Data Sleuth - Using Data in Forensic Accounting Engagements and Fraud Investigations
Data Sleuth - Using Data in Forensic Accounting Engagements and Fraud Investigations
Founded in 1807, John Wiley & Sons is the oldest independent publishing com-
pany in the United States. With offices in North America, Europe, Asia, and
Australia, Wiley is globally committed to developing and marketing print and
electronic products and services for our customers’ professional and personal
knowledge and understanding.
The Wiley Corporate F&A series provides information, tools, and insights
to corporate professionals responsible for issues affecting the profitability of
their company, from accounting and finance to internal controls and perfor-
mance management.
Data Sleuth
Using Data in Forensic Accounting
Engagements and Fraud Investigations
LEAH WIETHOLTER
Copyright © 2022 by John Wiley & Sons, Inc. All rights reserved.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in Canada.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted
in any form or by any means, electronic, mechanical, photocopying, recording, scanning,
or otherwise, except as permitted under Section 107 or 108 of the 1976 United
States Copyright Act, without either the prior written permission of the Publisher,
or authorization through payment of the appropriate per-copy fee to the Copyright
Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400,
fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for
permission should be addressed to the Permissions Department, John Wiley & Sons,
Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or
online at http://www.wiley.com/go/permission.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used
their best efforts in preparing this book, they make no representations or warranties
with respect to the accuracy or completeness of the contents of this book and specifically
disclaim any implied warranties of merchantability or fitness for a particular purpose. No
warranty may be created or extended by sales representatives or written sales materials.
The advice and strategies contained herein may not be suitable for your situation. You
should consult with a professional where appropriate. Further, readers should be aware
that websites listed in this work may have changed or disappeared between when this
work was written and when it is read. Neither the publisher nor authors shall be liable for
any loss of profit or any other commercial damages, including but not limited to special,
incidental, consequential, or other damages.
For general information on our other products and services or for technical support,
please contact our Customer Care Department within the United States at (800) 762-2974,
outside the United States at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that
appears in print may not be available in electronic formats. For more information about
Wiley products, visit our website at www.wiley.com.
Library of Congress Cataloging-in-Publication Data:
Names: Wietholter, Leah, author.
Title: Data sleuth : using data in forensic accounting engagements and
fraud investigations / Leah Wietholter.
Description: Hoboken, New Jersey : Wiley, [2022] | Series: Wiley corporate
f&a | Includes index.
Identifiers: LCCN 2021062798 (print) | LCCN 2021062799 (ebook) | ISBN
9781119834380 (cloth) | ISBN 9781119834403 (adobe pdf) | ISBN
9781119834397 (epub)
Subjects: LCSH: Forensic accounting. | Fraud investigation.
Classification: LCC HV8079.F7 W54 2022 (print) | LCC HV8079.F7 (ebook) |
DDC 364.16/3—dc23/eng/20220112
LC record available at https://lccn.loc.gov/2021062798
LC ebook record available at https://lccn.loc.gov/2021062799
Cover Design: Wiley
Cover Image: © DNY59/Getty Images
For Chris, Sherlock, Irene, and Watson
Contents
Forewordxi
Prefacexv
Acknowledgmentsxix
vii
viii ◾ Contents
Index 253
Foreword
xi
xii ◾ Foreword
For about three months, we would meet up weekly and trade partners and
bruised toes and a few laughs and red faces. But we would also trade spots at
meals afterward. Then we would trade turns at different people’s houses, at vol-
leyball nets, at cookouts, and at ’80s themed birthday parties where we learned
an introductory version of the Thriller dance. We would exchange conversations
on topics more meaningful about purpose and dreams and courage to take next
steps. I will always count it a great inspiration that ballroom dancing lessons
would connect people in such meaningful ways. Although some wouldn’t find
a lasting passion for the tango, we would find lasting passion to see each other
accomplish the things that mattered to them.
Leah stands out for her customary boldness. After working with a local
accounting firm following her time with the FBI, she realized she had the skill,
ability, brand, and nerve to chart her own course. Giving it some intentional
thought – but not a second one – she started her own business. She recognized
that she had value to offer and that there was a niche she could fill. She didn’t
need a large accounting firm. She didn’t need the FBI. In our conversations, she
was certainly grateful for all the lessons and the relationships. But she didn’t
need the “tried and true” structures and career paths. She was perfectly capable
to chart her own course. No, it is more than that – it would have been a com-
promise not to.
Workman Forensics was born.
There are three factors that are common to most fraud that is perpetrated:
incentive/pressure, opportunity, and rationalization. How ironically apropos that
these would also be key elements in entrepreneurship, and especially in Leah’s
entrepreneurship for a business to help detect and prevent fraud. Still, there is
something more. As much as it takes incentive and rationalization to make a
case to step into the unknown and create something new, it is often seeing and
grasping the opportunity that separates entrepreneurs. Although the three sides
of that triangle are always relevant, they matter only when someone takes action.
Maybe we all see opportunities, find incentives, and can rationalize the journey
we would take. But few of us ever do.
It is not only seeing the opportunity, but seizing it, that separates Leah from
her peers. And it continues to separate her.
This is a good time to insert a quick observation from those ballroom dance
days of old. Leah was determined and present, and I like to think she had a good
time, though she did not continue past those three months unless cajoled. She
had one main struggle along the way: she had a hard time following. She was
always ready to lead, and she knew where she wanted to go. And her eyes were
set on bigger things.
◾
Foreword xiii
As I mentioned, she started her forensics business. She signed the lease on a
trendy commercial district in midtown Tulsa and signed up to capture the dream
she had described along the way.
It took off.
Under her leadership, the business grew to the point that she had more
work than she could do alone. But she was undeterred – she would bring dispa-
rate people together to accomplish something more than each could do alone.
Faithful to her commitment to community, she found ways to bring others
along with her. In fact, she would hire some of those very people we met on the
dance floor, with skills ranging from education to accounting and others along
the way. They didn’t need to be great at every aspect, but their combined skills
could lead to greater outcomes.
She trained them and used their varied skillsets, all repurposed as part of a
cohesive strategy. From that, Leah was already starting to see how the different
pieces fit together that would become the basis for the Data Sleuth. She had
to be able to separate the forensics process into manageable activities that she
could direct others to complete and bring them back together into meaningful
analysis. It allowed her business to grow and for her to take people who didn’t
have a deep forensics background and teach them to perform integral activities
for her thriving business.
But Leah didn’t stop there. Instead, the realized dream of Workman Foren-
sics gave flight to others. In the world where podcasts were only being conceived,
she worked with others to develop a new concept podcast that would make the
world of forensic accounting available – and more important, interesting – to
the masses. In a whodunnit series called The Investigation Game, both a train-
ing curriculum and a podcast, she would innovate a way of teaching that even
the certification and training boards recognized led to meaningful education.
She is frequently innovating.
I have been privileged to be surrounded by strong women in my life, who
have taught me lessons on courage, strength, and resilience. My grandmother
opened a cosmetics business in her 40s after co-owning a hardware store and
boarding people at our grandparents’ home. My aunt ascended various tiers in
her career to support nutrition needs of children while simultaneously battling
a crippling form of breast cancer, earning her PhD while taking bouts of chemo.
My mom would face being a single parent and a caretaker for her own mother
who lived a thousand miles away while holding down a full-time job and the
grace to still share and give into others’ lives with joy and sincerity.
I can’t tell if Leah has ever really considered the challenges that she may
have uniquely faced in the tango she has been dancing with her own destiny.
xiv ◾ Foreword
Like those old ballroom lessons, I think she has continued to be the first mover
in that duo, guiding destiny and seeing clearly her own next steps. And in a
larger sense, I see how she continues to find an unconventional path, and to
inspire others to join her along the way.
Reflecting on those first comments I remember from her all those years ago,
I honestly don’t know for sure whether she carries a firearm at this stage of her
career. Or whether she would still name it as a key perk in the path she’s taken.
I like to think that in some ways, she’s traded it for a machete – a tool to clear
new paths – and is leaving markers to help others join her along the way. Or in
another sense, maybe the Data Sleuth Process has opened up an entirely differ-
ent arsenal. She’s found that in her business, sidekicks carry better ammunition
than sidearms.
James Bowie, CPA
Preface
xv
xvi ◾ Preface
college-aged students from around the United States, I was ready to go through
security to enter the doors of the headquarters of the Federal Bureau of Inves-
tigation.
“What’s your name?” the security guard asked. “Leah Workman.” He asked
a second time, this time asking for my driver’s license. This is not a good sign, I
thought. My mind started racing through all the paperwork, background check
interviews, polygraph testing and wondered if maybe I had missed completing
one of the many federal forms. All the students chatting outside of the J. Edgar
Hoover Building in nervous excitement about their first day sounded like a loud,
constant buzz, but as soon as the security guard said, “You’re not on the list.
Please step aside,” everything went silent. Blood drained from my face.
The security processing of the interns slowed to a complete stop, and the
security guard pulled me out of line. Heads began to turn in my direction as
the line stopped moving, and thankfully, before it became even more embarrass-
ing, the internship coordinator for my group stepped forward to save the day.
My name had in fact been omitted from the list, and to this day, I still do not
know why. After a short discussion with the internship coordinator, the secu-
rity personnel verified that I was indeed an intern. I was admitted, received my
access badge, and was sworn in.
After orientation and exploring DC, my internship group returned to West
Virginia for our work assignments. The internship coordinator let us know we
would be taking group photos, meeting with management, and receiving our
assignments. We made sure to look as professional as possible by wearing suits
again that day. As soon as we walked outside to carpool to the office, I realized
that I once again was going to be singled out. Everyone was wearing a black suit,
and I was wearing a cream suit.
What began as embarrassment and very unwanted attention those first few
days of the internship resulted in an incredible pattern that forced me to learn
quickly that being the only one or singled out or different did not have to be
detrimental. In fact, these uncomfortable moments laid a foundation for a career
advantage.
The 10-week internship was just the beginning of my career with the FBI.
When I returned to school the following semester, I was not only about to
graduate with my accounting degree, but because of a new program, I was able
to continue the internship as an actual FBI employee under the direction of an
experienced forensic accountant for the following two years. At the end of the
two-year assignment, with only one career option in mind, I took the phase 1
assessment to become an FBI special agent. A few weeks later, based on my
assessment results, I was not accepted. Devastated, I relived the exam over and
◾
Preface xvii
over as I felt lost trying to find my next step. The test questions were like that of
a personality test coupled with an assessment of my decision-making abilities.
Although this is not the intention of the test, I felt as if the FBI was telling me
once again, that I, including my personality and decision-making choices, did
not fit in.
My lifelong dream career had been denied me, but as it was not the first
time, after a brief period of mourning, I decided to do what I heard all “good”
accountants do. I applied to work in public accounting. I chose to work in the tax
department because I could then at least prepare my own tax returns.
While working for the accounting firm in Tulsa, forensic accounting was
becoming a more requested service, and the firm invited me to work on foren-
sic accounting engagements and fraud investigations. While there, I was able
to work on several cases including a $3 million embezzlement from a bank, a
divorce, and an engagement involving the tracing of millions of dollars of funds.
It was really exciting to take what I learned working for law enforcement and
under the direction of the FBI forensic accountant and apply it to the private
sector. One major problem with this setup remained. In working for a public
accounting firm, I still had to prepare tax returns during the busy seasons lead-
ing up to the tax deadline. After a couple of years, I started looking for another
job. When I found none that interested me, an accounting headhunter sug-
gested, “What would happen if you started your own investigation and forensic
accounting business?” In November 2010, I opened Workman Forensics.
Workman Forensics was established to provided forensic accounting and
fraud investigation services, and we have continued to provide only these ser-
vices for over 11 years. I have managed a team as big as 11 employees, and
as small as 1– which included only me. In 2014, I realized that the number
of hours I was working per week managing deadlines, business development,
human resources, and casework was not sustainable. I am grateful to the many
team members who have worked with me over the last six years. It is because of
their hard work and specialized talents that we were able to begin developing
what is now known as the Data Sleuth Process.
Being an entrepreneur and business owner for over 10 years now, I have
read so many books and listened to so many podcasts by great leadership and
business minds that talk about vision. If I am being honest, after hearing the
term “vision” repeatedly, I began to tune it out because my interpretation of the
way they defined vision felt materialistic. The goal of a business vision seemed
to focus on doing big things to make more money, which is not a bad thing
when someone is in business. I just did not want that to be my vision for my
business.
xviii ◾ Preface
xix
Building a Data Sleuth Team
1
CHAPTER ONE
1
2 ◾ Building a Data Sleuth Team
more robust forensic accounting division. When there was a case requiring
full-time hours for months, or a rapidly approaching deadline, I would receive
approval to borrow various personnel from the tax department but equip-
ping my ever-changing team to overcome the steep learning curve for them
to meaningfully contribute, while also serving as the case manager and lead
investigator, was nearly impossible. Regardless of how intelligent or willing the
borrowed talent was, with a deadline quickly approaching, it was often easier
to work the case alone.
When I decided to open Workman Forensics, I told my manager at the
time, “I think I will just take some small cases – maybe even just divorce work –
and work from my dining room table for a while. Then I will decide what to do
with my life.” I assumed I would work alone on cases like I had been in public
accounting, but this time, I would have more control over the types and sizes of
the investigations. After three months of marketing and meeting litigation attor-
neys, I was hired by an attorney for a case with a hearing date rapidly approach-
ing. I knew that preparing what was needed to provide expert testimony before
the deadline was impossible without help. The amount of time needed to pro-
cess data in a financial investigation usually correlates to the amount of revenue
generated by an organization, and this case was no exception. For each month
of bank statements, 20 to 30 double-sided pages had to be scanned and sub-
sequently entered into a spreadsheet. Additionally, if an investigation requires
the manual data entry of check payees and memo lines from check images, the
data processing could take weeks – especially as a solo practitioner. The client
was needing a two-week turnaround on the project, and I knew there were not
enough hours for me to singlehandedly process, analyze, and prepare to testify
without a team.
Fortunately, during that same week, an unprecedented snowstorm created an
opportunity for roommates and friends at my house to enter bank statement data
into spreadsheets working around my dining room table. Although I had not had
success at the previous firm explaining the analysis needed for financial investi-
gations, I was confident that I could explain to my friends the steps required for
the repetitive data entry of bank statements. My friends were the key to success
in meeting the deadline as they worked with me to find a process for processing
the data. When all of the data had been compiled into spreadsheets, I worked to
calculate the loss and finished the analysis. While I worked around the clock
to prepare for the hearing testimony, my phone kept ringing with inquiries from
potential clients.
My solo journey lasted six months when I realized it was not going to stay
that way. Not knowing how one decides to create a team, I decided to hire some-
one who could relieve my workload by processing data. I felt confident that
4 ◾ Building a Data Sleuth Team
I could at least use the process my friends and I created to teach an employee
until I discovered my next step. The data processing step being performed by a
team member was extremely helpful, but I still had more hours of casework than
I wanted to work in a week. That is when I began looking to hire another profes-
sional who could be responsible for financial investigations like me. No matter
how hard I tried, I could not find someone who remained long term because
of the incredible expectations and pressures of a forensic accountant or fraud
investigator.
Watching Ben Affleck’s character in The Accountant at first glance seemed abso-
lutely ridiculous as he performed a financial investigation, worked through
Benford’s analysis on the walls of the conference room, and faced violent oppo-
nents until I stopped to consider the current role and expectations of a forensic
accountant. Knowing martial arts and being an impeccable marksman, or marks-
woman, is not listed on most forensic accountants’ curriculum vitae; however, the
forensic accounting or fraud investigation career, at the testifying expert level,
requires a uniquely broad and, at the same time, intricate set of skills.
The experience needed to gain proficiency in the areas essential for a forensic
accountant who also testifies as an expert witness requires tremendous focus and
effort. Forensic accounting, especially with technological advances, has the power
to find missing money and bring clarity to financial disputes. However, the experi-
ence factor is the largest barrier to one’s entry into the profession. To truly create
value for a client, a forensic accountant must be able to clearly articulate findings
in a report and through testimony, which opens the expert up to personal and
professional scrutiny by opposing parties.
For the next section, I will be using the terms forensic accountant and inves-
tigator to refer to an investigation professional who works a financial investigation
or litigation dispute engagement from start to finish as a sole practitioner with the
expectation that the professional will testify to her findings.
After being in business for six years, I worked a case involving an embez-
zlement with a total loss exceeding $3 million. At this point, I was working as a
solo practitioner and knew from listening to the client’s concerns and attorney’s
strategy the most efficient, yet thorough, way to investigate the case within the
client’s budget and the attorney’s deadlines. I worked the entire case and prepared
a report in 40 hours, over approximately two weeks, for which both a civil lawsuit
and federal criminal charges were filed. The ability to manage such a thorough
and efficient investigation was a result of years of experience and dedication to
the profession.
loss through the husband’s separate assets. Remembering the criminal jury trial, I
asked our graphic designer to prepare an illustration of the timing and use of funds
between spouses. The attorney I was working with did not normally use illustra-
tions in expert testimony, which led to an awkward testimony. Although I believed
the illustration helped clarify the use of funds, the resulting awkward testimony did
not accomplish the effective communication I had hoped for with the judge.
From these experiences, even when all the details seem important, I have
learned to ask more questions of the attorneys and work with them to strategize
about the best way to use the most valuable detailed findings.
Possessing a broad range of accounting knowledge and basic legal process knowl-
edge is vital for a forensic accountant. A testifying expert in the area of forensic
accounting will likely encounter engagements that require an understanding of
financial accounting and reporting, tax returns, tax strategy, and audit. At the
same time, it is helpful to an attorney if the testifying expert has some knowledge
of the legal processes to integrate the expert more efficiently into an existing case.
Experience, once again, is truly the best teacher in this area. It can be frustrating
to professionals because acquiring the knowledge requires someone hiring them
to allow opportunities to learn.
The way that I gained knowledge early on was by asking questions of attor-
neys. Whether an attorney had hired me to help with a case or not, I tried to meet
with anyone who would accept an invitation and to ask them as many questions
as possible. Before meeting with an attorney about a case or over lunch introduc-
tion, I mentally prepared questions to inquire about their preferred methods in
approaching cases and about their best and worst expert witness experiences. The
feedback was not consistent, as the attorneys seemed to all have varying experi-
ences, but it was helpful in developing a method for me to become a trusted expert
and effective expert witness.
One example of the helpful skills I learned through this inquiry method
included understanding the difference between testifying in a bench trial versus
a jury trial. In a bench trial, attorneys encouraged me to testify with the judge in
mind even though the attorneys were asking the questions in front of me. With
this in mind, I began sitting in the witness stand to answer questions slightly
turned toward the judge to encourage any clarifying questions the judge might
want to ask of me. Additionally, if I do not understand a step in the legal process
on a particular case, I ask the client’s attorney to explain its purpose so that I can
know for future reference.
8 ◾ Building a Data Sleuth Team
A client often realizes that they need a forensic accountant in response to some type
of crisis. Although the fraud scheme, hidden assets, or improprieties occurred over
a long period of time, a client wants to know what happened, the resulting loss, and
his next steps as soon as possible. The emotional response of a client creates urgency,
which results in deadlines for the forensic accountant. Also, it is not uncommon
that attorneys will wait until the end of the discovery phase in a lawsuit to engage
the forensic accountant. To better understand the reason attorneys will wait to hire
an expert, I have tried to identify a pattern; however, I have not identified the root
cause in cases other than class action lawsuits. In class action lawsuits, a law firm is
typically paying all investigation expenses before collecting, and collection on a case
is not guaranteed. It appears the delay in hiring an expert is for the attorney to make
sure the expert is truly needed before incurring the expense. Whatever the cause,
when an attorney delays the hiring of a forensic accountant, some cases are already
scheduled for hearings, trials, or other court deadlines that the forensic account-
ant cannot change. When this happens, the forensic accountant must perform the
analysis, review, and be ready to testify by the imposed deadline.
When working on cases with tight deadlines, maintaining consistent market-
ing and business development is challenging. Business development is especially
challenging when deadlines require that weeks, or months, will be spent on one
project consuming all the available work hours in a week. When facing the choice
between working billable hours and business development, the forensic account-
ant is most likely to prioritize meeting the deadlines with a work product that
solves problems. Although word will spread about the dependability of a reliable
expert, through the demonstration of meeting deadlines, the pressure to sustain
business development to secure future work exists.
a scalable model for forensic accounting and fraud investigations – where the
clients were served well, the work product was as consistent, and the attorneys
would trust a team approach. I ignored these nagging thoughts until a new cli-
ent’s case involved more than I could handle alone. Cautiously and slowly, I began
hiring again.
As a new business owner, I was naïve in believing that I could hire smart peo-
ple to work investigations without any formal training and stay within a reason-
able budget. There were a lot of factors I had never considered before, but because
I had no formal forensic accounting training and could still navigate messy fi
nancial
disputes, I expected the same of the people I hired. Forgetting the experiences and
opportunities I had been given to learn about the intricacies of financial investiga-
tions, I unrealistically expected the talented people I hired to untangle a financial
investigation without training and stay on a budget.
As much as my team and I wanted to help every person who contacted our
firm, the challenge of running an investigation business in the private sector is
earning the revenue necessary to stay in business. Engagement after engagement,
we burned through the client’s budget without a viable solution. Even though we
did not promise the client as to what the solution would entail, we had promised
that we would find a solution. I felt so obligated to provide a solution, even if the
project budget had been exhausted, I would find myself working all night long to
finish the investigation after my team had gone home. The worst part mentally for
me, and potentially detrimental to the business, was that I was unable to charge
for the time.
Working cases alone, as part of the public accounting firm and as a sole proprie-
tor, presented a problem – no one was actively engaged enough in the details of
the case to brainstorm high-level strategy, to foresee potential complications, or
to troubleshoot analysis problems. The lack of others with similar or more experi-
ence in the detail review of my analysis greatly contributed to the ever-mounting
pressure of the job itself. Inherent to investigations is the constant realization that
investigation decisions could result in deposition or trial testimony with unyield-
ing scrutiny. Any issued reports, articles, blogs, podcast interviews, or opinions
could be used in court as part of a cross-examination attempt to discredit me,
demonstrate a lack of objectivity, or accuse me of advocacy. The constant appre-
hension that I may not have all of the facts or that errors existed in the work
product loomed. Nothing reinforced this uncertainty more than a memory from
my time at the FBI.
The Strategy Problem ◾ 11
A case agent held a team briefing in the conference room, which doubled
as the break room, to discuss an ongoing investigation. On the whiteboard, he
drew a variation of what I now know is the Rumsfeld Matrix that is replicated
in Figure 1.1.1 The case agent used this matrix to explain how he viewed the case
he was working and requested ideas from the team. Pointing to each quadrant, he
advised of the case facts known and unknown. Then pausing briefly and pointing
at the third quadrant, he took a deep breath and said, “I do not know what I do
not know.”
Anxiety about not knowing what I do not know can be paralyzing, but com-
plete disregard for the quadrant is reckless. Early in my career, I was overly sensi-
tive to the third quadrant of the matrix and was concerned that anything I had
ever spoken or written could be taken out of context by an opposing counsel and
used against me to a client’s detriment. This worry caused me to be slow to offer
expert opinions unless it could be proven from multiple perspectives and a lot of
supporting data. However, a healthy respect of quadrant three can give an expert
an edge. When an investigator incorporates humility into her work, and exercises
professional skepticism, it yields a result that is founded on facts rather than the
answer a paying client, a pressuring boss, or an influential politician desire. I accept
that even though the profession may refer to me as an expert, I do not know
Within a few months, the results of the analysis were presented in trial.
There were several testifying experts, but I was not one on this case. However,
through some maneuvering of the opposing counsel, the other side was able to
call my colleague and me to the stand. Although we were called as the other side’s
witnesses, opposing counsel requested that we be treated as hostile witnesses. A
hostile witness is one who is adverse to the side who called him to testify. If the
judge determines that the witness is hostile, the attorney may ask leading ques-
tions as if the witness was under cross-examination.2 The attorneys in this case
were granted this request, and we were ordered to answer questions that likely
would not have been allowed under normal circumstances. I was so new to the
field; this was my first time to testify with any form of cross-examination. All of
my previous testifying experience was in front of a federal grand jury. With every
question asked, I desperately hoped they would not uncover a mistake. After
testifying for over two days, I breathed a long sigh of relief. Unfortunately, when
my colleague took the stand to testify to her work, a large error was revealed.
The judge ordered a recess, and my colleague and I worked long into the night
to correct the analysis, hopeful that the corrected analysis would be admitted as
the attorney for our client questioned my colleague the next morning. Thank-
fully, the correction was received, and ultimately, our side won the case. Sadly, my
extremely talented colleague vowed to never again work on forensic accounting
engagements.
Many professionals believe the niche to be exciting and intriguing –
maybe because of influence from mystery novels and FBI television shows –
but in the end, it is a profession of highly detailed work for which most
clients want the professional to testify. If the professional testifies, the highly
detailed work product is put under a microscope by the opposing counsel and
at least one other highly trained expert. This expert’s assignment is to find
weaknesses, especially in the areas that the professional did not know that
they did not know. The enormous pressure and inspection demand that all
work be prepared as if they are going to trial. At a bare minimum, a rigorous
review process must be established. Without a proper review process, seri-
ous professional risks arise including inaccurate work being discovered in a
deposition or trial.
The enormous pressure, scrutiny, and risk in this field takes its toll on a profes-
sional. I experienced severe burnout in the fourth year and eighth year of business.
As a result, any criticism, whether from clients, employees, or opposing counsel
14 ◾ Building a Data Sleuth Team
The creation and implementation of the Data Sleuth Process over the last five
years has provided our team with solutions to reduce burnout, risks, and problems
that I faced as the sole professional responsible for investigations. The experiment
to create what is now the Data Sleuth Process began with the question, “If I can
build a team of people who have experience and proficiency in at least some of the
areas required in a financial investigation, can we then make forensic accounting
accessible to more professionals and in turn to more clients?” The current status
of the Data Sleuth Process development has solved the scalability problem, the
strategy problem, the review problem, and the sustainability problem inherent in
many forensic accounting practices.
Beginning to hire a team again brought many challenges, but with the dream
of a healthy life, I implemented two practices into my business: I involved
employees in creating solutions, and I met frequently with a business coach. In
the beginning, incorporation of data analysis software to analyze data sources
brought some relief by assigning individual analyses. However, when it was
time for me to connect the dots and final review to provide a final report, things
seemed to fall apart. In these final steps of the investigation, I would discover
that some of the individual analyses did not answer the actual questions of the
client. It seemed that additional work was always needed to provide a valuable
work product, but we would have only a couple of days remaining before the
deadline. The primary cause of this consistent issue was identified as a process
The Scalability Solution ◾ 15
problem; we did not have a way for the team to work together to connect the
client concerns to the analyses assigned. Because team members did not know
why they were performing an analysis, they could not advise as to whether the
analysis addressed the client’s questions. It was not until I would try to connect
the analysis to the client’s concerns at the end of the project that the inapplica-
bility of the analysis was discovered.
The members of my team were sharp and were willing to contribute more
to the investigation, but I was unable to train them in these important inves-
tigation steps. I was frustrated because I was making decisions that I thought
were obvious, but my team advised that the decisions seemed logical to me
because I had the benefit of experience they did not. We needed to find a way
to translate the experience-based process in my head into a process the team
could follow.
Before the breakthrough with my business coach, I believed that the number
of ways people committed fraud or hid money was infinite. When I was able to
understand that there were only a finite number of ways, tackling the process and
experience issues to create a process did not seem insurmountable. For the first
time in years, I had hope. If there truly were only a finite number of ways people
steal money, then I could identify them and advise the team about where to look,
making adjustments along the way to allow for the unpredictable parts of investi-
gations. The process of working investigations as a team infinitely improved with
this simple breakthrough. We were able to identify that:
member could then get the team together to formulate a new approach. We
also recognized that the inputs and data sources might change from case to
case, but the strategic planning would allow for adjustments to be made to
customize the analysis.
The involvement of the team in the creation and improvement of the process
over the years has created incredible buy-in that has not only resulted in a process
that serves clients better than when I worked alone, but it has also solved the
training problem. When the team is focused in making their areas of contribution
to the investigation better, they have a better understanding of the purpose and
intention for the decisions being made, which empowers them to make higher-
level decisions along the way. The forensic accountant’s scalability problem now
has a viable solution allowing the incorporation of new team members into a
structured process resulting in a consistent, reliable work product.
point of view. Hoping adrenaline would keep me moving, we met the deadline. I
presented the findings amid a controversial meeting. Driving from the meeting,
I said out loud to myself, “I am no longer an analyst. I have a team, and I need to
be the strategist.”
I had realized that the weakest area in our developing, yet lacking, pro-
cess was in planning, but after I removed myself from the analyst role, I had
an idea. The next week, a new client hired us for a case, and I gathered the
team together for our new case planning process. Before the planning ses-
sion, I created a list of the client’s concerns and my proposed strategies. Then
I translated those strategies into what we now call investigation priorities,
explained further in Chapter 6. I began the meeting by explaining the case
story gathered from my initial client meeting. Then, taking the list of inves-
tigation priorities, such as, “Quantify overpayments of payroll to subject,” I
gave each team member an opportunity to ask questions about the case and
to describe an analysis they thought would be appropriate. For each analysis,
types of data that would be required to perform the analysis and the corre-
sponding data processing tasks were identified. We repeated this process for
every investigation priority.
The most challenging part of hosting a case planning meeting like this
was reminding myself to be the facilitator and remain quiet until the end.
When all of the investigation priorities had been addressed, I then provided
strategic edits to the plan focusing on superfluous or duplicative analyses and
identifying multiple uses for the data. At the completion of the edits, each
team member advised as to which analyses or data processing task they would
most like to complete. The edited case plan was presented to the client for
approval, and the tasks were assigned to each team member with a process for
subsequent review.
By documenting a case plan and creating work paper templates and processes
to reinforce the case plan, we incorporated the requirement that an analyst com-
municate their findings and the significance of the findings in every analysis work
paper. After the analysis was reviewed, the findings were compiled into a findings
summary along with any attachments (i.e. exhibits consisting of tables, graphs, or
charts further explained in Chapter 11). At this point, we could connect a client’s
concerns and investigation priorities to all data processing and analysis and the
resulting findings. The strategy and problem-solving value that I once brought
to the table as an individual expert cannot compare to the implementation of
the strategy that we now provide to clients as a team. The communication of the
plan for the case allowed me to do only the parts necessary and to capitalize on
the individual strengths of team members resulting in a high-quality, consistent
work product.
18 ◾ Building a Data Sleuth Team
The review step, whether detail or final, promotes accuracy; incorporates multiple
perspectives; reduces the risk of egregious, simple errors; and upholds consist-
ency in the final work product. The Data Sleuth review solution is built into the
process itself. The review step occurs after data processing and before analysis, at
the completion of each analysis, after all findings have been compiled, and lastly
before the final report is issued. With the team understanding the purpose of an
investigation from the case planning meeting, the review step becomes simple.
Whoever performs the analysis does not review the same work, and the reviewer
can provide insight because she knows the client concerns and the underlying
analysis purpose.
The most difficult to scale, or assign to those with less experience, in an
investigation are the overall case strategy and testifying pieces. These two areas
necessitate the involvement of an experienced professional. As that professional
on my current team, without the Data Sleuth Process and review step, I would
be tempted rework every analysis to ensure its accuracy, validity, and reliability.
To do so is highly inefficient. With the Data Sleuth Process and the imbedded
review steps contributing to the quality control of the work product, I can rely
on my team and trust the process to find the big oversights. Errors are still a risk,
as the process is composed of talented people, but people, nonetheless. However,
trusting the input of a team of people is still more reliable than working the
entire investigation alone. At this point, I am not sure I could ever go back to
working solo because the work we produce now, the money we find for clients,
and the clarity we add to situations are truly better than I could have ever created
on my own.
Fortunately, closing shop in those most challenging years was not an option
because we had clients to serve and investigations to work. These struggles forced
me to plow ahead continuing to believe that a solution existed for my investigation
business struggles that also promoted the vision of making forensic accounting
accessible to more people. The creative development of the Data Sleuth Process
gave me energy to move on in the most difficult years. When I would feel as if
creating the process would never work, my team’s constant focus on continuous
improvement would give me the energy to continue. Workman Forensics does
The Sustainability Solution ◾ 19
not need a team of people where everyone thinks they know everything. We just
need a team of people who bring their unique expertise to serve clients well and
to trust the process to do what we cannot do on our own. And this is why, I
believe, the Data Sleuth Process creates the sustainability solution for the forensic
accounting and fraud investigation professionals.
NOTES
T HE USE OF THE Data Sleuth Process for the Workman Forensics team has
been focused primarily on engagements involving corporate fraud, embez-
zlement, partnership disputes, bank fraud, divorce, estate and trust disputes,
economic damages, and civil or criminal defense.
Before diving into the specifics of the process itself, it is important for
a forensic accountant or investigator to understand the mindset of the Data
Sleuth when beginning an engagement including the simultaneous manage-
ment of client expectations and professional standards of objectivity and con-
flicts of interest.
The Data Sleuth Process, which created solutions for the struggles and prob-
lems described in the previous chapter, is outlined within this chapter.
ENGAGEMENT TYPES
21
22 ◾ The Data Sleuth Process
are those listed next. There are other types of litigation support or consulting
engagements for which forensic accountants and investigators are hired; however,
throughout this book, the engagement types and end-clients will be limited to the
ones listed here.
Engagements in which the end-clients are typically organizations include:
■■ Divorce
■■ Estate and trust disputes
■■ Civil or criminal defense
Kevin disagreed with fraud risks one and three and instructed the investigator
to limit the scope of the investigation to fraud risk number two. The investiga-
tor prepared a case plan emphasizing an exploratory phase to include one-year
review of bank accounts, credit cards, and supporting accounting software exports.
The investigator explained that if the controller had been stealing funds through
expenditures, it was likely that the loss was the greatest in the most recent year.
This approach would help keep limit the investigation costs while performing the
exploratory phase. If suspicious transactions were identified, the relevant period
could always be expanded.
With the client’s approval of the case plan, the Data Sleuth engagement
began, starting with the bank statements and credit card statements. The trans-
actions for each bank and credit card account were summarized by payee and
provided to the client for an initial review. From the bank transactions, Kevin
identified several payees he did not recognize and requested they be researched
further. All but four payees originally marked for additional research were found
to be either normal business or project-specific expenses that benefited the busi-
ness. Expenditures paid to four payees for which the benefit could not be deter-
mined totaled $3,000.
When the one-year analysis results identified only $3,000 of transactions,
Kevin did not believe the results of the exploratory phase investigation were accu-
rate. Gathering the bank and credit card statements, data processing, and data
analysis on this project occurred over two weeks, and over this time, where Kevin
had once trusted the controller, he now believed she was stealing tens of thou-
sands of dollars per year, but at this point, this belief was supported by nothing
except fear. Because the analysis results were considerably less than he believed,
he insisted the investigator do more. The investigator advised that the team could
perform the same analysis for the previous year or that she could interview the
controller about the four payees totaling $3,000.
Kevin selected the latter as he did not want to pay the fees associated with the
additional year of analysis. The investigator and Kevin agreed that the interview
would be informal, nonadmission seeking, and as nonconfrontational as possi-
ble. Although Kevin was convinced tens of thousands of dollars were missing, he
claimed he still wanted to trust the controller and did not want her to leave for
thinking otherwise.
24 ◾ The Data Sleuth Process
Kevin and the investigator met with the controller in her office. Kevin
explained that he had been concerned after he learned about the theft from his
friend’s company and had requested the investigator review his company records.
The controller was not happy about this inquiry but agreed to cooperate. The
investigator explained the source of the findings and that she wanted to ask ques-
tions regarding a few transactions. As the investigator worked her way down the
list of transactions, the controller would look at Kevin and say before answering
each question, “I asked you if I could charge this transaction to the credit card and
reimburse the company later out of payroll, and you said I could.” Her statement
would remind Kevin about a previous conversation, he would respond with, “Oh
that’s right. I did say that.” At the conclusion of the transaction questions, the con-
troller provided a spreadsheet of the transactions and the amounts deducted from
her paycheck to repay the company along with the remaining balance.
Despite the exploratory phase results and the interview outcome, Kevin was
still convinced the controller was stealing tens of thousands of dollars and asked
the investigator what remaining analysis could be performed. The investigator ref-
erenced the other two fraud risk areas. She explained that the majority of the evi-
dence to date indicated that another employee, the project manager, had a greater
risk and opportunity to steal funds than the controller. Kevin decided he was not
going to spend more money on the investigation and requested the findings to be
written in a report and the case to be closed. It is still unknown what analyses were
performed or evidence discovered that resulted in this outcome.
Several months later, the investigator was advised that a friend of Kevin’s had
quantified hundreds of thousands of dollars the controller had stolen and that the
controller had been fired.
Data-Driven Results
Perhaps one of literature’s most well-known sleuths, Sherlock Holmes, said it
best: “It is a capital mistake to theorize before one has data. Insensibly one begins
to twist facts to suit theories, instead of theories to suit facts.”1
It is not uncommon that a client provides an investigator with his under-
standing and interpretation of the events that occurred in a dispute. No matter
how diligent the client is at collecting information about the dispute or issue at
hand, he still retains some sort of bias, and in “The Case of the Reimbursing Con-
troller,” friends and family seemed to encourage and amplify Kevin’s theories with
emotional responses during the investigation instead of evidence.
Although empathy is invaluable in client relationships, maintaining objec-
tivity and allowing facts to uncover the story – rather than finding facts to fit a
client’s theory – is imperative as it ultimately affects the lives of others and affects
the investigator’s future reputation.
Simultaneously Managing Client Expectations and Objectivity ◾ 25
The balance between following data and developing an expert opinion within the
confines of a client’s expectations and timeline is challenging for an investigator.
Common tensions faced in client engagements include the following:
■■ Client beliefs versus evidentiary support. When the client believes one
series of events happened causing their harm, but the evidence suggests oth-
erwise, clients may believe the investigator is not providing the best customer
service or is somehow an adversary to their claims and causes. This not only
creates a strain in the once-trusting relationship between the client and inves-
tigator but can also cause a client to withhold payment or promote negative
feedback about the investigator.
Practice Management Recommendation: Provide a case plan and contract
or engagement letter for a client to review and sign listing the agreed-upon pro-
cedures and payment terms for the investigation. Insist that both be completed
prior to providing any services.
■■ Complete analysis versus client budget. Sometimes when a client is anxious
about a once-trusted employee stealing money from his company, he wants
the full-service investigation – until the cost estimate is discussed. At this
point, risk-based priorities can be presented to create a manageable scope,
but the client may choose a priority based on how he feels about an employee
and decide to use the case budget on a lower-risk concern. This is difficult
for the investigator because had the client opted to spend the budget on the
higher risk priority, the results may have been more helpful in addressing the
client’s concerns.
Practice Management Recommendation: Although an analysis may be
focused on a lower risk priority, if any evidence is obtained concerning a higher
risk priority, disclose the information to the client.
■■ Client Misconceptions about an Expert. Although much in the forensic
accounting and fraud investigation profession relies on the consultant being
an expert, the term “expert” in this context does not denote the ability to
know the truth of what happened without compiling and analyzing evidence.
When a client begins to tell their story, general ideas and high-level investiga-
tion paths may begin to form in the investigator’s mind, but the investigator
does not know exactly what has happened until she follows the data through
the investigative process. Clients often believe an expert can simply “look at
the documents” they have and predict the outcome of an investigation. This
26 ◾ The Data Sleuth Process
■■ Attorney objectives versus expert opinion. Attorneys are often a great source
of referrals for consulting investigators and experts – for some consultants,
Simultaneously Managing Client Expectations and Objectivity ◾ 27
this is his or her primary revenue source. It is not uncommon that an attorney
has a desired objective for an expert analysis in mind that will complement his
theory for the case. Stress on this relationship is created when the attorney’s
desired outcome is not the opinion of the expert based on relevant facts and
the expert’s experience.
Practice Management Recommendation: Document as many conversa-
tions as possible with the attorney. Provide the attorney with a copy of the case
plan approved by the client. Be specific in reports as to the documents reviewed
and related findings. If addendum reports are written subsequent to the issu-
ance of a final report, reference the previous report so that the addendum cannot
stand alone.
PROFESSIONAL STANDARDS
Conflicts of Interest
As stated in the AICPA professional standards, in this line of work, a professional
must ensure that a conflict of interest with regard to the case does not exist. As
part of a prudent client onboarding process, an investigator should have a step in
which anyone working on the engagement provides feedback as to any conflicts
of interest pertaining to any of the parties in the case or their counsel. This step
should also occur prior to learning about the nature of the case and any working
theories or strategies.
It is not uncommon for an attorney to jump into the details of the case in
requesting assistance from an investigator prior to communicating with the parties
involved to the investigator. An awkward conversation results especially when the
investigator must inform the attorney, without breaking client confidentiality, that
she has already been hired to help the other side. In order to honor client confiden-
tiality, requesting the names of the parties and their counsel early in the conversa-
tion is best. Then, if the investigator is aware of a conflict, identify it immediately by
simply stating, “I’m sorry, but I have a conflict in this matter.” This type of response
provides the attorney with what they need to know but does not reveal the specific
conflict – such as working with the parties opposing this attorney’s client.
Another tricky situation may arise when an investigator reviews the parties
and counsel and no conflict is identified; however, later in the case, the investigator
discovers that a new attorney has entered an appearance and at the same time is
representing the investigator in a matter. When this occurs, it is helpful to com-
municate it to the end-client immediately. The end-client may decide that they do
not trust the relationship and must end the engagement, but getting in front of
issues like this is vital for an investigator’s relationship with a client who has likely
already been lied to, resulting in the case at hand.
As the process was applied to each case, staff could then be assigned based
on their personal strengths, interests, and talents. This distribution of work had
the added benefit of increased objectivity by creating space between the client’s
emotional story and the actual data analysis. The client intake part of the process
is now handled by an experienced, credentialed forensic accountant case manager
while the analysis portion is performed by an experienced, credentialed data ana-
lyst. The case manager reviews the analysis to ensure that nuances and concerns of
the client are addressed in the analysis, but in this way, the data analyst can view
the data from a neutral third-party perspective.
The details of the Data Sleuth Process are continuously refined and improved
and will be explained in greater detail throughout the remaining chapters of this
book. The overall process has proven successful in numerous forensic accounting
engagements and financial investigations performed by Workman Forensics and
continues to guide the way we serve clients and work cases. The Data Sleuth Pro-
cess is illustrated in Figure 2.1.
The Data Sleuth Process illustrated in the figure was developed to assist
new investigators and data analysts in applying a careful, methodical approach to
investigations. Within an investigation, it is not uncommon that an investigator
has one chance to obtain the best evidence, and discretion is often key. However, if
a new investigator has never performed an investigation, he will not know which
step might trigger an unexpected response and cause evidence to disappear or wit-
nesses to refuse to cooperate.
Some investigators may want to perform background research and then
interview the subject to see what they can learn. However, in my experience, if this
step is taken too early, the subject is often not helpful because there is no base-
line research or data findings indicating to the investigator whether the subject is
being truthful or not. Then, when the same investigator returns after data analysis
to discuss the findings with the subject, the subject has often retained counsel and
is no longer willing to cooperate at all.
In a financial fraud investigation, it may be that the only person who knows
what happened is the subject. To jump ahead of the process and interview too
early is a critical mistake, and often leads to the best piece of evidence – learning
about the scheme from the subject himself – being forfeited, resulting in more fees
charged to the end-client and a longer investigation.
The Data Sleuth Process, as illustrated in Figure 2.1, works as a funnel that
starts with third-party information gathering and moves toward the subject’s
connections/influence and ends, if possible, with a subject interview. Figure 2.2
provides an illustration of the process as a funnel for information and data within
engagements.
32 ◾ The Data Sleuth Process
Client Onboarding
The way in which a client project starts will often dictate the way it ends. Get
the client on board with the process from the very first encounter – including the
initial inquiry call. This could begin with a simple request that the client sched-
ules a meeting to discuss their case, and even prior to the call, completes a form
providing details about their investigation priorities, access to information, legal
representation, and any court case references. This allows the investigator taking
the initial client call to be prepared to address questions from the potential client;
if necessary, the investigator can also be prepared to listen and then politely advise
the client as to why they are not the best fit for the concern.
An overworked, exhausted investigator will make mistakes whereas an
investigator who uses a process to establish standards can allow the process to
set the boundaries without having to “get tough” with clients. A difficult bal-
ance in this profession is serving vulnerable clients well while also maintaining
professionalism, distance, and time boundaries. Although it may seem like a sur-
prising analogy, Disney World is a great example of how establishing processes,
standards, and boundaries can be seamlessly integrated into the overall customer
experience. When a pop-up show is about to begin on the streets of the Magic
34 ◾ The Data Sleuth Process
Kingdom, guides in costume and character begin directing traffic and setting up
tape lines, and the customers simply follow – maybe never even realizing that
they are being asked to create space for the pop-up show. Thoughtful client-
driven processes and systems allow such integration where the investigator does
not have to be at odds with the client but instead walks with them through the
process explaining what is possible.
Risk-Based Analysis
To connect the client’s concerns to the case plan, or scope of the investigation,
an investigator needs to perform a risk-based analysis of the client’s situation.
For fraud investigations in an organization, the investigator should identify the
areas within the organization most vulnerable to fraud. For a forensic account-
ing engagement such as identifying hidden assets for an individual in divorce,
a risk analysis should be performed to identify key areas in which the spouse
could have hidden assets or understated income. It is the risk-based analysis
that allows the investigator to convert the client’s concerns into action items
and prioritize the action items within the case plan. Risk-based analysis in
The Data Sleuth Process ◾ 35
Case Planning
Using the client’s concerns from the client onboarding step and the results of the
risk-based analysis, the investigative team can then create a plan to address each
concern. This process is explained in greater detail in Chapter 6. Within the case
plan, each of the client’s concerns are translated into an investigation priority to
be matched with a corresponding analysis. The analysis identifies the data needed
to address the client’s concerns.
The case planning step provides a natural checkpoint for the client and inves-
tigator to ensure that good communication is happening and that they are both on
the same page. It is more efficient for both parties to establish an understanding
of the concerns up front. Doing so gives the investigator an opportunity to specify
the concerns she can and cannot address. The client in turn learns what is required
and can identify if he has enough access to data or information to move forward.
When the client sees their concerns, related analyses, and required data in the
form of a written plan, they can more accurately understand the estimated fees;
this also provides an opportunity for the client to prioritize the areas of concern
based on their budget.
Key Interviews
The following approach to interviews is specifically geared toward investigators in
private industry. Investigators in law enforcement may have procedures that are
required to interview subjects.
To better understand the information available for the analysis planned,
an investigator should consider performing interviews of key individuals with
knowledge of the issue being investigated. Through discussion with the client, the
investigator should identify the parties involved and categorize them as potential
witnesses, associates of the subject, and subject(s). Interviews should begin with the
parties farthest removed from the subject and subject associates to limit the chances
of the subject learning of the investigation prematurely. Throughout the investiga-
tion, interviews (formal or informal) will then begin to converge in an ultimate
interview of associates of the subject and the subject(s) as illustrated in Figure 2.3.
The key interviews at this stage should be designed to help the investigator
learn about the processes and procedures used within a business, systems used,
available data, internal controls, business entity setup, and the like. These inter-
views should not be confrontational in nature and should be for information
gathering only.
36 ◾ The Data Sleuth Process
FIGURE 2.3 Illustration of the order of key interviews throughout the Data
Sleuth Process.
Open-Source Research
Open-source intelligence (OSINT) has become an expertise owned by private
investigators and a niche within this profession. This step in the investigation
process, as used by Workman Forensics, is not executed to the level of an OSINT
expert or specialist but rather gathers easily accessible information that contrib-
utes to the understanding of the subject and facts or circumstances surrounding
the client concerns.
Open-source research at this step generally includes the use of public records
databases to identify assets owned, business entities registered in various states,
judgments, liens, licenses, etc. This step is particularly helpful in creating a list of
business entities owned so they can be considered as part of the data analysis step
as well as any utilities or bills paid on various homes. Organizing this information
and making it readily accessible to other investigators or data analysts working on
the case often results in findings that may have been overlooked without it.
the inventory that had been purchased but never received by the company. The
suppliers of the inventory were contacted and provided data exports of all orders
from the client company. Examination of the data exports identified various ship-
ping addresses. The orders were then summarized by shipping address and com-
pared to employee addresses discovered as part of public records searches and
employee records held by the client company. It was discovered that over one third
of the purchases had been shipped directly to an employee’s home. These orders
were quantified as part of the overall investigation and provided to the client.
Open-source intelligence needs should be identified as part of the case plan-
ning process to ensure that when the analysis step is being performed, the research
findings are available to incorporate at that time.
Data Analysis
Chapters 9 and 10 are exclusively focused on the area of data analysis in a variety
of forensic accounting engagements and fraud investigations. Conceptually, how-
ever, this step in the Data Sleuth Process is the critical step in an engagement.
Within this step, information gathered from the previous steps is used to quantify
the amount of missing or hidden money. It is also in this step that evidence sup-
porting the subject’s intent is uncovered.
Results from data analysis within a forensic accounting engagement or fraud
investigation will ultimately be organized into a few categories or buckets through
client feedback and/or additional research, analysis or inquiry. The three catego-
ries that apply to the majority of engagements, as illustrated in Figure 2.4, are
as follows:
The transactions or actions by the subject identified as not benefiting the cli-
ent begin to generate the findings and quantification of a loss. For the transactions
or actions by the subject for which the appropriate bucket is not determinable,
additional research and analysis may be needed, which leads to the next steps in
the process.
sources of information to make a bucket determination could include, but are not
limited to:
Subject Interviews
If the subject of an investigation is an employee of the client company, and if the
company’s policies permit, interviewing the subject using the findings gathered to
date is a great last stop before finalizing the investigation. When interviewing a
subject, it is recommended that someone on the interview team has experience in
interviewing and that at least two investigators are present.
The goal of a subject interview is to take the transactions for which additional
research is needed or for which a bucket could not yet be determined from the
evidence obtained so far and to ask the subject about the specific items. Interview-
ing the subject at this stage, when the results of the research and analysis steps can
be used to develop a much more targeted line of questioning, greatly increases the
likelihood that the subject will share additional information. It is still possible that
the subject will not provide anything new, but an investigator will never know if
the subject is never interviewed.
40 ◾ The Data Sleuth Process
Communication of Findings
An investigation may be perfectly executed, and all types of evidence may be
obtained, but if the investigator cannot communicate the findings in a simple,
concise, and clear manner to the client, attorneys, judge, jury, or other involved
parties, the investigation will be ineffective. In communicating findings, an inves-
tigator should consider the following tips:
■■ For all findings, create tables, charts, or graphs summarizing the finding and
listing the source information. Include them in the report or as attachments
to the report.
■■ Simply state the facts resulting in each finding and explain why the finding
is important.
■■ Do not provide opinions that accuse, or remotely accuse, the subject of fraud.
■■ Do not provide personal or professional opinions when the documented, sub-
stantiated facts will suffice.
■■ Group the facts discovered, or analysis results, by client concern, type of pay-
ment, or method by which the subject benefited from the transactions.
It may be surprising, but the steps of the Data Sleuth Process outlined in
this chapter can be applied to virtually any forensic accounting or fraud investiga-
tion, whether a divorce, embezzlement, partnership dispute, or any of the other
types of engagements discussed at the beginning of this chapter. By following this
process consistently, the investigator ensures not only that their investigation is
both thorough and efficient, but that their objectivity is maintained throughout,
allowing them to uphold professional standards and most importantly, better serve
their clients.
NOTES
1. Arthur Conan Doyle, A Scandal in Bohemia, e-reader edition, Top Five Books, LLC, accessed
August 28, 2021.
2. Association of Certified Fraud Examiners, CFE Code of Professional Standards (Association
of Certified Fraud Examiners, 2020), 2, accessed August 28, 2021, https://www.acfe.com/
uploadedFiles/ACFE_Website/Content/documents/rules/CFE%20Code%20of%20
Professional%20Standards%20-%202020-11-01.pdf.
3. American Institute of CPAs, Objectivity, Integrity and Disclosure (American Institute of CPAs,
2021), accessed August 28, 2021, https://us.aicpa.org/interestareas/personalfinancialplanning/
resources/practicecenter/professionalresponsibilities/objectivityintegritydisclosure.
4. American Institute of CPAs.
5. Doyle, A Scandal in Bohemia.
The Data Sleuth Necessity
3
CHAPTER THREE
A LTHOUGH THE DEFINITION OF Data Sleuth to describe the work of our team
did not originate until more recently, the Data Sleuth Process was devel-
oped out of a necessity for me starting a solo firm early in my career. The
more I applied a data-focused strategy to cases, no matter the type of organization
or scheme alleged, I gained confidence. I knew that if I could identify the best and
most reliable sources of evidence determining the legitimacy of a client’s allega-
tions from the beginning of an engagement, I could then answer clients’ ques-
tions early in the process instead of right before a deadline and would be found
reputable as an investigator and testifying expert. What began as an effort to prove
my legitimacy as an expert resulted in the creation of a professional team that has
consistently provided answers to clients’ questions in the most complex of cases
using the Data Sleuth Process.
Forensic accounting engagements and fraud investigations are not detailed
external financial statement audits. They are methodical, process driven, data-
focused investigations targeted at answering the most popular client questions of
“What happened?” and “How much money did I lose?” External financial state-
ment audits, in general, remain an integral part of many organizations because
they provide assurance as to the fairness of the representation of the information
presented in financial statements. Additionally, external financial statement audits
can contribute to an organization’s fraud prevention strategies. However, they are
not a replacement for proper internal controls or as a tool to detect fraud.
A widespread increase in the availability of financial data processing technol-
ogy has provided opportunities to expand the application of forensic accounting
41
42 ◾ The Data Sleuth Necessity
Frustrated by the number of years a fraud scheme continued while having external
financial statement audits is all too common with our clients. In working with the
management of organizations that have been victims of occupation fraud, or fraud
perpetrated by an employee, we find that they commonly believe external finan-
cial statement audits should have detected the scheme. It is not until after their
engagement with our firm that they truly realize the distinctions between a foren-
sic accounting engagement and an external financial statement audit. Although
the two may seem similar conceptually to someone not in the profession, they
both serve distinctly different purposes.
In 2014, while working cases as a solo practitioner, I contracted on audit
engagements to gain experience with external financial statement auditing pro-
cedures and using data analytics software. It was through these engagements
that I began to appreciate the purpose of audits while recognizing stark dif-
ferences between external financial statement audit procedures and forensic
accounting procedures. Many of the procedures assigned to me were routine
in testing internal controls and statutory compliance. Testing for internal con-
trols involves an evaluation of the business procedures and corresponding duties
assigned to personnel. The auditor evaluates whether there is accountability built
into the procedure that would prevent or detect fraud should it occur in the
process. Having solely worked investigations for eight years, I did not always
understand the purpose of some of the procedures; therefore, I would often ask
a supervisor or manager about the purpose of the procedure before beginning
the assignment.
External audit procedures can be updated to address areas of concern, but
sometimes, procedures are carried over year after year without considering their
effectiveness or ongoing purpose. One such procedure was the comparison of a
sample group of system exported check register entries and the corresponding
paper check stubs. The paper check stubs were generated from the same system
Forensic Accounting Engagements versus External Financial Statement Audits ◾ 43
as the check register. Ultimately, I was comparing a data source to itself – which
in some situations is valuable when testing for the accuracy of an exported report
prior to performing data analysis. However, that was not the situation. From a
Data Sleuth perspective, an improved procedure would be to compare the sample
transactions from the system exported check register to the corresponding checks
on the bank statement to ensure that the information in the system represents
what actually cleared the bank.
If an organization is concerned about the fraud risk in an organization, an
external financial statement audit will not likely detect it for several reasons, but
ultimately, because a financial statement audit is not designed to detect fraud.
It is simply the wrong tool for the job. The deadlines alone restrict the audi-
tor’s ability to examine in detail the individual transactions that make up the
balances on the financial statements. The design of an audit includes mandated
deadlines requiring an audit to be completed for some organizations in as few
as 45 to 60 days. Even as the use of data analysis has improved the efficiency
of audits and allowed for more strategic testing of transactions, there is still a
constraint of time.
In providing an opinion on whether financial statements are fairly presented,
financial statement fraud may be identified; however, the most common fraud
schemes faced by businesses, not-for-profit organizations, governments, tribes,
or schools are those of asset misappropriation, and many of the clients we serve
do not have internal audit departments. Asset misappropriation refers to the
theft of cash, inventory, equipment, or any other asset of value. Asset misappro-
priation schemes comprise multiple transactions that when combined over the
life of the scheme may be material in total. However, over the course of a year,
asset misappropriations in transaction value fall below most materiality thresh-
olds established in an audit. Not to mention, many transactions representing the
individual occurrences of theft are charged to profit and loss accounts whose bal-
ances are closed at the end of each year to retained earnings. Thus, the totality of
the amount stolen over time is less obvious – especially in an organization with
total revenue necessitating an annual external audit – such as a company that is
publicly traded.
Although it may not be the specific intention of an external financial state-
ment audit to detect fraud, it is possible. Additionally, an audit contributes to
a fraud prevention program by decreased fraud risk in an organization to the
extent that employees believe an auditor could detect their scheme. However, if
an employee understands the audit procedures, he may be able to conceal the
scheme, making it undetectable by the auditor. If an organization wants to prevent
or detect fraud, or investigate fraud that has already happened, an external finan-
cial statement audit is not the most effective tool.
44 ◾ The Data Sleuth Necessity
When I first started working in the private sector, I noticed several percep-
tions about forensic accounting engagements. The first perception about foren-
sic accounting, from accountants and clients alike, was that forensic accounting
engagements were essentially detailed audits with the involving procedures to
examine any and all transactions within an organization – or at least in the area
of the alleged occurrence of misappropriation of funds. Obviously, this approach
created a perception with some clients that to request such an engagement would
be cost prohibitive from the start. For other clients, the cost of the investiga-
tion itself did not feel justifiable as the client had already suffered a financial loss
and knew that not much of the loss could be recovered. Then, there were others
who, even though only a fractional part of the loss stolen may be realized, still
believed the engagement would provide value because they could learn how the
fraud occurred and receive consultation on how to prevent it in the future. The
accountants’ and clients’ perceptions were not entirely wrong.
Familiar with the manual labor process of data entry, it was no surprise that
cases in the private sector required the same manual labor process of gathering
and entering data that I experienced when working with law enforcement. A sig-
nificant difference between public and private sector investigations was a client’s
budget for the investigation. Although cases I worked on with law enforcement
began with the manual data entry of all known bank statements, credit card state-
ments, and the like, such work could be extremely cost prohibitive for private
sector clients. Optical character recognition technology (OCR) was being used to
search PDF documents but was not yet used to facilitate the importing of finan-
cial data into spreadsheets or accounting systems.
Because of the cost of digitizing financial information, private sector investi-
gations seemed to begin by first identifying the scheme a client was alleging about
a subject and then the investigator would try to find corresponding data/evidence
to determine if the allegation was verifiable. Evidence of the scheme would be col-
lected and documented, and a loss was quantified. This approach reduced the fees
that would have been incurred from manual data entry; however, it greatly limited
the scope of the investigation.
In order to perform the procedures beginning with an alleged scheme, case
planning had to be based on understanding the characteristics of the alleged
scheme and comparing the characteristics to the evidence available. An inves-
tigation could have several schemes for which this same process was followed.
Although this method was successful with clients’ cases, I personally did not enjoy
the constant internal nagging and concerns. I worried that I might overlook some-
thing pertinent to the case, or that had I looked at other evidence, I would have
The Case of the Cash Back Payroll Scheme ◾ 45
Vince had been out at the ranch and missed a call from a number he did not
recognize. Listening to the voice mail, he heard, “Hi Vince. This is Gina. I work
for your company under Jane. I really need to talk to you.” Vince immediately
redialed Gina’s number and set an appointment to talk with her the following day
off site. Gina’s hands were shaking as she carefully told Vince about a conspiracy
in the home office. The conspiracy she described existed between Jane who was
46 ◾ The Data Sleuth Necessity
the chief executive officer (CEO), the chief financial officer (CFO), and other
managers and supervisors. Vince was shocked, blindsided, really. He diligently
reviewed his company’s financial statements every month. The balance sheets and
income statements were consistent, and the CFO had paid every shareholder dis-
tribution on time and without any discussion of cash flow issues. He knew Gina
was well liked and part of the core team and would not risk that position to tell
him something untrue, but he just could not believe it. Vince encouraged Gina to
tell him all she had seen and heard so he could chart a course of action.
Jane had positioned herself to be responsible for payroll, even though it was
outside the job description of a CEO. She would overpay the core team employees
and then place envelopes on team members’ desks with a handwritten amount on
the front of the envelope. The team members knew that Jane expected them to
return to her in the envelope the indicated amount of cash when their paycheck
deposited. For example, if Jane overpaid an employee by $1,000, the envelope may
have $500 written on the front. That employee was to return $500, and then he
was able to keep $500 net of all the taxes that would be due on the extra $1,000.
Later that evening, Vince began to research Gina’s allegations. Slowly but
surely, he confirmed the worst – a team of trusted employees were stealing money.
Vince interviewed the four employees from the list Gina prepared; they all imme-
diately confessed. Then, Vince hired Workman Forensics to help him establish the
amount of money missing. Although Gina advised about the employees involved
in the scheme, and those interviewed confessed, I asked Vince if we could expand
our scope to look at all home office employees – not just those known at the time.
We had recently procured data analytics software to pair with our data process-
ing system. I explained that if we ran our analysis on all home office employees
at the same time, not only would he know who was involved based on data evi-
dence, but it would be more efficient than generating a loss analysis every time he
learned about another involved employee through the grapevine. Vince agreed to
this method and provided us with the timesheet records and payroll reports from
the provider for all home office employees.
Comparing the hours in the timesheet data to the hours paid in the payroll
reports, we immediately identified 28 employees who had been paid for more
hours than they worked. Most of the differences were between 150 hours and
300 hours, and the primary players in the scheme had been overpaid for between
4,000 to 5,000 hours over the five-year relevant period. The loss to the company
and Vince was $208,000.
If our investigation focused only on those individuals Gina reported, Vince
would have had a loss of $170,000. An additional loss of $38,000 was quantified
that could be included by Vince in his recovery efforts moving forward. More
Start with the Evidence, Not the Scheme ◾ 47
significant than this, however, was that the analysis of looking at all home office
employees identified that Gina had been overpaid during the period by 500 hours.
During the week following April 15, 2010, when we were given a bonus vacation
day to celebrate the end of a busy tax season, I began investigating a $3.5 million
embezzlement by a loan officer at a local bank. As that case ended, preparation for
the fall tax deadline began. This was the first time in my career that I experienced
a panic attack although I did not know this was happening at this time. What I
did know was I could not continue to prepare tax returns and work on forensic
accounting engagements at the same time. After having given my manager ample
notice, I started the job search process. I still remember the days following giving
my notice as one of the lowest points of my life. Having left my dream job at age
21 felt as though my career life was all downhill, and I did not want to return to
the FBI. Working with a headhunter, I explored several controller positions, but
although the accounting job openings were a great step in an accountant’s career,
I felt lost. I did not want to be a great accountant; I wanted to be an investigator.
One day, the headhunter suggested that I start my own business as a fraud exam-
iner. This was the first option that did not feel terrible. I called my mentor from
the FBI and my mom to see what they thought about the option. My mentor was
surprised but encouraging, and Mom said, “If it doesn’t work, what’s the worst
that will happen?” I responded, “I go get a job as a controller.” A few weeks later,
Workman Forensics officially opened – from my laptop on my dining room table.
My experience to this point was laser focused on tax strategy, forensic account-
ing engagements, and fraud investigations. I had never considered opening my
own business, so I was facing an enormous learning curve – especially because I
had no clients or even contacts in town. Starting in the fall of 2010, I worked odd
jobs while I forced myself to meet with attorneys, bankers, and really anyone who
would talk to me. Three months passed when the phone rang. On the other end
The Case of the Gambling Executive Director ◾ 49
was an attorney I had met a few months before. A local not-for-profit organiza-
tion believed their executive director had stolen $1 million. He wanted to know if
I wanted to work on it and if I would go meet with the interim executive director.
I tried to sound as if I received these calls every day and made an appointment that
was responsive but not too eager.
The interim executive director, Adam, was worked up to say the least and
openly anxious of my arrival. Assuring him that I was just an accountant and not
law enforcement, he began to tell me about his discovery. Before becoming the
interim executive director, Adam had been the assistant executive director. Before
the discovery, the former executive director, Ivan, was preparing for retirement and
was training Adam to take his position. The organization did not use any kind of
accounting software, or even Microsoft Excel, but still used green-bar ledger paper
and a checkbook. Complaints around the organization were that Ivan was never
there and that things were starting to fall apart. Ivan began teaching Adam about
the financial preparations for board meetings when Adam noticed payments to
a financial institution. Shortly after the training, Ivan would bring Adam credit
card statements and represent to Adam that these statements were Ivan’s personal
credit cards. He would ask Adam to shred them. Recognizing that a couple of the
statements were from the financial institution listed in the check register, Adam
did not follow Ivan’s orders and kept copies of the statements in his file drawer.
The next time Adam was asked to prepare financial information for the board,
he took the credit card statements into Ivan’s office while he was out and com-
pared the payments listed on the credit card statements to the check register. The
amounts matched. Adam was convinced Ivan was stealing from the organization.
The realization of the theft hit him, and in somewhat disbelief, Adam waited
for Ivan to leave on several occasions to investigate other areas of potential theft
including cash donations received. Records of the cash received were compared to
cash deposited to the bank account. Having found no cash deposits over a period
of time and knowing that Ivan was the person responsible for the deposits, Adam
believed Ivan was stealing those funds as well.
Adam provided me with copies of all the credit card statements and showed
me the matching check register entries. The credit card statements were several
pages long and listed numerous transactions at local casinos within an hour from
the organization. I was sent back to my home office with 11 extra-large banker’s
boxes full of paper documents including bank statements and green-bar check
registers for 10 years. He also provided me with the records of cash donations and
carbon copy deposit slips lacking cash or currency deposits. The attorney advised
he was filing a civil lawsuit and was requesting a temporary injunction, so a sample
50 ◾ The Data Sleuth Necessity
Starting with the analysis goals in mind, I had to find the most efficient path
from start to finish and be ready to testify with exhibits in less than two weeks.
Additionally, at 26 years old, any testimony where I might have said, “based on my
experience. . .” would not be seen as credible, especially if Ivan had hired a more
experienced expert, so I knew my analysis had to be perfect. Out of necessity, I
exclusively relied on financial data, specific transactions, and patterns that would
substantiate my testimony and reputation – especially with my first case as Work-
man Forensics.
Ivan’s credit card statements listing the gambling transactions and payments
could not be subpoenaed and returned within 10 days, so I needed the next best
type of evidence – the bank statements of the not-for-profit organization listing
the payments on the credit cards. Returning to the data entry skills I learned at the
FBI, I began entering banking transactions into an Excel spreadsheet for a relevant
period of one year noting if any memo lines on checks referenced the credit card
number associated with the payment and the signature authority on the check.
I could have simply scheduled payments to the known credit card accounts for
which Adam had saved statements; however, every time I had ever only processed
select transactions instead of all the transactions listed on the statement to save
time, I regretted it later and still ended up spending the time doing so.
This case was no exception; digitizing all the bank statement transactions and
subsequent analysis identified two additional credit cards belonging to Ivan. These
additional credit cards were paid using the organization’s funds. To confirm that
the credit card payments did not belong to the organization, a Dunn and Brad-
street report was obtained from a company specializing in background checks.
The report confirmed that the organization did not have any credit card debt
in the organization’s name. Digitizing the bank statements also proved valuable
because another area of loss to the organization was identified. Ivan had written
multiple check payments for $1,000 each to himself in excess of his regular pay-
roll. Tables listing the check payments to credit card companies and Ivan directly
during the one-year period were prepared. I organized a binder for the hearing
The Case of the Gambling Executive Director ◾ 51
containing examples of the check payments made to credit card companies and
Ivan’s credit card statements retained by Adam.
The records of cash donations were compared to corresponding bank state-
ment deposits that had been digitized to list cash and check totals. For the year
under investigation, none of the cash donations had been deposited to the bank
account. Tables were prepared summarizing the findings and were accompanied
by examples of the paper donation records and carbon copy deposit slips.
More nervous than ever, I testified to my assignment, my findings, and the
evidence upon which I relied. During cross-examination, the opposing counsel
questioned me on the validity of my procedures and evidence relied upon, but
despite his efforts, the judge granted the temporary injunction. Relying on specific
transactions from third-party source documents proved reliable and accomplished
the goals of the case: it verified the legitimacy of the allegations and demonstrated
to the court that Ivan’s assets should be frozen.
The origins of the Data Sleuth Process resulted from the necessity that I
had to do what I could using the experience I had early in my career. The funda-
mental skills I had learned were to process data and to identify patterns within
the data. This approach worked by addressing the concerns of the clients and the
goals of investigations using data-driven results – instead of finding evidence to
fit a scheme.
Data Sleuth Considerations
4
CHAPTER FOUR
53
54 ◾ Data Sleuth Considerations
ledger. This was not best evidence, yet it was all I had to work from to ultimately
communicate to the client whether embezzlement was happening in the practice.
I asked a lot of questions and consulted with experienced investigators, but at
the end of the day, I simply had to scroll through this client’s general ledger and
identify items that I thought seemed strange. Looking back, I have no idea how
I defined what made a transaction strange, as I had no formal process or method
other than simple logic.
After providing the client with a list of the seemingly strange transactions,
the client ended the investigation. I later learned, from the client’s account man-
ager, that the client believed her husband was having an affair with the office
manager and was hoping to find evidence that her husband was letting her take
extra funds from the business. Having found none, the investigation ended. It was
this investigation that brought a few things to my attention that I knew I had to
understand for future case work:
Working with law enforcement as a support employee, never did I meet the
victims of fraud cases and only rarely did I meet the subject of the inves-
tigation. When forensic accounting engagements began to call the public
accounting firm on cases, interaction with the clients was unavoidable. Rather
than an agent opening a case based on a complaint or tip received, or an ini-
tiative, the forensic engagement began with the client discovering a problem
that required immediate response and constant communication. The first few
meetings with the victim, or end-client, felt overwhelming. Previously, the
investigation case details were filtered to only the information I needed when
analyzing the financial transactions; but in the private sector, the information
came firsthand through a client interview process and through a firehose. No
one had refined and compartmentalized the facts from the drama-ridden nar-
rative for me. However, this experience proved invaluable. Prior to meeting
the victims, a career in financial investigations stemmed from a desire to have
a fun job, but having met them, my motivation transitioned into empathy to
help the victim.
The Case of the Nonexistent Inventory ◾ 55
Sitting across from and listening to a victim’s story never fails to change my
attitude and perspective on a case. It is easy to overlook the real people affected
by an investigation or a subject’s vulnerability in a perceived crisis. When an
investigator sits outside of the situation and the daily commotion of a busi-
ness, judgment of the victim owner’s inaction or apparent negligence is tempt-
ing. However, when the victim shares his version of the story, the impact and
importance of the investigation become more than just an interesting career; the
realization that the results of the investigation decisions will affect a person’s life
is sobering.
To the business owner who has lost millions of dollars to an employee, the
emotional loss tends to be greater than the financial loss. The business owner
rarely sleeps with the normal workload, so the seemingly never-ending effects of
the once-trusted employee’s actions continue to be revealed, including:
■■ Identifying the tasks of the subject that must continue for the business to
continue to operate
■■ Discovering tasks once believed to have been completed are outstanding
■■ Recruiting and training new talent to cover the duties of the subject
■■ Managing the other employee attitudes and perspectives when law enforce-
ment action, or any type of criminal punishment, appears to be slow or lagging
■■ Continuous identification of other, usually smaller, schemes or methods of
theft and disloyalty to the company
■■ The discovery of years of negative financial performance after years of believ-
ing the opposite
■■ Greater than any of these, the feelings of betrayal and loss of a trusted
relationship
Jeff’s interview is one that I will never forget. It was not my first subject interview,
but it changed my perspective of a subject. I had been analyzing the messiest
56 ◾ Data Sleuth Considerations
data (to this day I have never seen worse) and compiling what I could determine
as the loss. Before Jeff arrived at the interview, I coached myself on being direct,
calling things as I saw them, and fighting for the victim client. But when Jeff
arrived, he looked so human, humbled, relieved, and terrified. We introduced
ourselves and barely finished establishing the purpose of the interview, having
asked him to be truthful, when Jeff blurted, “Let me say this before we dive into
everything. It’s been a long, long time since I’ve had any kind of peace in my life.
I’ve laid down most nights worried about getting caught. I’m at the point where
I’m here to tell you the truth. I’m not going to cover anything up because I’ve
covered up so much for so long that I’m really tired of it. I’m tired of stressing,
having stomach cramps, and waking up in the middle of the night. I can’t keep
covering things up, hiding things, and lying about things. So, I’m just going to
tell you the truth.”
All my self-coaching about maintaining a tough exterior melted at his opener,
and I all I could see was a person who made a mistake – a very costly and impru-
dent mistake – but still a person, nonetheless. Then he started telling his story, and
although there were plenty of other alternatives to solving his financial problem
than stealing money from his employer, his logic tracked – as much as I hated
to admit it.
Jeff was an outside salesperson in industrial sales for 25 years for Industrial
Distribution, LLC, and it was in his sales rounds that he met Trent. Trent was
a manager for a company that would buy discontinued industrial products for
pennies on the dollar, which Jeff ’s company could purchase from time to time for
clients and earn a higher margin. When Trent lost his job with the supplier, Trent
started his own discontinued industrial products company, Discount Supplies,
LLC. Jeff arranged to continue purchasing products from Trent, only through
Discount Supplies instead of Trent’s previous employer.
After doing business with Trent for years, Jeff found himself in financial hard-
ship with his three kids in college while paying their tuition and living expenses.
Jeff knew that his managers at Industrial Distribution did not pay a lot of atten-
tion to him and his sales because he was one of the top producers for the company.
Jeff approached Trent and told him he was going to start selling products on the
side to make some extra money, but to do so, he wanted Trent to run the checks
from customers through Trent’s company, Discount Supplies, and then remit pay-
ment through Discount Supplies to Jeff. Trent agreed to do so because Jeff told
him that he did not want Industrial Distribution to see the sales on the side to
their customers as it was a conflict of interest.
Shortly after the scheme began, Industrial Distribution was acquired by
a larger company, Acquiring Distribution, and Jeff became nervous that his
scheme was going to be discovered when the acquisition team started their due
The Case of the Nonexistent Inventory ◾ 57
diligence and counted inventory. However, the acquisition team did not per-
form due diligence related to the inventory of industrial supplies. Addition-
ally, because of Jeff ’s trusted position in the company and his past success, he
was the only outside salesperson at Industrial Distribution who had total access
to the computer program with the ability to initiate purchase orders, receive
products from the purchase orders, deliver products to customers, and prepare
customer invoices.
When Acquiring Distribution purchased Industrial Distribution, even after
the purchasing system was consolidated, Jeff retained his system access to the
entire purchasing and sales processes. Jeff recognized his new employer was not
paying any more attention to him than the previous employer, and his scheme
continued, which involved the following steps:
Jeff had finally decided to resign, find a new job, and start over with the
hope that his scheme would go unnoticed. But Jeff ’s decision was a few weeks
too late. His employer discovered the fake vendor invoices when looking
through purchases that had not been billed to customers. Jeff was cooperative
throughout the entire engagement, including this interview, and when I would
call him with questions about activity I discovered in the financial data analysis.
The total loss exceeded $650,000. Jeff was fired, and in an effort to encourage
the employer to not file criminal charges, Jeff offered to surrender his retire-
ment account. The employer did not agree to not file charges in the matter, but
when I followed up on making a referral, management advised that because of
other acquisitions in progress, they did not want any potential negative public-
ity from the case.
Training event audiences dislike and feel uncomfortable when I share stories
like Jeff ’s. Outrage is the typical response by audience members, as they believe
that Jeff did not receive appropriate punishment for his actions. And maybe
they’re right. When I consider that if presented with the same set of circumstances
as Jeff, I realize that I might have made the same decision to relieve the sense of
58 ◾ Data Sleuth Considerations
pressure to provide for my children’s college education. This is the truthful humil-
ity I realize every time I interview a fraud suspect – especially when the theft was a
first-time occurrence. Acknowledging this human frailty reminds me to avoid the
judgment and accusation trap and to stay in the objective lane of evidence, data,
and piecing together from such what actually happened.
In its most simplistic form, to prove fraud, one must provide evidence of the
subject benefiting by deceitful intentions. If this concept was a formula:
When I worked my first case in the private sector, I originally believed that
working cases without access to subpoena power was extremely frustrating, if
not impossible. I worried that I would not be able to create value or answer
client questions to help them take their next steps without access to this infor-
mation. However, after working investigations from the private sector for over
12 years, I think private sector investigations possess great advantages that law
enforcement investigations do not have the time to consider. Conversely,
law enforcement investigations have great advantages in collecting information
through subpoenas from financial custodians. When the two types of investiga-
tions work together, that is where I have experienced the greatest recovery for
clients and client satisfaction.
Investigations beginning in the private sector, before being referred to law
enforcement, create value by providing a greater foundation and context around
the crime than that of a criminal investigation – if for no other reasons than being
able to incorporate accounting expertise and more time to truly understand the
situation. Starting with a criminal investigation may seem more efficient, linear,
and cost effective considering the ability to subpoena bank statements and other
financial information, and to avoid paying legal fees. However, several pieces of
key evidence in financial investigations that law enforcement does not always have
time to consider include a company’s general ledger, accounting software reports,
audit trail/user log reports, and payroll reports. These sources of information can
provide a treasure trove of evidence supporting the intentions and motives within
the scheme. The types of evidence and data key to private sector investigations are
provided in greater detail in Chapter 8.
Staying on Task with Purpose in Mind ◾ 59
basic financial analysis tasks throughout the investigation, I tried to advise the case
agent of transactions that may have assisted with the purpose of the investigation.
Working a case without a stated purpose can also result in opposing counsel
accusing the investigator of having no guidelines and simply running in an open
field going whichever direction the wind blows. On the other hand, if the investi-
gator begins with a desired outcome in mind, she may be accused of bias, cherry-
picking evidence to support a theory, or being an advocate.
The definition of investigate is “to observe or study by close examination and
systematic inquiry” or “to make a systematic examination.”2 Perhaps the inclusion
of “systematic inquiry,” in the definition, references a process that justifies the con-
nection of evidence discovered to the end purpose or statutes. However, the portion
of the definition stating “to observe or study by close examination” creates the idea
of separation between the observer and that being examined, which then appears to
incorporate objectivity into the examination. Although interesting, this definition
is more complicated when put into practice in the real world. Few are those who
are given unlimited time and resources to explore without a specific destination
and goal in mind. Such a state allows time for an investigator to follow rabbit trails.
How does a forensic accountant or fraud investigator navigate an investi-
gation objectively, but also efficiently, which justifies the time spent observing
and systematically inquiring to then articulate what happened in such a way that
the client or prosecutor can take their next steps? One solution is presented in
Figure 4.1 as an investigation decision tree.
experience, so when calls of such nature are received, the callers are provided with
contact information of digital forensics experts. Collaborations with open-source
intelligence experts are created when it is apparent that a case will require in-
depth research identifying facts that financial analysis will not provide. When the
client’s allegations fall within the investigator’s areas of expertise, the investigator
may then move on to the next step.
Verifying the legitimacy of the allegations creates value for the client and
limits the investigator’s exposure. The client should be advised as soon as pos-
sible if their allegations, or perceptions about what happened and how they were
harmed, do not have sufficient evidence. Additionally, if the client’s desired recov-
ery avenues will not be available because of lack of evidence or otherwise, the
client should be advised before he invests time and resources into fruitless efforts.
As for the investigator, communicating with the client continuously about
lacking evidence or invalidity of the allegations can reduce the investigator’s expo-
sure for malpractice lawsuits. Reducing exposure does not mean that a client can-
not file a lawsuit; however, contemporaneous documentation and communication
with the client will provide great evidence should a complaint be filed.
RECOVERY AVENUES
the reality of the potential outcomes, but focus their attention on recovery over
revenge, are often the most successful and happiest clients after the investigation.
The following outcomes can be pursued simultaneously and independently of the
others, but not all avenues are beneficial or applicable to every client’s situation.
As Data Sleuths, we investigate every client matter as if it will be criminally pros-
ecuted as the burden of proof is the greatest of all the outcomes.
When a client report is prepared considering a burden of proof beyond a
reasonable doubt, it serves the other possible outcomes well. Additionally, it is
never advisable to have multiple reports issued as an expert with multiple loss
totals. Doing so will not only create confusion, but also provides the opposing
counsel with an easy opportunity to discredit the investigation and create doubt.
From the client’s perspective, preparation in this way is also more efficient and cost
effective when the issuance of one report can be used to pursue any, or all, of the
desired outcomes.
■■ There must be clear and convincing evidence that a prosecutor can use to
prove beyond a reasonable doubt that the subject stole the financial resources
contained in the allegations. The less convincing the evidence, the less likely
law enforcement will pursue criminal charges. For example, if the loss to the
victim involves a cash/currency-based scheme, the likelihood of prosecution
diminishes because evidence is limited. Often, there is more than one person
who handles the cash, which makes blaming one subject difficult when the
standard is beyond a reasonable doubt.
■■ Loss calculations for the purposes of criminal prosecution should be based on
specific item tracing and specific transaction identification. Quantifying spe-
cific transactions identifying how the trusted subject benefited at the victim’s
expense is a preferred method over estimating, or “backing into,” a loss. Loss
calculations are a primary driver in the subject’s sentence, which is why it is
important that it is as accurate as possible.
■■ Law enforcement has limited resources, including time and personnel to
handle the crimes experienced by the public. Therefore, priorities must be
assigned to the investigations pursued that may include whether it is a vio-
lent crime. Additionally, even within the context of white-collar crimes and
fraud schemes, there are priorities given to the cases with a greater total loss
Recovery Avenues ◾ 65
amount, the types of victims (i.e. the public or a community versus one indi-
vidual), the number of subjects or conspirators, the repetitive nature of the
scheme, the criminal history of the subject, etc. And all of these prioritizing
factors are subject to the quality of evidence. Therefore, not all cases worked
by an investigator in the private sector will be charged criminally.
■■ Detectives in law enforcement are required to be a jack-of-all-trades when
investigating crimes – even when focusing on the area of financial crimes.
Within one financial crime unit consisting of a few detectives, they at one
point or another may need to work a credit card fraud case, an embezzle-
ment, an elder financial abuse case, and a check fraud case. Although each of
these investigations are financial in nature, the investigation approaches vary
greatly. The more complicated the scheme, such as thousands of transactions
moving in and out of numerous bank accounts or theft being hidden in the
accounting of a company’s records, the likelihood of charges being filed at
the state and local level decreases – especially when combined with unclear
evidence or lower priority cases explained previously.
■■ If financial crimes are not associated with a violent crime, drug rings, or
organized crime, judges may be more lenient with the sentencing – especially
when the subject has no prior criminal history. Many subjects of embezzle-
ment investigations I have worked have few, if any, speeding tickets let alone
a criminal record. When sentencing results do not feel severe enough to the
victim, the victim is often left feeling helpless, as if he or she did not receive
the desired justice and has been betrayed by yet another trusted system.
■■ It is possible for assets to be seized and restitution ordered to the subject in
a criminal prosecution. However, it is important for the client to understand
that criminal proceedings and law enforcement are not collection agencies.
■■ Filing a civil lawsuit provides the client with a way to subpoena financial
accounts of the subject through the help of his attorney. Having this infor-
mation streamlines the investigation for the forensic accountant or fraud
66 ◾ Data Sleuth Considerations
investigator, which can often make the investigation more efficient from a
cost standpoint for the client. It also helps the investigator prepare a report in
which law enforcement can be more confident in the reliability and simplicity
of the evidence to move forward with criminal charges.
■■ A civil lawsuit also provides opportunities to obtain a judgment to acquire
assets purchased with stolen funds from the subject. If the client’s attorney
elects to do so, at the beginning of the lawsuit, a temporary injunction or
restraining order can be obtained through this process to limit the disposal of
assets by the subject while the investigation is ongoing. Preliminary investi-
gation will likely be necessary to establish the existing assets and may require
testimony at the hearing concerning the injunction by the investigator.
■■ The burden to prove fraud in a civil lawsuit is lower than that of criminal pros-
ecution, which could be advantageous if the client’s goal is to recover assets.
■■ If damages from a fraud claim are awarded to the victim, the judgment can-
not be discharged through bankruptcy by the subject.
■■ A caveat to civil lawsuits involves the related fees from attorneys and experts.
I recommend that before a client pursues this outcome, preliminary research
and investigation be performed to identify if any of the stolen funds exist in
the form of bank accounts, properties, related businesses, shell companies, or
personal property providing a path of at least partial recovery for the client
that is greater than the fees to be incurred. If this hurdle is overcome, then
the remaining benefits of this avenue may benefit the client.
ABC Oil and Gas Exploration sold working interests to investors and managed
the exploration and development process. Oil and gas prices were at a peak, and
cash was flowing steadily until the chief financial officer retired and was replaced
The Case of the Man Cave ◾ 67
by a new CFO, Trent. As the new CFO was getting up to speed with the systems
and procedures of his new employer, he discovered irregularities in the bank
statements. It appeared that the previous CFO was behind in reconciling the
operating account. Trent prioritized this project, and in doing so, he discovered
images of checking withdrawal slips were included with the images of canceled
checks. When he contacted the bank, they advised the withdrawal slips were
accompanied by cashier checks.
Banks operate on a double entry accounting, which is important to under-
stand as an investigator, because with every transaction or image listed on a
monthly bank statement, a corresponding document exists for the other side of
the transaction, as listed in Table 4.1.
Trent requested copies of the corresponding cashier checks to the checking
withdrawal slips for the previous few months. When received, Trent was stunned
when he immediately recognized the vendors to whom the checks were written.
They were limited liability companies that he recognized because they belonged
to his good friend and buddy, Bill Word. The same Bill Word who recruited him
to work at ABC Oil and Gas Exploration.
Trent and Bill were friends from high school, and carried on through college
as they earned accounting and finance degrees, respectively. They shared com-
mon interest in car racing events. After college, Bill began working for ABC Oil
and Gas Exploration and began climbing the ranks. By the time he recruited
Trent to replace the former ABC Oil and Gas Exploration CFO, Bill managed
all operations and had recently become a partner in the company. Trent contacted
the former CFO to ask him about the unreconciled issues to see if he was aware
of these cashier checks payable to Bill’s LLCs. The former CFO advised that he
did not know what the withdrawal slips were for as, historically, they fell under
Bill’s operations. The former CFO said that he did not code the transactions to
accounts, but rather, he would let Bill know about the unreconciled transactions
each month, and Bill would code them to the appropriate job or general ledger
account. Trent made sure to not let the former CFO sense his suspicions and con-
tinued to perform the reconciliations.
After completing several months’ worth of reconciliations, Trent could not
deny his findings. Bill was paying personally owned LLCs affiliated with car
racing events with ABC Oil and Gas Exploration’s money. Trent prepared a
memo of his findings for the owners whose reactions vacillated from disbelief
to outrage. The chief executive officer contacted the company’s attorney and
private investigator. The private investigator convinced the company to refrain
from letting Bill know about their discovery so that a forensic accountant could
examine the evidence, prepare sample findings, and then the private investigator
could interview Bill possibly to obtain a confession. The attorney supported this
plan, and the company agreed to give the forensic accountant a week because
they feared they would respond out of emotion if they had to wait to confront
Bill much longer.
The forensic accountant began with a relevant period of one year and iden-
tified multiple LLCs owned by Bill that received payments from ABC Oil and
Gas Exploration. Similar transactions were also extracted that did not appear
to be for the benefit of the company. The findings memo was provided to the
private investigator who used it to confront Bill. After an hour-long interview,
Bill confessed to the theft. The private investigator not only obtained a con-
fession, but Bill also advised how the money was used, bank accounts hold-
ing some of the funds, and where assets purchased with the company’s money
were stored. The private investigator recruited the help of the local sheriff ’s
deputies to travel with Bill to the site storing personal property and physical
assets to seize:
The private investigator learned through the interview that Bill enjoyed pur-
chasing items for his buddies to enjoy, and because of the size and volume of the
personal property purchased, he needed a place to store all of it. That is when he
used his employer’s money to build a metal building on his property, separate from
his house, that cost $100,000.
The Case of the Man Cave ◾ 69
A civil lawsuit was filed by the company and its attorney, which was used
primarily to obtain a judgment for the assets collected by the sheriff ’s office. Once
accomplished, the company was able to auction and sell the assets – including the
property on which the metal building was built.
When the loss calculation and financial investigation was completed, the
theft loss totaled over $3 million. The report of findings was provided to federal
law enforcement at the request of the client. The investigative agency was the
Criminal Investigation Division (CID) of the Internal Revenue Service, as Bill
never paid taxes on the $3 million he stole from his employer.
Using the forensic accountant’s investigation, the client was able to recover
approximately one third of their loss through the civil lawsuit and sale of the
property sold through auction. At the same time, IRS CID agents completed their
investigation, and within a year, Bill was sentenced to three years in prison.
This case illustrates the success of an investigation when an investigator con-
siders a client’s goals, verifies the allegations, and identifies potential loss recovery
avenues in a financial investigation.
NOTES
1. Janetta Maxwell, “Check Kiting and Ponzi Schemes,” The Investigation Game Podcast,
Tulsa, OK, accessed June 26, 2019, https://www.workmanforensics.com/podcast- episodes/
episode-5-check-kiting-and-ponzi-schemes?rq=check%20kit.
2. Merriam-Webster, “Investigate,” accessed October 4, 2021, https://www.merriam-webster.com/
dictionary/investigate.
Client Communication and
Involvement
5
CHAPTER FIVE
71
72 ◾ Client Communication and Involvement
Knowing the lifestyle, assets, and business run by her husband, Susan would not
settle for her soon-to-be-ex-husband’s property settlement offer in their divorce.
She searched the web for a “forensic accountant” to find an investigator. Susan
called the investigator and explained her situation during a one-hour phone call.
To wrap up the call, the investigator suggested they schedule a meeting where she
could bring the case documents for the investigator to review. At her scheduled
appointment time, she hauled six banker’s boxes up two flights of stairs to the
investigator’s office. She began the meeting by pulling out piece after piece of
paper theorizing about how her ex-husband was omitting assets from the mari-
tal balance sheet to give her an unfair property settlement. The investigator lis-
tened for a couple of hours to Susan jumping from one theoretical explanation
to another, suppositions of girlfriends, and anything else she could imagine her
husband doing to ensure she was not adequately compensated at the end of the
divorce. Susan left the investigator’s office. Exhausted by the lengthy stories of
the day and knowing the remaining case work piled on her desk to complete, the
investigator settled in for a long evening.
The next day, Susan called with more stories and theories. Susan’s personality,
when she was not upset about the divorce, was fun, upbeat, and positive. However,
each phone call would result in the investigator offering some sort of advice or
consoling Susan about the divorce itself. Over the next few weeks, the investiga-
tor started cringing when the phone rang – not because she did not want to help
Susan but rather, that when the investigator was on the phone for an hour at a
time, she was not making progress on the actual tasks at hand – finding the hid-
den assets. These long phone calls would derail concentration on the investigation
and cause the investigator to work even more unexpectedly long days that began
frustrating the investigator’s spouse, family, and friends.
The Case of the Initial Client Meeting ◾ 73
The internal conflict felt by the investigator involved the necessity of cli-
ent feedback to learn more about Susan’s ex-husband’s business to help her find
important evidence of hidden assets, but the valuable information was woven into
the emotional expression of the drama Susan felt, which was inefficient and drain-
ing to the investigator. The investigator decided to allow client communication to
continue its course with Susan but determined that with the next client, she would
try a new approach.
The initial response from prospective clients to the client inquiry changes
was that of frustration and prospective clients insisting they speak with me. How-
ever, my team graciously explained that our process ensured they would be served
well and that my involvement would occur later in the process. We also became
proactive in publishing content by other team members on the website and host-
ing them as guests on the podcast, which promoted their expertise and profes-
sionalism to build trust with prospective clients prior to inquiry calls. After a
few months of diligently, and at times uncomfortably, following the process, the
resistance decreased, and now most of our client inquiries do not even ask to
speak with me.
Client Expectations ◾ 75
CLIENT EXPECTATIONS
■■ The subject has stashed the stolen funds in a hidden bank account or under
her mattress. Many clients believe that it would be impossible for subjects
to spend the large sums of money that are stolen from their businesses. In all
of the cases of embezzlement and corporate fraud I have worked to date, the
largest amount of money identified in a subject’s bank account was $80,000,
and the total loss in the case exceeded $5 million. In another case, the subject
stole money and invested it in real estate rentals. These are the exceptions and
not the rule. Although anything may be possible, most white-collar crimi-
nals steal to gamble, shop, purchase drugs, or to fund some other habit. It is
highly unlikely that a subject has stolen money to save the money.
■■ Complete recovery of stolen funds, legal fees, and expert fees is possible.
If criminal charges are filed and result in restitution ordered to be paid to
the client, the client may recover some of the loss. However, the subject is
allowed to pay restitution based on their earnings, and because they have lost
their job due to fraud, they may be limited in their future employment and
thus be required to pay only $100 per month on a multimillion-dollar loss.
Clients need to understand that law enforcement is not a collection agency.
Even through a civil lawsuit and insurance reimbursement as possible recov-
ery avenues, it is unlikely the client will recover all of the funds stolen. It is
advantageous to investigate the situation, quantify the loss, and take reason-
able steps within the recovery avenues. But the best form of recovery for a cli-
ent is to implement fraud prevention and detection procedures and get back
to work to earn a profit without an employee stealing it.
■■ A financial investigation will be resolved in a few weeks. Using the Data
Sleuth Process, if complete information is received by the client in a timely
fashion, most of our large investigations are completed within three to six
months. The Data Sleuth Process does not begin on a client’s case until
substantively all requested information has been provided by the client. We
advise clients that they affect the turnaround of the case by the timeliness,
quality, and completeness of the information they provide for our analysis.
The quickest resolution in which our work was followed by a criminal inves-
tigation involving a $3 million embezzlement was approximately 18 months
from the initial client meeting to the subject’s sentencing by a federal judge.
■■ Spouses or business partners will go to prison for embezzlement. In my
experience, criminal fraud charges are not filed against spouses or business
partners who have stolen from the other spouse or business owner(s) as they
themselves are the owners of the assets. Embezzlement charges are filed
against individuals who were entrusted with assets they did not own when
they stole them.
Data Procurement ◾ 77
DATA PROCUREMENT
A financial investigation is only as good as the data and evidence available; there-
fore, communicating with a client to procure the best data is essential. After the
case plan has been prepared, the case manager provides the copy of the case plan
to the client for their approval. Accompanying the case plan is a document and
information request list. The most common types of information requested for
cases involving a business or not-for-profit organization include:
■■ Operating agreement
■■ Closing document
■■ Bank statements
■■ Credit card statement
■■ Tax returns
■■ Schedule K-1s
■■ Annual financial statements
■■ Loan history statements
■■ Accounting software backup or access to accounting software
■■ Accounting software password to login
■■ Payroll records
■■ Inventory records
The most common types of information requested for cases involving an indi-
vidual dispute includes:
■■ Bank statements
■■ Credit card statements
■■ Brokerage account statements
■■ Retirement account statements
■■ Tax returns
■■ Personal financial statements
■■ Loan history statements
78 ◾ Client Communication and Involvement
■■ Prenuptial agreements
■■ Pay stubs
■■ Life insurance policies
■■ Trust documents
There are different theories and perspectives from forensic accountants on a client’s
involvement in an investigation. Some professionals believe the client involve-
ment taints an investigation. On the other hand, some forensic accountants rely
solely on the loss determined by clients, and then they will testify on their behalf.
My current perspective on client involvement in an investigation is somewhere in
between the two.
Having worked with law enforcement, I began my private sector investiga-
tion career from the perspective that after I obtained all the information a client
wanted to provide, I would sort through it, conduct my investigation, determine
a loss, issue a report, and close the case file – unless testimony was required later.
The problem I continued to face with some – not all – clients was a sense of disap-
pointment with the loss that I had calculated if certain components or nuances of
their business was not factored into the resulting loss. Even though this was not
the client response in every case, it still bothered me.
Client Involvement During an Investigation ◾ 79
I began to realize that although I could use data to investigate allegations and
quantify a loss, I could never fully learn, in the span of an initial interview and
even follow up questions, what the client knew about his business (or marriage).
Additionally, it was impossible for me to fully understand the details within every
type of industry a client represented. This is when I decided to try involving the
client in at least one segment of the investigation – the part of the investigation
for which knowledge of a business or marriage was most valuable – feedback on
analysis results.
Client Feedback
After an analysis is performed, the client’s feedback is requested, if possible. The
client feedback step is incorporated into the Data Sleuth Process after the comple-
tion of the Interesting Data Findings (IDF) explained in Chapter 10. Transactions
may be flagged due to either the high-risk nature of the transaction or the anoma-
lous nature of the transactions. There are Interesting Data Findings that, although
they are strange from a data perspective, may be normal to the client’s business,
marriage, or family situation. By requesting client feedback on findings, which
we generated independent of their influence and as objective professionals, then
the result is a healthy balance of both approaches. If the client is able, obtaining
their feedback on the data anomalies can be extremely helpful to narrow down the
transactions requiring further inquiry, research, or investigation.
A great case example of the value of client feedback on analysis results was
a case in which there was a jewelry purchase totaling $90,000. Based on the data
analyzed, this purchase appeared suspicious compared to the other transactions.
When I sat down with our client and asked her about all of the findings, and the
jewelry purchase in particular, she advised it was a purchase made by her husband
for her, and showed me the $90,000 ring as she was wearing it during our meet-
ing. This example illustrates how something can appear to be an anomaly, and if
I had not incorporated client feedback, I may have mistakenly included it in the
loss calculation. Of course, in my early process, the client may have advised after I
issued the report, but involving the client in the investigation process prior to the
issuance of a report is much simpler and cleaner moving forward.
When clients provide us with feedback on the IDF, we ask them to specify if
the transactions fall into one of three basic categories:
■■ Did the transaction, or group of transactions, benefit the business, the marital
estate, or trust?
■■ For all of the transactions that are marked as not benefiting the business,
marital estate, or trust, then we work with them to locate supporting docu-
mentation, or additional evidence, to confirm it did not benefit the client.
80 ◾ Client Communication and Involvement
Upon receiving feedback on the IDF, we then will review the Source and Use
Summary again for any additional transactions, or groups of transactions, neces-
sitating client review and perform the same process of the client feedback that
we did for the IDF. Many of our clients want to be involved in the investigation,
and this feedback allows them to do so. Sometimes, they can even employ staff
members to review emails and archived documentation while we continue with
our process to expedite the turnaround of the investigation results.
Although not the most common, in some cases, the client is too far removed
from the matter to provide valuable feedback. When this occurs, we still make sure
to communicate findings to them, but the additional research, investigation, and
analysis are performed by our team.
the comparison of checks paid directly to the general manager as a contractor ver-
sus the contractor agreement. However, the client advised that he was also paying
himself through regular employee payroll at the same time.
Categorization approaches to data analysis and making decisions about the
benefit of a transaction without client involvement require that the analyst make
judgment calls that are dependent upon situations that occurred in which the
analyst was not present. The risk associated with this type of analysis is that an
investigator may overstate or understate a loss.
We have found that providing clients with direct access to the case manager, from
the initiation of a client engagement, works best for our team. All client commu-
nication from requesting information initially and throughout the engagement is
submitted to the case manager and then the case manager contacts the client. The
case manager’s schedule is designed to allow for interaction and communication
with the client, and it allows the analysts and other investigators to focus on their
specific tasks without also needing to respond to client questions throughout
the project. The case manager is assigned a routine task to follow up with each
client to advise as of the status – especially if there has not been much recent
communication.
When the analysis findings are compiled in a Findings Summary (further
explained in Chapter 11), the case manager reviews the findings to ensure that
all of the client’s concerns and investigation priorities have been addressed. The
case manager then schedules a meeting to review the findings with the client. This
final client involvement step provides one more opportunity to address any and all
outstanding items with the client before issuing a final report. In this way, when
the client receives the final report, there are no surprises.
The Data Sleuth Case Plan
6
CHAPTER SIX
A N ATTORNEY ASKED TO meet over lunch to discuss our firm’s services, and
before we had even placed our order he said, “I’ve hired forensic accountants
before who took months to look at my client’s information only to report
that they found nothing. They offered no consultation or recommendations for
how their review would add value to my work for the client. What do you do that
they don’t?”
This is not the only attorney who has asked me questions similar to this one.
My explanation of our services always includes advising of our case planning pro-
cess that considers the client’s concerns, the attorney’s legal theory, and a pri-
oritization of investigation priorities. In doing so, we avoid chasing down every
rabbit trail to try to identify all of the things someone did incorrectly. Instead, this
process allows us to use data to find answers that advise whether the theory of
the case can be supported based on the information reviewed. In the story of the
attorney lunch, the next day, we received a referral from his office to do just that.
83
84 ◾ The Data Sleuth Case Plan
the following case example. Although this case involves duplicate payroll, the
same process goals and implementation steps can be applied and adapted to most
common forensic accounting and fraud investigation engagements.
When money goes missing, one apparently obvious way for an investigator to
begin is by interviewing the client and reviewing the paper documentation the
client believes is important. However, as explained in greater detail in Chapter 3,
this manual approach has several issues, including potential bias and an incom-
plete loss calculation.
When investigating cases like George and Stacey’s story, the first step in
the Data Sleuth Process is to understand the client’s concerns and to identify
the investigation priorities. These priorities are created by listening to the client’s
communication of the events that transpired and the issues they observed. As
they are sharing their stories, area(s) of concern can be recognized. These areas of
concern can then be translated into investigation priorities. For example, the top
investigation priorities detected in the initial consultation with George were to:
When a client has just discovered fraud and emotions are running high, it is easy to
see how the areas of client concern – and the time and budget required to address
them – can quickly multiply. This is where the investigator’s understanding of
fraud risk can improve the efficiency of the investigation. For each investigation
priority, an evaluation of the subject’s access to the client’s financial systems and
information must be performed. If the subject does not have access that would
give her the opportunity to steal funds, the likelihood that the client’s allegation
will be substantiated with further analysis is greatly reduced.
In the initial client consultation, as George explained the circumstances sur-
rounding his discovery, he was overwhelmed with the seemingly infinite number
of ways Stacey could have stolen from him. One such example was his concern
that she could have diverted customer payments to her personal bank account. As
part of the consultation, George was asked about the client billing and payment
receipt process. He advised that:
■■ Stacey prepared the client invoices, but George reviewed, approved, and sub-
mitted the invoices to the clients for payment.
Evaluate the Subject’s Access through Risk-Based Analysis ◾ 87
■■ Due to the nature of the business, client invoices were charged against a
client-approved project budget.
■■ The clients served by George’s business paid invoices via ACH directly to the
business bank account.
■■ George received email confirmations of the payments, which he then
forwarded to Stacey to mark the client invoice as paid in the account-
ing system.
Business processes vary from business to business, and investigators who may
not be as familiar with accounting processes may find the Data Sleuth Fraud
88 ◾ The Data Sleuth Case Plan
Before preparing the Data Analysis Plan, it is important to understand the Data
Sleuth Analysis Framework. Data analysis in other disciplines often involves large
data sets or “big data” for which much of the analysis is statistical in nature. In a
traditional audit engagement, statistical sampling is used to identify transactions
to test with the goal of providing an opinion as to whether a company’s financial
statements are without material misstatement. An audit does not look at every
transaction within the company; therefore, because of materiality thresholds, an
audit is not designed to uncover fraud.
In forensic accounting and fraud investigation engagements, the investi-
gation and resulting findings must be performed and prepared in anticipation
of civil litigation or criminal prosecution, whether actualized or not. For the
investigation findings to be effective in these venues, the total loss amount
must be supported by specific, itemized transactions in order to contribute to
the plaintiff attorney’s or prosecutor’s case in meeting their relative burdens of
proof. In order for a prosecutor to file embezzlement charges against a busi-
ness’s former employee totaling $100,000, every transaction comprising the
$100,000 must be specifically identified. A loss estimate based on statistical
sampling that identifies a few instances of theft and uses these to represent
the entire population of transactions will not assist a plaintiff ’s attorney or
prosecutor.
Most data analysis in forensic accounting and fraud investigation engage-
ments involves the comparison of at least two data or information sources.
This framework is illustrated simply through the use of a Venn diagram (see
Figure 6.2).
When a data or information source that supports the events that happened
are compared to the data or information source that supports the events that
should have happened, at the intersection of the two, transactions or events that
occur in both data sources are identified. These are generally considered verified
and need no further investigation. The transactions or events that remain outside
of the intersection are those that should be investigated further or, depending on
the data sets being compared, may represent the loss.
Data Sleuth Analysis Framework ◾ 89
Instead, the ending bank account balance totals $1,000. The balance of the father’s
bank account as of the date of death was confirmed as totaling $10,000; however,
on the day before the funeral, the balance of the account was $1,000. Put another
way, expenditures from the account over this time period should have totaled $0,
but instead totaled $9,000. (See Figure 6.3.)
Additional analysis in this case would include the examination of the bank
account transactions to determine how funds were used and who benefited from
the unexpected expenditures.
Additional data analysis that would be helpful in this case would be to exam-
ine audit logs, if they exist, providing evidence as to the employee’s actions in
changing the correct product type code to the incorrect product type code result-
ing in higher commission payments. This analysis would assist in providing evi-
dence demonstrating the “intent” component of the fraud.
Additional data sources helpful in cases such as this include copies of the
husband’s paystubs for the relevant period. A common way funds are diverted in
divorce when the spouse is employed, or receives regular payroll, is by directing the
deposits to be split into multiple bank accounts. The paystubs requested should list
the amounts deposited to each account. A paystub is another example of third-
party “best evidence” in that the subject of the investigation did not control the
reporting of this information.
■■ Recalculate the subsidiary’s quarterly net income using management fee per-
centage as stated in the agreement (in other words, identify what the net
income “should have been”).
■■ Compare the resulting quarterly net income from the recalculation to the net
income reported with the overstated management fee. Assuming all other
factors remain the same, the difference between the two for all quarters quan-
tifies the total overpayment of management fees and the lost net income on
which dividends should have been calculated.
■■ Calculate the total dividends the investors should have received based on the
agreement.
(See Figure 6.7.)
If the information can be obtained, valuable further analysis that would
provide additional context to this case scenario would be to identify how the
Data Sleuth Analysis Framework ◾ 95
FIGURE 6.7 Venn diagram illustration comparison of net income with inflated man-
agement fee to net income with stated management fee.
overpayment of management fees were used by the parent company (e.g. executive
bonuses). Any evidence that can be obtained where the accounting staff members
were instructed to charge this overstated management fee could be helpful evi-
dence of management’s intentions (e.g. emails).
96 ◾ The Data Sleuth Case Plan
The simplest translation from the Venn diagram illustration to real-world data
analysis in a forensic accounting or fraud investigation engagement is through the
use of spreadsheets and tabular data. A tabular foundational structure provides
numerous analytical opportunities using the features of spreadsheet and database
applications or software and, as described previously, these techniques can be used
to find missing money in various types of cases. The use of a tabular structure also
provides efficiencies when preparing findings from the data to use as attachments,
or exhibits, to reports that allow the reader to better understand the resulting
conclusions.
A great example illustrating the multiple benefits of tabular comparative data
analysis is “The Case of the Cash Back Payroll Scheme” from Chapter 3 in which
Vince discovered money was being stolen from his company by his chief executive
officer, Jane, and multiple other employees. Jane routinely overpaid the employees
and then asked the overpaid employees for a percentage of the overpayment.
Payroll data from the payroll provider was obtained for all employees – not
just the employees suspected of participating in the scheme. Timesheet data
for all employees were also obtained, and it was noted that the payroll manager
did not have access to or control of the timesheet data. The two data sources
were processed and converted to a tabular format, with employee names and
pay period dates providing a common key. By comparing the hours reported in
the payroll data to the hours worked in the timesheet data for each pay period,
it was discovered that the payroll manager was using the vacation hours field to
inflate the other employees’ payroll. Table 6.1 illustrates this comparative tabu-
lar analysis.
Because the data were in a tabular format in which calculation formulas could
be applied to the entire data set, not only were the inflated hours and result-
ing overpayments quantified, but it was also discovered that there were more
employees participating in the scheme than originally believed. Performing data
investigations in this way allows the investigator to evaluate all employees effi-
ciently instead of focusing on just the known employees under investigation. This
approach will often uncover additional discrepancies throughout the organiza-
tion, as it did in this example, and it is helpful should the subject employee accuse
management of bias.
The Data Analysis Plan ◾ 97
Pay Date Employee Gross Hours Pay Date Employee Hours Worked Difference
As also shown in Table 6.1, the tabular structure makes the creation of tables,
attachments, or exhibits to the findings report simple, and it clearly depicts spe-
cific, itemized transactions. This allows the business owner, attorney, or prosecutor
to take their next steps with clear, concise, and simplified information. Compar-
ative analysis is only one of several standard Data Sleuth analyses that will be
explained further in chapters 9 and 10.
plan should address the investigation priorities considering the data that should
be available based on the examination of the subject’s access.
■■ Compare the payroll reports to the bank statements to ensure the total
amount paid on the payroll report reconciles to the amount debited from the
bank account.
■■ If the payroll reports do not reconcile to the bank statements, examine the
audit log to see if any of the payroll entries from the accounting software
were deleted or altered. If so, identify the details of the original item deleted
or altered. If possible and reliable, note the username associated with the
deletion or change.
■■ Compare the total amount paid to Stacey (perhaps requiring a recalculation if
step number two is necessary) to the employment agreement and documenta-
tion of bonuses and/or raises.
■■ Make inquiries regarding any differences, if needed. Often this difference,
net of any responses to inquiries, will result in the amount of overpayment
and loss to the client or business.
1. Identify whether or not the bank account has been reconciled within the
accounting software. If it has not, it is likely that any transactions benefiting
the subject were never recorded. If it has been reconciled, special attention
should be paid to step number five in this list.
2. Using the most reliable data source, which in this example is the bank state-
ment data instead of the accounting system data, summarize transactions by
payee to identify potential payments benefiting Stacey instead of the business.
3. Analyze individual bank transactions for irregularities including, but not lim-
ited to, even dollar payments, payments to unknown vendors/entities, and
total number of payments by payee.
Data and Information Gathering ◾ 99
4. Compare the irregular transactions identified in steps two and three to their
categorization on the general ledger.
■■ This step allows the investigator to evaluate whether or not the categoriza-
tion of the transaction is reasonable. For example, if Stacey wrote a check
to herself and categorized the transaction as rent in the general ledger,
and if she does not own the property being leased by the business, further
research regarding this transaction should be performed. This step in the
analysis process may provide evidence of the subject’s intention to hide
the transaction from the owner or management in addition to potentially
flagging additional irregular transactions for investigation.
5. Search the audit log for any transactions that are not identified on the general
ledger or check register that may have been changed or deleted.
■■ The transactions listed on the bank statement are the most reliable source
to determine how the business’s funds were spent. However, reviewing
items in the audit log to identify deleted and/or changed transactions may
be used to provide evidence indicating the intention of the subject to hide
the actual transaction from the owner or management.
■■ Reconcile credit card payments listed on the business bank statement to the
known credit card statements. This step will identify if business funds were
used to pay the balance for an unknown credit card account. Inquiry into
the additional payments could uncover an additional business credit card
(for which the same analysis steps should be performed), or the additional
payments could identify a personal credit card of the subject, or another
employee, being paid with business funds.
During case planning, a relevant period is defined. The investigator and client
should have an agreement as to the period of time for which the data should be
analyzed. This is extremely important when a client is being charged by the con-
sultant, because fees for financial investigations will strongly correlate with the
100 ◾ The Data Sleuth Case Plan
■■ A backup copy of the client’s accounting system. A backup copy allows the
investigator to import the data into her copy of the accounting system and
export the appropriate and preferred reports for analysis. When the investi-
gator does not have a copy of the accounting software, specific reports and/
or exports should be requested. It is recommended to obtain both PDF and
CSV or Microsoft Excel versions of each report, when possible, to ensure
that the tabular data reconciles to the printed or PDF version of the report
in the system.
In the example of George and Stacey, the reports and exports nec-
essary for further analysis included the following organized by investiga-
tion priority:
■■ Priority No. 1: Detailed payroll reports
■■ Priority No. 1: Audit log reports
■■ Priority No. 2: General ledger reports
■■ Priority No. 2: Check register reports for bank account transactions
and credit card transactions (if recorded using detailed transactions
by Stacey)
■■ Bank account statement copies, including check images. Bank account
statement copies will assist with the analysis related to investigation priority
numbers 1 and 2 as they are the most reliable data source in identifying how
the business’s funds were actually used. It’s important to note that in many
cases, accounting records do not constitute “best evidence” and are not a sub-
stitute for the account statements themselves.
■■ Credit card account statement copies. Credit card account statement copies
will assist with the investigation priority number 2 as they are the most reli-
able data pertaining to how the credit card was used to ultimately determine
whether the charges benefited Stacey personally or benefited the business.
■■ Employment agreement and documentation concerning bonuses or pay
increases. As explained in greater detail in Chapter 9, many data-focused
Communication of the Case Plan ◾ 101
A case plan should be developed in every engagement and provided to the client
for review. This ensures that the priorities the investigator developed from the
initial client consultation accurately reflect the priorities of the client before the
actual work begins. Table 6.2 illustrates a case plan for all investigation priorities
in George’s case.
The case plan also provides a list to the client of the most important data
sources necessary to perform the analyses listed in the Data Analysis Plan column
of Table 6.2. It is not uncommon that the client does not have the information or
lacks access to the data requested. Collaboration and communication with the cli-
ent is vital in this step as the client may need assistance in troubleshooting access
issues. Sometimes the Data Analysis Plan may need to be adjusted to create an
analysis that will have meaningful results despite the missing information. Upon
the client’s acceptance of the case plan, the investigation begins.
102 ◾ The Data Sleuth Case Plan
Priority Investigation
No. Priority Description Data Sources Data Analysis Plan
1 Quantify the amount *Detailed payroll reports 1. Payroll reports versus bank
overpaid to subject *Audit log reports statement payroll debits
through payroll. 2. Compare total amount
*Bank statements paid to subject to employ-
*Employment agreement ment agreements and
other documentation.
*Documentation of raises
and bonuses
The analysis of payments to Stacey through payroll identified that not only had
she duplicated her payroll over the four years, but she also paid herself outside of
the payroll cycle, including payments issued on weekends, using the direct deposit
profile she created. Check payments and direct deposit payments were plotted on
The Case of the Duplicate Payroll – Conclusion ◾ 103
1500
1200
900
600
300
CHECKS
DIRECT DEPOSIT
FIGURE 6.8 Check and direct deposit payments to Stacey during 2008.
a graph by year for the relevant period. As shown in Figures 6.8 and 6.9, the num-
ber of extra payments to Stacey from 2008 to 2011 increased greatly in frequency.
The additional payments over the four-year relevant period totaled approximately
$101,000. Audit log entries provided evidence of Stacey’s intention to hide the
additional payments from George as she deleted many of them from the account-
ing software.
Stacey did not regularly reconcile the business bank account. However, exami-
nation of the bank account statements, and credit card statements, did not uncover
any additional payments benefiting Stacey during the relevant period. She simply
overpaid herself through payroll.
Stacey was charged federally with wire fraud because the direct deposit pay-
ments were initiated at the business’s local bank and were transferred to Stacey’s
bank, whose headquarters were outside of the state. Stacey pleaded guilty and was
sentenced to 6 months in prison followed by 36 months of probation and was
ordered to pay restitution.
104 ◾ The Data Sleuth Case Plan
1000
800
600
400
200
CHECKS
DIRECT DEPOSIT
FIGURE 6.9 Check and direct deposit payments to Stacey during 2011.
7
CHAPTER SEVEN
Risk-Based Analysis
105
106 ◾ Risk-Based Analysis
The Data Sleuth Fraud Detection Worksheet provides a framework for iden-
tifying key questions and observations to facilitate this understanding. Later in
this chapter, further demonstration will be provided regarding how the worksheet
can be used to identify the risks associated with cash flows into and out of an
organization.
Randy owned several businesses in the healthcare sector that involved billing
Medicare, the US Department of Veterans Affairs (VA), and health insurance
companies. Randy was very successful with the marketing and sales side of the
business, and he reviewed the company’s financials on a regular basis. After several
months had passed in which he found himself repeatedly thinking, “Something is
wrong with cash. We should have more cash than this,” Randy reached out to an
investigator. The investigator began the engagement by learning about the irregu-
larities Randy had noticed, which included the following:
■■ The company’s costs had remained the same, and patient count was steady,
but the business was now operating at a net loss.
■■ When asked about the losses, the CFO gave Randy a variety of reasons but
ultimately explained it away as a “timing difference.”
■■ Randy knew that there were quite a few bank accounts handling the cash
for the business’s various locations, but he did not know how many bank
accounts existed. The CFO and Randy both had signature authority on the
bank accounts.
■■ The CFO had requested that Randy contribute several hundred thousand
dollars over the last couple of years to help the business’s cash flow shortages.
With this information, there were several approaches the investigator could
take. Because Randy did not know where the cash issue was originating, the inves-
tigator’s next step was to ask questions that would help them identify areas of
highest risk and design the case plan accordingly.
Focus on Cash
The primary reason a forensic accountant or fraud investigator is hired is to find
missing money, and in turn, the investigator’s job is to identify how the money
went missing, if unknown, and to quantify the amount missing. Because these
tasks comprise the investigator’s primary responsibility in an investigation, he
The Case of the Puzzling Entries ◾ 107
should focus on areas involving cash. The term “cash” in this context does not
exclusively refer to green paper money or currency but rather any liquid resource
or method of funds transfer that increases someone’s purchasing power. These
resources include cash, currency, credit card receipts and payments, PayPal,
Venmo, and so forth.
It is a common error for those with a professional background in audit-
ing and accounting to want to begin by reviewing the financial statements and
journal entries and the internal controls surrounding them. However, journal
entries do not allow someone a lot of playing time at the casino. In other words,
someone who is committing fraud (with the exception of financial statement
fraud, which is for the most part outside the scope of this book) is doing so
to fund expenditures such as shopping, gambling, drugs, or medical bills, and
these require cash. Later in the chapter, the concepts regarding how and when
accounting records are useful in an investigation will be detailed, but they are
not the starting point. The most efficient, effective investigators begin by under-
standing the internal controls surrounding the sources and uses of cash within
an organization. Figure 7.1 is an example illustration of how cash sources and
uses, internal controls, and accounting records fit together in the investigator’s
initial conceptualization of a case plan.
Tools like the Data Sleuth Fraud Detection Worksheet (available for down-
load at www.datasleuthbook.com) can be used to facilitate the identification of
cash sources and uses and the level of risk associated with the internal controls (or
lack thereof ) relating to each. The following sections will demonstrate how the
Data Sleuth Fraud Detection Worksheet can be applied to the investigation of
Randy’s healthcare businesses.
Money In
Cash comes into an organization primarily through sales and/or donations. There
may be some other income from investments or scrap sales, such as in manufac-
turing, but most cash generated in a business is through sales of goods or ser-
vices and in a not-for-profit organization through donations. For this example,
the Fraud Detection Worksheet will focus on a business issue – that of Randy’s
healthcare businesses. The Fraud Detection Worksheet is divided into two sec-
tions: “Money In” and “Money Out.” Table 7.1 shows the “Money In” section
with columns completed for “The Case of the Puzzling Entries” based on Randy’s
initial consultation with the investigator. Note that although all sources of funds
are essentially sales revenue, they have been distinguished based on the specific
source and/or method of payment, as different sources or methods may have dif-
ferent internal controls and be associated with different risks.
108 ◾ Risk-Based Analysis
General &
Administrative
Expenses2
Identifying these fraud risks within the business’ sources of funds, the inves-
tigator included the following analyses to address investigation priorities within
the case plan:
■■ Patient payments that were on installments were reviewed for months that
appeared no payment had been made. Patients, with the approval of Randy,
were then contacted to request copies of canceled checks to confirm whether
the deposit had been made to the business bank account.
■■ Finding: All checks tested had been deposited to known business bank
accounts.
■■ The credit card processing company records were requested. Total credit card
payments applied to patient accounts in the system were compared to the
credit card processing records, which were then compared to the credit card
deposits to business bank accounts.
■■ Finding: All credit card payments applied to patient accounts reconciled
to the credit card processing reports, which also reconciled to the business
bank accounts.
■■ Randy contacted Medicare, the VA, and insurance companies to determine
if any changes to bank accounts receiving deposits had been made during the
period under investigation.
■■ Finding: All the bank accounts on record with the payors belonged to
the business.
Money Out
The uses of funds within an organization vary depending on the purpose of the
organization. The pie charts in Figure 7.2 list common, possible uses of cash in an
organization by expenditure category comparing financial information for when
there is no occupational fraud versus a situation of occupational fraud. The uses of
cash and corresponding percentages are for illustration purposes only and include:
Taxes
Investments
Owner
Distributions
Operating Payroll
Expenses
Investments
Owner Distributions
Taxes
Equipment
Operating Payroll
Expenses
vulnerable to fraud or theft are the funds that remain after all of the required pay-
ments are made.
The second pie chart represents the same example organization if occupa-
tional fraud is occurring. Total expenditures between scenarios do not change. The
difference is in the apportionment of the expenditures.
When an organization does not have fraud, there is cash available to rein-
vest in the organization through purchasing equipment, to invest in opportuni-
ties outside of the organization, to pay taxes, and to pay the owner distributions
or dividends. However, when fraud is being committed, the opportunities for
investment, owner distributions, and ability to pay taxes are usually the areas
most affected.
The portion of the chart in Figure 7.2 that is most vulnerable to fraud or theft
are the funds that remain after all of the required payments are made. For exam-
ple, a business will struggle to operate if the basic expenses are not paid such as
employee payroll, vendors, and rent. But when funds are not strictly accounted for
or reserved for the vital expenses, they become more vulnerable to theft. The most
vulnerable group of funds from an expenditure point of view, is the leftover – the
funds available for profit, reinvestment, owner’s salary, distributions, and dividends.
Without theft, the leftover funds allow for adequate cash flow and reinvestment;
however, these funds also allow the subject to steal without stakeholders realizing
it – until there is a cash flow issue.
The Fraud Detection Worksheet section “Money Out,” as provided in the
spreadsheet download, is represented in Table 7.2 with columns completed for
“The Case of the Puzzling Entries” based on the Randy’s initial consultation with
the investigator. Note that some uses of funds appear over several lines, as each
step with a different individual responsible for authorization is assessed separately
for associated risks.
Having completed the worksheet based on Randy’s responses, the investiga-
tor identified the highest fraud risk areas in the cash disbursement process to
include those under the control and responsibility of the CFO. It was possible
under the existing controls that the CFO could:
■■ Use company funds to pay personal expenditures such as utilities, credit card
bills, charitable contributions, or taxes;
■■ Transfer or wire funds to bank accounts under the control of the CFO; or
■■ Inflate CFO’s payroll, expense reimbursements, and benefits to more than
stated in the employee agreement.
Identifying these fraud risks within the business’s cash disbursements, the
investigator included the following analyses to address investigation priorities
within the case plan:
■■ Review all expenditures paid from business bank accounts with special atten-
tion paid to the number of monthly payments to utility companies, purchases
not benefiting the business, payment of personal income taxes, and personal
credit card payments.
■■ Finding: No expenditures were identified from the bank accounts as not
benefiting the business or being personal in nature.
■■ Trace transfers from business bank accounts to the corresponding destination
accounts. Review supporting documentation identifying the beneficiaries of
wire payments from the business bank accounts.
■■ Finding: No transfers were made to accounts not owned by the busi-
ness. All wire transfers benefited the business and were not personal in
nature.
■■ Payroll for the entire company was reviewed, including the CFO, and vari-
ances were researched with the help of Randy.
■■ Finding: No overpayments of payroll or unsupported expense reimburse-
ments or benefit payments were identified.
■■ If missing funds are quantified, it is often still valuable to the client to iden-
tify the methods used to divert the funds and/or avoid detection in order to
improve internal controls and prevent future losses, as well as to show the
subject’s intent if a legal case alleging fraud is to be made.
■■ If no funds have been diverted to the subject’s benefit, there may still be
financial or accounting issues within the organization that justify additional
investigation. Note that even in these cases, although the findings may seem
disappointing to the client, using a cash-focused, risk-based analysis frame-
work has already provided an often overlooked but important benefit in pre-
venting the investigator from seeing fraud where there is none.
In these cases, the next step is to use accounting records and interviews to
provide context to the cash-related findings.
In “The Case of the Puzzling Entries,” it was this next step that ultimately
identified the issue and gave the case its name. Despite the negative findings from
116 ◾ Risk-Based Analysis
the investigator, although relieved that theft had not been discovered, Randy
remained convinced that something was wrong with his cash balance and asked
the investigator if there was anything else she could think of to solve this problem.
It was at this point that the investigator incorporated a thorough review of the
general ledger into the case plan to look for accounting errors and irregularities.
Beginning with a review of the revenue accounts, it was discovered that backdated
quarterly adjustments had been made to several of the accounts reducing the bal-
ances by an annual total of over $1 million. Questioning this approach, the investi-
gator decided to examine the expense accounts for bad debts as the company used
the accrual basis of accounting; oddly, the investigator did not just find an absence
of bad debt entries but did not find a general ledger account for bad debt expense
at all on the chart of accounts. Returning to the strange revenue account entries,
the CFO’s backdated quarterly entries were as follows:
Debit Revenue
Credit Retained Earnings
Knowing that the CFO was an experienced CPA and that he should know
this was improper treatment of uncollectible revenue, the investigator began to
wonder if there was a motivation behind the apparent nondisclosure, and perhaps
hiding, of the writing off of bad debts. The investigator narrowed her procedures
to the revenue accounts by type: Medicare, VA, and insurance billings. By revenue
type, she compared the total gross revenue in the accounting system to the bill-
ing software and discovered that the gross revenue in the billing software was
consistently greater than that in the accounting software and ultimately the profit
and loss statement provided monthly to Randy. The investigator reached out to
numerous accountants explaining the discovery and performing further research
to understand why someone might be using these types of entries when missing
cash was yet to be identified. Lacking an affirmative answer, and with the cli-
ent anxiously waiting for the investigator to solve the cash balance anomaly, the
investigator requested to interview the CFO. Randy agreed to this idea, and an
interview was scheduled.
The interview got off to a rough start. The CFO was initially angry that
Randy suspected that he was stealing money and had hired an investigator. Randy
smoothed things over by explaining to him that the longer his concerns were
ignored and dismissed by the CFO, Randy’s suspicions grew. Shrugging, the CFO
complied and told the investigator he would answer her questions.
When presented with questions about the odd accounting entries, the CFO
admitted that he had been writing off bad debts by debiting revenue and crediting
retained earnings instead of using a direct write-off method. The direct write-off
The Case of the Puzzling Entries ◾ 117
method involves writing off specific customer accounts when they are determined
uncollectible. The accounting entry for this method is:
An earlier section of this chapter contrasted the fraud investigator’s focus on cash
with an auditor’s interest in accounting records and journal entries. Another con-
trast can be made in the approach taken to understanding internal controls in
these two contexts. In both a financial statement audit engagement and a forensic
accounting engagement or fraud investigation, an understanding of an organiza-
tion’s internal controls is a primary input into the risk-based analysis and prepara-
tion of an engagement plan. The difference between the two lies in the focus and
purpose of the internal control understanding and evaluation.
In a financial statement audit, learning about the control environment guides
the auditors to look more closely into those areas within an organization where
the financial statements are at a higher risk of material misstatement.
Forensic accounting engagements or fraud investigations, however, are typi-
cally not focused on the fairness of financial statement presentation but rather
on concerns about missing money. Therefore, the focus of the investigation is to
locate the evidence of specific transactions and ultimate disposition of the money.
This level of detail often falls below a financial statement audit’s materiality limit,
and thus a different perspective and approach is necessary when considering an
organization’s control environment. Although the approaches are different, they
are not necessarily contradictory; in fact, sometimes a case arises where the two
approaches prove to be complementary.
Employee Credit Union (ECU) was a small employee-owned credit union. The
credit union would collect member deposits and loan payments either by mem-
bers visiting the physical office or by mail. Because of the small size of the credit
union, ECU would collect cash and check deposits and loan payments from the
members, apply the deposits and payments to their member accounts in ECU’s
system, and then prepare and deposit the funds to an account at a larger banking
institution to actually process the items. The member cash and check deposits and
payments were prepared for deposit much like a business prepares a daily deposit.
The employee responsible for these payments was ECU’s internal accountant,
Emily. Each day, the tellers would provide her with the members’ payments and
deposits. Emily would compare the funds provided to her from the tellers to the
members’ accounts; prepare a deposit slip; and on her way home each day, take
the deposit to the bank for processing. At the end of each month, Emily would
The Case of the Mom of the Year ◾ 119
reconcile ECU’s general ledger identifying all of the members’ balances and trans-
actions to the bank statement.
Because ECU was a financial institution, routine agreed-upon procedures
were completed each year by an auditor from a public accounting firm. As part
of the procedures, the external auditor would vouch the amount listed on the
year-end bank reconciliation as “deposits in transit” to the following month’s bank
statement. To vouch a transaction, the auditor would identify a deposit in transit
on the bank reconciliation and locate where it had cleared the bank on the fol-
lowing month’s bank statement. As illustrated in Figure 7.3, if items on the bank
reconciliation were marked “deposit in transit,” the auditor should have been able
to identify their clearing of the bank account in the following month’s statement.
However, as illustrated, the deposits did not clear in the first week of the following
month but rather the last week of the month.
For several years in a row, ECU’s report from the auditor for the agreed-upon
procedures included a finding that the amounts listed as “deposits in transit” on
the year-end bank reconciliation took too long to clear the bank. Each year the
president of ECU noted this finding, spoke to Emily about making the change to
her process, and business continued as usual.
One of Emily’s children was battling health issues, which caused her to miss
several weeks of work. One week while Emily was out of the office, a teller per-
formed the monthly reconciliations. After multiple attempts, the teller could not
get the reconciliation to balance between the member accounts and the balance at
the processing bank. When Emily returned, management brought the issue to her
attention. Avoiding the questions completely, she abruptly blamed management
for overworking and underpaying her and subsequently submitted her resignation.
It was at this point that an investigator was called to identify the problem.
Management did not want to believe that funds had been stolen or were missing;
instead, he stated repeatedly that Emily would never steal and that it was probably
“just an accounting issue.” During the initial interview with the investigator, the
manager advised of the external auditor’s finding and tried to explain it away as
Emily’s incompetence at her job.
Money In
As part of Emily’s job responsibilities, she was responsible for the following tasks
as funds received from members by ECU.
■■ Received the daily cash and check deposits and loan payments from the tellers,
■■ Prepared the deposit slips,
■■ Delivered the deposit to the bank,
■■ Reconciled the bank statements to the general ledger, and
■■ Worked directly with the external auditor.
Money Out
As part of Emily’s job responsibilities, she was responsible for the following tasks
related to paying the expenditures of ECU.
Management would receive the expense checks, compare the checks to the
invoices, sign the checks, and then provide the signed checks to his assistant to
mail to the vendors. Emily was not responsible for any of ECU’s payroll process.
Because of Emily’s limited access to funds through the expenditure process, the
investigator advised management of procedures that could be performed in this
area but recommended that they be given a lower priority than the procedures
related to deposit collection.
Knowing that Emily controlled the entire deposit and reconciliation process
from start to finish, the investigator was intentional in the planning process to
consider the risks of theft, fraud, and misrepresentation in this area.
Case Findings 1
The ECU accounting and member account systems had not yet been upgraded
and were thus extremely limited in the data reports to provide to the investiga-
tor. In fact, the investigator was told that no historical reports could be exported
digitally, but that she would have to work from file cabinets storing the paper
reports from the end of each day. Determined to find the data source that would
provide evidence of what caused the discrepancy, the investigator prioritized veri-
fying information Emily prepared as part of her monthly tasks. The first procedure
performed by the investigator was the reperformance of several months’ worth
of reconciliations, as that is what led to the discovery of the original discrepancy
122 ◾ Risk-Based Analysis
■■ Cash listed on the carbon-copy deposit slips was marked out and was not
deposited to the processing bank.
■■ Cash deposits were posted to members’ accounts, yet the corresponding pro-
cessing bank deposit did not contain the same total amount of cash for the
day that had been collected from members.
■■ When cash deposits did not match the amount of cash that was collected on
a given day, a check (or multiple checks) from Emily would be deposited,
equaling the difference.
■■ Check deposits were posted to members’ accounts, but the same check items
were not found in that day’s corresponding processing bank deposit items.
■■ As the scheme continued, the carbon-copy deposit slips and processing
bank deposit slip images no longer contained an itemized list by member of
check deposits but instead had the words “Checks” or “List” written on the
deposit slip.
Further examination revealed that for the first month of the altered bank
statements, Emily forced the reconciliation to balance. Instead of plugging the
difference with checks she was holding, she falsified two months of bank state-
ments. The reconciliation balanced in that first month by adding, deleting, or
changing transaction amounts on the bank statements. In the following month,
she was able to make a few more adjustments to the statement as she then only
either used checks from future deposits or her own account to make up the differ-
ence. Understanding Emily’s access and the lack of internal controls surrounding
her tasks allowed the investigator to be critical of the bank statements provided
by management. Because Emily controlled the entire deposit process, without any
accountability or oversight – other than that of the external auditor once a year –
she was able to remove cash from deposits and use multiple methods to cover up
the missing funds. Additionally, identifying the falsified bank statements provided
key evidence as to intent by Emily and the cover-up of her scheme.
Case Findings 2
It became apparent that although member deposits or loan payments included
cash, that cash was not being deposited to the processing bank. In comparing
the date on which check deposits were collected by ECU tellers to the carbon
copy deposit slip listing the corresponding check deposits and to the process-
ing bank deposit slip image, it was discovered that some check deposits were
deposited to the processing bank several days after being posted to the members’
accounts instead of the same day or next day.
Table 7.3 demonstrates in table form several of the findings from the detailed
reconciliation analysis. As noted, although members deposited a total of $2,230.00
during the period listed in the table, none of the cash was deposited to the bank.
All of the deposits that cleared the bank consisted of check deposits. Addition-
ally, from January 2, 2013, through January 7, 2013, member deposits totaled
$66,790.07, but only $55,941.01 was deposited to the processing bank – a dif-
ference of $10,849.06. By January 10, 2013, total deposits for the month to date
differed by only $0.09. Patterns similar to this were noted throughout the entire
life of the scheme.
The detailed comparison of the daily member deposit reports to the daily car-
bon copy deposit slips uncovered the method Emily was using to steal from ECU.
By removing the cash from the daily deposit, the processing bank account would
be short at the end of the month by at least the total amount of cash taken. To
ensure the monthly reconciliation did not show a difference, Emily would cover
the missing cash through reconciling items labeled “Deposits in Transit” to force
the reconciliation to balance. Emily would delay the end of month check deposits
124
The Case of the Mom of the Year ◾ 125
until she could create a deposit from check deposits held that would closely match
that of the deposits in transit. Then, she would make a deposit of the members’
check payments. This delay was noticed by the external auditor, which resulted in
the repeated finding that in turn uncovered Emily’s scheme.
Emily’s scheme was fundamentally similar to an account lapping scheme,
or “robbing Peter to pay Paul.” By stealing the cash, she had to rob from future
deposits to cover what was missing that same day. Her scheme also relied on
a delay in the processing of funds to avoid detection – a delay that in part she
controlled. A loss associated with one of these schemes is easiest to identify when
the subject is no longer in control to keep lapping. By performing the reconcili-
ation for the month after Emily had resigned, the investigator knew the loss was
approximately $85,000. Were this an investigation involving a business or non-
profit organization, it is possible the client would have been satisfied with the
findings at this point.
However, because the organization involved was a federally insured financial
institution, the case was going to be worked by law enforcement whether man-
agement wanted them to or not. To prepare the case for both civil and criminal
charges, quantifying the lump sum loss at the end is not normally as useful as
identifying the specific transactions that make up the loss. Because of the ineffi-
ciencies of ECU’s systems and evidence that Emily was repaying ECU throughout
the period when she would write a check for reconciliation differences, a hybrid
approach was performed. Specific item comparisons, similar to that in Table 7.3
were performed for a several months over the relevant period connecting the iden-
tification of cash missing from deposits to the month-end reconciliation. This cal-
culation was used by law enforcement in making a determination of the loss for
the related federal charges.
By understanding the risks within Emily’s access and responsibilities, the
investigator was able to discover additional clues and evidence that money was
missing and confirm that the reconciliation issues the employee discovered in cov-
ering responsibilities during Emily’s absence was not just an accounting mistake.
Often, management will want to initially believe that irregularities in financial
information are simply accounting mistakes and will say, “It’s just a timing differ-
ence.” These beliefs and statements should not deter an investigator or interfere
with following the investigation process – especially when reconciling between
an accounting system and third-party source documents such as bank statements.
These two sources of financial transactions should always reconcile, with an
allowance for reconciling items that are substantiated. Reconciling items usually
include checks or deposits that have not yet cleared the bank or bank fees, charges,
or errors that have not yet been recorded in the general ledger. If a reconciliation
126 ◾ Risk-Based Analysis
is reviewed and recalculated by the investigator, and a difference exists and/or sup-
porting documentation is unavailable or does not exist for the reconciling items,
the likelihood that money is missing is high.
Divorce Cases
The most common reason our Data Sleuth team is engaged in divorce matters
is to identify hidden or undisclosed assets and understated income for the pur-
poses of a property settlement. As part of a divorce matter, property settlements
involve the division of the marital assets of the couple getting a divorce. Our role
as investigators is most often to assist the spouse who controlled few, if any, finan-
cial assets (“out-spouse”) during the marriage. A risk-based analysis in a divorce
Evaluating Risk in Divorce Cases and Estate and Trust Disputes ◾ 127
matter shifts from the areas of vulnerability due to fraud in business systems to the
risk areas of undisclosed assets or understated income.
As part of the property settlement negotiations, it is imperative that the list of
marital assets, or the marital balance sheet, is complete because only those items
on the marital balance sheet will be divided. If there are assets existing that do not
make it onto the list to divide during property settlement negotiations, then with-
out legal action in the future, the spouse who omitted the disclosure of the asset
will likely own the asset going forward. Understated income becomes a contention
when it is being used as a basis for alimony, spousal support, or child support. If
income reported by either party is not accurately represented, then one side may
not receive the support they need.
To perform the risk analysis, identification of what is known by the out-
spouse about the financial situation is helpful in creating a place to start:
A data source is the origination of the data being used in the investigation. For
example, if transactions that cleared a bank account are to be analyzed in an inves-
tigation, the data source for the transactions is the collection of bank account
statements. Data sources, however, are not limited to just statements from finan-
cial institutions; they can also include things such as a collection of invoices from a
129
130 ◾ Data Sources and Data Processing Techniques
TABLE 8.1 Illustration of a data set created from a bank statement data source.
Financial statement fraud investigations have been less common in my career than
those involving misappropriation of assets or hidden assets. In financial investiga-
tions of missing or hidden money, knowing where to look – or which data sources
Data Sources for Quantitative Evidence ◾ 131
to use to find evidence uncovering what happened and where the money went – is
paramount. Data sources of this nature can be categorized into two groups: stand-
ard and nonstandard.
■■ Statement date
■■ Account number
■■ Deposits/credits to the account
■■ Dates of deposits/credits and corresponding amounts
■■ Dates, source, and amounts of electronic deposits/credits
■■ Checks/debits to the account
■■ Dates, check numbers, and corresponding amounts of checks that have
cleared the account
■■ Dates, payee, and amounts of electronic payments/debits
■■ Dates, payee, and amounts of wire transfers
■■ Dates and amounts of internal transfers
■■ Gross pay
■■ Employee and employer taxes
■■ Net pay
■■ Employee and employer contributions to retirement plans
■■ Other benefits
■■ Reimbursements
■■ Employee’s Tax Identification Number
Because all the standard data sources have predictable types of data points,
the information from the statements or reports can be entered into a tabular for-
mat for further analysis. Each data point is entered into one field per row within a
spreadsheet in the corresponding data source type column.
■■ Audit/user logs
■■ General ledgers
■■ Employee information
134 ◾ Data Sources and Data Processing Techniques
Fraud investigators who love digging for evidence more than data analysis tend to
enjoy the qualitative data sources the most. For those who love data analysis, the
quantitative evidence gathering and related analysis is their favorite way to inves-
tigate a case. The best cases, and the ability to prove a case beyond a reasonable
doubt, are those in which both qualitative and quantitative data sources exist and
there is time to use both.
The primary example of a qualitative data source are emails. When an employee
has stolen money from her employer, and the employer stores the employee’s email
for future reference, this evidence is the favorite among many fraud investigators.
Qualitative data sources are where many feel the story and drama are uncovered.
Examples of qualitative data sources include:
■■ Memos and notes within a company’s general ledger and/or journal entries
■■ One co-conspirator was responsible for the accounting entries to hide
the stolen funds from the company’s owners. He would leave notes in
Using Quantitative and Qualitative Data Sources ◾ 135
the memo field of journal entries stating things such as, “Reclass to [co-
conspirator’s] job.” These journal entry notes confirmed employee inter-
views and other evidence that the conspirators were stealing money and
hiding the missing funds in a fake job in an inventory/asset account.
■■ Spreadsheets
■■ Employees were instructed by the owner to enter only checks into Quick-
Books and manage inventory and the rest of the business on separate
spreadsheets that did not tie to each other. However, financial statements
had been prepared and provided to a bank to obtain a loan that was in
default. Copies of the spreadsheets were collected and provided great evi-
dence of multiple schemes in which not only was the bank defrauded but
also the company’s customers.
■■ Receipts in desks
■■ An employee paid funds from a corporate holding account to an inheritance
scam. In the books of the company, the employee recorded the payments to
the scammers as a distribution to the company’s owner. The owner, how-
ever, was not aware and did not receive the distributions. To confirm the
recipient of the funds was not the owner, a receipt listing one of the bank
accounts was discovered in the employee’s office.
■■ Documents in file cabinets
■■ The investigation involved verifying the assets of a company who defaulted
on a loan. The company eventually was closed, but the investigation con-
tinued. As the company records were being packed up and taken off site for
storage, paper bank statements with the account name, “Owner Name –
Special Account” were discovered. Payments that should have been used
to pay down the loan at the bank and to purchase supplies for customer
orders were being paid on expensive cars and Ivy League college tuition.
A Data Sleuth begins with the quantitative data analysis. It is the qualitative data
sources that compliment and complete the data analysis. Qualitative data sources
could be used to investigate financial crimes or in forensic accounting engage-
ments; however, it can be tedious, laborious, and inefficient.
Quantitative data sources should be analyzed first to confirm or deny the alle-
gations made by the victim, or client, followed by the identification of patterns and
data indicators that can be used to uncover any other schemes or losses incurred
by the victim. Qualitative data source investigators are limited to known schemes
and related losses. Without analyzing all activity during the relevant period, other
136 ◾ Data Sources and Data Processing Techniques
schemes and losses may not be uncovered. In “The Case of the Gambling Execu-
tive Director,” if I had focused on only quantifying the losses Adam had discov-
ered, I would have missed the use of organization funds to pay additional personal
credit card payments, of which Adam was unaware.
At the same time, quantitative data source investigators should remember
that qualitative data sources are extremely valuable in providing the client, attor-
ney, or prosecutor with evidence of intent and connecting the missing funds to the
subject. However, when using quantitative data sources and related analyses, locat-
ing qualitative data for each item can be unnecessary and redundant. The amount
of qualitative data obtained can simply represent a category of the findings instead
of every transaction comprising the loss.
Within each of the following sections, important terms will be defined and helpful
data processing steps will be provided as a guide to setting up the detailed data sets
for the standard Data Sleuth analyses explained in Chapters 9 and 10. Successful,
thorough, and accurate data processing creates a much smoother analysis step
reducing the need to update and revisit underlying data to correct mistakes. The
adage “Garbage in, garbage out” holds true in the Data Sleuth Process starting
with data processing. When processing data, it is a good rule of thumb to process
everything an analyst or investigator believes they may need whether they use it all
or not. Selecting data points instead of processing entire statements usually results
in revisiting this step – and the worst part of the process to revisit data processing
is when a report is being written just before a deadline.
RELEVANT PERIOD
As part of the case planning process, a relevant period should be defined prior
to any work beginning. A relevant period is the period of time under investi-
gation and drives the data and information requests throughout the case. The
most efficient investigations are those for which data processing and analysis
do not begin until complete information is received for the agreed-upon rel-
evant period.
The client and/or attorney typically decide on the relevant period. However,
in general, the relevant period is often determined based on several factors or
Relevant Period ◾ 137
For the cases in which subjects were associated with the clients in some busi-
ness, marital, or fiduciary capacity for long periods of time, limitations do exist
that impact the relevant period.
responsibility of the position for her financial gain over that of the organiza-
tion, criminal charges of embezzlement, wire fraud, bank fraud, etc. can be
charged. However, if at any point the employee becomes a partner of the busi-
ness, criminal charges are much more difficult to file because the employee
is no longer entrusted with the property of the owner but has become an
owner. In the Northern District of Oklahoma, unless there are other crimes
committed against perhaps a bank or government, criminal charges are not
filed for partnership disputes. In the event an employee becomes a part owner
in the client’s business, the relevant period will likely be limited for criminal
charges, and thus, splitting the period to delineate between the subject’s posi-
tion and responsibilities is important to assist the client with their next steps
in pursuing the matter – both in civil and criminal proceedings.
■■ Admissibility and practicality. In my experience of locating hidden assets or
performing forensic accounting procedures for divorce matters, the relevant
period has frequently been limited by the number of years a judge will allow
for consideration should the matter go to trial. If the case requires a busi-
ness valuation, the business valuation expert typically considers three years
of financial information prior to the date of the divorce filing. Occasionally,
the attorney for our client has requested that we examine five years’ worth of
financial information. The primary objective in a divorce matter for a forensic
accounting expert is to help identify and locate all assets to complete the
marital balance sheet that will be used for the property settlement or division
of marital assets. At some point, reviewing old financial information may
have diminishing returns; however, old records may prove helpful in tracing
the source of certain assets – such as retirement accounts or in disputes about
the use of inheritance funds.
■■ Budget. Much of a client’s budget in a case is used for data processing – or
putting the information into the format in which it can be analyzed. The
number of years being examined affects the budget of a case. A strategic
approach to working within a client’s budget is to limit the relevant period by
choosing a period for which the greatest value would be provided to the client.
For example, a loss trend in embezzlement cases is that the subject starts his
scheme by stealing a small amount, and as the scheme goes undetected, the
loss increases exponentially over time. If a client is unsure whether embez-
zlement is happening, it may be beneficial to limit the relevant period to the
most recent year or two. Such a strategy may confirm the client’s suspicion
and help the client decide whether to expand the scope of the investigation.
Getting Organized Before Beginning Data Processing ◾ 139
■■ Inventory From/To. This field contains the first date on the first state-
ment and the last date on the last statement in inventory for the account
even if some months are missing. If months of statements are missing,
identify and list those months in the “Missing From/To” columns.
■■ Beginning Balance (Begin Balance). This field lists the balance of the
account on the first date of the first statement. This information is usually
located on the first page of the statement and is labeled as the begin-
ning balance.
■■ Ending Balance (End Balance). This field lists the balance of the account
on the last day of the last statement. This information is usually located on
the first page of the statement and is labeled as the ending balance.
■■ Missing From/To. Gaps in the months/dates within the information
provided can be tracked in this field by listing the first date that is missing
and the last date that is missing.
■■ Check Images. Most bank statements include small images of the checks
that cleared the bank account. This field is used to identify if check images
were provided.
■■ Loan Activity/History Statements. Helpful supporting documents for
loans to request from a financial institution are the loan activity/history
statements. These statements list advances on the loan and principal and
interest payments.
■■ Deposit Items. Deposit slips are the summary of deposits made to the
bank that are not electronic in nature such as the depositing of cash, cur-
rency, checks, money orders, or cashier’s checks. These deposits can be
made at the bank location through a counter deposit or through mobile
or ATM deposits. Deposit slip copies normally accompany and precede
the small check images when included with a bank statement. “Deposit
items” is the term used to reference the items that were deposited, such as
the checks or cash in tickets, accompanying the deposit slips. To obtain
the detail behind the deposit slips, a special request must be made of the
financial institution; the financial institution will then provide copies of
each item deposited to the account. Note: Some financial institutions pro-
vide online access to the deposit slip and deposit items that can be downloaded
directly; however, sometimes access to the information is less than that required
by the relevant period.
■■ Loan Documents. In some cases, requesting loan supporting documenta-
tion is helpful to understanding the original purpose and intention of the
loan. These documents typically contain information regarding the type of
loan, the interest rate, the term, collateral, and other conditions.
144 ◾ Data Sources and Data Processing Techniques
■■ Start and end dates for each data source. Keeping the relevant period in
mind, each data source to be processed should be reviewed to determine the
start and end dates within the data source that should be processed. In this
way, the team member processing the data processes only what is intended
to be used.
■■ Checks. If bank account information is to be processed, much of the informa-
tion on a statement can be converted into an account schedule using software;
however, a determination should be made as to what information should be
included from check images as they currently require manual data entry. If
check information is to be digitized, helpful fields to include, as applicable
to the case, include the dates checks were written (in addition the date the
check cleared the account), payees, name of the signer of the check, any notes
recorded on the memo line, and endorsements on the back of the check. Note:
The backs of checks normally must be obtained through an additional request of the
bank as they are not provided with the monthly bank statement.
■■ Deposit items. A determination should be made as to whether digitizing the
individual deposit items for each deposit is pertinent and useful in addressing
client concerns and investigation priorities.
■■ Information to process from each data source. Each data source should be
reviewed to determine what other potentially valuable information might
need to be digitized for further analysis. For example, when processing credit
card account information, it may be relevant to the case to digitize the loca-
tion of transactions, the transaction dates, and merchant categories.
■■ Combination of data sources. If data sources will be combined for future
analysis, knowing this in the data processing step will improve the efficiency
and allow for normalizing payees across the data sources at one time.
■■ Budgets and deadlines. Most forensic accounting engagements or fraud
investigations involve some sort of data processing on the front end of the
project. As such, if there are budget or time restraints, these should be con-
sidered in this step to limit the time processing information that is unneces-
sary or will not be used later in order to maximize the efficiency of the client’s
budget and to meet the deadline.
Account Scheduling Steps ◾ 145
Credit card account schedules are similar to that of bank account schedules
with a few differences. Key items to note from the example credit card account
schedule are:
■■ Transaction date and posted date. Credit card statements contain informa-
tion for both the date of the transaction and the date the transaction was
Formatting Account Schedules and Normalizing Payees ◾ 149
charged to the credit card account. Capturing transaction dates can assist
with future analysis if the days of the week on which the transactions occurred
are relevant to the client’s concerns and investigation priorities. Creating col-
umns listing both dates may be important to the data processing step.
■■ Payments and charges. Payments on credit cards reduce the balance of an
account while credit card charges increase the balance of the account. Col-
umns are created to differentiate between the two and allow corresponding
amounts to be recorded as positive values.
■■ Balance. The balance column should begin using the beginning balance of
the account located on the first page of the first month’s statement, and a
formula should be used that will automatically calculate a running account
balance as transactions are entered. The running balance should reconcile to
the ending balance of each statement and should be used to ensure all trans-
actions were entered accurately. The formula to use on each row is slightly
different from that of a bank account balance formula:
Account schedules create efficiency for the data analysis step through consistency
in the data processing. General formatting recommendations include:
■■ Use ALL CAPS for all fields including payees, memos, locations, and mer-
chant categories.
150 ◾ Data Sources and Data Processing Techniques
■■ Avoid using punctuation, with the exception of the ampersand (&). For
example: Wal-Mart should be entered as WALMART, and Ben & Jerry’s
should be entered as BEN & JERRYS
■■ Consistency is pertinent when entering payee names, locations, and merchant
categories. The goal is to list only one unique name for each payee across all
account schedules – especially if multiple accounts will be combined in the
data analysis step. For example: If checks have been written to John Smith
and John S. Smith, but you know or believe them to be the same person, all
should be entered as JOHN S SMITH.
■■ List the entire business name as the payee or payor. For example: payments
to Workman Forensics and Workman Forensics, LLC should all be entered
as WORKMAN FORENSICS LLC
NOTE
1. Stephen Pedneault, Need access to historical banking information? Better read the fine print, Fraud
Magazine (2014), accessed October 16, 2021, https://www.fraud- magazine.com/article.
aspx?id=4294985046.
Standard Data Sleuth Analyses:
Comparative Analysis and Source
9
CHAPTER NINE
P RIOR TO THE DEVELOPMENT of the Source and Use Summary, I would use the
filter and sorting functions in spreadsheet software to analyze and manipu-
late bank statement data and credit card statement data. I would look for
anomalies within the data for which further investigation was needed. Having
years of experience entering data into a spreadsheet, I was familiar with identify-
ing unusual transactions based on the case strategy, but I had never stopped to
specifically consider what made the transactions unusual. There was no defined
process or methodology, and I struggled to communicate and train analysts to
assist with the ever-growing caseload.
One afternoon, my only data analyst at the time asked me, “What does fraud
look like? How do I know it when I see it?” These questions forced me, for the first
time, to specifically pinpoint the steps I would take to find what was important in
bank and credit card statement data for an investigation. At the end of the discus-
sion, the analyst said, “So people commit fraud by writing checks to themselves?”
Although it sounded too simple at the time, I discovered that she was absolutely
correct. Through the identification of the ways in which someone has access and
opportunity to divert funds for their personal gain and benefit, that is where fraud
is found. Simplifying the analysis to highlight potential transactions of theft
151
152 ◾ Standard Data Sleuth Analyses: Comparative Analysis and Source
allowed me to build a team of analysts to assist with at least the initial analysis
required in financial investigations. That is where the standard Data Sleuth analy-
ses began to take shape.
The standard Data Sleuth analyses can be grouped into two categories:
COMPARATIVE ANALYSIS
■■ Anchor Data Source: Payroll report exports from the payroll processing
company. An export of payroll information for the relevant period provides
information regarding “What happened?” and retrieving the information
from the payroll processing company is most reliable as it would not involve
the subject’s access or risk alterations in retrieving it for the investigation.
■■ Comparative Analysis: Payroll report exports versus timesheet entries.
Tabular timesheet entries, from which the payroll report exports should have
been derived, can be connected to the payroll report exports by employee
name, or identification number, and pay period. Combining the two data
sets side by side allows for additional calculations to be performed in adjoin-
ing columns for each row identifying discrepancies between hours for which
employees were paid and hours reported as being worked by the same
employees.
■■ Comparative Analysis Results. The results of a comparative analysis, as
described in the payroll fraud example, do not prove that fraud occurred
but should be treated as a starting point for further investigation. In “The
Case of the Cash Back Payroll Scheme” in Chapter 3, the overpayment of
employees through the inflation of hours was confirmed through interviews
of employees. Additionally, when the chief executive officer would inflate an
employee’s hours, she would enter the inflated portion of the hours into an
unused field when entering the payroll information. This field was discovered
to have been used only on time related to employees involved in the scheme.
As if things could not get any worse, the lender that had financed his used car
purchases for years changed its repayment terms. Normally, when Lance wanted
to purchase additional used car inventory, he would request an advance to pay for
the vehicle and provide the lender with the title. When the car sold, he would
remit the funds to the lender and receive the title to provide to the customer.
The process of remitting the funds after the car was sold usually occurred within
a week; however, the lender shortened this repayment turnaround to three days.
With the cash flow crisis at hand, Lance contacted another lender requesting
the same lending process but with better repayment terms. The lender agreed
to extend Lance’s dealership a loan with remittance of funds due no later than
14 days from the date of the sale to the customer. The negotiations with the larger
auto group to purchase the dealership moved slowly, and Lance began to do eve-
rything he could to stay open, pay bills, and keep employees on the payroll.
A couple of months after the agreement with the new lender, the lender sent
an auditor to perform an inventory count of all the vehicles for which the lender
had advanced funds. For all of the advances that had not been repaid, the auditor
requested that Lance identify the car for which funds were advanced or to provide
a check from recent sales to remit to the lender to pay off the advance of the cars
that had been sold. Reviewing the auditor’s report, the loan officer identified that
there were more checks provided by Lance to the auditor from alleged recent
sales than the balance in the auto dealership’s bank account. If the loan arrange-
ment had been used properly, every time a car was sold, funds would have been
deposited to the dealership’s bank account. Then, a check to pay off the advance
would have been written to the lender to pay off the corresponding advance. It
was apparent that although the cars had been sold, Lance did not have the funds
to pay the lender back.
The loan officer provided the investigator with a list of all advances that had
not yet been repaid. The investigator requested a copy of all loan advance requests
and copies of the checks Lance provided to the auditor for which the bank account
did not have enough funds to process. Using this information, a comparative anal-
ysis was performed, as demonstrated in Table 9.1.
Using the list of advances from the lender as the anchor data source, the other
supporting documentation of outstanding checks and loan advance requests were
compared to the list of advances. “What should have happened?” is answered by
identifying that the funds from vehicles that had been purchased and sold should
have been returned to the bank. Therefore, the list of vehicles for which advances
had not yet been repaid would have either been identified as remaining on the
dealership’s lot or a check returned to the lender by the auditor in which the check
would have cleared the bank account. “What happened?” is answered by listing
The Case of the Cash Flow Fiasco ◾ 155
INVOICE OR EMAIL
CHECKS SUBMITTED TO
DATE OF VEHICLE AMOUNT RETURNED THE LENDER FOR
ADVANCE DESCRIPTION ADVANCED BY AUDITOR ADVANCE
the known information for each vehicle on the lender’s list by data source. The
comparative analysis results regarding the 24 advances for vehicles with an out-
standing balance remaining with the initial evidence included:
■■ All email advance requests were not supported by an actual car purchase.
■■ Cars were purchased and sold for which no amount was remitted to the
lender to repay the advance.
■■ Funds from the advance requests that were not used to purchase cars and car
sales were determined to have been used to pay expenses of the business. The
analysis performed to make this determination was based on the dealership’s
bank account statements using the Source and Use Summary.
The simplest and first step in analyzing bank and credit card statement data is
through the Source and Use Summary. It is a high-level summary of all of the
transactions in an account, or group of accounts, organized by the sources and
uses of funds over a relevant period. The Source and Use Summaryis structured to
identify where money is coming from (i.e. sources) and where money was spent
(i.e. uses) during the period. Before creating a Source and Use Summary, there are
a few details that should be considered and completed to avoid inaccuracy, confu-
sion, and performing the analysis repeatedly.
Bank Account Source and Use Analysis ◾ 157
The Source and Use Summary process is similar for both bank accounts and
credit card accounts; however, because of some differences, the explanation of the
Source and Use Summary will be separated into sections specifically for bank
accounts and credit card accounts.
For the purposes of this section, all steps will reference an analysis of one bank
account; however, the same steps can be performed as a group of accounts keep-
ing in mind the recommendations of the previous section. Table 9.2 illustrates
a sample Source and Use Summary that will be further described throughout
this section.
The Source and Use Summary is performed using spreadsheet software and
its summarizing features such as pivot tables and subtotals. Before creating the
summary, list the beginning balance as of the first date of the relevant period. This
reference point will be used in reconciling the results to the underlying data at the
completion of the summary.
158 ◾ Standard Data Sleuth Analyses: Comparative Analysis and Source
Related Count of
Account Records
Name Numbers Summarized Total Amount Notes
SOURCES (DEPOSITS/
CREDITS)
Withdrawals
WITHDRAWAL 1 2,500.00
ATM WITHDRAWALS 2 404.00
Transfers and Wires
TRANSFER 5678 10 50,555.25
TRANSFER 2323 1 222.78
Payments to Entities
COMPANY CO. 7 13,962.57
COMPANY CORP. 9 2,447.78
COMPANY INC. 1 5,783.93
COMPANY LLC 1 717.18
Payments to Individuals
JOHN DOE 3 1,750.00
JANE DOE 14 23,997.00
Bank Account Source and Use Analysis ◾ 159
Sources (Deposits/Credits)
The detailed account transactions listed in a spreadsheet from data processing is
then summarized based on whether the transaction is a source of funds or a use
of funds. The section labeled “Sources” summarizes all of the deposits or credits
to an account first by name, description, or type. Corresponding fields are used to
list the total number of records and the sum of the records per summary line item.
Then the sources are further summarized from highest to lowest risk of fraud to
the client.
Total sources are calculated at the bottom of the sources section. Any items
noticed by the analyst within this section as needing additional research should
be flagged or noted for further investigation and research. Any items noted will
also be considered in preparing the interesting data analysis to be explained in
Chapter 10.
Uses (Expenditures/Debits)
The section labeled “Uses” summarizes all of the expenditures and debits to an
account by name, description, or type. Corresponding fields are used to list the
total number of records and the sum of the records per summary line item. If a
client concern includes the quantification of missing money, and the subject had
access to the bank account, then it is advantageous to understand the most com-
mon ways in which subjects steal money and the potential data indicators of the
Bank Account Source and Use Analysis ◾ 161
As demonstrated in “The Case of the Man Cave,” Bill was able to steal funds
by creating fake entities. Within the State of Oklahoma, registration of a new
entity costs $100 with an annual renewal fee of $25. Registering entities with
the state is inexpensive and allows the individual to create a bank account in
the entity’s name. If someone has discovered a method to steal funds from their
employer and hide it as a vendor payment, the fees associated with registering an
entity are not a deterrent.
■■ Payments to individuals. Creating a subcategory in the “Uses” section for
payments to individuals is helpful in identifying individuals who received
funds from the business, or even marital estate, who should not have received
the funds. This subcategory is particularly helpful in divorce cases, to identify
money that has been paid to a trusted friend or relative to hold until divorce
proceedings have been finalized. This subcategory has also been used to iden-
tify payments to employee spouses who are not employed by the company
but were paid directly from the bank account. With estate and trust matters,
embezzlement is perpetrated by the trustee, caretaker, or personal representa-
tive simply by writing checks to themselves. Careful review of this subcat-
egory may identify payments to the trusted individual that should not have
occurred or that exceed an agreed upon amount.
■■ Credit card payments. Creating a subcategory of payments to credit cards
may be helpful in identifying credit cards for which funds were spent by the
client but they were unaware of the card or account.
■■ All other payments. The remaining subcategory of “All Other Payments”
summarizes those transactions that were not previously categorized. Depend-
ing on the needs of the case, transactions summarized in this section may
need additional research and analysis even though they do not fall into the
standard subcategories.
In order to reconcile the Source and Use Summary to the underlying data, an
ending balance calculation should be performed to match the ending balance of
the last date of the relevant period to the supporting bank statement.
■■ Transfers. For all transfers in both the “Sources” and “Uses” section of the
summary, the analyst should reconcile all account numbers listed on the sum-
mary to the account inventory. If any of the accounts for which transfers
occurred involve accounts that are not listed on the account inventory or rep-
resent an account number for which the analyst does not have supporting
documentation, that group of transfers should be flagged for client consid-
eration and feedback and potential account requests made by the account
holder or subpoena. This section represents transfers between accounts that
are made electronically. Sometimes, funds are transferred between accounts
using checks. As such, transactions grouped in other subcategories may need
to be moved to the transfers section.
■■ Deposits and deposit items. If deposit items were entered into the under-
lying data set or spreadsheet, any deposits from payors relevant to the case
investigation priorities, should be flagged for client feedback. Knowing the
sources of deposits is helpful if the investigation involves comparing the
expected deposits from sources to actual deposits by sources.
■■ Wires. Any wires that do not appear to be within the normal course of busi-
ness or might potentially indicate that assets were sold or hidden or moved
out of the control of our client, those transactions should be flagged.
■■ Payments to entities. All payments to entities for which the analyst is una-
ware should be flagged for at least client review. If the client is unable to
review transactions, or if the client is unaware of certain payments to enti-
ties, then further research is performed by the analyst including but not lim-
ited to identifying registered agents and principals through public database
164 ◾ Standard Data Sleuth Analyses: Comparative Analysis and Source
A credit card Source and Use Summary is set up similarly to that of the summary
for bank accounts. The primary difference is the direction of the transactions in
the data. For the transactions on credit card statements, purchases for which the
credit card was charged are positive amounts, and payments to the credit cards
are negative amounts. Table 9.3 illustrates a sample credit card Source and Use
Summary that will be further described throughout this section.
Just as with the bank Source and Use Summary, begin by listing the begin-
ning balance as of the first date of the relevant period. This reference point will
be used in reconciling the results to the underlying data at the completion of
the summary.
Sources (Payments/Credits)
The “Sources” section of the credit card Source and Use Summary lists payments
to the credit card account as well as merchant credits or any other type of credit
provided by the credit card company.
Credit Card Account Source and Use Summary ◾ 165
The purchases for which the credit card is charged are then summarized by
payee. Depending on the case investigation priorities, it might be valuable to
extract and review using subcategories, payments to entities and individuals as
with the bank Source and Use Summary. Another feature of credit card data are
the categories assigned to purchases by the credit card company. If the merchant
categories are scheduled as part of data processing, subcategories could be created
in the Source and Use Summary as well.
In order to reconcile the Source and Use Summary to the underlying data, an
ending balance calculation should be performed to match the ending balance of
the last date of the relevant period to the supporting bank statement.
SOURCES (PAYMENTS/CREDITS)
Merchant Credits
SECURITY SYSTEM COMPANY 15 4,288.15
AUTOMOTIVE COMPANY 1 180.00
ONLINE DATA STORAGE COMPANY 1 97.37
TRAVEL INN 1 821.28
Payments to Account
PAYMENTS 45 115,544.83 Reconcile to known
bank accounts
USES (PURCHASES/ADVANCES/
BALANCE TRANSFERS)
Cash Advances
N/A -
Balance Transfers
N/A -
Payments to Entities
COMPANY CO. 41 20,990.15
COMPANY CORP. 1 174.33
COMPANY INC. 56 59,765.78
COMPANY LLC 1 106.07
Payments to Individuals
N/A -
All Other Payments
MISC PAYMENTS 3 4,733.60
SERVICE CHARGES 3 1,344.77
TOTAL USES $ 87,114.70
Analysis of a credit card Source and Use Summary involves primarily review-
ing the types of purchases charged to the credit card account. Review of the trans-
actions is normally focused on delineating between the business-related purchases
and non-business-related purchases. This delineation can often be performed on a
summary by payee level from the Source and Use Summary by noting next to each
payee group whether the charges fall into the buckets, described in Chapter 2, of:
■■ Business related
■■ Non-business related
■■ Both business and non-business related
■■ Unknown
169
170 ◾ Standard Data Sleuth Analyses
Another Data Sleuth analysis to incorporate after the Source and Use Summary is
the Interesting Data Findings (IDF) analysis. The IDF is a more detailed, granu-
lar analysis of specific transactions using data analysis tests to identify anomalies
and the most common indicators within a data set, which might indicate fraud or
attempts to hide assets or purchases of assets. There are standard data analysis tests
that are performed on each data set; however, the analyst preparing the IDF also
considers whether custom tests should be designed based on the client’s concerns
and investigation priorities.
■■ Run data analysis tests on each data set in the case that are relevant to the
client concerns and investigation priorities.
■■ Categorize the individual transaction results of the tests by type.
■■ Summarize the results in a simplified format for client feedback and or addi-
tional inquiry, research, or review.
Interesting Data Findings ◾ 171
Benford’s Analysis
Benford’s analysis is based on Benford’s Law, which provides the expected distri-
bution of a random population of numbers.1 Using this law is helpful in spotting
anomalies in data in investigations because deviations from the expected frequency
distribution may indicate that the transaction was not a random occurrence but
was influenced somehow. Benford’s analysis works best on large data sets and
can be run using spreadsheet software or data analysis software. As with any data
analysis result, further research must be performed to decide if the anomaly is
legitimate, erroneous, or fraudulent. Benford’s analysis expected frequency devia-
tions are explained through the following examples to illustrate Benford’s analysis
anomalies:
FIGURE 10.2 Benford’s Analysis graph of suspicious first two digits identifying chari-
table contributions.
Interesting Data Findings ◾ 173
Even-Dollar Amounts
It is common that when individuals are stealing funds or moving money to hide in
a divorce directly from a bank account or brokerage account, the payment amounts
are multiples of 10 or 100 and are even in amount such as $3,500.00, $55,000.00,
$205,000.00. Many data analysis programs assisting with Benford’s analysis will
provide a result for the last two digits for which even dollar payments can be
exported. Additionally, filter functions within spreadsheet software can be used
to filter for dollar amounts ending in “.00,” “00.00,” and so forth. When transac-
tions of even dollar amounts are identified, additional research and inquiry can be
performed to verify whether they were for the benefit of the subject or the client.
Adams 0 0 0 0 0 0
Andrews 1 1 1 1 1 5
Cole 3 1 1 1 0 6
Daughtery 1 1 1 1 1 5
Martin 1 1 1 1 1 5
Mason 0 0 0 0 1 1
Mitchell 0 0 0 0 0 0
Newton 2 1 1 1 1 6
Patterson 1 1 1 1 1 5
Williams 0 0 0 0 0 0
Workman 0 0 0 0 0 0
Clients will sometimes provide data from a data source and request that an
investigator or analyst identify fraud within the data source based on a series
of events. For our firm, these types of cases often involve larger companies
with no internal audit department, but due to the size of the organization,
more than one person manages the finances of the organization. The two most
176
Risk Indicator Analysis ◾ 177
common data sources involve purchasing and payroll records. This section will
explain the risk indicator analysis involving purchasing records. The Payroll
Analysis section will incorporate the use of the risk indicator analysis as part
of testing for ghost employees.
Another use of the risk indicator analysis is in prelitigation investigations.
Prelitigation investigations are performed when clients would like to sue another
party, but they are not certain of the events that caused the loss. Usually, the clients
do not have access to all of the evidence required for a full investigation, but they
will be able to obtain what is needed through discovery or subpoena when the
lawsuit is filed.
a risk indicator analysis could be performed. The following data sets and reports
were obtained and combined into one table as applicable to begin performing a
risk indicator analysis.
To combine information from the data sets, a matching primary key should
be identified from the various data sets that can be used to link two data sets
together.2 For example, in the information listed previously, if each of the data
sets reference a vendor identification number (“vendor ID”), then the vendor ID
can be used to link the transactions between all of the data sets before performing
the risk indicator analysis. Rarely is a primary key and join that simple between
multiple data sets, so realistically, a few of the data sets will be joined together on
one primary key, and then a different primary key will need to be identified in the
combined data set and another data source, and so forth. Sometimes, not all the
data sets can be combined, and some data sets may go unused or may require a
separate analysis.
Data analysis tests performed on the combined data set included the identi-
fication of:
For each transaction with a positive result from the data analysis tests, a value
of 1 was assigned to transaction. If the data analysis test returned a negative result
for the transaction, a value of 0 was assigned. All the data analysis test results were
totaled and sorted from largest to smallest to identify the vendors and payments
of highest risk. The results of this analysis were then reviewed by the client to
narrow the results further. The resulting list of high-risk vendors was used in the
interview process of personnel. An example of a risk indicator analysis worksheet
is provided in Table 10.3.
179
180 ◾ Standard Data Sleuth Analyses
PAYROLL ANALYSIS
Payroll analysis uses both analysis of one data source as well as comparative
analysis. Using only the data provided in a payroll report, anomalies regarding
payroll to employees, including expense reimbursements or benefits, can be
identified. When working with one data source analysis, the most meaningful
results are those when the data set is complete and includes all employees –
or at least all employees from a department or all employees in a certain pay
grade or position. It is difficult to find anomalies when a client has edited
the data set prior to providing the information. In order for anomalies to be
discovered, there must be a benchmark or a way to identify what is normal to
the data set.
Although most payroll providers are able to export any data collected from
payroll into a tabular format, if clients are using older versions of the software
that have not been updated, sometimes it is not economically feasible to convert
payroll data for all employees to a tabular format for one data source analysis.
Sometimes, clients will request that only one employee’s records be reviewed.
When either of these situations occur, the payroll analysis immediately becomes
a comparative analysis as other data sources will need to be used to identify any
discrepancies or unauthorized disbursements of funds through payroll. Note: if
a client requests that only one employee’s records are to be reviewed and there is
little supporting documentation, be sure to exercise professional skepticism about
the client’s intentions behind the engagement. The following analyses assume a
complete data set of all employees and involve the analysis of one data set at a time
and then comparative analysis as a second step.
Ghost Employees
Ghost employees is the term most commonly used when individuals are paid
through payroll but either never worked for the company or whose status remained
active after leaving and was used to issue additional paychecks to someone in the
company. There are several different indicators an analyst will want to test for in
a data set to identify ghost employees. The data analysis tests explained in this
section can be applied to most data sets involving employee information. Custom
tests can also be designed, depending on the data provided by the client and the
client’s concerns and investigation priorities.
The term “indicators” when referring to data analysis looking for ghost
employees is intentional because if the indicators are discovered in a data set, fraud
is not certain to have occurred. The indicators are used to flag data points within
Payroll Analysis ◾ 181
Employee
No. SSN Address City State Zip Code
Risk
Indicators
Employee Duplicate
No. SSN Address City State Zip Code SSN
Employee Zip
No. SSN Address City State Code
Risk
Indicators
Employee Zip Duplicate No
No. SSN Address City State Code SSN Address
resulting from the three data analysis tests. It is recommended that the payroll
records for at least employee numbers four and five be examined further, which
may include:
■■ Identify if payroll was paid to employee numbers four and five in the same
pay period for the same work (i.e. review the payments to identify whether
they are duplicate payroll).
■■ Identify if payroll and benefits paid to employee numbers four and five are
consistent with employee agreements and reconcile to W-2s.
■■ Identify if expense reimbursements to employee numbers four and five are
substantiated by supporting documentation.
Some strange activity was discovered in the pay records of the HR director,
including the maximizing of exemptions, thus reducing his tax withholdings to
almost nothing. The investigator discussed this finding with the client; however,
no evidence supporting unauthorized payroll, unauthorized payments of benefits,
or ghost employees was identified. Within the final report, the investigator listed
the data analysis tests performed and documented the strange withholdings find-
ing. She also reiterated her initial conversation with the president that had all of
the pay data for all employees been reviewed, ghost employees and overpayments
Overpayments of Payroll ◾ 189
to other employees may have been uncovered. The president advised they did not
want to expand the scope of the investigation, and the investigation ended.
OVERPAYMENTS OF PAYROLL
Using data from payroll reports, indicators of payroll overpayments within the
payroll report data alone can be identified using the data analysis tests explained
in this section. As with any other data analysis test of one data source, any of the
findings from the analysis should then become a comparative analysis to verify the
purpose of the indicated overpayment.
■■ Summarize total payments to employee by pay date and graph the total pay-
ments by pay date, using perhaps a scatter graph, to identify outliers includ-
ing payments to employees for off-cycle payroll.
■■ Plot on a scatter graph every payment paid to every employee over the rel-
evant period to identify outliers such as individuals whose pay was consider-
ably higher and lower than other employees.
A pay date review may also identify bonus payments, appearing as off-cycle
payroll. Further review of the payments should include identifying the employees
receiving the off-cycle payroll and the payment frequency. It is possible the pay-
ments were for all employees as a company-wide bonus at the end of the year. It
is also possible that the person responsible for payroll is providing himself and
friends, or co-conspirators, with unauthorized bonus payments.
NOTES
1. J. Carlton Collins, “Using Excel and Benford’s Law to detect fraud,” Journal of Accountancy (April
1, 2017), accessed October 15, 2021, https://www.journalofaccountancy.com/issues/2017/apr/
excel-and-benfords-law-to-detect-fraud.html.
2. Dave Fowler, “JOIN Relationships and JOINing Tables” (Data School, 2021), accessed October
15, 2021, https://dataschool.com/learn-sql/joins/.
Findings, Reports, and Testimony
11 CHAPTER ELEVEN
FINDINGS
193
194 ◾ Findings, Reports, and Testimony
as the Data Sleuth Process began to expand beyond just a data processing
and data analysis solution, I realized that a report is not always necessary.
Reevaluation of this step in the process allows us to now proactively ask the
client about the intended purpose of a report or desired recovery avenue. If the
client does not require a final, signed report, we instead provide the client with
a Findings Summary.
For each of the analyses listed on the case plan, a corresponding work paper
is prepared containing:
By requiring these items in the analysis work papers, when the analysis is
complete, the analyst drafts the findings as if they will be sent to the client. In this
way, the findings are prepared contemporaneously rather than in a report writ-
ing step just before a deadline. Not all of the analyst’s findings for each analysis
are used in the Findings Summary and report, but the use of work papers in this
manner allows for multiple analysts and investigators to work on the same case
with the same goals.
From the results of each analysis, after detail and case manager review, the
findings from the analyses are compiled in the Findings Summary with attach-
ments resulting from the analysis accompanying the findings. An example of a
Findings Summary is provided in Table 11.1.
For each finding, the investigation priority determined in the case planning
step is listed along with the relevant period, finding description, amount of the
loss, and a reference to the attachment table, chart, or graph for each finding.
The attachments are prepared as if they will be included with a report or with the
expert’s testimony. The Findings Summary is then reviewed by the case manager
and then with the client prior to the preparation of the final report. Encouraging a
meeting with the client to review the Findings Summary provides an opportunity
to ensure that the client and investigator are on the same page, that nothing was
overlooked by the investigator, and that there will be no surprises for the client if a
report is issued. Additionally, if any of the findings or corresponding attachments
are confusing to the client or the client’s attorney, adjustments can be made prior
to the finalization in a report.
195
196 ◾ Findings, Reports, and Testimony
REPORTS
■■ A prosecutor or plaintiff’s attorney works to simplify the facts of the case and
make it simple for the judge or jury to understand to eliminate doubt as to
what happened.
■■ A defense attorney works to find areas within the prosecutor’s or plaintiff’s
theory to exploit and cause confusion in hopes of creating reasonable doubt.
When possible, the exploitation of the theory is simplified by the defense
attorney to create even more doubt as to the validity of the prosecution or
plaintiff’s theory.
incurs the risk that she may be questioned about each report in a deposition, or
hearing, or trial in an effort to confuse the decision maker(s). With every report
issued, it is also possible to have contradicting opinions, analysis results, or cal-
culations. Although it is possible for an expert to recover if a mistake is found in
a work product, it is an unnecessary risk to issue multiple reports with the same
types of findings.
One exception to not issuing multiple reports is that if, for some reason, a par-
ticular analysis performed does not create value in the respective recovery avenue.
When this occurs, the removal of that analysis is the only difference between the
reports. This makes the removal simpler to explain.
If an investigation finds that laws have been broken for which criminal charges
may be filed, a report is helpful in presenting the client’s case to law enforce-
ment. A forensic accountant or investigator is not required to refer cases to
law enforcement, and we always obtain written permission from clients before
referring a case on their behalf. Not all clients want their cases referred to law
enforcement and prefer to settle either through civil court or even just a sim-
ple agreement with the subject. There are numerous investigative agencies who
will review complaints from citizens regarding crimes for which a case may be
opened, and understanding the purposes of these agencies and the crimes they
are authorized to investigate is advantageous to the client’s case being success-
fully prosecuted.
Not all law enforcement agencies will be addressed in this chapter, but the
ones we work with most often for financial crimes have been listed for reference
starting with federal law enforcement agencies:
At the local and state levels, investigative agencies with the authority to inves-
tigate financial crimes include:
■■ Local Police Departments. In Tulsa, the local police department has a finan-
cial crimes unit that will investigate financial crimes within the city of Tulsa.
■■ County Sheriff’s Office. Fraud cases that occur within the county may be
investigated by a county sheriff’s office.
■■ State Investigation Agencies. In Oklahoma, the state law enforcement
agency is the Oklahoma State Bureau of Investigation, which will work
fraud investigations as requested by the state auditor or other statutory
requestor.1
■■ State Auditor’s Office. The state auditor’s office in the state of Oklahoma
is not a law enforcement agency, but if petitioned by citizens, they can open
investigations into public service entities. If crimes are discovered, they will
refer the criminal investigation to the Oklahoma Attorney General’s office or
the Oklahoma State Bureau of Investigation.
The investigation was performed for law enforcement referral, the investiga-
tor identified that the funds had been paid via wire from a local bank to a bank
whose headquarters were in another state. Because of the use of a wire as the pay-
ment method and the funds crossing state lines, the subject was charged with wire
fraud, and the case was able to be prosecuted federally instead of embezzlement
by local law enforcement.
If the goal of the expert is to help their client’s case to be investigated by law
enforcement, then making this process simple for the agent or detective is key.
To do so, consider preparing a report and supporting documentation with law
enforcement in mind. Avoid providing them a report of every procedure per-
formed and the result of the procedure, whether it created a finding or not.
Simplify the report to communicate the findings of the investigation, the analysis
used in the investigation, and the data relied on in the investigation. Create tables
and charts to illustrate the results of the findings, removing any extraneous infor-
mation. An example of a commonly used format when presenting findings and
the resulting loss to law enforcement is provided in Table 11.2.
After law enforcement has reviewed the report and supporting attachments,
they may request additional information from the files. With written permission
Attachment 1
Nonbusiness Uses of Company Funds
For the Period 01/01/14 through 10/15/16
by the client, we provide organized files with a corresponding copy of the Docu-
ment Inventory so they can easily navigate the evidence in our possession and
then obtain the remaining information they need.
Within the report, the findings should communicate to the agent or detective
the reasons supporting why a subject’s benefit was unauthorized or at the expense
of the client using employment agreements or emails documenting intentions.
Clearly identifying a subject’s unauthorized benefit through an intent to deceive
assists law enforcement in taking their next steps with the investigation.
The goal behind a criminal investigation is successful prosecution. This can be
obtained on the federal level through two primary avenues for which assisting law
enforcement in building a simple, concise case is important:
insurance companies verifying that customers did file a police report. Knowing
this, I think it is helpful that the same report submitted for insurance reimburse-
ment also be provided when filing a police report.
When preparing a report for any audience, less is more, and simplicity is key.
Most readers of forensic accounting or fraud investigation reports want to be able
to read a report once and digest the important information in a quick and efficient
manner. Every report issued by our team includes a section labeled “Background”
in which we state the purpose of the engagement, the background pertinent to the
engagement, the relevant period, and a summary of information reviewed.
The sections following the “Background” section use the Findings Summary
as it serves as an outline to guide the order of the final report. A brief explanation
of the analysis performed and the findings from the Findings Summary are copied
directly, as applicable, to maintain consistency between the Findings Summary
and final report.
Consider creating sections of the report where the analysis is grouped by
client concern and/or investigation priority. Within the concerns and priorities,
consider grouping the findings by method, transaction, or payment type. One of
the strategies my mentor at the FBI taught was if listing a transaction, use bullet
points and the same format for each item. In this way, the reader does not have to
read every word on every line to understand the information. For example:
The use of “BANK5454” and “BANK9898” in the example refers to the use
of account references as explained in Chapter 8. The account reference provides a
shortened name for the financial institution and the last four digits of the account.
This simplifies references to bank accounts within the body of the report for which
details can be obtained by consulting the Account Index.
As findings are communicated, any evidence supporting intentions of the
subject to deceive a custodian or owner of the funds stolen are incorporated. A
simple example is in the investigation involving a fire chief. The fire chief was
using the fire department’s debit card for personal expenses. He would then record
the purchases in QuickBooks in general ledger accounts that hid the true purpose
◾
Testimony 203
behind the expenditure. In an interview with his assistant, she advised that the fire
chief was the only individual with access to QuickBooks. We were able to confirm
this statement when we had to obtain the QuickBooks from the fire chief. In the
section of the report where the debit card purchases were explained, the incorpo-
ration of the assistant’s statement and our confirmation was also listed to provide
supporting evidence of the fire chief ’s intention to hide the personal purchases
from the board.
For every calculation or list of transactions resulting in a loss, we create both
a detailed and summarized table to include with the report. We refer to the tables,
charts, example emails, or flowcharts as attachments instead of exhibits. These
attachments are prepared with the intention that they may be used in a hearing,
deposition, or trial testimony. As such, the referencing of exhibits to the report in
testimony can get confusing because the plaintiff has exhibits and the defendant
has exhibits as well and depending on which side is using one of our tables, it will
be given an exhibit number. Labeling and referencing the table as “attachment 1 to
the report” is less confusing in a hearing, deposition, or trial setting.
TESTIMONY
After I earned the Certified Fraud Examiner’s credential, I joined the local chapter
and volunteered on the board of directors. Anxious to learn all I could about fraud
investigation, I attended every training event and met as many of the speakers as
possible. One of the speakers at the local conference was a litigation attorney who
had worked with countless expert witnesses and shared tips about testifying as an
expert. The primary recommendation from his presentation I have carried with
me throughout my career – to work on cases for both plaintiff and defendants.
Since that day, I have encountered many experts who share this philosophy, and
as I began to testify, I understood why.
There are several questions that are typically asked of expert witnesses on
cross-examination that are intended to make the expert appear unqualified, biased,
or paid to testify to a desired result of the attorney.
or make it personal. The attorney is doing his job for his client and testifying is
part of mine. It is not uncommon that an attorney who questions me on cross-
examination later refers a client or hires me to consult on a case. Keeping this in
mind reminds me that we are not actual enemies in life; we are both doing a job.
The question, “How much were you paid for your testimony?” is designed
to trick an expert into appearing as if she was paid to testify to a specific result –
which is not accurate in the cases I work. My response to this question is, “I am
not paid for my testimony (or for a report or answer). I am paid for my time.”
Every report I issue reiterates this policy with the language, “Workman Forensics’
fees for this engagement are based upon our normal hourly billing rates and are in
no way contingent upon the results of our findings.”
Testimony advice I have learned from attorneys and also experience in the
courtroom includes:
■■ Breathe. The calmer I can remain on the stand, the greater difficulty opposing
counsel will have in confusing me and, in turn, the judge or jury.
■■ If I do get confused, I ask if I can clarify or restate my response. The judge
may not allow it, but it never hurts to ask.
■■ Listen to the question in its entirety and only answer the question that is
asked. This requires practice and discipline. It is natural to want to help
someone finish sentences or understand a concept, but on cross-examination,
this instinct needs to be ignored.
■■ An attorney told me before my first deposition, “Leah, it may feel slow to lis-
ten to the question completely and to pause to think about it before respond-
ing, but the transcript does not reflect the pauses. Just take your time.” Take
your time in understanding the question and contemplating your response.
■■ If I don’t understand the question, I let the attorney know and ask her to
restate or rephrase it. Sometimes the response of opposing counsel is to make
an expert feel as though she is dense, but once again, do not take it person-
ally. Ignore feelings of inadequacy and admit that you do not understand
the question so that you can provide a confident answer to a question you
understand.
■■ Testifying requires patience and can feel as if the attorneys’ questions will
never end. Slow down, try to relax, be professional, answer with confidence,
and be yourself.
did not order that I do so, but he did advise that he thought it would be helpful.
After dinner, I worked to organize the work papers until 2:00 a.m. so they could
be printed and presented the following morning in a simple fashion. Sitting on the
stand that next morning, opposing counsel was asking questions about the work
papers but the questions were not making sense to me – especially with such little
sleep. I responded to one of his questions saying, “I’m sorry, Mr. Attorney, but I
don’t believe we’re communicating very well this morning.” The judge echoed, “I
agree,” and the opposing counsel actually moved on to another line of question-
ing. When I first began testifying, I was rigid and wanted to be so exact all the
time. I have noticed that by intentionally practicing the recommendations previ-
ously explained, I enjoy testifying more, and I am a much more effective witness
in presenting the findings from the financial investigation or forensic accounting
component of the case.
NOTES
As a recap, the Data Sleuth Case Plan works in the following order as described
in detail in Chapter 6:
The Data Sleuth data processing step begins with defining a relevant period
so that information is as complete as possible before beginning the processing
of data. As client information is received, contemporaneously record and update
the information in the Document Inventory and Account Index. Review the
received information to determine what data should be included with in the schedul-
ing of financial accounts or other data sources. When processing the data, a ttention
to detail is encouraged to ensure consistency in the data to be used in the following
analysis step.
To create a Data Analysis Plan, select the type of analyses that most appropriately
address the client’s investigation priorities. Possible analysis options to consider
for the Data Analysis Plan include the following and are described in greater
detail in Chapters 9 and 10:
■■ Comparative analysis. Comparison of two data sets or two data sources that
answer the questions “What happened?” and “What should have happened?”
■■ Source and Use Summary. Summary by data source, or combination of data
sources, providing high-level information regarding where money came from
and how it was used by payee, payor, or other description.
■■ Interesting Data Findings (IDF) Analysis. The use of standard and custom
data analysis tests based on the client’s concerns and investigation priori-
ties such as:
■■ Benford’s analysis
■■ Even-dollar amounts
Case Study 1: The Case of the Disappearing Business ◾ 209
Eric owned a consulting business that required his exclusive expertise and time,
but a few years prior, he had an opportunity to open a retail store. What started
out as a small operation, which he just hoped would break even, was soon more
successful than he had imagined. So successful, in fact, that it was too much for
him to manage in addition to his consulting business. On July 15 of year two, he
hired Mandy to run the storefront, but Eric soon realized that the operations were
falling apart under her management. Eric met with Mandy to discuss terminating
her employment, but Mandy detected the hints from the beginning of the con-
versation and suggested that her mom, Denise, manage the store so that Mandy
could be demoted to a clerk position. Eric agreed to give the arrangement a try
after interviewing Denise and learning about her extensive retail experience. From
that day forward, the mom-daughter duo ran the store.
To keep Eric in the loop, Denise would email Eric daily with the sales for
the day and attach any supplier invoices for inventory that needed to be paid. The
210 ◾ Practice the Data Sleuth Process
■■ Payroll processing
■■ Vendor payments
■■ Bank reconciliations
■■ Financial statements
Denise’s daily sales emails boasted of great sales almost daily, but something
strange kept happening. When it was time for Eric to pay payroll, he reviewed
the timesheets, entered the time to be paid into the payroll provider’s website, and
then double checked the retail store’s bank balance online and in the accounting
system prior to final authorization of payroll. He began noticing in December of
year 5 that the cash balance in the bank account was barely covering payroll every
two weeks, which was their normal payroll cycle. He transferred money from the
consulting business to cover the deficit the first time as he believed it was a timing
difference.
Although the business had some corporate clients that they billed rather than
collecting payment immediately at the point of sale in the store, this was a small
percentage of the normal revenue; therefore, a timing difference resulting in an
inability to pay payroll would have been doubtful. The bookkeeper prepared the
clothing store financial statements on a cash basis, so revenue was recorded when
received. Additionally, the financial statements were prepared from the recording
of deposits and expenditures listed on the bank statements, so because of all of
these things, a timing difference between the recording and collection of revenue
was even more unlikely.
After transferring money to cover payroll for several pay periods, and with
his consulting business taking even more of his time, Eric told Denise that he was
going to close the store at the end of the month. Denise responded to the news by
asking him to sell the store to her family. Wondering why Denise would want a
business that was not paying all the bills, he agreed to sell the store anyway. Denise
was to pay a total of $150,000 to Eric over several months. With a signed letter of
Case Study 1: The Case of the Disappearing Business ◾ 211
intent, dated February 28 of year six, Denise provided Eric with three postdated
checks for $5,000 each dated one month apart. The letter of intent was signed,
and Eric deposited the first check, or so he thought. He was notified by the bank
the following day that the check he deposited from Denise had been returned due
to insufficient funds in her account. Eric called Denise, who apologized, saying
that she forgot to move funds over from their savings account. She assured him
the next one would clear her account. The next day, Eric tried to deposit the sec-
ond check, and it was returned due to insufficient funds as well. Frustrated, Eric
called Denise again about the returned check. She apologized again and delivered
a replacement check to Eric the same day. Thinking the third time would be the
charm, Eric was beyond frustrated when the check was returned for the final time.
Eric drove to the store directly from the bank after depositing the third and
final insufficient funds check to evict Denise and to shut down the store for good.
He could liquidate the merchandise over the next month and be finished with
the unprofitable operation and drama for good. However, when he arrived, the
store was uncharacteristically dark. There were no customers or any movement
inside. The once carefully arranged window displays were empty. Eric cautiously
approached the front door. It was locked. Pulling out his keys to open the door he
saw through the front door windows what looked to be the leftovers of a robbery.
Frantically, he opened the door and pulled out his phone to call Denise. The call
went straight to voice mail. He did not want to believe it, but after three bounced
checks, he knew in his gut – Denise had stolen the merchandise. As he walked
around the disheveled space with only the rickety racks and off-season merchan-
dise remaining, he was at a loss for words.
A couple of days later, through a series of texts from friends, Eric learned that
Denise had opened a retail store just a couple blocks south of the original store.
He could not believe it, but driving past the new location, it was true. The new
retail store display windows were fully stocked and carefully assembled with Eric’s
merchandise and displays.
The next morning, Eric filed a police report and hired an attorney. Within
a couple of days, a civil lawsuit was filed, and a forensic accountant was hired.
Eric wanted to know if Denise was willing to buy a failing store and steal all of
the inventory, what was really going on the entire time? More specifically, Eric
wanted to know:
■■ If the sales were as great as Denise reported to him daily, why was there not
enough money in the bank account to cover payroll?
■■ If Denise stole money during the period, how much had she stolen?
■■ How much inventory was stolen by Denise for her new store?
212 ◾ Practice the Data Sleuth Process
XYZ Co. was made up of three partners who all made cash investments at the
origination of XYZ. Scott was a long-time friend of one of the partners who
was recommended to hire as chief financial officer. The partners agreed to hiring
Scott as CFO. Scott wanted to be a partner in XYZ, but he was still recovering
from significant financial issues and could not afford to purchase shares. Knowing
his desire to become a partner, as part of his employment agreement, Scott was
offered the position of CFO with the opportunity to earn ownership in the com-
pany. A 25% ownership was promised to be given to Scott when all of the other
partners recovered their initial investments. Scott signed the employment agree-
ment, and XYZ began serving its customers and earning revenue.
The three partners’ roles became that of investors as they were unable to
run the operations of the business due to other various business interests. Scott
assumed the role of chief operating officer as well as CFO. This role assump-
tion was never formalized with an agreement, but the partners trusted Scott and
knew he was incentivized to make the company succeed if he wanted to become a
214 ◾ Practice the Data Sleuth Process
partner. XYZ operated with Scott at the helm for five years, and the partners were
happy with his performance.
One afternoon, Jack, one of the founding partners, received a phone call from
the bank used by XYZ informing him that their line of credit was maxed out and
that it was time to renew the loan. The loan officer wanted to know how they
would like to renew or if they were looking to pay off the balance. Jack did not
have an immediate response for the loan officer. When he did respond, he advised
that there must be a mistake because XYZ had never advanced funds on the loan.
When the company opened, Jack offered to be the guarantor on the loan as it was
just a backup plan to supplement during emergency cash flow crises. It was com-
mon in XYZ’s industry that customers would be slow to pay outstanding invoices
because of the massive sizes of the companies comprising XYZ’s customer list. To
Jack, and the other partners’ surprise, however, customers were paying on time, and
Scott had advised in several partnership meetings that the line of credit remained
untouched. The loan officer assured Jack that the line of credit had been drawn
down and had an outstanding balance of $1.5 million. Jack asked the loan officer
to renew the line of credit for one more year to give them time to sort out what
was really happening at the XYZ.
Jack left his office immediately to drive to the offices of XYZ to talk to Scott
in person. Scott had plenty of explanations, but Jack could not understand them.
At first, he thought that maybe the finances of XYZ were more complicated than
his other businesses because none of Scott’s reasons as to using the line of credit
made sense. Jack called his attorney and explained the situation. The attorney
told Jack that the confusion he felt was warranted; something was not right at
XYZ. The attorney recommended that Jack and the other founding partners hire
a forensic accountant to discover what was truly happening. Jack told the forensic
accountant that he wanted answers to the following questions:
■■ What was happening to all of the revenue being reported to the partners by
Scott to necessitate the use of the line of credit?
■■ Where are other financial issues negatively impacting the company’s
cash flow?
Data Sleuth Fraud Detection Worksheet Example for Case Study 2: Exercise 1
MONEY IN
Source of Funds Payment Type: Checks
People who touch the When and where do If this person stole If funds were
payment from the these people touch funds, where could stolen, how
origination to bank the payment? it happen? would you
deposit know?
People who touch the When and where do If this person stole If funds were
payment from the these people touch funds, where could stolen, how
origination to bank the payment? it happen? would you
deposit know?
Data Sleuth Fraud Detection Worksheet Example for Case Study 2: Exercise 1
MONEY OUT
Use of Funds Payment Type: Checks
People who Who releases the funds If this person stole If funds were
authorize the to pay the expenditure? funds, where could it stolen, how
expenditures happen? would you know?
People who Who releases the If this person stole If funds were
authorize the funds to pay the funds, where could it stolen, how
expenditures expenditure? happen? would you know?
over the five years of business included everything – from the invoicing of cus-
tomers, to the receiving of payments, preparation of payroll, and paying vendor
invoices. Information regarding how funds came into the business and the most
common expenditures include the following.
■■ Sources of funds for XYZ Co. included payments from customers who
are invoiced monthly for services provided. Payments are received via
check and ACH.
Case Study 2: The Case of the Sneaky CFO ◾ 217
TABLE 12.4 Case of the Sneaky CFO Planning Worksheet example for Case Study 2:
Exercise 2.
T HIS BOOK WOULD BE incomplete if I did not allocate at least a few pages to
those cases that did not go as planned or advised. These are most common
when little to no findings are uncovered when the client insists they were
wronged and those when the client’s decisions hinder the effectiveness or com-
pletion of the investigation. Engagements like these are incredibly challenging
because when a client shares their story in the initial client meeting, they are con-
vincing. They are certain that they have been wronged, stolen from, that money
has been hidden from them, or that their sibling has taken more than her fair
share. If the investigator listening to the story is remotely empathetic, she relates
to the client and wants to help him or her find a solution that ultimately feels like
justice to him or her. Everyone leaves the meeting energized to uncover what hap-
pened and help this client take his or her next steps.
It is in the case planning stage that the difficulty begins. The case manager will
prepare the list to request information from the client, and then something
strange happens. The client is either not responsive, or they do not have access to
the information they claimed to be able to provide. It is not that they should have
access and find out they do not – for instance, a business owner who used to be
a signer on all accounts is no longer a signer on the main operating account and
has to work with the bank to prove that he should have access. No – this client
219
220 ◾ The Cases that Went Wrong
actually knows that he does not have the information requested at all; it does not
exist. The client often minimizes the information request and instead wants the
forensic accountant to work CSI magic by entering keywords into a database that
does not exist in the reputable, court-admissible world and put someone in jail –
or at least help him file an insurance claim. But using inadmissible evidence to put
a subject in jail at the direction of a client is not the role of the forensic accountant
or investigator. The role of an investigator is to uncover what actually happened.
If evidence does not exist from which analysis can be performed to identify what
happened, then the client’s problem cannot be solved. No one is going to jail, and
no insurance claim will be filed by the ethical forensic accountant or investigator
if the data do not lead to a finding of fraud.
One interesting observation in client situations like this is that if the scenario
was reversed, and our clients were the defendants, as they sometimes are, they
would be arguing with everything they had that they were not being charged
fairly because of insufficient evidence. They would be outraged if the evidence
proving the allegations did not exceed a preponderance of the evidence or beyond
a reasonable doubt. If someone would not want to be charged with a crime based
on insufficient evidence, then it should not be permissible either when someone
is the victim.
It should always raise a red flag in an investigator’s mind if someone is con-
vinced something happened, but they are not willing to let the evidence and inves-
tigation run its course. This red flag should alert an investigator that professional
skepticism is required in evaluating whether the client knows evidence does not
support their allegations and that the hiring of an investigator is fueled by an
agenda. Although I may want to believe my client, I must maintain professional
skepticism and objectivity, so that I do not get caught up in their story where I
cannot see that I am being tricked. It does not feel good to have to tell someone,
“I’m sorry. We’ve reviewed your allegations and the available evidence, and based
on this evidence, you don’t have a case where we can help you.” However, the role
of an investigator is not to create something from nothing but to uncover what
happened from real, best evidence.
that he knew were necessary. Frank had opened 10 locations over a period of a few
years and needed a break. Nolan was thankful so he could properly begin tracking
inventory and implement consistent policies, procedures, internal controls, and
security systems at each location.
A site audit was performed at each location, including an inventory of all
appliances. This was a challenging audit for Nolan’s team because no one had
counted the appliances when received to ensure what was ordered was delivered.
With the potential for discrepancies known, Nolan instructed his team to per-
form an inventory count of what existed as of the day of the audit. The results of
the count would be compared to the inventory ordered for that location with a
reduction for sales. It was not perfect, but Nolan felt they could get a reasonable
count. For the first few stores, there were a few discrepancies but not so large a
difference that it caused alarm. The day after the fourth store’s audit, the manager
for the on-site audit called Nolan in a panic. After counting and double checking
their calculations, the team had uncovered a discrepancy totaling over $100,000.
Nolan called Frank with the news, and Frank immediately reviewed his insur-
ance policy and called his agent to begin filing a claim. The insurance company
advised that for a loss of this magnitude, they would need to provide certain evi-
dence supporting the claim and that a forensic accountant would review the claim
and evidence. Knowing that this was more detailed than what Nolan had time for,
Frank hired an investigator.
Having learned about Frank’s situation, the forensic accountant prepared a
case plan and a document list requesting the following information for the rel-
evant period:
Frank contacted the investigator weekly to see how the investigation was pro-
gressing. The investigator consistently told him that without additional data or
information clearly identifying who was working when the theft occurred, the
only findings for the report were the analysis and confirmation of the total dollar
amount missing from inventory. The investigator would follow up the phone call
with an email listing the information needed to identify which employees, if any,
had stolen the appliances. Frank was concerned that this would not be sufficient
for the insurance company and pressured the investigator to connect the theft to
one of the employees. The investigator suggested that she visit the site to see if any
of the employees would talk about what they might have witnessed during the
period of alleged theft. Frank agreed; however, when the investigator arrived to
perform interviews, she discovered that Nolan told a few employees the investiga-
tor was coming and was going to get confessions. Needless to say, the employees
who agreed to meet with the investigator would not answer any questions of sig-
nificance. Nolan talked with the investigator at the end of the interviewing day
and claimed he knew who had been stealing the appliances because he had been
gathering intelligence while performing the audit. He provided the investigator
with the employees’ names.
The investigator did not trust the information provided by Nolan. She was
aware that if she had been pressured by Frank to connect the loss to an employee,
he had likely probably pressured Nolan even more intensely. The data provided
were reviewed one more time in an effort to identify any other potential anomalies
that would indicate a connection between the loss and employees, but no indica-
tors were found. The investigator updated a frustrated Frank and advised that she
would prepare a report documenting the loss totals that could be used to make a
claim with the insurance company; however, no employees would be accused or
connected to the theft. The report was completed, and the investigator never heard
from Frank again.
If a client is stolen from and has an employee dishonesty policy or a fidelity
bond, although the purpose is to help the policyholder recover from theft, the
insurance company may have restrictions and limitations regarding types of theft
for which claims will be paid. When this happens, the victim of the theft risks
becoming a possible subject in a fraud investigation himself. Being stolen from
is not justification for committing insurance fraud – or any other type of fraud.
There is an unexplainable pressure when a client has paid the investigation
fees and the results they desired are not attainable because an investigator has
refused to promote an unsupported conclusion. I have found that although the
client was not thrilled with the result of the investigation being less than he hoped,
by providing the results that could be substantiated, I was able to offer some value
and not entirely lose the client relationship.
The Client Who Believes He Was Wronged ◾ 223
■■ Is the bookkeeper the only employee with access to the cash drawer?
■■ Does the bookkeeper submit timesheets and paid time off requests?
■■ Are the bookkeeper’s timesheets approved prior to payment?
■■ Who submits the payroll to the payroll provider?
In response to the questions, the doctor advised that they normally did not
count the cash drawer at the end of the night. The normal practice was to leave
$200 in the drawer and put the remaining cash in a small lockbox to use as petty
cash. The $200 in the drawer was counted only by the bookkeeper, but the cash
in the lockbox was never counted. Additionally, multiple employees were able to
take payments during the day, which sometimes included the bookkeeper. As for
payroll, the bookkeeper was supposed to submit a timesheet, but she never did as
there was no one designated to approve her time. The bookkeeper input everyone’s
time, including her own, into the payroll provider’s client portal for the practice.
The doctor advised that she was supposed to work 30 hours per week and received
two weeks of paid time off per year – none of which could roll over. The doctor
ended the conversation by expressing his sense of betrayal and resulting anger at
the bookkeeper. He wanted the investigator to put the case together quickly and
help him work with law enforcement to have her arrested and sentenced to jail.
Because of the lack of internal controls, and the number of people who had
access to the cash drawer, the investigator advised the doctor that likely there
would not be enough evidence to prove she stole the cash. The investigator rec-
ommended verifying cash, check, and credit card deposits for a short relevant
period of a month to see if there was any data evidence of the theft. As it related
to payroll, once again because of the lack of internal controls surrounding the
bookkeeper’s timesheet, payroll submission, and no employment agreement, the
investigator emphasized that there could be a chance she would not be prosecuted
if the evidence did not support the allegations – especially if the best evidence was
his word against hers.
The doctor still insisted on hiring the investigator, so the investigator pre-
pared a case plan reiterating his concerns about the lack of documentation and
information available. He specifically requested copies of system deposit reports,
carbon-copy deposit slips, bank statements with deposit items, payroll reports, and
any timesheets and calendars that existed.
The analysis results identified in cash deposits, a total of $1,000 was not
deposited to the bank. No discrepancies were identified for other deposit types.
From the payroll analysis comparing the information provided by the doctor to
actual payroll paid, it appeared the bookkeeper had been overpaid by $1,500; how-
ever, when the number of hours worked on her timesheets were compared to her
payroll, there was no discrepancy.
The Client Whose Decisions Affect an Investigation ◾ 225
The investigator called to tell the doctor about the analysis findings. The
investigator reluctantly had to tell him again that although he believed the loss to
be $50,000, the information provided did not support the same. Although it was
possible the cash discrepancy found in the one-month relevant period was due
to the bookkeeper removing cash from deposits, it would be impossible to prove
beyond a reasonable doubt because it was also possible that the cash was placed
in the petty cash lockbox. As for the alleged overpayments of payroll, because the
timesheets supported the hours the bookkeeper was paid, it was going to be a tough
case to support that she should not have been paid those hours because there was
no way to prove that she did not work the hours recorded to the timesheets. The
doctor was furious that the investigator did not have the proof he believed existed
supporting a loss of over $50,000. When asked how the doctor determined the
loss was $50,000, he explained that he based it on what he presumed the balance
of the petty cash lockbox should have been and on verbal agreements as to the
bookkeeper’s time and PTO.
The investigator closed out the case by releasing a report of the findings to the
doctor disclosing the lacking information surrounding the findings.
Clients who are victims of theft tend to believe that the wrong committed
against them must be avenged by having the subject arrested and put in jail at any
and all cost. However, this approach is dangerous because a client will start looking
for loopholes and avenues to force a situation in which the goal is no longer the
truth or the facts surrounding what actually happened, but instead to punish the
subject. A client’s emotional response to the breach of trust in financial investiga-
tions is expected and warranted, but it does not permit the creation of evidence,
facts, or situations just to obtain an outcome they believe fitting for the subject.
When an investigator notices the red flags from a client’s behavior shifting
from “I want to know what happened,” to “This is what happened,” but no new
evidence has surfaced, it is imperative to maintain objectivity, professional skepti-
cism, and to scrutinize the information being provided by the clients. Remain
faithful to the investigation and allow it to work rather than forcing a result a
client wants. Integrity in investigations promotes future repeat referrals; being a
“hired gun” or always advocating for a client no matter the facts is successful only
in the short run.
Sometimes an investigator can follow all the right processes and uncover the most
convincing findings from a financial investigation, but the client may still decide
226 ◾ The Cases that Went Wrong
to ignore the findings. A client may decide, as in “The Case of the Nonexistent
Inventory” in Chapter 4, to not prosecute a financial crime for fear of public expo-
sure or reputation repercussions.
In learning to separate client decisions from our value as professionals, we try
to recognize that we are valuable regardless of someone’s response to our findings.
No matter the action or inaction taken by a client, we will continue to organize,
analyze, and present findings with care because we want to help people uncover
the truth; what they do with the findings is their responsibility.
The Analysis
From the risk-based analysis, the investigator determined that the expenditures
and payroll paid from the company were a lower fraud risk than the deposits
because Jim paid all expenditures and the new employee managed payroll. The
investigator recommended that the top investigation priority focus on revenue
and deposits. The investigator knew that the manufacturing plant site was oper-
ated by a state-of-the-art computer system specific to the industry. The employees
in the plant could not place an order for a customer and begin manufacturing
without the computer recording the details of the order and printing order tickets.
The order tickets were gathered at the plant and delivered to Jenny at the end of
each day. Jenny would then use the order tickets to prepare customer invoices
within a week of the order ticket’s date.
When the investigator learned about the computer system controlling the
manufacturing of products but that the invoices were prepared from a separate,
accounting system, the investigator asked Jim if the two systems had ever been
reconciled. The investigator specifically wanted to know if Jim was certain that the
product being ordered and shipped to customers was actually being invoiced, col-
lected, and invoiced by Jenny. Jim thought about his response longer than expected
and said, “No. I cannot confirm that.”
The investigator prepared a case plan for Jim including a comparative analysis
between the computer export of order tickets to the invoices in the accounting
software. Depending on the results of that analysis, the second step of the analysis
would compare the deposits in the accounting software to the deposits on the
bank statements. Jim approved the plan, but he wanted to limit the relevant period
to only one month.
The investigator started discreetly reconciling the plant computer order reports
to the invoices in the accounting system. The primary reason for working behind the
scenes was that Jim wanted to avoid upsetting Jenny. If she was not stealing from
the company, Jim did not want her to know he had ever doubted her. Comparing the
units of finished goods shipped to the invoices prepared by Jenny, the investigator
realized immediately that Jenny did not have a consistent process when invoicing
customers. Jenny was a very inconsistent bookkeeper, which made the compara-
tive analysis more difficult than it should have been. The investigator knew that if
Jenny was not stealing money, there were going to at least be errors discovered. The
comparative analysis should have been simple in matching order ticket numbers to
invoices; however, Jenny did not consistently log the order ticket numbers on the
invoices. If she had recorded this information, the investigator could have simply
joined the two data sets using the primary key of the order ticket number. However,
the inconsistency resulted in the need to perform a more manual comparison.
228 ◾ The Cases that Went Wrong
After manually comparing the one month’s worth of data between the order
ticket export and the invoices in the accounting system, the investigator identi-
fied a large number of transactions exceeding $20,000 that did not reconcile. The
plant computer system showed $20,000 more ordered than Jenny had invoiced.
The investigator called Jim to explain the results of the analysis. Jim responded,
“That’s impossible. I can’t be missing $20,000 from one month. It’s just a timing
issue. Isn’t that a thing?” Despite the numerous attempts to explain the investiga-
tion’s results, Jim argued with the investigator and refused to consider that there
was a problem.
The investigator provided Jim two options:
The Interview
Jim told Jenny the investigator was going to be arriving to ask her questions about
a reconciliation. So, when the investigator arrived, Jenny was not happy to see her.
Jenny bluntly said, “I am way too busy for this. I don’t have time for an auditor.”
While the investigator sat at Jenny’s desk, Jenny made herself appear busy shuf-
fling papers, answering phones, yelling and chatting with neighboring employees,
and kept stating how she was overworked.
Finally, the investigator calmly advised of the purpose of her visit and began
to ask questions regarding the invoicing anomalies. For each one, Jenny would
respond with one of the following reasons:
■■ “I’m just so busy, sometimes I make mistakes. Tell me what they are, I’ll
make notes and go fix them later.”
■■ “Oh, that’s no big deal.”
■■ “I’ll research it and get back with you.”
More than likely it was a mistake, but I’ll need to get with the salesman. He’s not
here, and I need to leave to pick up my kids.”
And that was it.
This vision is not linear but circular. As empowered professionals in turn bring
the problem-solving capabilities of the Data Sleuth Process to more clients and
industries, they will uncover more fraudulent activities that were previously con-
cealed. With each revolution of the cycle, the Data Sleuth Process becomes more
applicable, more accessible, more user friendly, more technologically advanced,
more efficient, and simpler, amplifying its usefulness to a broad user group in both
private and public sectors. (See Figure 14.1.)
The Data Sleuth Process is the future of financial investigations. It is a
convergence of forensic accounting, fraud investigation, and data analysis
231
232 ◾ Data Sleuth Expansion
The Data Sleuth Process provides a roadmap for those who are not familiar with
accounting, to be able to quantify losses in embezzlement or find hidden assets
using financial information. Even though the Data Sleuth Process explained in
this book focuses on the forensic accountant or financial investigator, many inves-
tigations can be worked by non-accountants. It is through the combination of
the most common data sources (i.e. bank statements, credit card statements, and
payroll reports) and the standard Data Sleuth analyses that fraud is uncovered
Data Sleuth Empowers the Curious ◾ 233
experience. Such a process allows the expert investigator’s time to be spent only
in the areas required, which may include business development, training the team,
and ideation of other uses. At the same time, a higher-quality work product and
solution for the client is being produced. With a process easily replicated from
investigation to investigation, then professional services firms and law enforce-
ment agencies can create Data Sleuth divisions to further improve investigations
for clients and the public at large.
Through the adoption of the Data Sleuth Process, public accounting firms have
an opportunity to create a Data Sleuth division that could operate seamlessly with
other service offerings. What once may have felt like the Wild West, which would
necessitate reliance on a professional’s experience in investigation decision mak-
ing, using the Data Sleuth Process, forensic accounting and fraud investigation
workflows can be structured similarly to those of tax preparation and external
audit engagements.
■■ Client intake
■■ Project planning and procedure development or improvement
■■ Tax preparation or audit procedures
■■ Detail review
■■ Final review and release of tax return or audit report
The Data Sleuth Process gives management a starting point to bring structure
to forensic accounting engagements. It provides a bridge between fraud investiga-
tion theories and their practical application and execution. This bridge empowers
all members of the team to make decisions, pertaining to their area of involve-
ment, in a logical, methodical manner guided by the prioritization of best evidence
and application of reliable analysis procedures that promote consistency in work
products and the ability to conduct a quality review of the analysis of other team
members prior to issuing a report.
Integrating the Data Sleuth Process into a public accounting firm also allows
professionals interested in this type of work to allocate their time across a vari-
ety of interesting projects. Because forensic accounting and fraud investigation
engagements cannot be predicted or structured with deadlines, reluctance to add a
forensic accounting service offering is understandable. However, dividing forensic
accounting tasks across team members allows everyone to fulfill their primary
work responsibilities while applying their skills to a unique consulting engagement
236 ◾ Data Sleuth Expansion
Consulting and advisory firms often provide many diverse service offerings to cli-
ents creating a perfect opportunity to establish a Data Sleuth division to support
the numerous specialized consultants. Many large consulting and advisory firms
have been adding forensic accounting and fraud investigation to their list of client
services by employing professionals with financial investigation experience. The
firm may provide support personnel to handle administrative duties, but most of
the work is performed by the professionals in the manner preferred by that pro-
fessional. The client services from professional to professional vary in execution
because the professionals have differing opinions on the best way to serve each
client. Clients generally accept varying results from financial investigators and
forensic accountants, but there is a better way.
Consistency in the investigation process, using the Data Sleuth Process, would
allow consulting firms to offer reliable, scalable financial investigation services in
The Case of the Phony Professional ◾ 237
which revenue from the services is not dependent on the varying methods of inde-
pendent professionals and capped by their individual availability. Additionally, the
risk of unsatisfied clients would also decrease as there would be greater quality
control throughout the entire project.
Implementing the Data Sleuth Process within a consulting firm allows the
collaboration of forensic accountants, investigators, and other subject matter
experts, such as open-source intelligence, surveillance, due diligence, and other
expertise to provide complementary services to clients. Some of my favorite inves-
tigations are those we have worked jointly with other specialized investigators to
provide a comprehensive solution to the client’s concerns.
Professional Engineers Oil and Gas, Co. (PEOG) provided professional engi-
neering and programming services for oil and gas construction projects. It was a
customary practice for companies, like PEOG, to bid on jobs with the intention
to collaborate and hire subcontractors. PEOG was awarded a large project, and
in order to provide a cost-effective and timely completion for their client, they
subcontracted to a small engineering firm owned by Caleb. The managing part-
ner of PEOG had been introduced to Caleb a year earlier by a mutual contact.
Caleb provided his resume to PEOG, which stated he had earned a PhD in two
engineering disciplines. The resume also indicated that Caleb held a professional
engineering license.
PEOG and Caleb prepared an estimate for the client’s project in the amount
of which Caleb’s budget would consist of 40% of the total project hours. However,
only one month after the project began, Caleb exceeded his budget and billed
PEOG for all of the hours allotted to both Caleb and PEOG combined. Two
months into the project, PEOG’s client placed a hold on the invoices and all
payments as the allotted hours far exceeded the scope and agreed upon budget.
PEOG met with Caleb to discuss the budget overrun and to strategize about
how to complete the project. Caleb insisted that his time was accurate and that
he would not discount his future time on the project. In fact, if the PEOG’s client
demanded a discount from him, Caleb would quit the job entirely. Oddly, Caleb
continued to work on the project and to send excessive billings to PEOG for three
more months even though he knew the client was refusing to pay outstanding
invoices. After the third invoice, PEOG demanded to exercise their contractual
right with Caleb to audit his company’s books and records, but on the same day,
Caleb issued a payment demand letter to PEOG. After many phone calls between
PEOG’s managing partner and Caleb, a mutual agreement was reached. If Caleb
238 ◾ Data Sleuth Expansion
allowed the audit, depending on the outcome of the audit, then PEOG would
consider paying the outstanding invoices.
PEOG hired a forensic accountant to perform the contractual audit, but after
multiple requests for information from Caleb, the forensic accountant knew she
should recommend the use of other specialized investigators. The client agreed to
the collaborative assistance of a private investigator to perform surveillance and
an open-source intelligence investigator. PEOG was concerned that Caleb would
not actually cooperate with the audit and would instead begin shredding all per-
tinent information. To address this concern, the private investigator specializing
in surveillance began monitoring Caleb’s home and office locations. At the same
time, the open-source intelligence investigator began researching Caleb’s history.
Caleb’s business website listed all kinds of engineering services and boasted
pictures of a beautiful office and engineering team, but from surveillance activities,
the team discovered that Caleb did not actually occupy an office but rather did
all of the work from his home. This caused serious doubt about the existence of
an actual team. Further online research uncovered evidence that Caleb had been
outsourcing the engineering work overseas and was not performing the work him-
self. Thus, an unlicensed individual from another country was producing the work
Caleb claimed to be his. A search of the Secretary of State website identified that
the company Caleb claimed he owned and represented was delinquent in its regis-
tration by several months and was never current while working on this large project.
The investigation team noticed that representations made by Caleb to PEOG
were not supported by evidence uncovered through the research. Contacting each
school on Caleb’s resume, one of the investigators requested to verify Caleb’s
purported degrees. None of the schools were able to verify his attendance as he
had never attended any of the universities. Using public records and investigative
databases, the team also discovered that two years prior, Caleb had been charged
with multiple counts of “obtaining property under false pretenses” for making
unauthorized purchases of tires and sporting goods for his personal use with his
previous employer’s funds. Then in the following year, he had been charged with
one count of “obtaining property under false pretenses,” because he had purchased
computers under his employer’s name, for which he did not have authorization
to represent or to make purchases. The computer vendor billed the employer, but
Caleb never returned computers.
While researching and surveilling, the client advised that when cleaning out
a temporary office they had loaned Caleb, the client discovered a professional
engineering stamp in his desk drawer. The stamp listed his full name and a license
number. Using the state licensing website for engineers, a search for the license
number was run revealing another person’s name. Caleb had ordered a fake pro-
fessional engineering stamp listing his name using an actual licensed professional
engineer’s license number.
Law Firms ◾ 239
The evidence that Caleb had been defrauding PEOG and PEOG’s client
kept mounting, and by interviewing individuals connected to open-source intel-
ligence findings, it became increasingly apparent that Caleb was a serial fraudster.
A police report was filed about the incident, as PEOG had to absorb the payments
they had paid to Caleb. Law enforcement advised PEOG that because Caleb’s
relationship to them was as a contractor and because of the use of a fake profes-
sional engineering license that the case should be filed civilly instead of charging
criminally. A report of the surveillance and research findings was provided to the
client, should they decide to file a civil case, but the most effective use of the report
was to stop the incessant demands of Caleb to pay the outstanding invoices.
Once the financial investigator realized that the client was not going to
receive the requested documentation for the audit, collaboration among a team
of specialized investigators provided an opportunity for the client to still gain
valuable evidence and information despite the inability to perform the audit-like
procedures as initially hired.
LAW FIRMS
LAW ENFORCEMENT
Some law enforcement agencies have created financial crime units and task forces
to investigate financial crimes; however, because of the size and complexity of
some of the cases, and the ever-growing workload, analyses of the information can
take months if not years. The Data Sleuth Process would allow even nonfinancial
investigators to perform much of their data analysis without solely relying on the
limited capacity of financial analysts. Additionally, the Data Sleuth Process could
improve the efficiency of financial analysts and support personnel to work through
outstanding cases more quickly. The support of financial investigations provided
through a Data Sleuth division would increase the timeliness of help to victims of
financial crimes and better serve the public at large.
The Data Sleuth Process is just the beginning of addressing clients’ concerns with
accuracy, specificity, and consistency. Advancement of the Data Sleuth Process
uncovers facts that answer client questions by connecting the power of data ana-
lytics with the curiosity that drives investigations. As Data Sleuth grows, it will
continue to look for ways to seamlessly connect fraud investigation theories and
practical application. Using the standardized data analysis process that leverages
technological improvements, investigators everywhere can implement the Data
Sleuth Process to provide data-supported answers to the clients in their commu-
nities. As more professionals embrace and implement the Data Sleuth framework,
we will continue to invest in the technology that will further improve the way the
Data Sleuth Process can be sued by professionals. As more people use the process
and benefit from the results, more clients will trust the process and will see the
benefits of incorporating it as a preventative solution to detect fraud before a fraud
loss is astronomical.
Whether an organization has a robust fraud prevention program or not, the Data
Sleuth Process can be adapted as an ongoing fraud detection measure. If an inves-
tigation can be performed using data within the Data Sleuth Process to uncover
what happened, then that same process can be used on a regular basis to test for
the same anomalies and findings – preferably before the loss closes a business,
causes layoffs, or results in a family losing their investment.
Licenses, Credentials, and Professional Development ◾ 241
The case plan for “The Case of the Disappearing Business” addressed three of Eric’s
primary questions concerning Denise and the missing money. For each question,
Denise’s access to funds and systems should have been considered in determin-
ing the investigation priority for the investigator. To complete the p lanning, the
analyses required to address the investigation priorities must be determined fol-
lowed by the identification of the best available data and evidence to be requested
for the relevant period of July 15, Year 2 through February 28, Year 6.
If the sales were as great as Denise reported to Eric, why was there not enough
money in the bank account to cover payroll? If the deficit in the bank account was
due to theft, how much did Denise steal?
■■ Denise’s Access to Funds and Systems. Denise had access to the point-of-
sale software, which gave her the ability to control the recording of the funds
in the system.
■■ She could choose to record some, but not all, of the sales.
■■ She could skim cash payments, or remove cash from deposits before they
were recorded, taking only the checks to deposit to the bank.
■■ Denise could open a bank account in a tradename similar to that of the
retail store name, (i.e. Denise doing business as Retail Store Name), which
would allow her to divert check payments.
■■ She could set up a separate credit card processing account to process credit
cards instead of using the account connected to the point-of -sale software.
■■ Not only did Denise have full control over the sales and collections
process, but because of the mother/daughter relationship of Denise and
243
244 ◾ Appendix: Case Study Exercise Solution Recommendations
Mandy, the risk of the theft of funds from sales was not mitigated by any
segregation of duties between employees.
■■ Investigation Priority. Quantify any losses related to deposits and revenue.
This investigation priority could be further categorized by type of payments
such as cash, check, or credit card because the business was a retail store, and
all types of payments could be at risk.
■■ Analysis. Compare sales recorded to the point-of-sale software to the depos-
its to the bank account. The analysis could be divided by payment type: cash,
check, and credit card.
■■ Data Sources. The investigator should request point-of-sale sales reports and
bank statements with deposit items.
The Data Sleuth Fraud Detection Worksheet prepared for “The Case of the
Sneaky CFO” found the following risk areas needed to be further examined and
incorporated into the case plan.
Appendix: Case Study Exercise Solution Recommendations ◾ 245
Money In
■■ Scott’s access to systems and funds. Scott invoiced the customers, retrieved
the payments from the mail, recorded the invoices to the accounting system,
and deposited the payments to the bank account.
■■ If Scott stole check payments, how could it have happened? With Scott
controlling the entire process, the risk of theft existed in that he could delete
invoices when payments were received and deposit the checks to a bank
account that only he could access. He could also invoice outside of the system
and have payments mailed to a post office box or his home and avoid the
company altogether.
■■ If Scott stole the ACH/electronic payments from customers, how could it
have happened? Whether Scott used the XYZ accounting system to invoice
customers or not, he could have stolen ACH, or electronic payments, by
directing customers to send payment to a bank account to which he alone
had access.
■■ If funds were stolen, what are the data sources that would help confirm or
deny Jack’s suspicions? A user audit log from the accounting system may
identify if invoices and/or customer payments were recorded to the system
and then subsequently deleted. A comparative analysis of hours worked by
employees on each customer’s job in a month could be compared to the hours
invoiced to the customer. If a customer was not invoiced and should have
been, further investigation may be warranted. For all invoices for which pay-
ments were recorded to the system, the bank account should be examined for
subsequent deposits.
Money Out
■■ Scott’s access to systems and funds. Scott was a signor on the operating
bank account for XYZ Co. As part of his responsibilities, he initiated all pay-
roll disbursements whether through a payroll processor ACH/direct deposit
or via check. He paid all vendor invoices using both checks and ACH.
He also initiated all distribution payments to the partners using check and
ACH payments.
■■ If Scott stole money using the payroll process, how could it have happened?
With Scott controlling the entire payroll process, the risk of theft existed
in that he could pay himself more than the agreed upon salary, bonuses, or
through unsubstantiated expense reimbursements.
■■ If funds were stolen through the payroll process, what are the data sources
that would help confirm or deny Jack’s suspicions? Payroll reports for the
246 ◾ Appendix: Case Study Exercise Solution Recommendations
entire period should be requested from the payroll processor and examined
for additional payments to Scott through salary, bonuses, or unsubstantiated
expense reimbursements.
■■ If Scott stole money using checks or ACH payments from the bank
account, how could it have happened? Scott could simply write checks or
send ACH payments to himself or LLCs he fully controlled disguised as
vendor payments.
■■ If funds were stolen, what are the data sources that would help confirm
or deny Jack’s suspicions? Bank statements and supporting information for
ACH/electronic payments could be requested from the bank and reviewed
for expenditures not benefiting XYZ Co.
■■ If Scott stole money using line of credit advances, how could it have hap-
pened? Scott could have advanced funds to a bank account he controlled that
had a similar account name to that of XYZ Co. Then he could have spent the
advanced funds from there for personal expenditures.
■■ If funds were stolen using loan advances, what are the data sources that
would help confirm or deny Jack’s suspicions? Loan activity or history state-
ments could be requested from the bank. All advances could be compared to
the known XYZ Co. bank accounts to confirm whether all the loan advances
were deposited to the operating account.
Although there are many areas of fraud risk for XYZ Co. with such little
oversight, the paths of least resistance are the areas given the highest risk and
investigation priority.
The case plan for “The Case of the Sneaky CFO” addressed two broad concerns for
the client, Jack. For each question, using the findings from the Data Sleuth Fraud
Detection Worksheet evaluating Scott’s access to funds and systems, preparing a
case plan should identify the analyses required to address the investigation priori-
ties. Then to perform the analyses, the identification of the best available data and
evidence will need to be requested for the relevant period of five years.
What was happening to all of the revenue being reported to the partners by
Scott to necessitate the use of the line of credit?
should prioritize the areas of fraud risk from simplest to most complicated
method(s).
■■ Investigation Priority. Determine if revenues are being diverted to bank
accounts controlled by Scott. Quantify any findings.
■■ Analysis. Review user audit logs for deleted invoices and/or deleted customer
payments. Compare the expected revenue from customers to actual revenue
deposited to the operating account. Compare hours worked on jobs to hours
invoiced to customers.
■■ Data Sources. The investigator should request an accounting system backup
if available. Otherwise, request the specific reports listing detailed customer
accounts receivable, user audit logs, and invoices. A report listing employee
hours by job should be obtained as well as customer contracts. Bank state-
ments with deposit items should be requested.
Where are other financial issues negatively affecting the company’s cash
flow? Expenditures.
Where are other financial issues negatively affecting the company’s cash
flow? Loan funds.
249
About the Website
D
■■
ATA SLEUTH® WORKSHEETS AND resources have been made available for
download to readers of Data Sleuth: Using Data in Forensic Accounting
Engagements and Fraud Investigations at www.datasleuthbook.com.
Bench trials, jury trials vs., 7 of the Unreconciled Cash Drawer, 225–227
Benefit: where client believes he was
in fraud formula, 58 wronged, 221–227
in referrals to law enforcement, 202 Case managers, 81
Benford’s analysis, 172–174, 174f Case planning, 35. See also Data
Benford’s Law, 172–173 Sleuth Case Plan
Budget(s): analysis work papers in, 196
and data processing, 145 and clients who believe they were
and relevant period, 138–139, 139t wronged, 221–222
Burnout, 13–14 and evolution of forensic accounting, 44–45
Business coach, 14, 15 professional experience in, 236
Business development, 8 with teams, 15–17
Cash:
Case(s): Case of the Cash Back Payroll Scheme,
of the Cash Back Payroll Scheme, 45–47, 45–47, 96–99, 97t, 155
96–99, 97t, 155 Case of the Cash Flow Fiasco, 155–158, 157f
of the Cash Flow Fiasco, 155–158, 157f Case of the Mom of the Year, 118–126,
with clients whose decisions affect 120t, 124t
investigations, 227–231 Case of the Puzzling Entries, 106–117, 108f,
Data Sleuth Analysis Framework for, 109t–110t, 112f, 114t
91, 91f (See also Data Sleuth Analysis Case of the Unreconciled Cash Drawer,
Framework) 225–227
of the Disappearing Business, 211–215, 215t focusing on sources and uses of, 105–107
of divorce, 91–94, 94f money in, 107–111, 108f, 109t–110t
of the Duplicate Payroll, 85–87, 98–104, money out, 108f, 111–115, 112f, 114t
103f, 104f Cash Back Payroll Scheme, Case of the, 45–47,
of economic damages, 93–96, 95f 96–99, 97t, 155
of embezzlement, 15, 22, 53–54, 91, 91f Cash Flow Fiasco, Case of the, 155–158, 157f
of estate disputes, 89–90, 90f CFE Code of Professional Standards, 28
of the Gambling Executive Director, Checks:
48–51, 134, 136 check kiting schemes, 59
of the Inaccurate Insurance Claim, 222–225 converted into account schedules, 145
of the Initial Client Meeting, 72–75 written to self, 153
of the Limited Payroll Records, 190–191 CID (Internal Revenue Service Criminal
of the Man Cave, 66–69, 67t, 133, 163, 164 Investigation Division), 69, 199
of the Missing Inventory, 36–37 Civil defense cases, 22
of the Mistaken Divorcee, 26–27 Civil lawsuits:
of the Mom of the Year, 118–126, Case of the Man Cave, 66–69, 67t, 133,
120t, 124t, 162 163, 164
of the Next-Day Deposition, 34 end-clients in, 22
of the Nonexistent Inventory, expert reports for, 202–203
55–58, 133, 228 preparing findings in anticipation of, 88
of the Overlooked Loss, 80–81 recovery with, 65–66, 76
of the Overpaid Administrator, 193 reports for, 198, 202–203
of the Overworked Office Manager, 228–231 Client(s):
of partnership disputes, 91, 92f balancing objectivity with
of the Phony Professional, 239–241 expectations of, 25–28
of the Puzzling Entries, 106–117, 108f, cases where client believes he was
109t–110t, 112f, 114t wronged, 221–227
of the Reimbursing Controller, 22–24 communicating concerns of, to team, 16–17
of the Sentencing Hearing, 28 communicating with (see Client
of the Sneaky CFO, 215–220, 217t, communication)
218t, 220t educating, 71
◾
Index 255
as expert witnesses, 235 (See also Expert IDF analysis, see Interesting Data
witness(es)) Findings analysis
imposed deadlines for, 8 IDF (Interesting Data Findings) Summary,
review problem for, 12–13 177, 178t
scalability problem for, 9–10 Inaccurate Insurance Claim, Case of the,
strategy problem for, 10–12 222–225
sustainability problem for, 13–14 Income sources, identifying, 127
technical and strategic skills of, 4–5 Initial client meetings, 72–75. See also
thoroughness and efficiency of, 5–6 Onboarding clients
types of problems encountered by, 8–9 Case of the Initial Client Meeting, 72–75
use of term, 4 in Case of the Sneaky CFO, 217–219
Forensic accounting: Inquiry calls, 73, 74
convergence of fraud investigation, data Insurance reimbursement:
analysis, and, 233–234, 235f Case of the Inaccurate Insurance
engagements in, 2–3, 13 (See also Claim, 222–225
Engagements) expert reports for, 203–204
Formats, for data and information, 78 as recovery avenue, 66, 76
Formula, fraud, 58 reports for, 198, 203–204
Fraud, 15 Intent, in fraud formula, 58
detecting risk of, 43 (See also specific topics) Interesting Data Findings (IDF) analysis,
end-clients in cases of, 22 171–178, 210–211
finite number of approaches to, 15 Benford’s analysis, 172–174, 174f
formula for, 58 client feedback in, 79–80
means for detecting, 42–43 creating summary of, 177, 178t
preventing, 242–243 even-dollar amounts, 173, 174
punishments for, 75 extracting detailed transactions from Source
Fraud formula, 58 and Use Summaries, 175
Fraud investigation, convergence of forensic large individual payments, 175
accounting, data analysis, and, 233–234, month-over-month pivot tables, 175, 176t
235f. See also Investigation(s) from Source and Use Summaries, 165
Funnel of information and data, 31, 33f standard tests for, 172
using accounting records in, 176–177
Gambling Executive Director, Case of the, Interesting Data Findings (IDF)
48–51, 134, 136 Summary, 177, 178t
General liability policies, 66 Internal controls:
Ghost employees, 182–190, 184t, for fraud prevention, 243
185t, 187t–189t in risk-based analysis, 105, 118
duplicate social security numbers, testing for, 42
183, 184t Internal Revenue Service Criminal Investigation
employee records with duplicate addresses, Division (CID), 69, 199
186, 187t–188t Interviews. See also individual cases
employee records without addresses, 183, 185t key, 35, 36f
"indicators" in, 182–183 in risk-based analysis, 115–117
number of employees, 183 subject, 31, 39, 55
Goals: Inventory:
of client, 63 Case of the Inaccurate Insurance
of criminal investigations, 202 Claim, 222–225
Case of the Missing Inventory, 36–37
Hidden bank accounts, 75, 76 Case of the Nonexistent Inventory,
"Hired guns," 27, 63 55–58, 133, 228
Hostile witnesses, 13 Investigate, definition of, 60
260 ◾ Index
Investigation(s). See also Engagements Law firms, Data Sleuth Process for, 241
building a process for, 15–16 (See also Data Legal knowledge, 7
Sleuth Process) Legitimacy of allegations, verifying, 62–63
client expectations vs. objectivity in, 25–28 Licensing of investigators, 243–244
client involvement in, 71, 78–81 Limited Payroll Records, Case of the, 190–191
clients’ priorities in, 86 Loan documents, 155
clients who believe they were Loan fraud:
wronged, 221–227 Case of the Cash Flow Fiasco, 155–158, 157f
client whose decisions affect, 227–231 Case of the Sneaky CFO, 215–220, 217t,
cost of, 44 218t, 220t
decision tree for, 60–63, 61f end-clients in cases of, 22
identifying purpose of, 59–60 relevant period for, 137
law enforcement agencies handling, 199–200 Local police departments, 200
obtaining best evidence in, 31 Loss calculations:
prelitigation, 179 Case of the Overlooked Loss, 80–81
priorities in, 17, 98–99 for criminal prosecution, 64
risk focus in audits vs., 118
types of, 21–22 Man Cave, Case of the, 66–69, 67t,
Investigation decision tree, 60–63, 61f 133, 163, 164
Investigation priorities: Marketing, 8
of clients, 86 Memos, as qualitative data sources, 134–135
in Data Analysis Plan, 98–99 Misappropriation of assets:
team’s planning for, 17 as common scheme, 43
Investigator(s). See also Forensic accountants in estate and trust disputes, 128
areas of expertise of, 60, 62 Missing Inventory, Case of the, 36–37
as "hired guns," 27, 63 Mistaken Divorcee, Case of the, 26–27
licenses, credentials, and professional Mobile deposits, for Source and Use
development for, 243–244 Summaries, 162
use of term, 4 Mom of the Year, Case of the, 118–126,
Invoices from customers, 39 120t, 124t, 162
Month-over-month pivot tables, 175, 176t
Jury trials, bench trials vs., 7
Need for Data Sleuth Process, 41–51
Key interviews, in Data Sleuth Process, 35, 36f Case of the Cash Back Payroll Scheme,
Knowledge: 45–47, 155
range of, 7 Case of the Gambling Executive Director,
in Rumsfeld Matrix, 11–12, 11f 48–51, 134, 136
and evolution of forensic accounting, 44–45
Large individual payments: and forensic accounting engagements
as Interesting Data Finding, 175 vs. external financial statement
in payroll analysis, 192 audits, 42–43
in risk indicator analysis, 180 to start with evidence, not the scheme, 47–48
Law enforcement cases: Next-Day Deposition, Case of the, 34
for all fraudulent acts, 77 Nonexistent Inventory, Case of the,
arrests in, 75 55–58, 133, 228
for criminal prosecution, 64–65 Nonstandard data sources:
Data Sleuth Process for, 242 defined, 132
interview procedures in, 35 for quantitative evidence, 132–134
private sector investigations vs., 58 Normalizing payees, 151
reports for referral for, 198, 201–202, 201t Notes, as qualitative data sources, 134–135
◾
Index 261
Real people, effects of investigations on, 54–55 Case of the Overworked Office Manager, 229
Real property, identifying, 127 Case of the Puzzling Entries, 106–117, 108f,
Receipts, as qualitative data sources, 135 109t–110t, 112f, 114t
Recovery avenues, 63–66 in Data Sleuth Process, 34–35
civil proceedings, 65–66, 76 in divorce cases, 126–127
for complete recovery, 76 in estate and trust disputes, 128
criminal prosecution, 64–65, 76 evaluating subject’s access through, 86–88
insurance reimbursement, 66, 76 money in, 107–111, 108f, 109t–110t
investigation focused on, 63 money out, 108f, 111–115, 112f, 114t
reports that can be used in, 198 and risk focus in audits vs. in
Reimbursing Controller, Case of the, 22–24 investigations, 118
Relevant period, 100, 136–139, 139t, 159 Risk indicator analysis, 172, 177, 179–181,
Reports, 195–196, 198–205 181t, 211
avoiding confusion with, 64 example for using, 179–181, 181t
for civil litigation, 198, 202–203 for overpayment of payroll, 193
consistency between Findings steps in, 179
Summary and, 204 Rumsfeld Matrix, 11–12, 11f
for criminal charges, 198–201
for expert testimony, 198 Scalability, 1–2
for insurance reimbursement, 198, 203–204 Data Sleuth Process solution for,
for law enforcement referral, 198, 14–16, 236–237
201–202, 201t as problem for forensic accounts, 9–10
multiple versions of, 198–199 Secret Service, 199
organization recommendations for, 204–205 Segregation of duties, for fraud prevention, 243
payroll, procuring, 78 Sentencing Hearing, Case of the, 28
professional and nonprofessional Shareholder dispute cases, end-clients in, 22
involvement in, 236 Sherlock Holmes, 24
Research: Skills for forensic accountants, 4–14
additional data sources and evidence, 37–39 accounting and legal knowledge, 7
open-source, 36–37 business development, 8
Restitution, 76 detail orientation and communication
Results, data-driven, 24 skills, 6–7
Review: learning, 59
by case manager, 81 to meet imposed deadlines, 8
of Data Sleuth Case Plan, 209–210 technical and strategic skills, 4–5
of Data Sleuth data processing, 210 thoroughness and efficiency, 5–6
Data Sleuth Process solution for, 18 Sneaky CFO, Case of the, 215–220, 217t,
of Findings Summaries, 196 218t, 220t
as problem for forensic accountants, 12–13 Social security numbers (SSNs),
professional and nonprofessional duplicate, 183, 184t
involvement in, 236 Source and Use Summary(-ies), 154,
of standard Data Sleuth analyses, 210–211 158–170, 210
Risk: for bank account, 159–166, 160t–161t
and categorization approaches, 81 client feedback for, 80
as focus in audits vs. in investigations, 43, 118 for credit card account, 167–170, 168t
reduced, with client involvement, 71 extracting detailed transactions from, 175
Risk-based analysis, 105–128 Spreadsheets:
accounting records and interviews for comparative analysis, 154
in, 115–117 for document inventory, 140–142, 141t
benefits of, 117 as qualitative data sources, 135
Case of the Mom of the Year, 118–126, for Source and Use Summaries, 159–165,
120t, 124t, 162 160t–161t
◾
Index 263