60,99 €
The definitive, must-have guide for the forensic accounting professional Financial Forensics Body of Knowledge is the unique, innovative, and definitive guide and technical reference work for the financial forensics and/or forensic accounting professional, including nearly 300 forensic tools, techniques, methods and methodologies apply to virtually all civil, criminal and dispute matters. Many of the tools have never before been published. It defines the profession: "The Art & Science of Investigating People & Money." It defines Forensic Operators: "...financial forensics-capable personnel... possess unique and specific skills, knowledge, experience, education, training, and integrity to function in the financial forensics discipline." It defines why: "If you understand financial forensics you understand fraud, but not vice versa" by applying financial forensics to all aspects of the financial community. It contains a book-within-a-book Companion Section for financial valuation and litigation specialists. It defines foundational financial forensics/forensic accounting methodologies: FAIM, Forensic Accounting Investigation Methodology, ICE/SCORE, CICO, APD, forensic lexicology, and others. It contains a Reader Lookup Table that permits everyone in the financial community to immediately focus on the pertinent issues.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 822
Veröffentlichungsjahr: 2012
Contents
Cover
Series
Title Page
Copyright
Dedication
Preface
Acknowledgments
Introduction
WHAT IS A METHODOLOGY?
WHY WAS THIS BOOK WRITTEN?
HOW TO USE THIS BOOK
ABOUT THE BOOK'S WEBSITE
HOW THIS BOOK IS ORGANIZED
PART One: Financial Forensics Tools, Techniques, Methods, and Methodologies
CHAPTER 1: Foundational Phase
ASSIGNMENT DEVELOPMENT STAGE
SCOPING STAGE
CONCLUSION
CHAPTER 2: Interpersonal Phase
INTERVIEWS AND INTERROGATION STAGE
BEHAVIOR DETECTION
BACKGROUND RESEARCH STAGE
CONCLUSION
CHAPTER 3: Data Collection and Analysis Phase: Part I
DATA COLLECTION STAGE
FORENSIC DOCUMENT REQUEST
Surveillance Stage
CONFIDENTIAL INFORMANTS STAGE
UNDERCOVER STAGE
LABORATORY ANALYSIS STAGE
CONFIRMATION BIAS: CLINICAL THINKING
ABERRANT PATTERN DETECTION: WHAT'S THE DIFFERENCE?
FORENSIC LEXICOLOGY:35 HOW TO ANALYZE WORDS LIKE NUMBERS
CONCLUSION
CHAPTER 4: Data Collection and Analysis Phase: Part II
ANALYSIS OF TRANSACTIONS STAGE
THE MYTH OF INTERNAL CONTROL
FINANCIAL STATEMENTS—WRITTEN CONFESSIONS
60-SECOND METHOD
FORENSIC INDICES
FORENSIC FINANCIAL ANALYSIS
CONCLUSION
CHAPTER 5: Data Collection and Analysis Phase: Part III
FSAT—FINANCIAL STATUS AUDIT TECHNIQUES
APPLYING DIGITAL ANALYSIS TECHNIQUES IN FINANCIAL FORENSICS INVESTIGATIONS
VALUATION & FORENSICS—WHY & HOW
VALUATION'S ORPHAN
CONCLUSION
CHAPTER 6: Trial and Reports Phase
TRIAL PREPARATION STAGE
TESTIMONY AND EXHIBITS
WEAPON (WPN)
REPORTS AND EXHIBITS: TIPS AND TECHNIQUES
POST-ASSIGNMENT
CONCLUSION
PART Two: Financial Forensics Special Topics
CHAPTER 7: Counterterrorism: Conventional Tools for Unconventional Warfare
STOP THE MONEY—STOP THE TERRORISTS
CIVIL TOOLS USED BY FEDERAL LAW ENFORCEMENT
THE CIVIL STATUTES AS COUNTERTERRORISM WEAPONS
WHY USE CIVIL LAWS IN ADDITION TO CRIMINAL LAWS?
DISCUSSION OF ALTER EGO
ALTER EGO LITERATURE
ALTER EGO JURISDICTIONAL EXAMPLES
THE CHALLENGES OF ALTER EGO INVESTIGATION
FRAUDULENT TRANSFER
SOLVENCY
FORENSIC ACCOUNTING TECHNIQUES
ALTER EGO, FRAUDULENT CONVEYANCE, AND SOLVENCY MATTERS IN ACTION
WHAT TARGET-RICH SCENARIOS CAN BE EXPLOITED?
FORENSIC ACCOUNTING: COUNTERTERRORISM WEAPONRY
FINANCIAL STATEMENTS—THE SOURCES OF DATA
WHEN FINANCIAL STATEMENTS CONTAIN LAUNDERED MONEY
WHEN NO RECORDS HAVE BEEN PREPARED BY THE TERRORIST
SUMMARY OF FORENSIC ACCOUNTING OBSERVATIONS
A FORENSIC ACCOUNTING METHODOLOGY TO SUPPORT COUNTERTERRORISM
SUMMARY
CONCLUSION
CHAPTER 8: Civil versus Criminal Law Comparison
COMPARISON
WHAT IF YOU SUSPECT EMBEZZLEMENT?—THE THREE BIG DON’TS AND SEVERAL DO'S
CONCLUSION
APPENDIX: Forensic Inventory
Bibliography
About the Authors and Contributors
CONTRIBUTING AUTHORS
Index
Founded in 1807, John Wiley & Sons is the oldest independent publishing company in the United States. With offices in North America, Europe, Australia, and Asia, Wiley is globally committed to developing and marketing print and electronic products and services for our customers’ professional and personal knowledge and understanding.
The Wiley Finance series contains books written specifically for finance and investment professionals as well as sophisticated individual investors and their financial advisors. Book topics range from portfolio management to e-commerce, risk management, financial engineering, valuation, and financial instrument analysis, as well as much more.
For a list of available titles, visit our Web site at www.WileyFinance.com.
Copyright © 2012 by Darrell D. Dorrell and Gregory A. Gadawski. All rights reserved.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. For more information about Wiley products, visit our web site at www.wiley.com.
Library of Congress Cataloging-in-Publication Data:
Dorrell, Darrell D.
Financial forensics body of knowledge / Darrell D. Dorrell, Gregory A. Gadawski. — 1
p. cm. (Wiley finance ; 616)
Includes bibliographical references and index.
ISBN 978-0-470-88085-2 (hardback); ISBN 978-1-118-21896-9 (ebk);
ISBN 978-1-118-21897-6 (ebk); ISBN 978-1-118-21898-3 (ebk)
1. Financial crimes. 2. Forensic accounting. 3. Fraud investigation. I. Gadawski, Gregory A. II. Title.
HV6769.D675 2012
363.25′6—dc23 2011034183
This book is dedicated to the citizens of the United States of America, and those who gave their lives to defend its foundational values and precepts, established by the Declaration of Independence, the Constitution, and the Bill of Rights. The book's contents compel rational thought and decision making based upon facts, evidence and integrity. Thus, America's citizens can restore, sustain, and strengthen our core beliefs that Bill of Rights“…all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness…” Re-orienting America with our beginnings will counter recent stridencies making demands “For the benefit of the few, to the detriment of the many.” American citizens will once again learn that we are “…one Nation under God…” and the world's citizens will benefit from America's strengths, leadership and commerce. God bless America!
Preface
The genesis of this book dates to 9:50 A.M. EST, Friday, June 29, 2001. I will explain that in a moment.
Since that date, thousands of forensic operators throughout North America have received training in all or some of this book's content. They include a cross-section of both the public and private sector and comprise (alphabetically) analysts, attorneys, attorneys general, auditors, bankers, certified public accountants (CPAs), chief financial officers (CFOs), consumers, controllers, district attorneys, fiduciaries, internal auditors, investigators, investment bankers, journalists, judges, law enforcement (federal, state, and local), non-CPAs, professors, prosecutors, retirees, students, treasurers, and others. They represent publicly held companies, privately held companies, non-profits (NPOs) non-governmental organizations (NGOs), and many branches of government, including FBI, SEC, USDOJ, state and local agencies, and others.
Throughout the training, attendees consistently requested the content in book format. There were two primary reasons for their requests. First, the training and (now) this book constitute the most all-inclusive codified financial forensics body of knowledge known to exist. Most other financial references focus myopically on fraud to the detriment of all other financial arenas. Their narrow focus contradicts the vital need for guidance in all financial dimensions, that is, performance measurement, investment, regulation, and reporting, in addition to fraud. Therefore, the all-inclusive nature of the tools, techniques, methods, and methodologies of this body of knowledge integrate fraud as a subset. As the saying goes, “If you understand financial forensics, you understand fraud, but not vice versa.”
Also, even though this book's content is substantially available through the Financial Forensics Academy™ training and Internet site, this book contains more explanation. Books are often preferred for their physical characteristics, ready availability, and go-anywhere features. Furthermore, experienced forensic operators know that books can be more persuasive in court than electronic contents.
Returning to 9:50 A.M. EST, Friday, June 29, 2001 …
That was the last day of my weeklong attendance at the FBI National Academy in Quantico, Virginia. I delivered a financial forensics training session to about 250 FBI Special Agents earlier in the week. My security clearance permitted me to attend many other briefings and training during the week, including FBI, CIA, US Marshals, Federal Reserve, and others.
While I searched for an auditorium seat for the 10 A.M. session, the FBI Training Director sought me out and asked me to deliver the 10 A.M. presentation ad hoc. A matter of national emergency had diverted the assigned speaker. The training director did not describe the national emergency but was visibly distressed. I misinterpreted his distress as anxiety due to the last-minute speaker absence.
Terrorists attacked the United States 74 days later, on September 11, 2001. Post-9/11 analysis indicates the June 29 national emergency was one of the precursors to the attack.
Like most Americans, I remember precisely what I was doing when I learned of the September 11 attacks. Furthermore, like most Americans, words cannot express the anguish that I suffered. I can summarize, however, by saying that, for 24 hours, my mind reeled, seeking ways to join America's war against terrorism. I knew that even if I could talk my way into the military, there was no way my wife would permit me to enlist. Consequently, I agonized through dozens of scenarios playing out how I might contribute to America's fight.
I had an epiphany almost exactly 24 hours later—I could crystallize three critical facts that I had learned at Quantico. First, I learned that FBI Special Agents and law enforcement specialists in general deploy financial crimes methodologies in their assignments. The methodologies may vary by agency, but they share certain commonalities with the financial investigations conducted by forensic operators and some CPAs.
Second, I learned that terrorists covet the annihilation of anyone whose beliefs differ from theirs. Terrorists execute their subhuman life goals of obliteration by subsisting on tiny amounts of money. This may seem counterintuitive, but they can, and do when necessary, operate on a shoestring. For example, $20,000 was the estimated cost necessary for all the terrorists’ expenses for the October 2000 boat-bomb that killed 17 Navy sailors, wounded 35, and nearly sunk the USS Cole. The US Navy's Arleigh Burke–class destroyer cost $984 million to launch. Before 9/11, small sums of money were off the radar screen of investigators, since large sums, for example, drugs and money laundering, had received nearly all the attention. Consequently, new forensic tools, techniques, methods, and methodologies were crucial to address both large and small sums of money in both civil and criminal investigations.
Finally, I realized that the financial forensics methodology that my firm developed in the late 1990s could capture both civil and criminal investigation parameters for all financial matters, whether large or small. We published the codified methodology through the United States Department of Justice, Executive Office for United States Attorneys, National Advocacy Center in two issues: “Counterterrorism: Using Conventional Tools for Unconventional Warfare,” United States Attorneys’ Bulletin 53, no. 2 (March 2005) and “Forensic Accounting: Counterterrorism Weaponry,” United States Attorneys’ Bulletin 53, no. 3 (May 2005).
Nearly everyone who received training in this book's content applauds it by citing two factors as unique. First, they cite the methodology, a method suited for virtually any financial forensic matter. The methodology is an interactive process map that mirrors military mission–specific doctrine. Military strategists know that “No battle plan survives first encounter with the enemy.” Therefore, military operators must be so well trained in their mission that they can course-correct the instant combat surprises appear. Likewise, forensic operators know that “No investigation plan survives first encounter with the people and money.” Training in a foundational methodology, therefore, ensures continual progress during any assignment.
Second, the methodology presently contains 250–plus or minus unique tools, techniques, methods, and methodologies that apply to virtually any large or small financial matter—civil, criminal, and dispute. This permits forensic operators to draw from a vast contemporary toolkit optimized for every assignment. The advantages are obvious: the right tools ensure more efficient and effective assignments; using the proper tools nullifies the dictum “Owning only a hammer, everything begins to look like a nail.” New forensic tools, techniques, methods, and methodologies continually update the toolkit. Therefore, forensic operators can rely on the methodology since it is quite literally never out of date. Furthermore, the methodology mirrors the process of an assignment, so that tool selection matches the assignment progress.
Greg and I, as the authors of this work earnestly desire that the contents of this book will help redefine the financial forensics profession and serve financial originators, users, and regulators.
DARRELL D. DORRELL and GREGORY A. GADAWSKIJuly 2011, Lake Oswego, OR
Acknowledgments
Ihave struggled during the past several months contemplating how I could possibly distill my life's innumerable blessings and thank those who have led me to this book. The obvious dilemma is that if I covered everyone who made significant contributions to my personal and professional life, it would exceed the length of this book. Alternatively, a succinct acknowledgement would inevitably exclude many, many people.
My wife, Cindy, is the single most important person to me on the face of the Earth and is the greatest blessing that I have ever received, closely followed by our daughters. She gave her gifts of beauty, intelligence, sophistication, independence, athleticism, and personality to our three beautiful, smart, sophisticated, independent, athletic, and personable daughters of our marriage, Heather, Heidi, and Holly. Heidi and Heather have brought three brilliant, handsome, and athletic grandsons, Gavin and Wyatt, and Bond into our family. They each uncannily resemble me. Naturally, our daughters’ husbands, Craig and Chris, are an essential part of the equation! We are proud to have them as sons-in-law.
Our extended families are a key part of our lives, including Bob and Dolores Smith, Kevin Smith, Dr. Wendy Smith, Perry Smith, PE, and Barry Smith and their families.
Our friends, associates, and colleagues, especially those at financialforensics®, Heidi, Janet, and Kevin, mark another blessing. Their integrity, commitment to excellence, and devotion to the profession are exemplary. Other people have profoundly influenced this book (often in ways unknown to them) including (chronologically), Rev. Vergil DeFreece, Terry Callaway, Eric Harris, JD, William Smart, Sid Robertson, Kenneth Docter, Mark Lutchen, Dr. J. Vernon McGee, Ron Decker, Dr. James Dobson, Dr. F. Owen Black, Dr. Charles Swindoll, Richard and Kathy Snyder, David and Charles Fein, and Greg and Hiromi Hadley.
Our clients inspire us! We have worked with some of the most outstanding people in America, and their professional passion and entrepreneurial perseverance motivates us to be the best possible forensic operators.
Likewise, our colleagues throughout the United States have demonstrated a continual striving for excellence and have both contributed ideas and reinforced the effectiveness of the tools, techniques, methods, and methodologies constituting our portfolio.
Finally, my father, John, who gave his life to defend America and ensure the freedoms and privileges that we enjoy today, was key to the foundational values and principles of my early years. His early life struggles with abandonment, his daily (and hourly) combat to survive during World War II, as a Japanese POW, his extraordinary encounters with history, and his short life after the War personify him as part of the Greatest Generation. I owe him more than I can ever articulate.
A singular note about Greg Gadawski: We have been friends and business partners for more than 10 years, and he exemplifies the saying “Select your business partner more carefully than your spouse.” He has supported me throughout the odyssey of building and growing our unique practice and perhaps more important, invariably redirects me to the proper course. He has uncommon talent in the financial forensics discipline and will inexorably achieve his place of international eminence in the profession.
DARRELL D. DORRELL
I would like to acknowledge all of those who have collectively contributed to the development of the Forensic Accounting/Investigation Methodology (FA/IM ©), the Forensic Accounting AcademyTM, and ultimately this book. It has been a long and tedious process that would not have been possible without the contributions of some of the best and brightest forensic operators in the world.
Furthermore, I would like to thank all of those who continue to contribute to advancement of the field of financial forensics. These are the people who are constantly developing or refining the countless tools and techniques for our profession. Their contributions have been invaluable, as we must always strive to be better, more efficient, and one step ahead of the bad guys.
I would like to thank all of our co-workers at financialforensics® for the extraordinary patience they exercised with Darrell Dorrell and me during the compilation of this book, and consistently on a day-to-day basis. Their support and contributions have been critical to our success and personal development.
Naturally, I would like to thank my wife for her continued love and support. She is my best friend and partner in life. She has blessed me with a handful of beautiful children and I look forward to spending the rest of my life with her by my side.
Finally I would like to acknowledge the person that has made all of this possible, Darrell Dorrell. Darrell encouraged me to enter the profession of financial forensics and ever since then he has been a great friend and business partner. Darrell is truly a visionary and it is a blessing to work alongside him every day. It is an immense understatement to say that without Darrell Dorrell none of this would have been possible.
GREGORY A. GADAWSKI
Introduction
This book describes and illustrates the copyrighted, trademarked, and patent-in-process (through the USPTO1) financial forensics/forensic accounting methodology. It can be deployed as-is in this book or through its comprehensive software-driven, Internet-based financial forensics methodology, Forensic Accounting/ Investigation Methodology©, or FA/IM©. Other financial forensics methodologies are also described, both inside and outside of FA/IM. They include 60-Second Method, BIC, FSAT, and ICE/SCORE©, among others.
FA/IM has been delivered for nearly ten years throughout the United States in training sessions ranging from 1 or 2 hours, 1 or 2 days, or through our signature 5-day Forensic Accounting Academy©. Naturally, shorter sessions cover less content.
The numerous participants’ responses have been nearly universal, stating that:
“It is the most comprehensive tool that I have ever seen” or
“I have never seen the forensic process demonstrated so logically” or
“I love the fact that it is continually updated” or
“I can leave the session with tools for immediate use” or
“This is what the accounting profession should have produced.”
The methodology and its tools can be deployed whether or not the software is accessed through subscription. A thorough read through of this book enables a forensic operator to deploy the methodology and its embedded tools, techniques, methods, and methodologies in civil, criminal, and dispute matters. However, the book's content, augmented by the software-driven, Internet-based methodology gives forensic operators more accessibility and ensures continually updated leading-edge content.
WHAT IS A METHODOLOGY?
Skilled forensic operators routinely deploy methodologies, but their clients and other parties occasionally need explanation regarding the term methodology. Simply put, a methodology is a formal or informal way of doing things. Merriam-Webster defines a methodology as “A body of methods, rules, and postulates employed by a discipline; a particular procedure or set of procedures.”2 Virtually everyone uses methodologies on a day-to-day basis.
The following examples summarize simple methodologies encountered on a day-to-day basis.
Baristas follow a methodology to make a latte, depending upon the size, ingredients, toppings, and other customer preferences.Grade-school children follow a methodology to add, subtract, multiply, and divide numbers by hand, “… carry the nine …”Users follow a methodology to launch a software program. That is, the user enters a user ID, followed by a password.Law enforcement officers follow a methodology to clear jammed semiautomatic pistols, consisting of “tap, rack, bang.”Cashiers use a methodology to close out the till at the end of their shift.Health enthusiasts follow a methodology when working out, such as warm-up and stretch, workout, and cool-down.Men follow a methodology when getting ready in the morning, comprising the tasks of teeth-brushing, flossing, shaving, and other ablutions.The preceding examples outline simple methodologies used for a wide variety of purposes. Methodologies also exist for more complex activities, as indicated next.
Corrections officers follow a methodology when returning prisoners to their cells and securing the facility.Pilots follow a preflight methodology to ensure safety.Hairstylists follow a methodology when trimming, cutting, shaping, styling, or other actions, depending on the customer's preference.Chefs follow a methodology when preparing various dishes.Accounting firms follow a methodology to plan and execute audits.Medical assistants follow a methodology after a patient checks in for a physician's visit.Housekeepers follow a methodology to clean hotel rooms.Reporters follow a methodology3 when writing articles and columns.The list of example methodologies is literally endless, but the point is clear— methodologies are integral to human beings. Also, methodologies have existed since man's earliest days. For example, nearly 2,000 years ago Moses was instructed, “See to it that you make everything according to the pattern shown you on the mountain.”4 However, none of the above examples provided one-to-one comparison for forensic operators. Forensic operators need a wide array of technical capabilities, any of which may be necessary depending upon the facts and circumstances of each assignment. Certain disciplines, though especially the military, law enforcement, and firefighters, serve as useful models for forensic operators. A few of them are listed here.
United States Marine Corps—The official mission of the Marine Corps is established in the National Security Act of 1947, amended in 1952. Marines are trained, organized, and equipped for offensive amphibious employment and as a “force in readiness.” According to the Act, Marines stand prepared to meet mission requirements.582nd Airborne Division—The mission of the 82nd Airborne Division is to, within 18 hours of notification, strategically deploy, conduct forcible entry parachute assault, and secure key objectives for follow-on military operations in support of US national interests.6Delta Force—The unit commonly referred to as Delta Force is the US Army's special operations unit organized for the conduct of missions requiring a rapid response with surgical application of a variety of unique skills while maintaining the lowest possible profile of US involvement.7 They plan and conduct a broad range of special operations across the operational continuum.LAPD SWAT—Los Angeles Police Department's SWAT (Special Weapons and Tactics Team) responds upon the request of the Incident Commander (IC) to barricade and hostage episodes or suicide intervention, or both, as well as initiate service of high-risk warrants for all department entities.8FDNY—Fire Department of New York—As first responders to fires, public safety, and medical emergencies, disasters, and terrorist acts, FDNY protects the lives and property of New York City residents and visitors. The department advances public safety through its fire prevention, investigation, and education programs. The timely delivery of these services enables the FDNY to make significant contributions to the safety of New York City and homeland security efforts.9When one reviews the shortlist of preceding examples (there are several hundred good examples not listed), a sense of awe, respect, skill, courage, and other positive attributes prevail. Each of the preceding examples has a common trait: They embody superbly trained experts—superbly trained.
In most cases, they constantly train in their mission, their objectives, their tools, their methodologies, and every other factor to continually refine their skills. In fact, many train their entire career with scant opportunity to deploy their capabilities. The constant training focused on their respective missions enables them to achieve their respective mission objectives.
More important, though, they are so superbly trained that they can deviate from their mission and still be successful. The capability to deviate is necessary because combat and emergencies invariably present them with unexpected circumstances. Military strategists and combat veterans know that “No battle plan survives first encounter with the enemy.” Therefore, military operators must be so well trained in their mission that they can course-correct the instant combat surprises appear.
Forensic operators are no different—the public anticipates, the courts expect, and the profession requires forensic operators who are superbly trained in their craft—superbly trained. … Consequently, forensic operators know, “No investigation plan survives first encounter with the people and money.” Forensic operators serve at the pointy end of the spear and cannot function without appropriate tools, techniques, methods, and methodologies.
That is the purpose of FA/IM and the other financial forensic methodologies detailed in this book. It permits forensic operators to continually train for and refine their craft so that they approach every assignment superbly trained, with the ability to deviate. A methodology also defines training needs, since forensic operators can compare their skill sets with the comprehensive requirements codified by a methodology.
The Forensic Accounting/Investigation Methodology, or FA/IM, gives every forensic operator a specific tool that permits continual refinement of skills for everyone's benefit. Furthermore, it provides forensic operators the means by which to deviate from the assignment when the need arises.
WHY WAS THIS BOOK WRITTEN?
This book should have been written (or at least begun) about 100 years ago. That time horizon, that is, circa 1910 to 1930, is significant because of the preconditions and convergence of seminal economic, political, scientific, and social events reliant upon financial information. Complete discussion of such events is outside the scope of this book, but the discussion in this section makes the case.
Perhaps the single most startling example is contained in the September 26–28, 1904, proceedings of the Congress of Accountants held during the St. Louis World's Fair. The following extraction from the proceedings summarizes the need for this book.
The rise of large corporations in the decades before the [C]ongress … and some spectacular panics and stock market crashes—underscored the importance of proper accounting procedures and financial reporting. This gathering of accountants at the dawn of the new century was intended as an event at which the attendees could consider what kinds of services and procedures businesses required and what the profession must do to meet those needs. (Emphasis added.)
Not knowing the date of original publication, one could easily place this quote within a few years of today's date. Indeed, the authors often display this quotation without a date and ask forensic operator training attendees to date the extract based on the text content. Invariably, the proffered dates fall very near the year 2000. That is about 100 years after its publication. Simply stated, the same problems that faced accountants 100 years ago still exist today. Therefore, this book addresses such problems through its financial forensics tools, techniques, methods, and methodologies.
This Is a How-To Book
This book is a how-to book. It contains, describes, and illustrates more than 250-plus-or-minus forensic operator tools, techniques, methods, and methodologies. The term forensic operator is used throughout this book to identify financial forensics-capable personnel. It was derived from the special operator term that describes USSOCOM10 Special Forces military personnel. Furthermore, forensic operator reflects the necessity for personnel to possess unique and specific skills, knowledge, experience, education, training, and integrity to function in the financial forensics discipline. The Forensic Inventory in the Appendix details the striking similarities between the job descriptions of the two titles, that is, special operator and forensic operator.
This book achieves its how-to status through seven unique features.
First, the vast majority of training and literature offered as financial forensics and forensic accounting training largely discusses the what of the discipline, not the how of the discipline. For example, the guidance offered by training and literature tells forensic operators to carefully analyze the financial documents but give few, if any, of the tools necessary to achieve such guidance. The few tools given are typically recitations of other publications. This book remedies that dilemma.
Second, this book purposely contains substantial content never before published within the financial forensics discipline, particularly as part of a comprehensive methodology. This feature is critically necessary for CPA forensic operators in particular. The accounting profession advises they label themselves forensic accountants despite providing a dearth of tools, techniques, methods, or methodologies for such a designation. Other professions, such as law enforcement, regulators, and so forth, do not make the same mistake; they gain legitimate training and expertise before attempting to do the work. Labeling oneself as forensic operator without commensurate skills is akin to trying to do a different job with the same tools. This book remedies that dilemma.
Third, a great deal of content in existing training and literature is highly duplicative. For example, many publications readily cite others’ works within its own contents, sometimes without attribution. Some contain substantial portions of print merely reproducing what is already available from the public record, for example, statutes, ordinances, and so forth. Although some duplication and republishing may be in order, forensic operators need and seek new tools, techniques, methods, and methodologies. This book remedies that dilemma.
Fourth, this book presents five unique training and learning options for forensic operators. Forensic operators can:
1. Use this book on a standalone basis.
2. Use this book augmented by its optional Internet subscription content from the Financial Forensics Academy™ at www.financialforensicsacademy.com.
3. Use the Internet site as a standalone tool.
4. Attend the 1- or 2-hour, 1- or 2-day, or 5-day Academy CPE sessions.
5. Combinations of the above.
The Internet site has the decided advantage of the continual, real-time update of new tools, techniques, methods, and methodologies, although subsequent book editions will, of course, also contain the new material. Previously, forensic operators had to look to numerous disparate sources for limited guidance. This book remedies that dilemma.
Fifth, this book gives forensic operators legitimate authority, as evidenced by its pedigree. For example, the Forensic Accounting/Investigation Methodology (FA/IM) that our firm created and formalized was originally published through the United States Department of Justice. In addition to that, the American Bar Association published descriptions of the methodology in a family law book.11 The rigorous and scrupulous reviews and editing of both publication sources give forensic operators significant confidence in the contents. Continuing references in courtroom settings and forensic reports further substantiate the tools, techniques, methods, and methodologies. Forensic operators continually seek to increase their confidence level in the tools they deploy. This book remedies that dilemma.
Sixth, this book serves as an ideal quality control and training tool within the forensic operator's environment. It can serve in academic environments, public sector organizations, accounting firms, law enforcement, regulators, military, and other venues to support forensic operator training and assignment execution. Many forensic operators function in an environment in which parties have vast differences in skill, knowledge, education, experience, and training. This book remedies that dilemma.
Finally, this book spans the gamut of financial information. It provides guidance to financial information originators, users, and regulators, thus establishing a single source for all parties. Most other publications offer a narrow focus, compelling users to seek multiple sources. This book remedies that dilemma.
The Definition of Financial Forensics
This book defines financial forensics and forensic accounting by the following phrase: The art & science of investigating people & money.© The definition dates from circa 199312 and the following exhibit symbolizes the definition's transcendence.
EXHIBIT I.1 Financial Forensics
Exhibit I.1 conceptualizes the universe of financial forensics tools, techniques, methods, and methodologies within the octagon shape. That is, the octagon represents every forensic technique on the face of the Earth. The ovals, such as “Economic Damages” and “Performance Auditing,” and so forth, represent different (noninclusive) services typically provided by forensic operators. The ovals also reflect two other factors. First, each displays significant overlap with the universe of financial forensics tools, techniques, methods, and methodologies or overlap with other services. This symbolizes how the collection of forensic tools, techniques, methods, and methodologies in this book almost universally to forensic services. That is, forensic operators should use common tools in virtually all assignments, thus increasing their proficiency.
Second, each oval displays a portion outside the financial forensics universe. That reflects the reality that certain service area requirements do not necessarily require financial forensics capabilities. For example, certain Financial Accounting Standards Board (FASB) requirements may fall outside the financial forensics universe. Also, statutes, precedents, jurisdictional requirements, and other guidance fall outside the financial forensics universe.
Furthermore, the figure places fraud within its appropriate context, as discussed in the Preface, that is, a subset of the financial forensics supra discipline. Forensic operators conducting fraud assignments indeed fall within the scope of financial forensics, but most financial forensics assignments fall outside the fraud realm. This book describes this broader scope and detail while still addressing fraud.
Finally, the public would be astonished to know that no definition of financial forensics exists that even approaches the essence of our work. Forensic accounting and financial forensics had various definitions in the past, all inadequate. In fact, some consider it akin to debate because of the root of the word forensic.13 Those misguided souls fail to consider the context of the root. That is, the Roman forum was the center of the world in its time. All legal, financial, societal, economic, cultural, moral (and immoral) laws, and mores derived from the Roman forum, where all roads led to Rome. Caesar was assassinated at the forum, and all manner of scheming and plotting took place there. It was anything but civil debate. Likewise, forensic operators function in career-ending and even life-ending environments. Such a realization germinated the CombatCPA© genre, as explained in the Appendix. Therefore, forensic operators must be realistic about the risks associated with such a dangerous undertaking, further substantiating the essential need for sophisticated tools, techniques, methods, and methodologies.
Events Converging about 100 Years Ago
The following events summarize those economic, political, scientific, and social events converging during the 1910 to 1930 time frame. They do not comprise an exhaustive treatment of the events but serve to illustrate the convergence of key points.
Economic Events
1896—The legal recognition of the CPA designation became effective April 17, 1896.14,151904—The Congress of Accountants convened at the St. Louis World's Fair. (See preceding extract.)1907—The Panic of 1907 was a U.S. financial crisis triggered when large corporate failures caused business and Wall Street brokerage failures. Stock market prices collapsed and short-term legislation lead to the formation of the Federal Reserve System.1909—Publication of the Cyclopedia of Commerce, Accountancy, Business Administration, American Technical Society, Chicago. This 10-volume set contains extensive guidance regarding financial techniques, including instructions for finding fraud in financial statements.1917—The naming of the American Institute of Accountants (AIA) occurred. The AIA was the successor to the American Association of Public Accountants (AAPA), which dated to 1887. The AIA restricted membership to CPAs in 1936. The AIA became the American Institute of Certified Public Accountants in 1957.161919—America emerged from World War I as a creditor rather than a debtor nation, and Wall Street supplanted London as the world's investment capital.171929—The stock market crash occurred October 29, 1929, precipitating the Great Depression, which arguably continued until the 1941 onset of World War II.Political Events
1913—The Owen-Glass Federal Reserve Act created the Federal Reserve System.1913—16th Amendment (Amendment XVI) to the United States Constitution ratified Congress's right to impose a federal income tax.1933—The U.S. Congress passed the Securities Act of 1933.1934—The U.S. Congress passed the Securities Exchange Act of 1934, which created the Securities and Exchange Commission, or SEC. The 1933 and 1934 Acts catapulted the growth of the accounting and auditing profession in support of financial reporting.Scientific Events
1911—Frederick Winslow Taylor, “The Father of Scientific Management” copyrighted his work The Principles of Scientific Management.1917—The Industrial Revolution peaked roughly coincident with the United States's April 16, 1917, entry into World War I.1920s—The source of the popular DuPont model (ROI, or return on investment) was F. Donaldson Brown, of E. I. du Pont de Nemours and Company's treasury department.1924—The International Business Machines Corporation (IBM) became the successor to the Computer Tabulating Recording Company. Herman Hollerith had formed the predecessor company after inventing a punch-card tabulating machine for the 1890 U.S. census.181925—The disciplines of statistics and probability were widely applied by 1925 and thus were available to accountants charged with evaluating financial statements. Commonly applied techniques included regression and correlation (1888), the normal distribution curve (1889), standard deviation (1894), chi-square test (1900), probability (1907), and ANOVA (1920), among others.1931—Alphonse Gabriel “Al” Capone is indicted for tax evasion and eventually sentenced to prison. The federal government used a forensic accounting technique known as the indirect method to help prosecute the case.1934—Benjamin Graham and David Dodd published Security Analysis. Graham and Dodd were Columbia University professors who codified the foundational tenets of financial analysis for investors. Their 736-page book contains techniques to evaluate the quality of earnings contained within financial statements. Significant portions of the text describe analytical techniques still useful today. Some of the reference phrases include padded income account, manipulated accounting, misleading artifices, and other techniques, all still pertinent today. Warren Buffet wrote that he considers this book as one of the four most treasured books that he owns.Social Events
1910 to 1930—The Industrial Revolution stimulated the flow of residents from the countryside to cities to gain industrial employment.1920—19th Amendment (Amendment XIX) to the United States Constitution ratified prohibiting the denial of voting rights for any U.S. citizen based on sex. This Amendment culminated the women's suffrage movement.1921—The Emergency Quota Act restricted legal immigration into the United States due to the burgeoning inflows. It established numerical limits on European immigrants and used the quota system to control the limits.Circa 1923—Oliver Gingold of Dow Jones coined the phrase blue chip while standing by the stock ticker of the brokerage firm that later became Merrill Lynch.19 It is believed this is a reference to the blue chip being the highest denomination in old poker chip sets.We are convinced that this book will fill the vacuum in financial forensics training and education for the near term. We are also confident that this book will serve as the foundation for continuing research, development, discovery, and application of continually more sophisticated tools, techniques, methods, and methodologies. The financial world grows more complex each day and it is essential that forensic operators have access to weapons that, at a minimum, keep pace with the change, and eventually overtake it.
HOW TO USE THIS BOOK
This book applies to nearly everyone originating or relying upon financial information, ranging from novice to expert. It contains tools that transcend the needs of anyone falling within the three basic classes of people who rely upon financial information: originators, users, and regulators. They are defined in Exhibit I.2.
EXHIBIT I.2 Three Classes of People Reliant Upon Financial Information
A Reader Lookup Table in Exhibit I.3 permits nearly everyone to find exactly what is needed within. Merely identify the Reader category say, “Investor” and note the • under the respective chapters. Thus, an investor would read the chapters so indicated. If seeking a type of matter say, “Due Diligence,” complete the same process.
ABOUT THE BOOK'S WEBSITE
Additional content is available for download at www.wiley.com/go/financialforensics. The website includes 12 actual BLINDED financial forensics reports related to the discussions in Chapter . The reports cover a wide range of matters—civil, criminal, and dispute, thus providing forensic operators with reference material applicable to the matter(s) at hand.
HOW THIS BOOK IS ORGANIZED
This book is based upon the most comprehensive financial forensics/forensic accounting body of knowledge and methodology known to exist, FA/IM© (Forensic Accounting/Investigation Methodology©). The methodology is a copyrighted, trademarked and patent-in-process (through the USPTO20) technique built upon a software-based, user-interactive process map with context-sensitive hyperlinks. It has been delivered a few hundred times to thousands of attendees throughout the United States, receiving very positive reviews.
EXHIBIT I.3 Reader Lookup Table
The book comprises the contents of FA/IM© and can be used as a stand-alone tool. Alternatively, it can be supplemented by the subscription based methodology and related training sessions.
FA/IM© mirrors any forensic assignment and functions left-to-right, top-to-bottom. It comprises 4 Phases, 13 Stages, and 5 Actions per Stage. Each chapter describes the respective Phase, Stage, and Actions, and contains the pertinent reference material. The 250-+/− specific forensic accounting/financial forensics tools, techniques, methods, and methodologies are contextually described throughout the book.
The following outline describes the respective chapter content, organized into two parts. Part 1 contains the financial forensics tools, techniques, methods, and methodologies. Part 2 contains special topics, including significant content on counterterrorism. Also, fraud-related content compares the civil and criminal law processes in financial forensics matters, and provides specific advice for anyone encountering a potential embezzlement in an organization.
Part One: Financial Forensics Tools, Techniques, Methods, and Methodologies
Chapter 1: Foundational Phase
This chapter lays the foundation for the overall methodology as described by the detailed content. The two stages in this phase of the methodology, Assignment Development and Scoping, permit the forensic operator to accurately scope an assignment before launching an assignment.
The Assignment Development stage contains conflict resolution recommendations and is supported by chain of custody, conflict resolution, sample engagement letter, and entity-party chart descriptions and example formats.
The Scoping stage contains forensic timeline, genogram, document request, data catalog, and document map descriptions and example formats. They enhance the foundation and will be continually updated throughout the respective assignment.
Chapter 2: Interpersonal Phase
This chapter highlights the Interview and Interrogation and Background Research stages and includes an example deposition matrix. The discussion permits forensic operators to continually loop back to refine and enhance the data gathered during subsequent phases and stages.
The Interview and Interrogation stage addresses the process of eliciting information through interviews, interrogation, and introduces behavior detection techniques such as facial mapping.
The Background Research stage is purposely summarized, since most forensic operators enlist specialists to conduct such research. Thus, the focus is on select resources the forensic operator should access.
Chapters 3, 4, 5: Data Collection and Analysis Phase—Parts I, II, and III
This phase comprises three chapters, that is, 3, 4, and 5, segmented as Parts I, II, and III, respectively. The phase contains the majority of content since this is where most of the pick-and-shovel work occurs in forensic assignments. The respective chapters introduce techniques, discuss their application, and provide examples of output. The content is very descriptive and it is likely that most forensic operators will spend most of their time in this phase. The contents follow.
Chapter 3: Data Collection and Analysis Phase—Part I
This chapter contains a detailed description of a versatile submethodology ICE/SCORE©. It can be used as a stand-alone methodology or in parallel with the overall methodology. Forensic operators will use it as a training tool for a wide variety of client and subject targets. Also, the proof of cash technique is explained as a logical extension of the ICE/SCORE technique.
The Surveillance—Electronic and Physical, Confidential Informants, and Undercover Stages are lightly treated in this book because the actual training contains sensitive techniques typically pertinent in law enforcement, counterterrorism, and military applications. Nonetheless, they still apply to all other forensic operators. For example, in civil litigation, surveillance sometimes consists of merely driving by opposition facilities. Specifically, the authors worked on a matter where it was suspected that the third shift of a frozen-foods company was selling inventory for cash. One of the authors parked nearby during several third shifts to observe and document traffic. Likewise, in another matter, a forensic operator stationed a staff accountant in a parking lot to observe, document, and count the number of cars serviced by a car wash during a defined period. That information was used to compare to the opposition's claims. In such circumstances, surveillance applies to forensic operators, but lacks law enforcement authority.
The Confidential Informants stage has similar implications for non–law enforcement matters. For example, forensic operators routinely chat with company employees to informally learn about the business.
The Undercover stage is often conducted by forensic operators in civil matters. For example, assuming counsel concurs, it is routine practice to phone opposition's subject company to query parties regarding products, services, pricing, and the like. Done properly, it is merely gathering information generally available to anyone who would phone the company.
WAR STORY
The authors are familiar with a CPA who tried to do forensic work without training. He was assisting an attorney who represented the wife in a marital dissolution. The day before trial he called the husband (an investment advisor) pretending to be a high-net-worth individual and obtained a great deal of information. Naturally, such a process, known as pretext actions, is at least unethical and perhaps illegal. During trial the next day, while the CPA spouted forth his newfound knowledge, he was asked on cross-examination how he obtained the information. He happily explained how clever he was, whereupon the judge dismissed him and suggested he seek counsel. Both the CPA and attorney were sanctioned by their respective professional associations.
The Laboratory Analysis stage contains new and powerful forensic tools. They include instructions and training regarding avoiding confirmation bias, which affects nearly every forensic operator. Aberrant pattern detection provides a unique perspective regarding data uncommonly considered by forensic operators. Also, forensic lexicology instructs forensic operators how to quantify words like they do numbers.
Companion Section—Valuation and Litigation: This unique section identifies foundational content for forensic operators seeking rapid insight into valuation and similar assignments. The content references sections essential to such assignments including confirmation bias, aberrant pattern detection, forensic indices, forensic financial analysis, valuation & forensics—why & how and valuation's orphan.
Chapter 4: Data Collection and Analysis Phase—Part II
The Analysis of Transactions stage begins with this chapter and contains tools more familiar to forensic operators but with dimensions beyond common knowledge.
The Myth of Internal Control provides surprising insight that clarifies the state of auditing today. The 60-Second Method is a very simple methodology that serves as a training tool for clients and a framework for trial testimony. Financial Statements—Written Confessions outlines a unique perspective of financial statements that forensic operators will welcome. Forensic Indices introduces insight into the dozens of techniques to assess financial statement veracity, surprisingly unknown to most CPAs, although non-CPA financial specialists know them well. Forensic Financial Analysis outlines a comprehensive analytical framework and a method of quantifying results in support of an ultimate conclusion.
Chapter 5: Data Collection and Analysis Phase—Part III
The Analysis of Transactions stage continues with this chapter and contains knowledge particularly suited to investigating financial statements and related data. In addition, the content is essential for forensic operators who practice valuation for any purpose.
FSAT—Financial Status Audit Techniques summarizes the IRS’ long-established investigation methodology. Data Mining and Digital Analysis synthesizes techniques almost unavoidable by forensic operators since so much of financial data is digitally stored. Valuation & Forensics—Why & How is a persuasive discussion of why valuation cannot be competently conducted without using forensic techniques. Finally, Valuation's Orphan addresses the most under-represented issue in valuation: assessment and derivation of economic benefit streams.
Chapter 6: Trial and Reports Phase
This chapter contains actual content taken from many forensic assignments. A chapter summary highlights the key report components specific to forensic operator output. Although the content is from actual assignments, certain portions are BLINDED to prevent identification of any parties, entities, and so forth. This precaution is taken even though virtually all of it is already public record through the courts. The reports cover Alter Ego, Damages, Damages/Lost Profits—2 Reports, Forensic Accounting—Shareholder Oppression, Fraud—Individual, Fraud—Institutional, Fraudulent Transfer, Marital Dissolution—Forensics and Valuation, Observations Matrix, Solvency, Valuation— Matrix, and Valuation—Report Card. Due to size restrictions, the reports reside online, and are available for download at www.wiley.com/go/financialforensics.
Part Two: Financial Forensics Special Topics
This part contains two components. The first discusses counterterrorism using financial forensics as explained in two monographs originally written by the authors and published by the United States Department of Justice. The contents elaborate on using civil laws and financial forensics in the fight against terrorism. They were published in USDOJ's Bulletin, which is the technical reference source for US attorneys prosecuting matters on behalf of the United States. They are titled: “Financial Forensics I—Counterterrorism: Conventional Tools for Unconventional Warfare,” vol. 53, no. 2, March 2005 issue, and “Financial Forensics II—Forensic Accounting: Counterterrorism Tactical Weaponry,” vol. 53, no. 3, May 2005 issue. Forensic operators are encouraged to maintain a counterterrorism vigil when executing forensic assignments.
The second component has two specific fraud-related segments to augment the fraud techniques throughout the book. First, Civil versus Criminal Comparison compares and contrasts how the two types of forensic matters course their way from beginning to end. Also, What If You Suspect Embezzlement?---The Three Big Dont's and Several Do's is a first-aid-like reference for anyone experiencing potential embezzlement.
We are confident that forensic operators will find virtually all of the content covered in this book useful and helpful. Nearly all the contents of this book are original and cannot be found in other, allegedly similar publications. Readers can use it in a variety of ways depending on the facts and circumstances of the assignment at hand. Regardless of approach, we are confident that it will be an indispensable tool and commonly cited reference when supporting analysis and opinions.
1. United States Patent and Trademark Office.
2.www.merriam-webster.com/dictionary/methodology.
3. Reporters seldom know how much of their article will be used since it is partly dependent upon available space. Consequently, reporters write articles containing the most important facts at the beginning of the article, followed by successively less-important facts so that if anything is cut, it will be less important to the article.
4. Hebrews 8:5, NIV.
5.www.lejeune.usmc.mil/2dfssg/med/files/103.htm.
6.www.globalsecurity.org/military/agency/army/82abn.htm.
7. Ibid.
8.www.lapdonline.org/inside_the_lapd/content_basic_view/848.
9.www.nyc.gov/html/fdny/html/general/mission.shtml.
10. United States Special Operations Command, Department of Defense Dictionary of Military and Associated Terms, Joint Publication 1-02, April 12, 2001 (as amended through September 30, 2010), Joint Chiefs of Staff (not classified).
11. Miles Mason, Sr., JD, CPA, The Forensic Accounting Deskbook—A Practical Guide to Financial Investigation and Analysis for Family Lawyers, American Bar Association, 2011.
12.financialforensics®.
13. 1650s, from L. forensis “of a forum, place of assembly,” www.etymonline.com/index.php.
14. Dale L. Flesher, Gary J. Previts, and Tonya K. Flesher, “Profiling the New Industrial Professionals: The First CPAs of 1896–97” (Business and Economic History 25, no. 1, 1996).
15. American Institute of Certified Public Accountants, 2011.
16. American Institute of Certified Public Accountants, 2011.
17.www.nyse.com.
18. U.S. Census Bureau history.
19.www.djindexes.com.
20. United States Patent and Trademark Office.
21. Chartered Accountants.
PART One
Financial Forensics Tools, Techniques, Methods, and Methodologies
CHAPTER 1
Foundational Phase
Forensic operators must initiate assignments by clearly identifying and documenting the entities, parties, and ownership interests in the matter at hand. This phase is essential and cannot be disregarded since it charts the vector for the remainder of the assignment, notwithstanding subsequent refinements.
ASSIGNMENT DEVELOPMENT STAGE
Purpose of Stage
This action anchors the forensic assignment and shapes the context and defines the framework for assignment execution. See Exhibit 1.1.
The objective of this action is to complete necessary policy and procedural due diligence before taking any steps toward launching the assignment. This is the starting point for all forensic assignments.
Specific actions include:
Identify all parties in the matter, internal and external. This includes, but is not limited to: plaintiff and defendant, petitioner and respondent, prosecutor and defendant, claimant and disputant, etc., including legal and regulatory parties.Correlate the matters of law, as applicable.Establish technical requirements.Uniquely identify the assignment with a client or case number or both.References
This action confirms access to pertinent technical references, whether currently available or requiring acquisition. Technical resources comprise written materials and training, including self-study, webinar, and live classroom training.
EXHIBIT 1.1 Assignment Development
The objective of this action is to ensure that necessary technical resources are at hand.
Specific actions include:
Search, for example, the Internet for pertinent technical reference sources.Develop a list of required sources.Compare required sources against currently available sources.Acquire sources not otherwise available.Example of Reference Sources
The following reference sources serve to jump start the forensic operator. The Key Internet Sites and Key Reference Materials are not all-inclusive but provide starting points from which to build resources. Also, refer to the bibliography.
Key Internet sites
All forensic operators www.financialforensicsacademy.comwww.fjc.gov“Reference Manual on Scientific Evidence,” Reference Guide on Economic Losses in Damages Awards, by Mark A. Allen, Robert E. Hall and Victoria A. Lazear.CPA forensic operators www.financialforensicsacademy.comKey Reference materials
All forensic operators Financial Forensics Body of Knowledge, published by John Wiley & Sons.CPA forensic operators Litigation Services Handbook: The Role of the Financial Expert, 4th ed., published by John Wiley & Sons. Also, earlier editions and supplements contain significant additional material.Tasks to Be Performed
This action outlines likely tasks but is not a checklist since each forensic assignment is unique. Use the tasks as a guideline and modify according to the unique facts and circumstances of the assignment.
The objective of this action is to ensure that the forensic operator thinks through the assignment from inception to completion before launching activities.
Specific actions include:
Initiate full-and-false inclusion1The full-and-false inclusion technique is foundational to financial forensics yet is foreign to many forensic operators and thus routinely overlooked. It is the single most important element of financial forensics yet is unknown or disregarded by untrained forensic operators. The technique is indispensable because it identifies the evidence essential to the forensic assignment at hand. Full-and-false-inclusion testing serves as the real-time map continuously constructed by the GPS-like capabilities of financial forensics. (See the following chain of custody.)Initiate chain of custody2The chain of custody is the fraternal twin of full-and-false inclusion. The term is familiar to forensic operators with criminal investigation backgrounds. Chain of custody likewise applies in civil and mere dispute matters just as it applies in criminal matters. (See full-and-false inclusion, above.)Formally clear conflict.Confirm the expectations of the responsible party(s). This could include a testimony role, consulting role, advisory role, or other capacity.Confirm the applicable laws, jurisdiction, regulations, precedent, and other requirements to ensure compliance.Confirm internal technical capabilities or alternatively, identify technical assistance, or initiate specific training.Search for pertinent technical reference sources via, for example, the Internet.Example Chain of Custody Form
Note: The following example chain of custody form (see Exhibit 1.2) permits all forensic operators to establish and maintain a contemporaneously documented trail of data and evidence. There are no generalized requirements for chain of custody forms except those unique to the forensic operator's organization. Nonetheless, it is often essential in both criminal and civil matters.
EXHIBIT 1.2 Chain of Custody Form
Descriptors: Each portion is self-explanatory regarding completion, with N/A indicated as necessary.
Custody: The prenumbered chain of custody forms trace to the chain of custody issue log. Both the chain of custody issue log and the chain of custody forms are permanently maintained in the evidence (work paper, library, etc.) room or locker.
Potential Issues
This action prompts the forensic operator to consider the boundaries of the people, parties, entities, timelines, data, output, cost, technical standards, and related criteria pertinent to the respective assignment. The suggested list is not an all-inclusive checklist since each forensic assignment is unique. Use the tasks as a guideline and modify according to the unique facts and circumstances of the assignment.
The objective of this action is to ensure that the forensic operator contemplates exigencies that may surface during the assignment. The forensic operator can minimize exigencies (to the extent possible) by diligent attention to this action.
WAR STORY
Plaintiff's counsel contacted a partner of an international accounting firm seeking his expert witness assistance. The forensic partner cleared the matter through his national office and began work. About three months later, defendant's counsel contacted a partner in the same accounting firm, seeking his expert witness assistance. The second partner did not follow procedure but began work immediately. Three months later an expert report exchange disclosed that the accounting firm was assisting both plaintiff and defendant. The accounting firm paid substantial damages and the second accounting partner is no longer with the firm.
EXHIBIT 1.3 Example Conflict Resolution Email
Specific actions include:
Confirm expectations of responsible parties.Confirm respective responsibilities of responsible parties.Agree upon criteria for success among responsible parties.Determine the extent of privilege,3 if any.Confirm cost expectations of involved parties.Confirm pertinent technical standards.Confirm expectations of output composition.Confirm timelines (hearings, disclosures, discovery cutoff, report exchange, depositions) throughout the duration of the assignment.Deliverables
The objective of this action is to identify and eventually finalize deliverables pertinent to the assignment. The forensic operator always develops deliverables designed with the end in mind so as to maximize efficiency. Document compliance with policies and procedures.
Commonly communicate understanding.Provide tangible evidence of assignment progress.Serve as reference points continually updated as necessary.Complete necessary policy and procedural paperwork required by the forensic operator's environment.Prepare necessary deliverables.Example Deliverables
The following deliverables are frameworks for the forensic operator, who will modify them to comply with their respective internal and other requirements.
Example Conflict Resolution Email Format
Note: The preceding sample conflict resolution email format (see Exhibit 1.3) includes typical considerations pursuant to assignment acceptance. The format can take almost any form, but the contents of the document must include the following and other firm- or agency-specific policy matters.
Addressed: The email addresses all internal parties familiar with potential conflicts.Affirmative Response: The affirmative response permits the forensic operator's organization to maintain a continuously updated database of parties to avoid future conflicts.Role: The explanation clearly identifies the forensic operator's testifying role.Timing: Timing expectations ensure accommodation with the forensic operator's availability.Example Engagement Letter
Note: The following sample engagement letter obviously applies to forensic operators who practice as CPAs. Nonetheless, even non-CPA practitioners can refer to the contents for generalized guidance to construct similar letters of understanding.
SAMPLE ENGAGEMENT LETTER
PRIVILEGED AND CONFIDENTIAL
PREPARED AT REQUEST OF COUNSEL DURING LITIGATION
DATE
Mr. Litigator/Prosecutor
Law Firm/Agency
ADDRESS
CITY STATE, ZIP
Re: Litigator/Prosecutor
Dear Mr. Litigator/Prosecutor:
This letter documents our conversations and confirms that we have cleared conflict and begun work. This letter then confirms the engagement of our firm to provide analysis and consulting services in assisting you in your representation of SUBJECT/PARTY.
The Nature of Our Professional Responsibilities and Ethics
We practice as certified public accountants, CPAs. Therefore, we are compelled to meet a wide variety of ethical, legal, professional, and technical standards. These requirements reflect our fiduciary capacity and comprise a set of standards exceeding virtually any other profession.
We hold our ethical, legal, professional, and technical practice responsibilities in the highest regard, particularly the hallmark of our profession, independence. It is through independence that we serve the public's interest in providing unbiased, objective, and technically correct opinions on financial matters, whether in court or in private transactions.
The authorities governing our ethical, legal, professional, and technical practice actions include:
AICPA—American Institute of Certified Public Accountants. This national body, in connection with the Financial Accounting Standards Board (FASB) and related entities establishes financial reporting requirements commonly known as Generally Accepted Accounting Principles (GAAP). The AICPA rules of professional conduct contain twelve (12) rules organized into the following categories:
100–Independence, integrity, and objectivity
200–General and technical
300–Responsibilities to clients
400–Responsibilities to colleagues (superseded, that is, no longer in force)
500–Other responsibilities and practices
State—State State Board of Accountancy.4
