Uploaded by austin.ude01

ACC822 ASSIGNMENT ON FORENSIC ACCOUNTING

advertisement
ACC 822: FORENSIC ACCOUNTING
Assignment Submitted
By
Austin Sams Udeh
VPG/PHD/ACC/22/8790
Table of Contents
1.0 INTRODUCTION ..................................................................................................................... 3
2.0 Section A: .............................................................................................................................. 4
Green Flag, Differences between Forensic accounting and auditing, Importance
of forensic Accounting and Stages in Investigation of financial crimes. .................. 4
2.1 Green Flag in Forensic Accounting ............................................................................... 4
2.2 Forensic accounting and auditing ................................................................................ 4
2.3 Importance of Forensic Accounting ............................................................................. 5
2.4 Stages in Investigation of Financial crimes .................................................................. 5
3.0 Section B: Techniques used by Forensic Accountants, Red Flags, and
Procedures Adopted for detecting Fraud in respect of Sales and Cash Theft ........ 8
3.1 Four Main techniques used in detecting fraud .......................................................... 8
3.2 Red flags in forensic accounting .................................................................................... 9
3.3 The procedures adopted in detecting fraud in respect of Sales fraud and
cash theft ................................................................................................................................... 10
3.4 Elements of an Investigation Report. ........................................................................... 10
3.5 Forensic Accountant and Discovery of Hidden Assets .......................................... 11
4.0 Section C: The Concept of Evidence, Types of Evidence, Principles of Forensic
accounting, Whistleblowing Policy, Importance of Whistleblowing and Recent
case of Whistleblowing in Nigeria....................................................................................... 13
4.1 The concept of evidence in forensic accounting investigation ......................... 13
4.2 The principles of forensic accounting? ...................................................................... 13
4.4 Whistleblowing and Whistleblowing Policy in Nigeria. ........................................... 15
4.5 Importance of Whistleblowing policy ......................................................................... 16
4.6 Recent Case of Whistleblowing in Nigeria ................................................................ 16
5.0 Section D: Money laundering process, Phases in Money Laundering Process,
and Notable Cases of Money Laundering in Nigeria. .................................................. 17
5.1 Money laundering process ............................................................................................ 17
5.2 Money laundering Phases and Process ..................................................................... 18
5.3 Notable Cases of Money Laundering in Nigeria ..................................................... 19
References ................................................................................................................................. 20
1.0 INTRODUCTION
Forensic accounting represents an interdisciplinary domain encompassing a
spectrum of accounting, investigative, and legal dimensions. Nonetheless,
diverse interpretations of this field arise among experts and institutions, leading to
multiple viewpoints in the existing literature. As articulated by Hopwood, Leiner,
and Young (2008), forensic accounting involves the utilization of analytical and
investigative skills to address financial matters adhering to court-mandated
standards1(see figure 1 below for domain of forensic accounting).
Figure 1: Domain of forensic Accounting
In a separate context, Dhar and Sarkar (2010) delineate forensic accounting as
the application of accounting principles and techniques to legal quandaries,
necessitating meticulous reporting that establishes the culpability of fraud,
subsequently serving as substantiating evidence in legal or administrative
proceedings2. This discipline embodies distinct models and methodologies of
investigative procedures oriented towards assurance, attestation, and advisory
perspectives, culminating in the generation of legal evidence. This assignment is
structured into four sections as presented below.
1
2
https://www.cpestore.com/pdf_courses/AA1245032/AA1245032_1378736012_book.pdf
http://inet.vidyasagar.ac.in:8080/jspui/bitstream/123456789/996/2/p8.pdf
2.0 Section A: Green Flag, Differences between Forensic accounting and auditing,
Importance of forensic Accounting and Stages in Investigation of financial crimes.
2.1 Green Flag in Forensic Accounting
In forensic accounting and fraud investigation environment, green flag stands as
an indication or cue that diverges from the typical manifestations of fraud, whitecollar misconduct, or any factors that could pose harm to the organization's
interests. Conversely, there are alternative indicators that, although suggesting
the potential presence of fraud, do not trigger immediate alarm. Instead, they
might engender a heightened sense of confidence and ease in circumstances
that might harbor fraudulent activity. These indicators are aptly termed 'green
flags'. The emergence of green flags can prove instrumental in identifying subtle
anomalies or irregularities that, while seemingly innocuous or potentially
beneficial, warrant closer examination.
Some of the typical examples of green flags in forensic accounting include but
not limited to the following;
•
•
•
•
Maintenance of excess cash without any shortage.
Unexpected windfall income in certain months.
Unusually high return provided by an investment.
Company performing very well when the overall industry is in slump.
2.2 Forensic accounting and auditing
There is a tightly interwoven link binds forensic accounting and auditing, both
firmly rooted within the expansive domain of finance and accounting. While these
professions share a connection to financial management, they diverge in their
objectives, scopes, and methodologies. Importantly, the pivotal distinction
between forensic audits and accounting resides in the core essence of their
goals. Forensic accounting focuses on exposing and addressing fraud committed
against a business entity. Conversely, forensic auditing zeroes in on fraudulent
activities originating from within the very organization itself3. This dichotomy directs
forensic audits toward the realm of financial statement fraud, while the
landscape of forensic accounting encompasses the mastery of investigative
techniques and technological adeptness. Additionally, the purview of forensic
accounting extends to the identification and analysis of financial transactions to
ascertain their adherence to accounting principles and industry standards. On
the other hand, the realm of auditing encompasses the evaluation of an
organization's financial statements to ensure their alignment with generally
accepted accounting principles (GAAP)4. Moreover, both forensic accounting
and auditing share analogous methodologies, encompassing the thorough
examination of financial documents, records, and digital data. However, the
canvas of forensic accounting extends further to encompass investigative
3
4
https://indiaforensic.com/forensic-audit-vs-forensic-accounting/
https://ijcrt.org/papers/IJCRT2304973.pdf
methodologies, encompassing the interrogation of witnesses, meticulous scrutiny
of financial transactions, and astute identification of telltale signs—dubbed red
flags—that may hint at potential fraud or other manifestations of financial
misconduct.
2.3 Importance of Forensic Accounting
According to Sylvester (2018), the contemporary circumstances of the role of
forensic accounting around the world is immensely significant, as it serves as a
crucial asset for lawyers, legal proceedings, law enforcement agencies,
regulatory bodies, and various other institutions involved in scrutinizing and
documenting instances of fraud. The escalating frequency of fraudulent activities
within the modern business landscape and governmental sectors necessitates the
expertise of forensic accountants to unearth deceptive practices both within and
outside organizations, particularly in contexts such as Nigeria. Additionally, the
persistent shortcomings in auditing practices over the past half-century have
precipitated a transformative shift in the field of accounting. Conventional
wisdom now acknowledges that auditors bear the responsibility of conducting
tests to uncover significant errors if they exist5. Notably, the domain of fraud
detection has prompted the engagement of specialized professionals known as
forensic accountants in advanced economies, as they are tasked with
investigating cases of corruption and financial malfeasance.
2.4 Stages in Investigation of Financial crimes
Meanwhile, investigating financial crimes is a complex and meticulous process
that involves several distinct stages. These stages are carefully designed to gather
evidence, analyze data, and build a comprehensive case against individuals or
entities suspected of committing financial misconduct. Below are the various
stages involved in investigating financial crimes:
• Preliminary Assessment: The investigation begins with a preliminary
assessment to determine the nature and scope of the alleged financial
crime. Investigators gather initial information, identify potential suspects,
and assess the urgency and severity of the situation. This stage helps in
developing an investigative plan and allocating resources effectively6.
• Planning and Strategy: A well-defined strategy is formulated to guide the
investigation. Investigators determine the objectives, goals, and
methodologies to be employed. This includes outlining the specific tasks,
5
https://www.researchgate.net/publication/339612681_The_Relevance_of_Forensic_Accounting_Issues_in_Accoun
ting_and_Auditing_Practice_in_Nigeria
6
https://www.acfe.com/-/media/images/acfe/products/publication/fraud-examiners-manual/2022_fem_toc.ashx
•
•
•
•
•
•
•
assigning responsibilities, and setting timelines for each phase of the
investigation7.
Collection of Evidence: Evidence collection is a critical stage where
investigators gather relevant documents, records, financial statements,
electronic data, and any other pertinent information. This includes
subpoenas, search warrants, and interviews with witnesses or involved
parties. Proper documentation and chain of custody procedures are
followed to ensure the admissibility of evidence in court8.
Data Analysis: Collected evidence is meticulously analyzed using forensic
tools, software, and analytical techniques. Financial transactions, patterns,
and anomalies are scrutinized to identify irregularities, discrepancies, and
potential red flags. Data analysis helps reconstruct financial trails and
establish connections between individuals, transactions, and entities9.
Interviews and Interrogations: Investigators conduct interviews with
witnesses, suspects, and relevant individuals to gather firsthand information.
Skilled questioning techniques are employed to extract essential details
and ascertain the sequence of events. Interrogations may also be
conducted to elicit confessions or uncover hidden information.
Forensic Accounting Examination: Forensic accountants play a crucial role
in this stage by examining financial records, transactions, and statements.
They assess the accuracy, consistency, and compliance with accounting
principles. Forensic accountants may reconstruct financial activities, trace
fund flows, and quantify financial losses10.
Reconstruction of Events: Based on collected evidence and analysis,
investigators reconstruct the sequence of events leading up to the financial
crime. This helps establish timelines, identify key players, and uncover the
motives behind the illicit activities11.
Legal Proceedings and Charges: If sufficient evidence is gathered, law
enforcement agencies or legal teams decide whether to file charges
against the suspects. This stage involves preparing legal documents, such
as complaints or indictments, and presenting evidence to prosecutors12.
Resolution and Reporting: The investigation culminates in a comprehensive
report that outlines the findings, analysis, and conclusions. This report may
7
https://www.wiley.com/en-us/Fraud+Auditing+and+Forensic+Accounting%2C+4th+Edition-p-9780470877913
https://www.cpestore.com/pdf_courses/AA1245032/AA1245032_1378736012_book.pdf
9
https://books.google.com.ng/books?hl=en&lr=&id=J1OEAAAQBAJ&oi=fnd&pg=PP1&dq=fraud+Examination+(6th+ed.).+Cengage+Learning+pdf&ots=fzZu3khp5O&sig=
F9pH_w2vkLkz3KT2hXudFOMjCDE&redir_esc=y#v=onepage&q=data%20analysis&f=false
8
10
http://160592857366.free.fr/joe/ebooks/Corporate%20Finance/Wiley%20A%20Guide%20to%20Forensic%20Acco
unting%20Investigation.pdf
11
https://www.cpestore.com/pdf_courses/AA1245032/AA1245032_1378736012_book.pdf
12
https://www.docdroid.net/c7DIB9p/book-fraud-fighter-my-fables-and-foibles-pdf
•
be used for internal purposes, legal proceedings, or regulatory actions.
Investigators may also provide expert testimony in court based on their
findings13.
Post-Investigation Actions: After the investigation concludes, appropriate
actions are taken based on the outcomes. This may involve legal
proceedings, regulatory actions, restitution, recovery of assets, or
disciplinary measures against individuals or organizations involved in
financial crime14.
In summation, the investigation of financial crimes is a meticulously orchestrated
endeavor encompassing an array of intricately interwoven stages. This intricate
sequence of activities, marked by diligence and expertise, is geared toward
unearthing the truth, achieving justice, and maintaining the integrity of financial
systems.
https://www.cpestore.com/pdf_courses/AA1245032/AA1245032_1378736012_book.pdf
https://www.docdroid.net/c7DIB9p/book-fraud-fighter-my-fables-and-foibles-pdf
http://library.wbi.ac.id/repository/124.pdf
http://library.wbi.ac.id/repository/124.pdf
https://www.yumpu.com/en/document/read/63449470/best-pdf-executive-roadmap-to-fraud-prevention-andinternal-control-creating-a-culture-of-compliance-full-acces
13
14
https://www.yumpu.com/en/document/read/63449470/best-pdf-executive-roadmap-to-fraud-prevention-andinternal-control-creating-a-culture-of-compliance-full-acces
3.0 Section B: Techniques used by Forensic Accountants, Red Flags, and
Procedures Adopted for detecting Fraud in respect of Sales and Cash Theft
3.1 Four Main techniques used in detecting fraud
Forensic accountants wield a diverse and advanced toolkit of methodologies
strategically tailored to unveil and expose fraudulent activities deeply embedded
within the intricate fabric of financial records and transactions. These meticulously
crafted techniques operate as intricate analytical lenses, systematically scanning
for telltale signs of irregularities, anomalies, and intricate patterns that might
otherwise remain concealed. Through a delicate interplay of data analysis,
financial statement scrutiny, interviews, and meticulous document examination,
forensic accountants orchestrate a symphony of investigative precision, peeling
back layers of complexity to illuminate the subtlest indications of potential fraud.
Notable among the techniques common in the field of forensic accounting are;
Data Analysis and Computer-Assisted Techniques, Financial Statement Analysis,
Interviews and Interrogations, and Document Examination and Tracing.
Thus, Albrecht, et al (2018) emphasize that within the realm of forensic
accounting, practitioners leverage the prowess of data analysis and cuttingedge software tools to conduct swift and comprehensive scrutiny of expansive
repositories of financial data. Employing techniques such as data mining, trend
analysis, and predictive modelling, forensic accountants adeptly unveil peculiar
patterns, outliers, and disparities that could serve as potential markers of
fraudulent activities15. These computational methods prove instrumental in
exposing concealed interconnections and anomalies that might elude detection
through manual inspection alone, thereby elevating the effectiveness of fraud
detection. Furthermore, Golden, Skalak, & Clayton (2018) assert that forensic
accountants diligently delve into financial statements, reports, and records,
orchestrating an in-depth assessment of their precision, coherence, and
adherence to established accounting benchmarks. Through meticulous
evaluation of the interrelationships between diverse financial components, these
experts16 discern incongruities or irregularities that may signify attempts at
fraudulent manipulation. This intricate technique involves a thorough examination
of financial ratios, trends, and variances, thus unveiling potential deviations that
merit further meticulous investigation.
Singleton, et al (2010) underscore the indispensable role of communication
prowess within a forensic accountant's toolkit. Through the adept orchestration of
interviews and interrogations with key stakeholders entangled in financial
transactions or operations, forensic accountants gain access to invaluable
insights and firsthand information17. This strategic deployment of adept
15
https://www.gbv.de/dms/zbw/662418123.pdf
http://students.aiu.edu/submissions/profiles/resources/onlineBook/E5z9G8_Forensic_Accounting_2.pdf
17
http://ndl.ethernet.edu.et/bitstream/123456789/28491/1/178.pdf.pdf
16
questioning techniques serves as a conduit to unearth incongruities, underlying
motives, and potential collusion, thus enabling the unraveling of complex
financial entanglements. Concurrently, Albrecht, et al (2018) emphasize that
forensic accountants meticulously navigate the labyrinth of financial documents,
contracts, invoices, and assorted records with meticulous diligence, unveiling a
meticulous tracing of the intricate pathways followed by funds and transactions.
A cornerstone technique entails the meticulous reconstruction of the paper trail,
strategically exposing disparities, alterations, or incongruities that could signal the
presence of fraudulent maneuvers18. By subjecting documents to scrupulous
authenticity and integrity analysis, forensic accountants adeptly unearth
endeavors aimed at obfuscating or manipulating financial data.
3.2 Red flags in forensic accounting
Red flags are generally undesirable situations or conditions that consistently
contribute to fraud, waste, and abuse of scarce resources for individual and
organisations. When an investigator is reviewing a company’s financial records
or statements, certain undesirable characteristics may stand out as fraud red flags
– contributors to fraud or circumstances that may indicate the presence of fraud
or high probability of imminent fraud. For Singleton, et al (2010) red flags in forensic
accounting is a vital indicator that prompt investigators to delve deeper into
financial records and transactions, signaling potential irregularities, anomalies, or
instances of fraud19 is present. These flags are like warning signals, drawing
attention to areas that merit closer scrutiny due to their deviation from expected
norms or patterns. They encompass a diverse range of circumstances, behaviors,
or transactions that stand out as potential indicators of financial misconduct.
According to Albrecht, et al (2018), recognizing these red flags is essential for
forensic accountants and investigators, as they provide crucial starting points for
uncovering hidden financial improprieties and initiating comprehensive
examinations20.
Some of the typical reg flags in forensic accounting include but not limited to the
following;
• Inventory shrinkage
• Missing documents
• Multiple payments
• Spikes in invoice volume
• Frequent complaints
• Excessive number of adjusting entries
18
https://www.gbv.de/dms/zbw/662418123.pdf
http://students.aiu.edu/submissions/profiles/resources/onlineBook/E5z9G8_Forensic_Accounting_2.pdf
20
https://www.gbv.de/dms/zbw/662418123.pdf
19
3.3 The procedures adopted in detecting fraud in respect of Sales fraud and
cash theft
Extensive research findings underscore the widespread prevalence of sales fraud
and cash theft, both of which pose substantial threats to an organization's
financial well-being, reputation, and operational integrity. In response to these
pressing challenges, the expertise of forensic accountants comes to the forefront.
Entrusted with the pivotal role of uncovering and substantiating instances of these
fraudulent practices, forensic accountants play a vital part in safeguarding
financial systems. This section of the paper meticulously delineates the procedures
employed by forensic accountants to unearth and combat sales fraud and cash
theft, providing valuable insights into their strategic methodologies, sophisticated
tools, and investigative techniques.
Wells, (2019) identified the following procedures that forensic accountants adopt
to detect fraud in respect of sales fraud and cash theft:
3.4 Elements of an Investigation Report.
Data Collection and Gathering: Forensic accountants initiate the process by
collecting relevant financial data, including sales records, invoices, receipts, and
cash flow statements. These documents serve as the foundation for their
investigation and enable them to establish a baseline for comparison.
Data Analysis and Anomaly Detection: Forensic accountants employ advanced
data analysis techniques, such as trend analysis and data mining, to identify
unusual patterns or anomalies in sales and cash transactions. These anomalies
can include sudden spikes or drops in sales, unexplained discrepancies between
reported and actual cash amounts, or irregularities in transaction frequencies.
Internal Control Assessment: Forensic accountants assess the organization's
internal controls related to sales and cash handling. This involves scrutinizing
procedures for recording sales, authorizing discounts, and processing cash
transactions. Weaknesses or lapses in internal controls can be exploited by
fraudsters to perpetrate sales fraud or cash theft.
Digital Footprint Examination: In the digital age, electronic trails can provide
critical evidence. Forensic accountants analyze electronic records, such as email
communications, to identify any correspondence related to unauthorized sales
or cash transactions. Digital footprints may reveal hidden communication
channels used by fraudsters.
Reconciliation and Documentation Review: Forensic accountants meticulously
reconcile sales and cash data with supporting documentation, ensuring that
reported figures align with actual transactions. Any unexplained variances or
inconsistencies are flagged for further investigation.
Interviews and Interrogations: Forensic accountants conduct interviews with
relevant personnel, including sales staff, cash handlers, and managers. Skillful
questioning techniques are employed to uncover potential red flags,
discrepancies, or indications of collusion.
Fraudulent Scheme Identification: Based on the gathered evidence and analysis,
forensic accountants identify the specific fraudulent schemes used in sales fraud
or cash theft. This could involve schemes such as skimming, lapping, fictitious sales,
or manipulation of discounts.
Quantification of Losses: Forensic accountants quantify the financial losses
incurred due to sales fraud or cash theft. This involves estimating the monetary
impact of fraudulent transactions and their cumulative effect on the
organization's financial statements.
Presentation of Findings and Legal Support: Forensic accountants compile their
findings into comprehensive reports, detailing the evidence of sales fraud or cash
theft. These reports may be used in legal proceedings or internal actions against
the perpetrators21.
Whereas, the architecture of an investigation report is meticulously crafted,
incorporating pivotal elements that play an indispensable role in orchestrating a
thorough and coherent presentation of investigative discoveries. Skalak & Golden
(2016) highlighted the main elements of an investigation report to include; a
succinct executive summary, offering a snapshot of the investigation's essence.
Subsequently, the report delves into the contextual landscape by illuminating the
investigation's backdrop and context, thereby setting the stage for a deeper
understanding. A comprehensive exposition of the methodology employed
follows, revealing the intricacies of the investigative process. As the narrative
progresses, the findings come to the fore, presented with an unwavering
commitment to objectivity and bolstered by analytical deliberations. This
analytical discourse forms a bridge to the conclusive segment, wherein the
culmination of the investigation is distilled into succinct conclusions that
encapsulate the key outcomes. These conclusions, in turn, pave the way for a trail
of insightful recommendations aimed at shaping future actions and decisions22.
The bedrock of this systematic framework is grounded in scholarly insights,
ensuring that the report conveys not only the investigation's gravity and nuances
but also its profound implications, serving as a beacon of informed enlightenment
for stakeholders and decision-makers.
3.5 Forensic Accountant and Discovery of Hidden Assets
The question here is how does forensic accountant find out hidden assets for
individual and organisation? Studies has shown that one of the most effective
approaches employed by forensic accountant is lifestyle analysis. In simple terms,
lifestyle analysis involves determining and analysing a person’s income, expenses,
assets and liabilities to identify gaps in records. By scrutinizing gaps or mismatches,
a forensic accountant can uncover evidence that a party’s income or net worth
isn’t what it appears to be. For example, if a party’s known income sources and
liquid assets are insufficient to support his or her standard of living, it’s likely that he
21
22
https://vk.com/doc399904795_474859154?hash=rseIgqGtZrNMGOWizykGc0IKYQ40CTUdzNIkp4pmxsD
https://www.gbv.de/dms/zbw/662418123.pdf
or she is hiding something (see figure 5 for approaches used by forensic
accountants to find hidden assets).
Lifestyle Analysis
Bank Deposit
Method
Expenditure
Method
Assets Analysis
Method
Figure 5: Approach to Discovery of Hidden Assets
Lifestyle Analysis
Forensic accounting methods above has been used in the past to reveal hidden
assets and sources of income. They can be invaluable in a variety of litigation
contexts. For example, forensic accountants can help support a fair division of
property in divorce cases, trace and recover funds in fraud cases, gather data
relevant to business valuations, and facilitate damages award collection.
The first step in lifestyle analysis is to develop a comprehensive financial profile of
the person in question. The accountant scrutinizes banking transactions, known
income sources and expenditures, and changes in net worth for signs of
unreported income or hidden assets as shown in figure above.
Bank Deposits Method
This technique is based on the assumption that all funds are either deposited or
spent. To reconstruct a party’s income, the financial expert 1) analyses bank
deposits, canceled checks and currency transactions, and 2) accounts for cash
payments from undeposited currency receipts and non-income cash sources
(such as gifts, loans, insurance proceeds and inheritances). Next, the expert
deducts funds from known sources from total receipts to arrive at the total funds
from unknown sources.
Expenditures Method
The expenditure method also known as the “source and application of funds
method,”. This technique involves analysing a person’s personal sources and uses
of cash for a given time period. Sources of funds may include salaries,
inheritances, loans, gifts and cash on hand at the beginning of the period. If the
person is spending more than he or she is taking in, the excess likely represents
unreported income.
Asset method
The asset method is also referred to as the “net worth analysis method,”. This
technique operates under the assumption that any unsubstantiated increase in a
person’s net worth represents unreported income. The forensic accountant then
begins by estimating the party’s net worth using bank and brokerage statements,
real estate records, loan and credit card applications, and other documents.
Next, he or she determines the increase in the person’s net worth during the
relevant time period and deducts reported income and known expenditures. The
excess represents income from unknown sources
4.0 Section C: The Concept of Evidence, Types of Evidence, Principles of Forensic
accounting, Whistleblowing Policy, Importance of Whistleblowing and Recent
case of Whistleblowing in Nigeria.
4.1 The concept of evidence in forensic accounting investigation
Forensic accounting operates within a framework that hinges on the bedrock
principle of evidence. Its primary function is to provide tangible validation or
disproof of financial Within this context, evidence comprises a complex
embroidery of information, data, records, and documentation misdeeds. Serving
as a cohesive thread, evidence bridges the gap between allegations and
conclusive findings, expertly guiding investigators through the labyrinthine
landscape of financial records and transactions. However, the value of evidence
transcends its mere presence; its true essence lies in its ability to intricately weave
together a vivid narrative of events, motivations, and manipulations that have
transpired.
In an insightful exploration of evidence within the realm of forensic accounting,
Singleton, Singleton, and Bologna (2010) underscore the critical role of evidence
as the cornerstone of investigative efficacy. They emphasize how evidence forms
the basis upon which forensic accountants construct their cases, enabling them
to meticulously dissect complex financial transactions and unveil concealed
truths23. Furthermore, Kranacher, Riley Jr., and Wells (2011) emphasize the
multifaceted nature of evidence in forensic accounting, highlighting how it
encompasses not only tangible records but also digital footprints, witness
testimonies, and expert analyses24. These diverse forms of evidence collectively
contribute to the comprehensive analysis of financial irregularities.
4.2 The principles of forensic accounting?
It is imperative to note that forensic accounting operates within a framework
fortified by key principles, each weaving into the fabric of investigative rigor and
ethical conduct. These principles form the bedrock upon which forensic
23
24
http://ndl.ethernet.edu.et/bitstream/123456789/28491/1/178.pdf.pdf
https://www.icmab.org.bd/wp-content/uploads/2021/01/1.Forensic.pdf
accountants navigate the complex landscape of financial scrutiny. Hence,
Singleton, Singleton, and Bologna (2010) elucidated the principles of forensic
accounting as follows:
Objectivity: Forensic accountants uphold an unwavering dedication to
impartiality and neutrality, ensuring that their analyses and conclusions remain
untainted by personal bias or external influence. This principle safeguards the
integrity of investigations and underscores the commitment to objective truthseeking.
Thoroughness: The principle of thoroughness dictates an exhaustive and
meticulous examination of financial records, sparing no effort in the pursuit of
unearthing the truth. This tenet compels forensic accountants to meticulously
scrutinize every facet of financial documentation, regardless of its apparent
significance, thereby leaving no stone unturned.
Professional Competence: Forensic accountants are mandated to possess a
robust skill set that encompasses a spectrum of expertise, including profound
knowledge of accounting principles, legal acumen, and investigative
proficiency. This requisite professional competence empowers forensic
accountants to navigate the intricate complexities of financial malfeasance with
expertise and finesse.
Integrity: The ethical compass of forensic accounting necessitates unwavering
integrity in every facet of the investigative process. This core principle ensures that
all aspects of an investigation are conducted transparently, honestly, and in
accordance with the law, fostering a foundation of trust and authenticity.
Confidentiality: Given the sensitive nature of forensic accounting investigations,
safeguarding the confidentiality of information assumes paramount importance.
Upholding this principle involves the meticulous preservation of sensitive data,
preventing unauthorized dissemination, and protecting the privacy of all parties
involved25.
Meanwhile, in the dynamic landscape of forensic investigation, a rich
needlepoint of evidence types is deftly woven together to construct a complex
and compelling narrative. This multi-layered approach is a testament to the
painstaking rigor with which forensic investigators navigate the convoluted realm
of financial improprieties. Each evidence type contributes a unique hue to the
canvas, culminating in a vivid portrayal that leaves no stone unturned. Let us
delve into the expansive panorama of forensic evidence, each type serving as a
distinct brushstroke that contributes to the masterpiece of truth-seeking.
4.3 The Types of evidence
In the context of forensic accounting or investigation, evidence is broadly
categorised into four (4) see figure 2 below
25
http://ndl.ethernet.edu.et/bitstream/123456789/28491/1/178.pdf.pdf
Physical
evidence
Documentary
evidence
Demonstrative
evidence
Testimonial
evidence
Figure 3: Types of Evidence
The four types of evidence are physical evidence, documentary evidence,
demonstrative evidence, and testimony. Physical evidence is defined as tangible
objects such as weapons, trace evidence, blood or fibres, and fingerprints.
Documentary evidence is any type of written or recorded evidence, such as a
telephone conversation recording. Demonstrative evidence is evidence that is
used to help recreate or illustrate a crime. Lastly, testimony is evidence given by
a witness during a trial.
4.4 Whistleblowing and Whistleblowing Policy in Nigeria.
In the realm of combating corruption, fraud, and embezzlement, Nigeria has
harnessed a powerful ally—whistleblowing. This mechanism, born out of a growing
need for transparency and accountability, has evolved into a cornerstone of
Nigeria's efforts to cleanse its governance structures. The Whistleblowing Policy in
Nigeria is a legal framework designed to encourage individuals to report acts of
corruption, financial malfeasance, and other wrongdoings within both the public
and private sectors. Introduced in 2017, through the Whistleblower policy, with the
aim to create an environment where whistleblowers can come forward without
fear of retribution, thus facilitating the exposure and subsequent investigation of
illicit activities26.
Under this policy, whistleblowers are encouraged to report their concerns through
designated channels, ensuring confidentiality and safeguarding their identities.
The Nigerian government has established the Presidential Enabling Business
Environment Council (PEBEC) as the coordinating body for whistleblowing
activities. Reports can be submitted through various means, including an online
portal, mobile application, or physical submission to authorized institutions. Once
26
https://whistle.finance.gov.ng/Home/About#:~:text=The%20Federal%20Ministry%20of%20Finance,and%20theft%
20to%20report%20it.
a report is received, relevant authorities are tasked with conducting thorough
investigations and taking appropriate actions against wrongdoers.
4.5 Importance of Whistleblowing policy
The Whistleblowing Policy in Nigeria emerges as a multi-dimensional force of
paramount importance, steadfastly positioned at the forefront of the ongoing
battle against corruption and financial misconduct. Through its robust
mechanisms and avenues for reporting, it embodies Nigeria's resolute dedication
to cultivating an environment of integrity, transparency, and accountability.
Below are the whistleblowing policy’s key areas of importance:
Promotion of Transparency and Accountability: This policy serves as a catalyst for
transparency across both public and private sectors, imposing a sense of
responsibility upon entities for their actions. By actively encouraging individuals to
embrace the role of whistleblowers, the policy systematically exposes concealed
wrongdoings that might otherwise have remained veiled from scrutiny.
Deterrence against Misconduct: The existence of a whistleblowing framework
exerts a powerful deterrent effect upon potential wrongdoers. This mechanism
sends a resounding message that unethical practices will not go unnoticed or
unaddressed, effectively curbing the inclination toward illicit activities.
Optimized Resource Allocation: Through the act of whistleblowing, instances of
embezzlement and fraud are systematically unearthed, thwarting various
attempts to divert public funds for personal gain. This process ensures that
valuable resources are channeled toward genuine developmental endeavors,
fostering a more equitable and progressive society.
Reinforced Legal Safeguards: The effort to pass the Whistleblower Protection Act
exemplifies Nigeria's unwavering commitment to safeguarding individuals who
expose corruption and misconduct. This legal framework when passed would
offer a sanctuary for whistleblowers, emboldening them to step forward without
the specter of potential retaliation, thereby ensuring a continuous flow of vital
information.
Attraction of Foreign Investment: The robust anti-corruption stance, bolstered by
an efficacious whistleblowing system is capable of fortifying Nigeria's image on
the global stage. This resolute commitment to ethical business practices
showcases Nigeria as an investment-friendly destination, thereby fostering an
environment conducive to foreign investments.
4.6 Recent Case of Whistleblowing in Nigeria
A compelling illustration of the remarkable effectiveness of whistleblowing within
Nigeria's context emerges through the high-profile case cantered around
Abdulrasheed Maina. At the time, Maina held the significant position of the former
chairman of the Presidential Task Team on Pension Reforms. In 2017, a cascade
of allegations enveloped Maina, accusing him of orchestrating a massive
embezzlement scheme involving pension funds that amounted to staggering
sums in billions of Naira27. This audacious financial misconduct sent shockwaves
through the nation, underscoring the deeply entrenched nature of corruption
within certain echelons.
The narrative took a pivotal turn with the pivotal role played by a vigilant
whistleblower. A figure whose identity remains cloaked, this individual
courageously unveiled Maina's elusive whereabouts, a breakthrough that paved
the way for a cascade of events with far-reaching implications. Subsequently, law
enforcement agencies were able to promptly apprehend Maina, signalling a
groundbreaking moment in Nigeria's relentless pursuit of accountability28.
5.0 Section D: Money laundering process, Phases in Money Laundering Process,
and Notable Cases of Money Laundering in Nigeria.
5.1 Money laundering process
Money laundering, often associated with criminal activities and illicit gains, is not
a single event but a complex process designed to conceal the origins of illegally
obtained funds. This paper delves into the multi-faceted nature of money
laundering, shedding light on how it operates as a systematic process to transform
tainted money into seemingly legitimate assets. It encompasses a series of distinct
stages, each meticulously orchestrated to achieve the ultimate goal of
legitimizing ill-gotten gains. These stages are characterized by their
interconnectivity and careful execution29. At its core, money laundering is a
process that operates with calculated precision as captured in figure 1 below.
Placement
Layering
Integration
Figure 1: Money Laundering process
Money laundering encompasses a sequence of distinct and purposeful stages,
each playing an essential role in achieving the overarching objective of
legitimizing ill-gotten gains30. These stages are neither haphazard nor isolated;
instead, they form a cohesive chain of events, intricately linked and seamlessly
executed to navigate the intricate web of financial systems and regulations.
27
https://www.premiumtimesng.com/news/top-news/245369-maina-court-may-issue-bench-warrant-arrest.html
https://guardian.ng/opinion/maina-is-the-hunter-now-hunted/
29
https://www.maurizioturco.it/bddb/2006_02_16_the_amounts_and_.pdf
30
https://www.adb.org/sites/default/files/publication/27932/countering-money-laundering.pdf
28
5.2 Money laundering Phases and Process
The commencement of the money laundering process initiates with the
"placement" phase following the accumulation of dirty money, representing a
foundational stride characterized by its intricacy and strategic manoeuvring as
captured in figure 2 below.
At the inception, the unlawfully procured funds are strategically introduced into
the legitimate financial landscape, employing a meticulous orchestration of
tactics. Often, substantial sums of tainted money are intentionally broken down
into smaller, inconspicuous amounts. Subsequently, these fragments traverse an
intricate maze of transactions, traverse a spectrum of financial institutions, and
populate a network of accounts. This artful dispersion aims to establish a
considerable distance between the funds and their illicit origins, thus erecting
formidable barriers against potential detection by law enforcement or financial
entities.
Following the initial "placement" stage, money launderers seamlessly transition
into the sophisticated realm of "layering." This intricate progression entails a
calculated sequence of financial operations, encompassing conversions,
transfers, and intricate movements of funds. The deliberate orchestration of these
maneuvers is devised with the specific intention of sowing the seeds of confusion
and complexity, rendering any attempt at tracing the funds increasingly
perplexing. The global landscape becomes a canvas for myriad transfers across
borders, the conversion of currencies, and the intricacies of diverse financial
undertakings. This intricate dance of financial artistry aims to cloak the underlying
paper trail with a veil of enigma, defying investigators and shrouding the true
nature of the tainted funds in obscurity.
Culminating with precision and finesse, the apex of the money laundering process
unveils itself as the "integration" stage. Within this pivotal phase, the laundered
funds, having undergone an elaborate metamorphosis, emerge with an illusion of
impeccable legitimacy. This transformation often assumes the form of judicious
investments, acquisition of high-value assets, or the orchestration of financial
transactions that resonate with an appearance of lawful conduct31. The delicate
merging of the once-tainted funds with their untainted counterparts casts a
deliberate haze upon the demarcation between legitimate and illicit wealth. As
a result, the line between these realms becomes blurred, rendering the
disentanglement of the two nearly insurmountable.
In essence, the narrative of money laundering transcends the realm of isolated
actions, blossoming into an intricate symphony of orchestration. The stages of
"placement," "layering," and "integration" interlock seamlessly, each contributing
a pivotal note to the melodic progression. The collective composition of this
symphony is centered around the conversion of ill-gotten gains into assets that
31
https://www.cpestore.com/pdf_courses/AA1245032/AA1245032_1378736012_book.pdf
appear to bear the hallmarks of legitimacy. This orchestration embodies the heart
of money laundering—a meticulously choreographed endeavor that artfully
navigates the intricate landscape of finance.
5.3 Notable Cases of Money Laundering in Nigeria
Prominent instances of notable money laundering cases in Nigeria include the
likes of James Ibori case, Diezani Alison-Madueke Case, and the Abacha Loot
Case. James Ibori faced legal proceedings in a UK court in 2012, resulting in a
conviction on money laundering and associated charges. Subsequently, it was
revealed that Ibori had embezzled substantial sums from state funds and adeptly
funneled the illicit proceeds through intricate channels, including offshore
accounts, shell companies, and opulent real estate properties. This case
spotlighted the deep-seated corruption and money laundering prevalent within
Nigeria's echelons of political and business influence32.
Diezani Alison-Madueke, who previously held the position of Nigeria's Minister of
Petroleum Resources, found herself ensnared in allegations of both money
laundering and corruption during her tenure. Accusations were levied against her
for siphoning billions of dollars from the country's oil revenue, subsequently utilizing
various illicit methods to legitimize the ill-gotten gains. This encompassed the
acquisition of lavish high-value real estate and luxury commodities. Her case
starkly illuminated the intricate intertwining of political authority, economic
exploitation, and the intricate world of money laundering within Nigeria33.
The Abacha Loot Case pertains to funds embezzled by the former Nigerian
military dictator, General Sani Abacha, during his time in power. Following his
demise, concerted endeavors were launched to recover the pilfered assets.
Substantial monetary sums were successfully repatriated from diverse foreign
bank accounts and jurisdictions. The complexities and challenges inherent in
reclaiming misappropriated funds were underscored by this case, shedding light
on the global scope of money laundering, further exacerbated by the
involvement of Nigerian officials34. Collectively, these illustrative cases cast a
somber light on the pervasive specter of money laundering within Nigeria. They
reinforce the critical imperative for ceaseless vigilance and resolute action in
combating corruption, fortifying transparency, and reinforcing the efficacy of
anti-money.
32
https://www.bbc.com/news/uk-england-london-17740891
https://www.premiumtimesng.com/news/headlines/432021-court-orders-diezani-to-forfeit-dubai-houses-fundsto-nigerian-govt.html
34
https://www.justice.gov/opa/pr/united-states-seeks-recover-approximately-38-million-allegedly-obtainedcorruption-involving
33
References
Albrecht W. S., Albrecht C. O., Albrecht C. C., & Zimbelman M. F. (2012) Fraud
Examination (4th Ed). Ohio: South Western Cengage Learning.
Crumbley, D., Heitger, L., Smith, G. (2013); Forensic and Investigative Accounting.
CCH
Golden, T.W., S.L. Skalak, and M.M. Clayton, (2011); A Guide to Forensic
Accounting Investigation, 2nd ed. Hoboken, NJ: John Wiley & Sons.
Hopwood, W.S., J.J. Leiner, and G.R. Young, (2011); Forensic Accounting and
Fraud Examination, 2nd ed. New York: McGraw-Hill Irwin.
Kranacher, M.J Riley, Jr., R.A. and Wells, J.T. (2011); Forensic Accounting and Fraud
Examination. (Hoboken, NJ: John Wiley & Sons1)
Manning, G.A. (2005). Financial Investigation and Forensic Accounting, 2nd
Edition, Taylor and Francis Group: USA.
Rasey,
M
(2009).
History
of
forensic
accounting.
http://www.ehow.com/about_05763_history forensic accounting, Rezace
Silverstone, H., Sheetz, M. (2007). Forensic Accounting and Fraud Investigation for
Non-Experts, 2nd edn. Wiley, New York, NY,
Singleton, T., Singleton, A., Bologna, J. and Lindquist, R.J. (2010). Fraud Auditing
and Forensic Accounting, 3rd edn. Wiley, Toronto
Wells J.T., 2011. Corporate fraud handbook: prevention and detection, 3rd
edition, John Wiley&Sons. Inc., Hoboken, New Jersey.
Wong S. & Venkatraman S., (2015) Financial accounting fraud detection using
business intelligence, Asian Economic and Financial Review.
Download