about how virtually every fraud embezzlement casehad come to me on a Friday afternoon typically around 4:00, just intime to ruin a perfectly good weekend.

I told Tim I understood the gravity of the situation, and would beavailable to help him as much as needed throughout the weekend. Ithen started in with my standard host of questions, a process I call‘‘triage.’’

I asked Tim these questions, and have included his responses.‘‘Other than the informant who provided the card statement, is

there anyone else at the division aware that you know the controllermay be stealing funds?’’ Tim indicated he was certain the controllerand the other staff did not know that the information was brought tohis attention.

‘‘Is there any reason to believe the controller knows his situationhas been compromised, and would be destroying the evidence aswe speak?’’ Tim stated the informant called him to let him knowthe controller had left for the weekend as usual, and that nothingunusual or suspicious was noted with his behavior throughout theday. Tim indicated there would be no risk of loss of evidence bywaiting and working on a plan over the weekend versus going to thedivision immediately and securing any evidence.

FRAUD FACTS

Anonymous tips and complaints are the leading method of detection of fraud. According to

the Association of Certified Fraud Examiners’ 2008 Report to the Nation on Occupational

Fraud & Abuse, tips accounted for 46 percent of all frauds detected, followed by 20 percent

discovered by accident.1 Tips included employee, customer, and vendor complaints, and

were the leading detection method in their 2006 survey as well. The high percentage of

detection by anonymous tips emphasizes an organization’s need to educate employees

regarding their fiduciary duty to provide information, as well as implement a means or

process for individuals to provide such information. On the receiving end, the organization

must implement a system to collect, screen, and process complaints and information

when it is received.

First Indications (They're Doing What?) 3

Page 20: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1C01_1 11/20/2009 4

‘‘Do they have computers at their location, and are they backed upin a reliable fashion in the event the controller or anyone elsepotentially involved gets nervous and deletes the hard drives?’’Tim indicated there were computers on each desk and a localarea network, and that they performed their own backups on a regularbasis. Tim was not aware of how the backup tapes were maintained.

‘‘Is the organization’s legal counsel involved and up to speed onthis matter?’’ Tim stated he had been speaking with counsel

LEARNING POINT

Why would it be important to know if anyone was aware that the scheme

had become known? Timing in these cases is everything. In virtually every

fraud matter, the perpetrators maintained evidence of their crime, in the

form of documents in a drawer, tracking the details in a notebook, or

keeping files electronically on their computers. Once they feel their

circumstance has been compromised by someone learning about their

misdeeds, the evidence is almost immediately destroyed or removed offsite.

If they have left the building for the day, they come back after-hours and

steal or destroy the evidence. They also call co-workers and ask favors

of them. Such favors could include deleting files and bringing physical

files and information home with them. Fraud perpetrators have been

known to break into their employer’s buildings or even burn the building

down in acts of desperation to ensure the evidence is never found and

used against them. I had one case involving an employee embezzlement

where the suspect burglarized the office, stole the receipts ledgers, and

corrupted the computer files so no one could access the computerized

accounting system the next morning. A week or so later the same office was

burglarized a second time, only this time some of the accounting records

were actually returned in a poor attempt to show they were there the entire

time, buried below other papers and information. Desperate people do

desperate things.

Knowing that, timing is of the essence in these cases. Typically, I like to

deal with searching for evidence immediately after receiving a call such as

Tim’s. In my experience, too much happens if you wait until tomorrow

morning. I drive right to their location regardless of the time of day, and

secure any and all information possible, removing any possibility of it being

lost, stolen, or destroyed. If I find any actual or potential evidence, it all leaves

with me so I can be assured nothing will happen to it. If there are computers

involved, they come with me as well.

4 Anatomy of a Fraud Investigation

Page 21: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1C01_1 11/20/2009 5

throughout the week awaiting the credit card statement, and that asrecent as late afternoon he had spoken to counsel about the status ofthe matter. Counsel was aware that Tim would be reaching out to meto solicit my involvement in resolving the matter.

LEARNING POINT

Why would you want to know about any computers, as well as if and how

they were backed up? Just as with physical evidence, such as ledgers, checks,

and bank statements, computer files and hard drives are at equal risk for

corruption or deletion if not preserved in a timely fashion. Often, users

have remote access into the business systems, and in some cases have access

directly into their individual workstations, depending on the level of

technology, sophistication, and authority involved. Once the computer

hard drives have been deleted or physically stolen from the computers,

recovering the files becomes much more difficult, if not impossible. Having

reliable and secure backups of the drives creates a secondary plan in the

event files are deleted or computer drives are deleted. However, if the

backup tapes and drives are under the control of the same person or

individuals potentially involved in the matter, both the computer drives

and the backups are at risk of theft or destruction. Beating suspects to the

punch by imaging the drives, making a backup, or taking possession of their

computer will provide the best scenario for finding electronic evidence, if

any exists.

Before setting out to preserve any potential electronic evidence, answers

to a few questions may help. Are the computers desktops or laptops? Does

the target use any other electronic devices, such as a hand-held phone or

BlackBerry, to access his files and e-mails? The mobility of computers can

create many issues and concerns—first and foremost, physically locating

where the devices exist at any point in time. Chances are if the target uses

anything but a desktop, his laptop and devices remain with him at all times. If

the laptop is not at the organization, it will make it difficult to seize it or make

an image of the hard drive without the user’s knowledge.

Remote access to the organization’s systems, files, and information may

need to be disabled to the target once the investigation has been initiated.

Knowing all the means the target has available to gain access will help ensure

all points of access have been disabled, preventing the target from secretly

accessing and deleting key files and information, or worse, stealing company

information, such as client and customer lists or trade secrets, before being

terminated.

First Indications (They're Doing What?) 5

Page 22: ANATOMY OF A...more about fraud investigation.” —John D. Gill, J.D., CFE, Vice President–Education Association of Certifi ed Fraud Examiners “In Anatomy of a Fraud Investigation,

E1C01_1 11/20/2009 6

FRAUD FACTS

The sophistication of an average perpetrator has likely been raised by what has been

termed the CSI effect. In essence, individuals have been watching episodes of crime and

forensic shows on television, and have learned what things are important in investigating

various types of crimes. Much information is also available to a perpetrator through the

Internet. One example is with software and technology available to remove files and

evidence from computer hard drives. Wikipedia, the Internet-based encyclopedia, includes

the term anti-computer forensics, which is defined as ‘‘a general term for a set of

techniques used as countermeasures to forensic analysis.’’ Much more information is

included by Wikipedia in its definition, providing would-be perpetrators with knowledge

that could aid them in preventing detection and recovery of supporting evidence.

LEARNING POINT

Legal counsel plays a very important role in every fraud investigation. First

and foremost, no privilege exists between a client and an accountant, or a

client and a fraud investigator. Any and all communications and procedures

performed for the client will be wide open for discovery, and worse, the

potential will exist that the very professionals retained to help the client

resolve a matter could become witnesses against the client. To help ensure

that all communications, procedures, and information are protected from

discovery, the client should engage counsel to direct the inquiry or investi-

gation. The accountant, fraud investigator, computer forensic specialist, and

anyone else brought into the case should then be engaged directly by

counsel. In order to preserve the privilege between the client and counsel,

all communications should be directly to counsel, and all work performed

should be clearly marked confidential and attorney-client privileged.

In many investigations, issues are identified within the victim organiza-

tion beyond those relating to the fraud matter being investigated. In most

cases, the discovered information could prove detrimental to the organiza-

tion, and therefore may need to be protected by maintaining it as confiden-

tial. Having been engaged as a consulting expert directly by counsel will help

preserve the information from being disclosed. Conversely, if counsel

changes strategies later in the investigation and decides to disclose the

same fraud professional as an ‘‘expert’’ for trial purposes, counsel does so

at the risk that any and all information collected and discussed from the

inception of the matter will be discoverable. This is something to keep in

(Continued)

6 Anatomy of a Fraud Investigation


Recommended